Access control is the selective restriction to a point or a place .access control is majorly based in the physical and information security .this act of accessing may be in terms of using, consuming or entering without full permission from sources or people of interest. Physical security maybe enforced factors such as fencing, security guards or borders; access control refers to the practice of restricting entrance to places such as buildings to authorized persons. Information control refers to the use of computers where it involves procedures such as authentication, authorization, and audit. Control systems are computer-based systems that controls and monitors physical process taking place, control systems represents a wide variety of information technology system network which is connected to the physical world.
Access control systems are composed of network agents comprising of sensors actuators, control processing units, and communication devices that monitor and control physical processes. The above topic of access control is the most suitable on the research due to revolution of the use of computers and software’s to run the world .technology change is inevitable and therefore.
it requires updates of new measures to be undertaken in terms of access control of most important sectors of human activities ,these includes personal security ,information security and also from health .furthermore people need to protect their families in terms of financial security (threat from being robbed through cybercrimes),government need also to protect its secrecy in terms of release of crucial information’s to the public, countries also need to protect themselves from possible threats from their enemies such as terrorist attacks or rival nations .all these threats will only be summarized through the access control of either information security or physical security, (Vainstein, 2012).
This paper studies on the access control systems employed by various malty agencies in order to boost their security in form of data security and financial security with special emphasis on absurd rise in threats of insecurity due to revolution of technology, in this research we provide a brief summary of the current approaches and their relevance in tackling these threats. We shall also take into special notice on the new proposals and assumptions on ways of solving the threats by various professionals’ .much attention will also be emphasized on issues related to confidentiality, authentication control mechanisms which are employed by these multi agencies to minimize security incidents.
Nowadays, due to the high rise of insecurity threats, companies, households, governments and other institutions employ the services of multi-agencies security systems to solve complex that normally occurs from time to time. In terms of security multi-agency systems do address issues such as confidentiality of information, integrity and authentication and access control using well planned techniques In this particular research, we shall discuss a case involving a multi agent systems which has shown to be very useful in the of Electronic Healthcare sector which helps in solving issues, (Vainstein, 2012).
Cardenas, 2018 performs an interesting research and review on this aspect of the health system. According to his conclusions and findings, he says that the ease of operating the health system can be achieved by establishing good communications between different healthcare systems, he further explains that intertwine network between all the health sectors will help in solving the common problems of early death though availability of drugs or the donor in different locations.
The security and privacy issues that arise within the sector of e-health can be handled through use of appropriate identity authentication management system, confidentiality of the people involved will also be put into top priority where the people involved in the agencies will be well scrutinized .can then be handled within the appropriate identity authentication management system, and also ensure that they posses good values such as integrity and confidentiality.
2. Analysis
2.1 use of multi- agency system in e-health
This literature review was performed on February 2012, where the survey was conducted on the willing participants, the main aim of the survey was to identify whether the access control system was suitable and could work well in the chosen topic of e-health system. The agency developed an application on titled healthcare, which could be used in any devices from androids, Mac, and apple. The application required the users to register their personal account which was supposed to b confidential, afterwards they were required to perform any healthcare request in the institution of their choice.
Although the use of multiagency system has proved to be working well in the e-health se, it faces some security threats such as attacks by fake hosts who pretend to be the original owners of the data. This problem can be solved by using Mobile Multi-Agent Security Architecture (MMASA). This program uses Authentication, Confidentiality, and Integrity for digital signatures to Access Control, (Carter and Zolotov, 2003).
Before the information was retrieved by the trusted malty-agency firm, various possible methods were used trying to retrieve data from the clients using the java authentication systems, the results obtained were negative its only until the trusted personnel from the agency used the right procedure of authentication that the full information’s could be obtained .this shows that the main aspects needed only for the information’s to be kept safe in various organizations is through the use of the most trusted firms .hence the most basic security concepts which are mostly used include a reviewing the security policies of the agency firm and authenticity of the security access . In this proposal, security policies are specified to control the entities of mobile agent systems.
2.2 procedures
To attain the proposed requirements some of the important features of the access control to information such as authentication, and obligation policies have to be fully supported. This paper introduces some solutions which can establish trust, unlike the traditional security ways which have been used in the past which various problems of using authentication trust the expert’s suggestions this some of the methods which can be used includes improving on the authorization and decomposition structure process, integrating behavioral and cryptographic-based evidence and mostly in-debt evaluation of evidence.
Trust Management, can be divided into hard trust concept which includes authentication and authorization while soft trust concepts of trust policies are evidence, trust evaluations and decisions. It is also speculated that the current security systems faces major problems relating to violation of clients identity , lack of proper protocols in the security hierarchy and in open environments compared to closed environments and lack of evidence
4. Discussion
In detail various multi-agent firms use various frameworks to deal with information security, it’s found that most of these agencies also use physical methods of security protections, this includes prevention of direct access to the data storage centers by intruders or thugs. well trained security personal are stationed at various data entries points, special keys and authentication passwords are also used to prevent fraudsters from accessing the protected points, in summary, the most secure means for information security appear to be the use of trust and proper authentication, (Pathan, 2016).
5. Applications 5.1 application of multi-agency in security control
The use of electronic identification methods by various security firms has proved to be useful in various ways, because this method has proved to be working well in the field of healthcare sector ,it can also be extended to various sectors of defense such as military, police and personal identification, in case of threats or suspicion of criminals activities of certain group of people, the trusted personnel in the contracted agency could easily locate the problem .this method can also be used in the bio-defense scenarios, these includes evaluation, data efficacy and detection tools, (Sicuranza, et al, 2015).
5.2Problems facing multi-agency firms
Owing to the critical response time requirements, multi-agency system (MAS) may need to use a large number of computing resources which may function over diverse number of domains. It is also useful to note that the multi-agency security system methods may be used in military; this may be used to develop a more medical command system Carter. Due to the growing demand of multi-agent technologies, there is more need to develop a more advance integrated system, this will enable it to meet the increasing demand of new dynamic applications owing to increase in use of wireless media.
5.3 cost implication factors
Access control falls under the expansive security sector, issues of security control requires substantial investments; this has restricted the operating market to large firms, military and the government. The cost of hiring multi-agency firms to manage the security is quite high up to date, some of the best companies dealing with physical and computer related security are quite expensive. Recently there has been much research being undertaken to promote a low cost and effective security control measures, (Cavusoglu, 2004)
Benefits of using multi-agency security access control
6.1Enhance building security
Access control can be used to limit security of different areas, the use of electronic system in the building can also take into account of the number of people who accessed the building and also record the specific time automatically, this means that the staff and other people who can access the building at the wrong time can be barred to access the building at the wrong time, (Goyal, 2006).
6.2Save costs
Access control using the electronic means minimises on the cost used in printing identification documents, this also means unauthorised usage is minimized; records can also be kept in large copies in hard disks, which is a quite effective means of storage.
7. Challenges facing of access control measures by multi-agency firms
7.1lack of persistent policies
Diversity make real challenge to control persistence in access control, data moves from one location to another ,from offices to home and coffee shops connected through W-fi hotspots, which makes it very vulnerable to attacks and cyber-crime. Multiple technologies need to come in concert to achieve a level of desired solutions ,most companies have become adept at authentication ,these include biometric-based authentication ,in recent years high data breaches has become a trend in the changing technological world, more secure control measures should also be designed, (Wang, 2010)
Conclusions
Application of access control mechanisms in health care through the multi-agency creates a path for, the more expansive approach to information security protection. There is a need for more advance security protections approaches, these are due to, advance in technology, human interest conflict which results in trust issues, and the use of technical protection services.
There is also unprecedented opportunities for individuals to access information in improved and novel ways, this could also have a negative impact on public access to information, therefore most developments should be monitored closely, (Sreedhar, 2017). Existing research provides useful information for the various developing multi-agency firms, however it is important to note that there is more need for methodologically sound research which will be able to investigate the performance and importance of different multi- agency firms in working effectively in improving service delivery. Research should also be carried to conduct cost assessments, ways of regulating the cost being of services being charged to clients and companies, (Cárdenas, 2016)
To improve access control measures in terms of network security protection in the greater collaboration between inter-agency and working relations should be of priority (Sreedhar, 2017). Lack of collaboration between these firms has been highlighted in major research studies; this blocks improvements on the security sector since it blocks new information from. It is recommended that various multi-agency firms, including the government, institutions and technology providers should work hand in hand through discussions and projects to study on improvements of security through the access control. Legal laws should be set by the government in order to prevent matters which include security breach, cybercrimes, and information theft
Reference
Carter, E., & Zolotov, V. (2003). U.S. Patent Application No. 09/766,560. Sreedhar, V. C. (2017). U.S. Patent No. 9,785,799. Washington, DC: U.S. Patent and Trademark Office.
Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006, October). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security (pp. 89-98). Acm
Rodenbeck, R. W., Russell, R. K., & Long, M. L. (2004). U.S. Patent No. 6,720,861. Washington, DC
Vainstein, K. (2012). U.S. Patent No. 8,176,334. Washington, DC: U.S. Patent and Trademark Office.
. Wu, S. L., Tseng, Y. C., & Sheu, J. P. (2000). Intelligent medium access for mobile ad hoc networks with busy tones and power control. IEEE journal on Selected Areas in Communications, 18(9), 1647-1657.
Yu, S., Ren, K., & Lou, W. (2011). FDAC: Toward fine-grained distributed data access control in wireless sensor.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download