Information in a variety of contents has surprisingly extended only for few years. When seeing year of 2000 and up to 2011, in 2000 was sharing of information and resources such as technology-based makes floods and tup to 2011 was flooding solutions a...
Information in a variety of contents has surprisingly extended only for few years. When seeing year of 2000 and up to 2011, in 2000 was sharing of information and resources such as technology-based makes floods and tup to 2011 was flooding solutions and using are utilized base on the period of the function. In addition, increasing the utilization of these systems in the courses of 2009 and 2010 a large-scale incident the disclosure of personal information and for protection of information technologies and solutions for the defenses and protection of their ongoing developments, but it is applied and the internal users or avoid unauthorized access to internal resources is increasing day by day. In this paper, informations leakage as a ways to prevent damage to your approach through the introduction of anti-expansion methods is proposed System Access Control(SAC). The SAC's gateway to the existing method most commonly has used in the industry to attack or bypass has had the disadvantage of lack. Shortcomings by designing Access Protection Agent(APA) were applied. APA through the bypass do not have access to the system detects an attempt to access the agent is forced to block. SAC applied to the APA, the existing shortcomings take complementary measure and to provide access control to a secure system.