Research Article

A Novel Security Approach for Access Model

by  Teena Jaiswal, Umesh Kumar Singh, Shabana Sheikh
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 138 - Issue 9
Published: March 2016
Authors: Teena Jaiswal, Umesh Kumar Singh, Shabana Sheikh
10.5120/ijca2016908953
PDF

Teena Jaiswal, Umesh Kumar Singh, Shabana Sheikh . A Novel Security Approach for Access Model. International Journal of Computer Applications. 138, 9 (March 2016), 25-30. DOI=10.5120/ijca2016908953

                        @article{ 10.5120/ijca2016908953,
                        author  = { Teena Jaiswal,Umesh Kumar Singh,Shabana Sheikh },
                        title   = { A Novel Security Approach for Access Model },
                        journal = { International Journal of Computer Applications },
                        year    = { 2016 },
                        volume  = { 138 },
                        number  = { 9 },
                        pages   = { 25-30 },
                        doi     = { 10.5120/ijca2016908953 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2016
                        %A Teena Jaiswal
                        %A Umesh Kumar Singh
                        %A Shabana Sheikh
                        %T A Novel Security Approach for Access Model%T 
                        %J International Journal of Computer Applications
                        %V 138
                        %N 9
                        %P 25-30
                        %R 10.5120/ijca2016908953
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In vision of the importance of researcher’s sharing the same theory of network security, this paper suggests a novel security approach for network security in which network security issues can be treated essentially. The meaning of network security has been identified for some time, but provides networks (especially public networks) with security utilities has proven difficult. The act of the network itself in computer network security has been minimum , as systems certainly preserve their own security. To resolve such problems, this paper recommends a network security approach for the access model.

References
  • Bell D.E. and LaPadulaL.J.,"Secure Computer System:Unified Exposition and Multics Interpretation", MiterMTR-2997(March 1976)
  • SynderL.,"Formal Models of Capability-BasedProtectionSystems", IEEE Trans. on Computers, C30,3,pp.172-181(March 1981).
  • Clark D.D. and Wilson D.R.,"A Comparison of Commercial and Military Computer Security Policies",IEEESymp.on Security and Privacy, pp.184-194 (1987).
  • Brewer D.F.C. and Nash M.J.,"TheChineseWallSecurityPolicy", IEEE Symp. on security and Privacy, pp.206-214 (1989)
  • Robert Koch, Björn Stelte, Mario Golling, “Attack Trends in Present Computer Networks”, 4th International Conference on Cyber ConflictC. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 .
  • D. Denning, Information Warfare and Security,P163-183, Addison-Wesley Publishers, 1999.
  • K. An Liu,R. Peng Ning, D. Maughan, Securing Network Access in Wireless Sensor Networks, WiSec’09, March 16 9,2009, Zurich, Switzerland. Copyright 2009 ACM 978-1- 60558-460-7/09/03
  • Y. Y. Carsten Maple, "Reliability, Availability and Security of Wireless Networks in the Community," Informatica, p. 8, 2007.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Access policy network security VPN Close User Group Wireless sensor network.

Powered by PhDFocusTM