ISSN 2278-9723
 

Research Article 


User Authentication Mechanism for Access Control Management: A Comprehensive Study

SAJAAD AHMED LONE, A.H. MIR.

SUPPLEMENTARY FILES :

  • 18-1645596518-adt-1.pdf ()
  • Abstract
    The threat of cyberattacks is growing in all sectors today, including banks, governments, healthcare institutions and other organizations due to the exponential increase in cloud, IOT and smart devices utilization in recent years. When it comes to protecting organizations' and clients' information and privacy in security risks, there is a strong desire to develop and use more secure authentication techniques. This paper presents an overview of authentication techniques built on the fundamental authentication metrics, i.e., knowledge, ownership, and biometrics, their advantages, limits, and open issues, and future possibilities for developing secure authentication techniques for securing critical and sensitive information.

    Key words: User Authentication, OTP, Multifactor, Knowledge, Token, Biometrics, Access Control Management


     
    ARTICLE TOOLS
    Abstract
    PDF Fulltext
    How to cite this articleHow to cite this article
    Citation Tools
    Related Records
     Articles by SAJAAD AHMED LONE
    Articles by A.H. MIR
    on Google
    on Google Scholar


    How to Cite this Article
    Pubmed Style

    LONE SA, MIR A. User Authentication Mechanism for Access Control Management: A Comprehensive Study. . 2022; 10(2): 54-63. doi:10.31838/ijccts/10.02.06


    Web Style

    LONE SA, MIR A. User Authentication Mechanism for Access Control Management: A Comprehensive Study. https://www.ijccts.org/?mno=88909 [Access: April 05, 2022]. doi:10.31838/ijccts/10.02.06


    AMA (American Medical Association) Style

    LONE SA, MIR A. User Authentication Mechanism for Access Control Management: A Comprehensive Study. . 2022; 10(2): 54-63. doi:10.31838/ijccts/10.02.06



    Vancouver/ICMJE Style

    LONE SA, MIR A. User Authentication Mechanism for Access Control Management: A Comprehensive Study. . (2022), [cited April 05, 2022]; 10(2): 54-63. doi:10.31838/ijccts/10.02.06



    Harvard Style

    LONE, S. A. & MIR, . A. (2022) User Authentication Mechanism for Access Control Management: A Comprehensive Study. , 10 (2), 54-63. doi:10.31838/ijccts/10.02.06



    Turabian Style

    LONE, SAJAAD AHMED, and A.H. MIR. 2022. User Authentication Mechanism for Access Control Management: A Comprehensive Study. International Journal of Communication and Computer Technologies, 10 (2), 54-63. doi:10.31838/ijccts/10.02.06



    Chicago Style

    LONE, SAJAAD AHMED, and A.H. MIR. "User Authentication Mechanism for Access Control Management: A Comprehensive Study." International Journal of Communication and Computer Technologies 10 (2022), 54-63. doi:10.31838/ijccts/10.02.06



    MLA (The Modern Language Association) Style

    LONE, SAJAAD AHMED, and A.H. MIR. "User Authentication Mechanism for Access Control Management: A Comprehensive Study." International Journal of Communication and Computer Technologies 10.2 (2022), 54-63. Print. doi:10.31838/ijccts/10.02.06



    APA (American Psychological Association) Style

    LONE, S. A. & MIR, . A. (2022) User Authentication Mechanism for Access Control Management: A Comprehensive Study. International Journal of Communication and Computer Technologies, 10 (2), 54-63. doi:10.31838/ijccts/10.02.06