Abstract
With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted.
Highlights
Access management includes diverse ways a user can gain access to an identity and the various technologies that offer protection to that identity
Security is a serious concern in the present day scenario in sectors like educational institutions, governmental applications, financial institutions, military organization, etc., it needs to be ensured that the security measures should be user ergonomic and adoptable
The paper presents the explicit discussion of the prior research works introduced in the past for the purpose of incorporating secure authentication and authorization for any legitimate members attempting to perform secure transactions
Summary
Access management includes diverse ways a user can gain access to an identity and the various technologies that offer protection to that identity. The access to an identity by the right user at the right time is taken care of in Access Management [1]. Access management in public and private networks is a serious concern in the field of Information Technology. Security is a serious concern in the present day scenario in sectors like educational institutions, governmental applications, financial institutions, military organization, etc., it needs to be ensured that the security measures should be user ergonomic and adoptable. A security system relies on Access Management that is found to be the first checkpoint in network security [5]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have