Research on Access Control Method by User Authority Using Two-Factor Authentication

With the recent development of IT society, the value of knowledge information has been focused more importantly. However, the accidents of personal and corporate secrets being leaked frequently happen, and also the damage is getting bigger day by day. The important information of individuals and businesses is leaked or processed by outside attacks or personal mistakes, thus misused, and thereby considerable damage is occurring. For this reason, the necessity of how to effectively manage personal and corporate information is emerging. This paper intends to suggest a method that can protect servers and media information, which requires security.

Provided by: Science and Development Network (SciDev.Net) Topic: Security Date Added: Jun 2013 Format: PDF

Find By Topic