Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/6495
Full metadata record
DC FieldValueLanguage
dc.contributor.authorYisa, L. Victor-
dc.contributor.authorBaba, meshach-
dc.contributor.authorOsho, Oluwafemi-
dc.contributor.authorSule, Anthony-
dc.date.accessioned2021-07-05T11:46:48Z-
dc.date.available2021-07-05T11:46:48Z-
dc.date.issued2018-01-
dc.identifier.otherDOI: 10.5815/ijcnis.2018.01.05-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/6495-
dc.description.abstractUnauthorized Access has been difficult to stop or prevent in the last few decades using username and password authentication only. For an individual, data breach might just be a simple case of espionage or the loss of private credentials, for an enterprise, this could mean the loss of billions of dollars. Preventing Unauthorized Access to Enterprise Systems Using a Location-based Logical Access Control proposes a framework that uses time and location in preventing and defending against data breaches. The framework was developed using Java with an Eclipse IDE. The database was designed using MySQL and locations were collected using Google Maps API. Users registered at different locations in a university campus were unable to access another’s account in the database because they were both outside the known location and tried to do this at offwork hours. Users were registered with username and password at specified locations. The users are then made to login from same and different locations with correct username and passwords. it was discovered that access to the database was only given when the username and password was correct and location was same as at registered or as allowed by an administrator. The system was found to protect against unauthorized access arising from stolen login credentials and unauthorized remote logins from malicious users.en_US
dc.language.isoenen_US
dc.publisherI. J. Computer Network and Information Securityen_US
dc.subjectUnauthorized Accessen_US
dc.subjectAccess controlen_US
dc.subjectgeolocationen_US
dc.subjectAdministratoren_US
dc.subjectGoogle Gearsen_US
dc.subjectLocationen_US
dc.titleApplication of Geo-Location-Based Access Control in an Enterprise Environmenten_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
Application of Geo-Location-Based Access control in an enterprise environment.pdf496.05 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.