• Title/Summary/Keyword: 인가 서비스

Search Result 172, Processing Time 0.021 seconds

Development of Identity-Provider Discovery System leveraging Geolocation Information (위치정보 기반 식별정보제공자 탐색시스템의 개발)

  • Jo, Jinyong;Jang, Heejin;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1777-1787
    • /
    • 2017
  • Federated authentication (FA) is a multi-domain authentication and authorization infrastructure that enables users to access nationwide R&D resources with their home-organizational accounts. An FA-enabled user is redirected to his/her home organization, after selecting the home from an identity-provider (IdP) discovery service, to log in. The discovery service allows a user to search his/her home from all FA-enabled organizations. Users get troubles to find their home as federation size increases. Therefore, a discovery service has to provide an intuitive way to make a fast IdP selection. In this paper, we propose a discovery system which leverages geographical information. The proposed system calculates geographical proximity and text similarity between a user and organizations, which determines the order of organizations shown on the system. We also introduce a server redundancy and a status monitoring method for non-stop service provision and improved federation management. Finally, we deployed the proposed system in a real service environment and verified the feasibility of the system.

Security Architecture Proposal for Threat Response of insider in SOA-based ESB Environment (SOA 기반 ESB 환경에서 내부 종단 사용자 위협 대응을 위한 보안 아키텍처 제안)

  • Oh, Shi-hwa;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.55-63
    • /
    • 2016
  • SOA(service oriented architecture) based ESB(enterprise service bus) model is widely adopted in many companies for the safe processing of enormous data and the integration of business system. The existing web service technologies for the construction of SOA, however, show unsatisfactory in practical applications though the standardization of web service security technologies is in progress due to their limitations in safe exchange of data. Internal end users using a large business system based on such environment are composed of the variety of organizations and roles. Companies might receive more serious damage from insider threat than that from external one when internal end users get unauthorized information beyond the limits of their authority for private profit and bad purposes. In this paper, we propose a security architecture capable of identifying and coping with the security threats of web service technologies arouse from internal end users.

Secure Contents Access Control System in IPTV Flexible-PPC Model (IPTV Flexible-PPC 환경에서의 안전한 콘텐츠 접근 제어 시스템)

  • Kang, Yong-Goo;Lim, Ji-Hwan;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.93-104
    • /
    • 2011
  • A conditional access system is an essential element in IPTV services enabling service providers to allow authorized access to their services only to paid subscribers. Currently, there are two types of IPTV service models, namely PPC (pay-per-channel) and PPV (pay-per-view). However, a more desirable model would be the flexible PPC model, in which subscribers are free to choose any combination of preferred channels and add/remove channels independently. In this paper, we first point out that a previously proposed key management scheme for F-PPC is not secure. We then propose a new conditional access system using 4-level key hierarchy to realize secure F-PPC services. Compared to existing schemes, the proposed system is very efficient, just requiring O(1) communication for key update.

An Examination of the Course Syllabi Related to Data Librarian in the ALA-accredited Library and Information Science Degree Programs (ALA인가 문헌정보학 학위 과정의 데이터 사서 양성과 관련된 교과목의 강의계획서 분석)

  • Hyoungjoo Park
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.4
    • /
    • pp.307-334
    • /
    • 2023
  • The purpose of this study is to examine the status of data librarian-related course syllabi in the 2023 American Library Association(ALA)-accredited degree programs in Library and Information Science (LIS). The present study examined LIS course syllabi related to data librarian including course titles, course objectives, course descriptions, weekly topics and assignments. ALA-accredited LIS programs offer various courses in data librarianship such as data management and curation, data analysis and visualization, metadata, information services, research methods, library management, academic libraries, computer programming and databases. This study collected 184 syllabi from the ALA-accredited LIS programs and selected and analyzed 127 syllabi that are related to data librarianship. The study examined 3,045 course titles, 2,559 course description from 61 LIS degree programs overseas, and 1,330 course titles from 37 LIS degree programs in Korea. This study found that LIS degree programs both in Korea and overseas offer various courses for data librarians. The researcher hopes the findings of this study will be used as a starting point to develop or redesign courses related to data librarianship in the information field.

A Study on Utilization Effect and Implementation Model of Directory Service Based Information Resource Management System (디렉터리 서비스 기반 정보자원 관리시스템의 활용 효과 및 구축 모델에 대한 연구)

  • Lee, Sung-Jun;Kim, Hyuk;Lee, Kwang Soo;Kim, Minsoo
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.427-439
    • /
    • 2014
  • Introduction of new information systems due to continuous progress of ICT has made the enterprise IT environment into a mixed pot of various IT resources. Rapidly changing business situation has emphasized the integration of organizational IT resources as one of key competitive advantages. Those distributed IT resources are now demanding to solve the problems not only on their own effective management but also on security and control issues against unauthorized infiltration and information leakages. Under the situation that the number of IT resources is constantly increasing, it is needed to study a management model and its implementation that integrally solves above all problems. In this paper, it is revealed that a directory service can be used to integrally manage distributed IT resources and a directory service based system model for distributed IT resource management is suggested. By implementing an HR solution over active directory service, it is demonstrated that our integrated management model for distributed resources is applicable to real business cases. It is expected that for small and medium sized enterprises with limited IT investments, directory service based IT resource management system can be a cost-effective solution for increasing security threats and lack of governance.

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.

The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access (OAuth 2.0 프로토콜에서 E-mail을 이용한 사용자 권한 인증)

  • Chae, Cheol-Joo;Choi, Kwang-Nam;Choi, Kiseok;Yae, Yong-Hee;Shin, YounJu
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.21-28
    • /
    • 2015
  • Currently there are wide variety of web services and applications available for users. Such services restrict access to only authorized users, and therefore its users often need to go through the inconvenience of getting an authentication from each service every time. To resolve of such inconvenience, a third party application with OAuth(Open Authorization) protocol that can provide restricted access to different web services has appeared. OAuth protocol provides applicable and flexible services to its users, but is exposed to reply attack, phishing attack, impersonation attack. Therefore we propose method that after authentication Access Token can be issued by using the E-mail authentication. In proposed method, regular user authentication success rate is high when value is 5 minutes. However, in the case of the attacker, the probability which can be gotten certificated is not more than the user contrast 0.3% within 5 minutes.

A Study on the Legal Regulation of 'Fake News' in the Age of Social Network Services : Focusing on the French Les propositions de loi contre la manipulation de l' information (소셜네트워크서비스 시대 가짜뉴스의 법적 규제에 대한 고찰 : 프랑스 정보조작대처법을 중심으로)

  • Sunhye Kwak;Sungwook Lee
    • Journal of Service Research and Studies
    • /
    • v.12 no.3
    • /
    • pp.144-157
    • /
    • 2022
  • This study began by pointing out the problem of domestic media reporting on 'fake news' regulations that frequently appear through the French 'Les proposals de loi control de l'information'case, while still approaching with different standards and perspectives on where to see fake news. In the age of 'social network services', the answer to what the media is, what the news is, and who the reporter is increasingly difficult. While reviewing the long history and background of the spread of fake news examined in this study, it was confirmed that could not determine the concept and scope of fake news, punished, regulated, controlled, or judged simply by one standard. From the perspective of 'freedom of expression' set by the law, we have the authority to express our opinions freely. In addition, 'online' space is a place where fake news is generated and spread, but at the same time, there is plenty of room to act as an antidote. In the end, the only alternative to the damage of long-term fake news will be to create a media environment that allows more high-quality "real news" to pour out, allowing us to develop our ability to judge reliable information through balanced competition among various news in the free market of ideas.

The Impact of Service Recovery Justice on Customers' Residual Emotions: Focusing on the Moderating Role of Brand Relationship Quality (서비스회복 공정성이 고객의 잔여감정에 미치는 영향: 브랜드관계품질의 조절효과)

  • Sang Hee Kim
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.11-23
    • /
    • 2023
  • This study aims to investigate the relationship between service recovery justice, residual emotions, and customer behavior. It empirically verifies that low justice in service recovery affects residual emotions and, in turn, has an impact on customers' negative behaviors. Furthermore, this research distinguishes customer-brand relationship quality into emotional relationship quality and cognitive relationship quality and seeks to validate that the type of relationship quality may influence the extent to which the justice of recovery processes affects residual emotions. Data was collected through surveys, and hypotheses were tested using structural equation modeling. The research findings indicate that among the dimensions of service recovery justice, procedural justice and interactional justice significantly influence residual emotions. Moreover, residual emotions have a significant impact on both the intention to revisit and the intention to engage in negative word-of-mouth. In addition, the impact of distributive justice and procedural justice on residual emotions was found to be higher for cognitive relationship quality than emotional relationship quality, and the impact of interactional justice on residual emotions was found to be higher for emotional relationship quality than cognitive relationship quality.

Understanding Privacy Infringement Experiences in Courier Services and its Influence on User Psychology and Protective Action From Attitude Theory Perspective (택배 서비스 이용자의 프라이버시 침해 경험이 심리와 행동에 미치는 영향에 대한 이해: 태도이론 측면)

  • Se Hun Lim;Dan J. Kim;Hyeonmi Yoo
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.99-120
    • /
    • 2023
  • Courier services users' experience of violating privacy affects psychology and behavior of protecting personal privacy. Depending on what privacy infringement experience (PIE) of courier services users, learning about perceived privacy infringement incidents is made, recognition is formed, affection is formed, and behavior is appeared. This paradigm of changing in privacy psychologies of courier services users has an important impact on predicting responses of privacy protective action (PPA). In this study, a theoretical research framework are developed to explain the privacy protective action (PPA) of courier services users by applying attitude theory. Based on this framework, the relationships among past privacy infringement experience (PIE), perceived privacy risk (PPR), privacy concerns (i.e., concerns in unlicensed secondary use (CIUSU), concerns in information error (CIE), concerns in improper access (CIA), and concern in information collection (CIC), and privacy protective action (PPA) are analyzed. In this study, the proposed research model was surveyed by people with experience in using courier services and was analyzed for finding relationships among research variables using structured an equation modeling software, SMART-PLS. The empirical results show the causal relationships among PIE, PPR, privacy concerns (CIUSU, CIE, CIA, and CIC), and PPA. The results of this study provide useful theoretical implications for privacy management research in courier services, and practical implications for the development of courier services business model.