{"id":2049,"date":"2019-09-17T10:08:16","date_gmt":"2019-09-17T10:08:16","guid":{"rendered":"http:\/\/tutorsindia.com\/academy\/?p=2049"},"modified":"2022-12-15T10:33:02","modified_gmt":"2022-12-15T10:33:02","slug":"secure-access-control-framework-for-fully-fledged-network-security-control","status":"publish","type":"post","link":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/","title":{"rendered":"Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve Security."},"content":{"rendered":"\n<h4><a style=\"color: #7694cb;\" href=\"#\" data-wplink-edit=\"true\">Engineering  &amp; Technology<\/a><\/h4>\n\n\n\n<p><h2><strong>Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve Security.<\/strong><\/h2>Sep 17, 2019<\/p><\/br>\n\n\n\n<h3>RESEARCH REPORT<\/h3>\n<div class=\"pdffile\">\n<p><a href=\"https:\/\/tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/Secure-Access-Control-Framework-for-Fully-Fledged-security-control.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><button>View Full Report <i class=\"fa fa-eye 3x\"><\/i><\/button><\/a><\/p>\n<\/div>\n\n\n\n<h1><strong>In Brief:<\/strong><\/h1>\n\n\n\n<ul style=\"font-weight: normal;\"><li>AI promises to booth data access control in cloud computing platforms. <\/li>\n<li>Developing a novel algorithm using the ML approach to classify user\u2019s behaviour is significant to bridge the gap among theory and real-time application.<\/li>\n<li>The access control and security management framework along with effective ML would provide guidance information for the cloud customers and administrators to make decisions.<\/li><\/ul><br>\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;The access control and security management framework along with effective machine learning would provide guidance information for the cloud customers and administrators to make decisions, for instance, migrating tasks from dynamically allocating resources, suspect nodes to trustworthy nodes and managing the trade-off among the cost of resources and degree of redundancy.At the present scenario, the cloud environment widely used in numerous fields, \nnamely, web applications, healthcare, mobile social networks, e-commerce, data storage, gaming, and so on. \nThus the huge collection of data becomes complex in terms of data access control and authentication\n in the distributed environment. Especially, the data access control is not fine-grained, \n and this may result in data leakage and other security threats. So apart from the traditional security,\n there is a special focus required in the field of data access control in cloud computing platforms.  &nbsp;<\/p>\n\n\n\n<i><b>See also: <b><u><a href=https:\/\/tutorsindia.com\/academy\/recent-trends\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/\">Tips for developing secure and flexible management policy<\/a><\/u><i><br\/><br\/>\n\n\n\n<i><b>See also: <b><u><a href=\"https:\/\/tutorsindia.com\/academy\/recent-trends\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/\">Security and Privacy Issues over the Cloud Environment<\/a><\/u><i><br\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.tutorsindia.com\/our-services\/masters-dissertation-writing-services\/dissertation-topic\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img fetchpriority=\"high\" decoding=\"async\" width=\"728\" height=\"90\" src=\"https:\/\/tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tutors-india.jpg\" alt=\"\" class=\"wp-image-2195\" srcset=\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tutors-india.jpg 728w, https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tutors-india-600x74.jpg 600w, https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tutors-india-300x37.jpg 300w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2>Brief note of Cloud access control system<\/h2>\n\n\n\n<hr class=\"wp-block-separator\" style=\"margin-top: -8px;max-width: 100%;height:2px;background: #87cefa\">\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;Generally, the term data access control system defines the huge collection of components and techniques which define the appropriate administrator to activate valid user on the basis of privileges outlined and preconfigured access permissions in the access security policy. The primary aim of any access control system is restricting a user to exactly what they should be able to do and how can protect data from unauthorized access. There is a wide variety of models, administrative capabilities, methods and technologies are utilized toward design and propose access control systems. Each access control system has its methods and functions, own attributes,  that derive from either set of policies or policy. The systematic representation of cloud access control with a service provider is shown in Figure 1.<\/p>\n\n\n<div class=\"wp-block-image zoom\">\n<figure class=\"aligncenter\"><img decoding=\"async\" width=\"597\" height=\"424\" src=\"https:\/\/tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/Untitled.jpg\" alt=\"\" class=\"wp-image-2065\" srcset=\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/Untitled.jpg 597w, https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/Untitled-300x213.jpg 300w\" sizes=\"(max-width: 597px) 100vw, 597px\" \/><figcaption><br><em> Figure 1<\/em>: Cloud access control system <\/figcaption><\/figure>\n<\/div>\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;Apart from this, one of the primary issues which we are facing is accuracy while we access the data in terms of detecting user behavior. For addressing this issue, there is a potential extension by considering multi-authority access control which aggregates data from different resources to profile the user\u2019s behavior. Developing a novel algorithm using a machine learning approach to classify user\u2019s behavior is significant to bridge the gap among theory and real-time application. The novel algorithm should consider the below factors in order to develop a secure access control system:<\/p>\n\n\n\n<ul style=\"font-weight: normal;\"><li>Should consider different flexible functionalities like self-managed and self-defined access control, user-friendly deletion and addition of group users, separation of access authentication from system authentication and iterative access control proxy server.<\/li><li>Reduce the computational complexity which comprises both encryption and decryption algorithms.<\/li><li>Multi-authority Access Control and Fine-Grained Data Access Control scheme for supporting dynamic behaviors of users over the cloud platform.<\/li><li>To enhance the complexity by fast decryption technique and outsourcing the pairing computations to the cloud by adding dynamic attributes.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-video aligncenter\"><video height=\"1080\" style=\"aspect-ratio: 1920 \/ 1080;\" width=\"1920\" autoplay controls muted src=\"https:\/\/tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/Secure-Access-Control-Framework-for-Fully-Fledged-security-control.mp4\"><\/video><\/figure>\n\n\n\n<h2>Summary<\/h2>\n\n\n\n<hr class=\"wp-block-separator\" style=\"margin-top: -8px;max-width: 100%;height:2px;background: #87cefa\">\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;The access control and security management framework along with effective machine learning would provide guidance information for the cloud customers and administrators to make decisions, for instance, migrating tasks from dynamically allocating resources, suspect nodes to trustworthy nodes and managing the trade-off among the cost of resources and degree of redundancy.<\/p>\n\n\n\n        <div class=\"rmwr-wrapper\" \n             data-id=\"rmwr-69e78af5c659f\"\n             data-mode=\"normal\"\n             data-animation=\"fade\"\n             data-duration=\"300\"\n             data-smooth-scroll=\"true\"\n             data-scroll-offset=\"0\">\n            <button \n                type=\"button\"\n                class=\"read-link\" \n                id=\"readlinkrmwr-69e78af5c659f\"\n                data-open-text=\"References\"\n                data-close-text=\"References\"\n                aria-expanded=\"false\"\n                aria-controls=\"readrmwr-69e78af5c659f\"\n                aria-label=\"References\"\n            >\n                <span class=\"rmwr-text\">References<\/span>\n            <\/button>\n            <div \n                class=\"read_div\" \n                id=\"readrmwr-69e78af5c659f\"\n                aria-hidden=\"true\"\n                data-animation=\"fade\"\n                data-duration=\"300\"\n                style=\"display: none;\"\n            >\n                 \n\n<p style=\"text-align:justify\">A. Younis, Y., Kifayat, K., &amp; Merabti, M. (2014). An access control model for cloud computing. <i>Journal of Information Security and Applications, 19(1), <\/i> 45\u201360. <br>https:\/\/doi.org\/10.1016\/j.jisa.2014.04.003<br><br>\nAnderson, R. (2010). &#8221; Security Engineering \u2013 A Guide to Building Dependable Distributed Systems , 2nd edition \u201d by Ross Anderson John Wiley &amp; Sons 2008 What the book is about. <i>Stobert, E., &amp; Biddle, R. (n.d.). The Password Life Cycle\u202f: User Behaviour in Managing Passwords, 243\u2013255. Sasse, M. A., Brostoff, S., &amp; Weirich, D. (n.d.). Transforming the \u2018Weakest Link\u2019 \u2014 a Human\/Computer Interaction Approach to Usable and Effective Se, 4\u20136.<\/i><br><br>\nLi, F., Rahulamathavan, Y., Conti, M., &amp; Rajarajan, M. (2015). Robust access control framework for mobile cloud computing network. Computer Communications, 68, 61\u201372. <br>https:\/\/doi.org\/10.1016\/j.comcom.2015.07.005\n<br><br>\nRen, W., Liu, R., Lei, M., &amp; Choo, K.-K. R. (2017). SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing.<i> Computer Standards &amp; Interfaces, 54, 29\u201335<\/i>.<br> https:\/\/doi.org\/10.1016\/j.csi.2016.09.001<br><br>\nRuan, Y., &amp; Durresi, A. (2019). A trust management framework for clouds. <i>Computer Communications<\/i> , 144, 124\u2013131. https:\/\/doi.org\/10.1016\/j.comcom.2019.05.018<br><br>\nThota, C., Sundarasekar, R., Manogaran, G., R, V., &amp; M. K., P. (2018). Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System (pp. 141\u2013154).<br> https:\/\/doi.org\/10.4018\/978-1-5225-2947-7.ch011\n<\/p><br>\n             <\/div>\n        <\/div>\n        \n","protected":false},"excerpt":{"rendered":"<p>Engineering &amp; Technology Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2862,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[147],"tags":[],"class_list":["post-2049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering-and-techology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve Security. - Recent-Research Trends<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve Security. - Recent-Research Trends\" \/>\n<meta property=\"og:description\" content=\"Engineering &amp; Technology Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/\" \/>\n<meta property=\"og:site_name\" content=\"Recent-Research Trends\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-17T10:08:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-15T10:33:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png\" \/>\n\t<meta property=\"og:image:width\" content=\"330\" \/>\n\t<meta property=\"og:image:height\" content=\"186\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tutors India\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tutors India\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/\"},\"author\":{\"name\":\"Tutors India\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8\"},\"headline\":\"Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve Security.\",\"datePublished\":\"2019-09-17T10:08:16+00:00\",\"dateModified\":\"2022-12-15T10:33:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/\"},\"wordCount\":252,\"image\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png\",\"articleSection\":[\"Engineering And Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/\",\"url\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/\",\"name\":\"Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve Security. - Recent-Research Trends\",\"isPartOf\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png\",\"datePublished\":\"2019-09-17T10:08:16+00:00\",\"dateModified\":\"2022-12-15T10:33:02+00:00\",\"author\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#primaryimage\",\"url\":\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png\",\"contentUrl\":\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png\",\"width\":330,\"height\":186},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tutorsindia.com\/academy\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve Security.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#website\",\"url\":\"https:\/\/www.tutorsindia.com\/academy\/\",\"name\":\"Recent-Research Trends\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tutorsindia.com\/academy\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8\",\"name\":\"Tutors India\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g\",\"caption\":\"Tutors India\"},\"url\":\"https:\/\/www.tutorsindia.com\/academy\/author\/tutors-india\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve Security. - Recent-Research Trends","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/","og_locale":"en_GB","og_type":"article","og_title":"Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve Security. - Recent-Research Trends","og_description":"Engineering &amp; Technology Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve [&hellip;]","og_url":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/","og_site_name":"Recent-Research Trends","article_published_time":"2019-09-17T10:08:16+00:00","article_modified_time":"2022-12-15T10:33:02+00:00","og_image":[{"width":330,"height":186,"url":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png","type":"image\/png"}],"author":"Tutors India","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tutors India","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#article","isPartOf":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/"},"author":{"name":"Tutors India","@id":"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8"},"headline":"Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve Security.","datePublished":"2019-09-17T10:08:16+00:00","dateModified":"2022-12-15T10:33:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/"},"wordCount":252,"image":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png","articleSection":["Engineering And Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/","url":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/","name":"Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve Security. - Recent-Research Trends","isPartOf":{"@id":"https:\/\/www.tutorsindia.com\/academy\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#primaryimage"},"image":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png","datePublished":"2019-09-17T10:08:16+00:00","dateModified":"2022-12-15T10:33:02+00:00","author":{"@id":"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8"},"breadcrumb":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#primaryimage","url":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png","contentUrl":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png","width":330,"height":186},{"@type":"BreadcrumbList","@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tutorsindia.com\/academy\/"},{"@type":"ListItem","position":2,"name":"Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve Security."}]},{"@type":"WebSite","@id":"https:\/\/www.tutorsindia.com\/academy\/#website","url":"https:\/\/www.tutorsindia.com\/academy\/","name":"Recent-Research Trends","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tutorsindia.com\/academy\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8","name":"Tutors India","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g","caption":"Tutors India"},"url":"https:\/\/www.tutorsindia.com\/academy\/author\/tutors-india\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png",330,186,false],"landscape":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png",330,186,false],"portraits":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png",330,186,false],"thumbnail":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame-150x150.png",150,150,true],"medium":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame-300x169.png",300,169,true],"large":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png",330,186,false],"1536x1536":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png",330,186,false],"2048x2048":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png",330,186,false],"rdtheme-size1":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png",330,186,false],"rdtheme-size2":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png",330,186,false],"rdtheme-size3":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png",330,186,false],"rdtheme-size6":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame.png",330,186,false],"rdtheme-size8":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame-92x92.png",92,92,true],"rdtheme-size5":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame-150x100.png",150,100,true],"rdtheme-size4":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-access-control-frame-80x62.png",80,62,true]},"rttpg_author":{"display_name":"Tutors India","author_link":"https:\/\/www.tutorsindia.com\/academy\/author\/tutors-india\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/www.tutorsindia.com\/academy\/category\/engineering-and-techology\/\" rel=\"category tag\">Engineering And Technology<\/a>","rttpg_excerpt":"Engineering &amp; Technology Secure Access Control Framework For Fully Fledged Network Security Control: How Machine Learning Algorithms Helps To Improve [&hellip;]","_links":{"self":[{"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/posts\/2049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/comments?post=2049"}],"version-history":[{"count":0,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/posts\/2049\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/media\/2862"}],"wp:attachment":[{"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/media?parent=2049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/categories?post=2049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/tags?post=2049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}