• Title/Summary/Keyword: 표준 ACL

Search Result 20, Processing Time 0.024 seconds

The case study to verify of a network based on router applying an ACL(: Access List) (ACL(: Access list)이 적용된 라우터 기반 네트워크의 검증 사례연구)

  • Kim, No-Whan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.5
    • /
    • pp.491-498
    • /
    • 2016
  • An ACL(: Access List), a list that determines network access, is used for the security of the network. An ACL if applied to a interface of router can filter particular packets. Also it can block or allow the access of certain unauthorized IPs or ports, based on the source address, destination address, and TCP/UDP port. This paper presents a simulation case to verify the effect of a router-based network applying Standard ACL or Extended ACL. The network was created through designing topology and then making a common virtual network using a Packet Tracer.

ACL based Mobile Agent Framework (ACL 기반 이동 에이전트 프레인워크)

  • 조정은;김원국;김상욱
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.580-582
    • /
    • 1998
  • 본 논문에서는 ACL(Agent Communication Language)를 기반으로 한 에이전트 프레임워크 Mollet을 제안하고 코드와 데이터의 이동성을 중점을 두어 이를 OS 버그 패치 시스템에 적용하여 본다. Mollet의 메시지 전송과 에이전트 이동은 FIPA에서 표준안으로 정의한 ACL을 사용함으로 다른 에이전트와의 효율성을 높이고 있으며 전송 과정에서 노출을 막기 위하여 암호화 기법을 이용한다. 이동성, 협상, 보안, 인증, 등록 등의 에이전트가 가지는 공통적인 속성과 각 에이전트만이 가지는 속성을 모듈화함으로서 확정성을 높을 수 있으며 JDBC 사용으로 데이터베이스와의 투명성을 제공하고 있다. 또, Mollet은 하나의 호스트가 서버와 클라이언트의 속성을 동시에 가질 수 있다. Mollet을 OS 버그 패치 시스템에 적용하여 사용자의 공식 패치 서버 검색을 자동화하고 신속하고 간편한 패치를 제공함으로 시스템의 보안과 신뢰도를 유지할 수 있고 시스템 관리자의 부담과 관리 비용을 줄인다.

  • PDF

A Study on Agent Communication Languages for Computational Logic - based Agents (계산논리 기반 에이전트를 위한 에이전트 통신언어에 관한 연구)

  • 이명진;한현관
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.3
    • /
    • pp.363-370
    • /
    • 2004
  • The FIPA community is developing a range of agent-related standards, of which the centerpiece is an Agent Communication Language (ACL). This language includes a number of communicative acts explicitly intended to support negotiation. In this paper, we consider a multi-agent environment that exchanges the resources for achieving agents' goals, represent agents as computational logic-based formalizations, and describe a simple ACL for negotiation using logic-based agents. In particular, we introduce and compare some communication acts that enable counter-agents to know the reason of request(proposal) or the reason of rejection(refusal).

  • PDF

Implementation of the ZigBee-based Homenetwork security system using neighbor detection and ACL (이웃탐지와 ACL을 이용한 ZigBee 기반의 홈네트워크 보안 시스템 구현)

  • Park, Hyun-Moon;Park, Soo-Hyun;Seo, Hae-Moon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.35-45
    • /
    • 2009
  • In an open environment such as Home Network, ZigBee Cluster comprising a plurality of Ato-cells is required to provide intense security over the movement of collected, measured data. Against this setting, various security issues are currently under discussion concerning master key control policies, Access Control List (ACL), and device sources, which all involve authentication between ZigBee devices. A variety of authentication methods including Hash Chain Method, token-key method, and public key infrastructure, have been previously studied, and some of them have been reflected in standard methods. In this context, this paper aims to explore whether a new method for searching for neighboring devices in order to detect device replications and Sybil attacks can be applied and extended to the field of security. The neighbor detection applied method is a method of authentication in which ACL information of new devices and that of neighbor devices are included and compared, using information on peripheral devices. Accordingly, this new method is designed to implement detection of malicious device attacks such as Sybil attacks and device replications as well as prevention of hacking. In addition, in reference to ITU-T SG17 and ZigBee Pro, the home network equipment, configured to classify the labels and rules into four categories including user's access rights, time, date, and day, is implemented. In closing, the results demonstrates that the proposed method performs significantly well compared to other existing methods in detecting malicious devices in terms of success rate and time taken.

Prevention of Alpine Ski Injuries (알파인 스키 부상의 예방)

  • Eun Seung-Pyo
    • Journal of Korean Orthopaedic Sports Medicine
    • /
    • v.1 no.2
    • /
    • pp.109-114
    • /
    • 2002
  • The types of Alpine ski injuries have changed through the years in relationship to the development of skiing equipment. Modern skis, boots and bindings are better at protecting the tibia, which previously was almost as commonly injured as the knee. Since the 1980s, severe knee sprains, most of them involving the anterior cruciate ligament have tripled while injuries of the lower extremity below the knee diminished significantly. However, recent studies show no further improvements in either lower leg fractures or increase in the rates of ACL sprains has occurred. The use of carving skis presents an increased risk for sustaining isolated ACL injuries in more skilled skiers and less skilled skiers are more likely to sustain an ankle fracture than skiers using conventional skis. To restore the trend of diminishing lower leg injury rates, efforts will be needed to motivate skiers to have their equipment serviced by ski shop professionals following ASTM (American Society for Testing and Material) standard procedures. As of now, there are no boots, bindings or skis on the market designed to protect skiers from the ACL injury. The only method proven to reduce ACL injury Is a training program based on recognizing the circumstances that lead to ACL injury in skiing and to avoid these events.

  • PDF

P2P DICOM System using Multiagent Systems Communicating with XML Encoded ACL (XML 기반 ACL로 통신하는 멀티에이전트 시스템을 이용한 P2P DICOM 시스템)

  • Kwon, Gi-Beom;Kim, Il-Kon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.5
    • /
    • pp.598-606
    • /
    • 2002
  • We suggest a distributed communication and management methodology using PC to PC Query multicasting strategy for efficient management of medical images produced by DICOM(Digital Imaging and Communications in Medicine) Modalities. It is absolutely necessary to reduce strict degradation of PACS system due to large sire of medical images and their very high transport rates. DICOM PC to PC Component is composed of a Service Manager to execute requested queries, a Communication Manager to take charge of file transmission, and a DICOM Manager to manage stored data and system behavior Each Manager itself is a component to search for requested file by interaction or to transmit the file to other PCs. Distributed management and transformation of medical information based on PC to PC Query multicasting methodology will enhance performance of central server and network capacity, reducing overload on both. We organize three major components for system operation. Each component is implemented as Agent. Communication between agents uses XML encoded Agent Communication Language.

Secure User and Program Interface for SecuROS (SecuROS 에서 개발된 사용자 및 프로그램 인터페이스)

  • Doo, So-Young;Go, Jong-Guk;Eun, Seong-Gyeong;Kim, Jeong-Nyeo;Gong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.557-564
    • /
    • 2001
  • Many people use Linux and FreeBSD because it is freeware and excellent performance. The open source code is very important feature but it also has some problem which may be attacked by hackers frequently. This paper describes the SecuROS of secure operating system that is best solution to this problem and introduces user and programmer interface for active use of secure operating system. Developed secure operating system is composed of the access control method MAC and ACL and conforms to the POSIX which is universally used.

  • PDF

A Study About Verification Model for Cooperation of Software Components of AUML Base (AUML기반의 소프트웨어 컴포넌트들의 협력성을 위한 검증 모텔에 관한 연구)

  • Gawn, Han-Hyoun;Park, Jae-Bock
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.3
    • /
    • pp.529-538
    • /
    • 2005
  • AUML (Agent Unified Modeling Language) is specification anger of agent software system, sight anger, language that do creation by purpose. Do so that may apply Together that is one of automation application program creation system to Agent's BDI in trend sophistication of software, large size Tuesday in this research and investigate this about operation between component system. Standard detailed statement (FIPA:Foundation for Inteligent Physical Agent) that use can consist by data exchange between component and cooperate each other even if type of component is different mutually to base ACL message, and protocole use and study about method and accuracy and consistency that minimize error when embody this using meta model base etc.. through object intention modelling.

  • PDF

A study of intelligent Agent Using CORRA (CORBA기반 지능형 에이전트에 관한 연구)

  • 장일동;이희용
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.1
    • /
    • pp.88-93
    • /
    • 2002
  • In this thesis, we propose an Intelligent Agent based on CORBA technology which can exchange and share data under distributed computing environment using Agent Communication Language(ACL), Recently, due to the rapid development of network technology, the need for the database management appeared. So representative standard, CORBA have been applied and used under distributed environment. Agent applications are being developed for various fields such as electronic commerce, user interface, information retrieval. When a user searches goods, he navigates several servers on different platform until he finds desired goods. The Intelligent Agent presented in this thesis, does these tedious navigations on behalf of the user through communication between different platform.

  • PDF

A Study on the Internet Based Cooperation-Design system for Ship Design (선박설계를 위한 인터넷기반의 협동설계시스템에 관한 연구)

  • 조민철;박제웅;이근무;김영훈
    • Journal of Ocean Engineering and Technology
    • /
    • v.15 no.4
    • /
    • pp.80-85
    • /
    • 2001
  • The early construction of the internet based ship basic planning supporting system based on the concurrent engineering and the internet technology is essential as a means for the improvement of technology and design productivity our ship building industry is facing currently. Further more, technological base construction for the construction for the construction of the cooperation system on the level of ship building industry is necessary for the technological base security to maintain and develop ship building industry continuosly in the 21st century of the information industry environment and for the technological improvement of the middle and small shipyard falling behind relatively and finally for the breaking through our ship building industry environment in which inter-enterprise competition is deeping. In this study, we designed the frame-system of the ship design supporting system and presented the development scenario based on core element technology.

  • PDF