• Title/Summary/Keyword: 접근정책

Search Result 2,885, Processing Time 0.028 seconds

An Access Control System for Ubiquitous Computing based on Context Awareness (상황 인식 기반의 유비쿼터스 컴퓨팅을 위한 접근 제어 시스템)

  • Lee, Ji-Yeon;Ahn, Joon-Seon;Doh, Kyung-Goo;Chang, Byeong-Mo
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.35-44
    • /
    • 2008
  • It is important to manage access control for secure ubiquitous applications. In this paper, we present an access-control system for executing policy file which includes access control rules. We implemented Context-aware Access Control Manager(CACM) based on Java Context-Awareness Framework(JCAF) which provides infrastructure and API for creating context-aware applications. CACM controls accesses to method call based on the access control rules in the policy file. We also implemented a support tool to help programmers modify incorrect access control rules using static analysis information, and a simulator for simulating ubiquitous applications. We describe simulation results for several ubiquitous applications.

An Analysis of Panel Data on the Web-accessibility Policies of Local Governments in Korea (우리나라 웹 접근성 정책 영향요인 분석 - 16개 광역자치단체 패널데이터를 중심으로 -)

  • JIN, Sangki;HYUN, Joonho
    • Informatization Policy
    • /
    • v.18 no.4
    • /
    • pp.42-58
    • /
    • 2011
  • This paper starts from one question: what are the key factors of the web accessibility policy, which is significant for realizing equity in the web and enhancing human dignity in the information society. To find significant factors for complying with web accessibility, this paper analyzes panel data of 16 Korean local governments (for five years: 2004-2009) according to the research design which is based on the demand and supply balance model and consists of four variables : 'legal and institutional environment (including legal infrastructure)', 'financial foundation (fiscal self-reliance ratio)', 'policy inputs (amount of imformatization budget, employee of information experts)'and 'policy demand (internet usage rate, the number of disabled people and elderly people)'. From the results of this study, this paper can explain the mechanism and impact factors on the web accessibility policy of Korean local governments. Some factors are critical to improve web accessibility: (1) the importance of policy demand, (2) the importance of policy inputs, (3) the importance of legal and institutional environment. Finally, this paper concludes with some suggestions to enhance the web accessibility capacity for Korean local governments: (1) improve awareness on web accessibility, (2) develop a standard and invest R&D on web accessibility, (3) foster experts in web accessibility.

  • PDF

Policy System of Data Access Control for Web Service (웹 서비스를 위한 데이터 접근 제어의 정책 시스템)

  • Jo, Sun-Moon;Chung, Kyung-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.11
    • /
    • pp.25-32
    • /
    • 2008
  • Access control techniques should be flexible enough to support all protection granularity levels. Since access control policies are very likely to be specified in relation to document types, it is necessary to properly manage a situation in which documents fail to be dealt with by the existing access control policies. In terms of XML documents, it is necessary to describe policies more flexibly beyond simple authorization and to consider access control methods which can be selected. This paper describes and designs the access control policy system for authorization for XML document access and for efficient management to suggest a way to use the capacity of XML itself. The system in this paper is primarily characterized by consideration of who would exercise what access privileges on a specific XML document and by good adjustment of organization-wide demands from a policy manager and a single document writer.

Design of Access Control Model for XML Schema (XML 스키마를 위한 접근제어 모델 설계)

  • Kim, Eun-Hee;Moon, Ho-Sung;Shin, Moon-Sun;Ryu, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.31-34
    • /
    • 2002
  • 최근 많은 웹 기반 서비스나 애플리케이션들이 XML 형태로 지원되면서 XML 데이터의 보안에 대해서 많은 연구가 이루어지고 있다. 기존의 XML 보안은 암호, 서명, 접근제어의 형태로 이루어지고 있으며 그 중에서 접근제어는 DTD기반과 문서기반으로 분류되어 임의적 접근제어 모델을 적용한 연구가 진행되어 왔다. 그러나 DTD의 대안으로서 객체지향개념을 수용하는 XML 스키마의 사용이 증가되고 있어 이를 위한 보안요구사항과 접근제어정책이 추가로 필요하게 되었다. XML문서의 데이터보호를 위해서 기존의 DTD기반과 문서기반 접근제어정책을 수용하면서 스키마 기반의 접근제어정책을 지원하기 위해서 이 논문에서는 역할기반접근제어 모델을 적용한 XML 스키마 기반의 접근제어 모델을 제안한다.

  • PDF

A Study on Architecture of Access Control System with Enforced Security Control for Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 보안통제가 강화된 접근제어 시스템 설계에 관한 연구)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.71-81
    • /
    • 2008
  • In the paper, we designed a context aware task-role based access control system(CAT-RACS) which can control access and prevent illegal access efficiently for various information systems in ubiquitous computing environment. CAT-RACS applied CA-TRBAC, which adds context-role concept for achieve policy composition by context information and security level attribute to be kept confidentiality of information. CA-TRBAC doesn't permit access when context isn't coincident with access control conditions, or role and task's security level aren't accord with object's security level or their level is a lower level, even if user's role and task are coincident with access control conditions. It provides security services of user authentication and access control, etc. by a context-aware security manager, and provides context-aware security services and manages context information needed in security policy configuration by a context information fusion manager. Also, it manages CA-TRBAC policy, user authentication policy, and security domain management policy by a security policy manager.

Analysis and Design Secure Linux on Micro Kernel Applied RBAC Policy (RBAC 정책을 적용한 마이크로 커널 기반의 안전한 리눅스 커널 분석 및 설계)

  • Choi, Byoung-Son;Lee, Seoung-Hyeon;Lee, Won-Gu;Lee, Hea-Gyu;Lee, Jae-Kwang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1993-1996
    • /
    • 2003
  • 본 논문에서는 접근 제어 메커니즘을 적응한 마이크로 커널 기반의 안전한 리눅스 커널에 대해 분석 및 설계하였다. 설계된 접근제어 보델은 역할기반 접근제어를 이용하여 권한을 효과적으로 통제하고, 신분 및 규칙기반 접근제어를 이용하여 정보 및 시스템의 비밀성, 무결성, 가용성의 보장 및 시스템의 불법적인 접근을 방지할 수 있다. 리눅스 마이크로 커널 기반 접근제어 모델을 직무, 보안등급, 무결성 등급 및 소유권의 다단계 보안 정책을 기반으로 시스템의 불법적인 접근, 직무기반. 소유권 통의 다단계 보안 정책을 기반으로 하여 시스템의 불법적인 접근을 통제 할 수 있다.

  • PDF

접근통제 기술 동향

  • 김의탁;최용락;김기현;최용락
    • Review of KIISC
    • /
    • v.8 no.4
    • /
    • pp.77-96
    • /
    • 1998
  • 본 논문은 각 시스템 자원의 안전성을 보장하기 위한 접근통제 기술을 다룬다. 현대의 분산 정보통신망 환경은 광역화되고 응용 서비스의 형태가 다양화 됨에 따라서 접근통제의 요구사항이 매우 복잡해졌다. 따라서 하나의 접근통제 정책이나 메커니즘으로 모든 보안 요구사항을 해결할 수 없으며, 다양하게 연합된 정책과 기능별 복합적 시스템의 개발이 요구된다. 본 논문에서는 전통적인 접근통제 기술의 개념과 국제표준의 핵심내용을 분석하고, 최근 접근통제 제품들의 평가내용을 조사함으로써 접근통제 관련제품의 개발에 대한 기준을 제시한다.

  • PDF

Access Control Policy of Data Considering Varying Context in Sensor Fusion Environment of Internet of Things (사물인터넷 센서퓨전 환경에서 동적인 상황을 고려한 데이터 접근제어 정책)

  • Song, You-jin;Seo, Aria;Lee, Jaekyu;Kim, Yei-chang
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.409-418
    • /
    • 2015
  • In order to delivery of the correct information in IoT environment, it is important to deduce collected information according to a user's situation and to create a new information. In this paper, we propose a control access scheme of information through context-aware to protect sensitive information in IoT environment. It focuses on the access rights management to grant access in consideration of the user's situation, and constrains(access control policy) the access of the data stored in network of unauthorized users. To this end, after analysis of the existing research 'CP-ABE-based on context information access control scheme', then include dynamic conditions in the range of status information, finally we propose a access control policy reflecting the extended multi-dimensional context attribute. Proposed in this paper, access control policy considering the dynamic conditions is designed to suit for IoT sensor fusion environment. Therefore, comparing the existing studies, there are advantages it make a possible to ensure the variety and accuracy of data, and to extend the existing context properties.

The Design and Implementation of Access Control framework for Collaborative System (협력시스템에서의 접근제어 프레임워크 설계 및 구현)

  • 정연일;이승룡
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.10C
    • /
    • pp.1015-1026
    • /
    • 2002
  • As per increasing research interest in the field of collaborative computing in recent year, the importance of security issues on that area is also incrementally growing. Generally, the persistency of collaborative system is facilitated with conventional authentication and cryptography schemes. It is however, hard to meet the access control requirements of distributed collaborative computing environments by means of merely apply the existing access control mechanisms. The distributed collaborative system must consider the network openness, and various type of subjects and objects while, the existing access control schemes consider only some of the access control elements such as identity, rule, and role. However, this may cause the state of security level alteration phenomenon. In order to handle proper access control in collaborative system, various types of access control elements such as identity, role, group, degree of security, degree of integrity, and permission should be taken into account. Futhermore, if we simply define all the necessary access control elements to implement access control algorithm, then collaborative system consequently should consider too many available objects which in consequence, may lead drastic degradation of system performance. In order to improve the state problems, we propose a novel access control framework that is suitable for the distributed collaborative computing environments. The proposed scheme defines several different types of object elements for the accessed objects and subjects, and use them to implement access control which allows us to guarantee more solid access control. Futhermore, the objects are distinguished by three categories based on the characteristics of the object elements, and the proposed algorithm is implemented by the classified objects which lead to improve the systems' performance. Also, the proposed method can support scalability compared to the conventional one. Our simulation study shows that the performance results are almost similar to the two cases; one for the collaborative system has the proposed access control scheme, and the other for it has not.

Research Trends in Access Control Policy of Android (안드로이드 접근 제어 정책 연구 동향 분석)

  • Seo-Jung Urm;Yeong-Pil Cho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.134-136
    • /
    • 2023
  • 안드로이드는 오픈소스로 많은 제조 업체들이 자신들의 서비스에 맞게 커스터마이징 하기도 한다. 다만, 접근 제어 정책들을 올바르지 못하게 수정하거나 추가함에 있어서 발생하는 취약점을 통해 공격자가 해당 접근 제어 메커니즘을 우회하여 보안적 위험 문제가 발생할 수 있다. 이에 따라 안드로이드의 다양한 접근 제어 정책들을 살펴보고, 제조 업체가 추가하는 접근 제어 정책을 검사하거나 발생하는 취약점에 따라 우회할 수 있는 방법들을 찾아내는 최근 연구들의 동향을 분석하고자 하며 앞으로의 관련 연구의 지속적인 필요성을 제시한다.