• Title/Summary/Keyword: Access Control Manager

Search Result 48, Processing Time 0.03 seconds

Distributed Access Privilege Management for Secure Cloud Business (안전한 클라우드 비즈니스를 위한 접근권한 분산관리)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.369-378
    • /
    • 2011
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server. And we construct the model of access privilege management using AONT based XOR threshold Secret Sharing, In addition, our scheme enable to grant weight for access privilege using XOR Share. In chapter 4, we differentiate existing scheme and proposed scheme.

Mobile Multicast Mechanism in IP based-IMT Network Platform (IP기반-IMT 네트워크에서의 모바일 멀티캐스트 기법)

  • Yoon Young-Muk;Park Soo-Hyun
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.3-7
    • /
    • 2005
  • The structure of $IP^2$(IP based-IMT Network Platform) as ubiquitous platform is three-layered model : Middleware including NCPF(Network Control Platform) and SSPF(Service Support Platform), IP-BB(IP-Backbone), Access network including Sensor network. A mobility management(MM) architecture in NCPF is proposed for $IP^2$. It manages routing information and location information separately. The existing method of multicast control in $IP^2$ is Remote Subscription. But Remote Subscription has problem that should be reconstructed whole Multicast tree when sender moves. To solve this problem, we propose a way to put Multicast Manager in NCPF.

  • PDF

An Extended GDMO for Interworking Different Network Management Protocols (망 관리 프로토콜 연동을 위한 확장된 GDMO)

  • Lim, Mi-Kyoung;Kim, Tae-Soo;Lee, Kwang-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.156-165
    • /
    • 2000
  • This paper proposes an integrated system for interworking different network management protocols. The interworking system between SNMP(Simple Network Management Protocol) and CMIP(Common Management Information Protocol) has been designed. We defined new managed object architecture using MOVI(Managed Object View Interface) concept and implemented an extended GDMO(EGDMO) compiler. An access mechanism for consistency control and atomic action on the sharing resources has been defined. Thus, even if a new management protocol would be introduced, new gateway system need not to be redesigned. It can be achieved with minimum modification of the view interface of managed objects. As a managed object can support various view interfaces, several network management protocols can directly access it. This approach, therefore, provides some benefits. For instance, manager can access managed objects without additional functions and tools. Ti, also, could be achieved interworking between SNMP and CMIP with minimum modification on the view interface of the managed objects defined previously. It is able to interwork more complicated network management protocols and to increase usefulness of SNMP and CMIP.

  • PDF

A Development of Fusion Processor Architecture for Efficient Main Memory Access in CPU-GPU Environment (CPU-GPU환경에서 효율적인 메인메모리 접근을 위한 융합 프로세서 구조 개발)

  • Park, Hyun-Moon;Kwon, Jin-San;Hwang, Tae-Ho;Kim, Dong-Sun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.2
    • /
    • pp.151-158
    • /
    • 2016
  • The HSA resolves an old problem with existing CPU and GPU architectures by allowing both units to directly access each other's memory pools via unified virtual memory. In a physically realized system, however, frequent data exchanges between CPU and GPU for a virtual memory block result bottlenecks and coherence request overheads. In this paper, we propose Fusion Processor Architecture for efficient access of main memory from both CPU and GPU. It consists of Job Manager, Re-mapper, and Pre-fetcher to control, organize, and distribute work loads and working areas for GPU cores. These components help on reducing memory exchanges between the two processors and improving overall efficiency by eliminating faulty page table requests. To verify proposed algorithm architectures, we develop an emulator based on QEMU, and compare several architectures such as CUDA(Compute Unified Device Architecture), OpenMP, OpenCL. As a result, Proposed fusion processor architectures show 198% faster than others by removing unnecessary memory copies and cache-miss overheads.

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

UX Design for Digital TV Platform (디지털 TV 플랫폼의 UX 디자인)

  • Yim, Jin-Ho;Lee, Sang-Hee
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.4
    • /
    • pp.563-568
    • /
    • 2010
  • TV businesses that have brought a competitive structure in terms of price, definition, product design for a long time now are bringing User eXperience (UX) into relief as DTVs come to support broadcast information-related services such as various broadcast channels and Electronic Program Guide(EPG), etc., and playing of multimedia contents like music/videos, etc. This study worked on an evaluation by developing a UI to control easily the various and complex broadcast contents or multimedia contents provided by DTVs. The UI Design for new DTVs was developed based on Function, Flow and Form in the concept of Single ABC (Access, Browser and Control), and the usability test of the developed UI concept along with the UIs of the major DTV products, was done for Channel Managers and the multimedia browsers for 32 users of DTVs in the U.K./U.S., respectively. As a result of the usability test, the new concept of Channel Manager was evaluated high both in the U.K./U.S, while the multimedia browser was evaluated low in the U.S., relatively.

The Design and Implementation of a Method for Identifying RCP in the Vehicle Tracking System (차량 추적 시스템에서 RCP를 식별하기 위한 방법 설계 및 구현)

  • Lee, Yongkwon;Jang, Chungryong;Lee, Daesik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.2
    • /
    • pp.15-24
    • /
    • 2016
  • GPS(Global Positioning System) location tracking is a method for taking the precise coordinates after the coordinates are obtained by a GPS receiver, and displaying them on the map. In this paper with WAVE(Wireless Access for Vehicular Environment) simulation, we show that various services such as vehicle tracking service, real-time road conditions service and logistics can go tracking service, control and operation services according to the vehicle position and the traveling direction by using the GPS position data. A vehicle tracking system using GPS is automatically able to manage multiple RCP when exchanging data between RMA and the RCP, and it provides rapid requests and responses. To verify that multiple sessions between RMA and RM, as well as multiple sessions between RMA and RCP are able to be implemented, we take RMA as a RCP application on an OBU, until the RMA is receiving data response from corresponding RM. As a result of this experiment, we show that the response speeds of single session between RMA and RM using 1, 2, 3, and 4 kbyte unit data are similar, 62.32ms, 62.65ms, 63.02ms, and 63.48ms, respectively. Likewise, those of 128 muliple sessions using 1, 2, 3, and 4 kbyte unit data are not much more time difference, 298.08ms, 302.21ms, 322.85ms, and 329.62ms, respectively.

The Development of a Computer-Assisted HACCP Program for the Microbiological Quality Assurance in Hospital Foodservice Operations (병원급식의 미생물적 품질보증을 위한 HACCP 전산프로그램의 개발)

  • Kwak, Tong-Kyung;Ryu, Kyung;Choi, Seong-Kyung
    • Journal of the Korean Society of Food Culture
    • /
    • v.11 no.1
    • /
    • pp.107-121
    • /
    • 1996
  • This study was carried out to develop the computer-assisted Hazard Analysis and Critical Control Point (HACCP) program for a systematic approach to the identification, assessment and control of hazards for foodservice manager to assure the microbiological quality of food in hospital foodservice operations. Sanitation practices were surveyed and analyzed in the dietetic department of 4 hospitals. Among them, one 762-bed general hospital was selected as standard model to develop computer-assisted HACCP program. All data base files and processing programs were created by using Foxpro package for easy access of HACCP concept. HACCP program was developed based on the methods suggested by NACMCF, IAMFES and Bryan. This program consisted of two parts: the pre-stage for HACCP study and the implementation stage of the HACCP system. 1. Pre-stage for HACCP study includes the selection of menu item, the development of the HACCP recipe, the construction of a product flow diagram, and printing the HACCP recipe and a product flow diagram. A menu item for HACCP study can be selected from the menu item lists classified by cooking methods. HACCP recipe includes ingredients, their amount and cooking procedure. A flow diagram is constructed based on the HACCP recipe. The HACCP recipe and a product flow diagram are printed out. 2. Implementation of HACCP study includes the identification of microbiological hazards, the determination of critical control points, the establishment of control methods of each hazard, and the complementation of data base file. Potentially hazardous ingredients are determined and microbiological hazards are identified in each phase of the product flow. Critical control points (CCPs) are identified by applying CCP decision trees for ingredients and each process stage. After hazards and CCPs are identified, criteria, monitoring system, corrective action plan, record-keeping system and verification methods are established. When the HACCP study is complemented, HACCP study result forms are printed out. HACCP data base file can be either added, corrected or deleted.

  • PDF

A Study on the Duty of the Business Owner in the Contents(Casino) Corporation related with the Commercial Law - In the case of claim for damages of the gambler against the Kangwon Land(Supreme Ct. 2014.8.21, 2010다92438 case) (상법상 유기장콘텐츠 영업주(카지노영업주)의 주의의무에 관한 연구 -강원랜드 카지노 이용자의 손해배상청구의 경우 (대판 2014.8.21., 2010다92438 전원합의체 판결))

  • Chun, Woo-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.12
    • /
    • pp.180-190
    • /
    • 2017
  • This is Kangwon Land casino case due to the damages of betting money, which is likely to affect the contents industry in the future. The reason why the gambler and his family's suit is that why the manager did not control their own access or did not supervise the wagering rules. The provisions of the "Restriction on the amount of money to be paid to the casino" in the Article 14 of the Enforcement Decree of the Act on the Support for the Development of the Abandoned Mine Area are not intended to increase the duty of the casino managers. It is just one of many public regulations imposed. No matter what legislation is made for public interest, it can not be considered equally in the private duty. If so, too much effort will be required to enact or amend the public law and this makes the legislative activity impossible. The Act on the Restriction on Access to the Casino shall be construed accordingly. From the point of view of economic efficiency theory, if we overestimate statutory duties (liability for compensation) excessively, the price goes up on the market, and the volume of transaction decreases drastically. This reduces the economic utility of resources in the society as a whole (total output, foreign currency acquisition amount, etc.).

A Study on the Theoretical Frameworks and the Implementation Effects of the Fishery Closures as Multi-strategical Measures of Fisheries Management (어업관리 휴어제의 이론체계와 도입 타당성 및 기대효과에 관한 연구)

  • Lee Sang-Go
    • The Journal of Fisheries Business Administration
    • /
    • v.37 no.2 s.71
    • /
    • pp.33-59
    • /
    • 2006
  • This study describes approaches to fisheries management that restrict access by fishers to an area in some way. When fishery closure is established as a technical conservation measure it is a form of input control as a Korea fisheries management system. There are many compelling reasons why a fisheries manager should seriously consider closed areas and/or time restrictions, either as a complement to other measures or as the primary facet of the Korean fisheries management strategy. Fishery closures have been shown to be effective in many fisheries and are an important tool in the management armoury. In many respects justifications for their use and the process of implementation are likely to be relatively straightforward compared to permanent area closures. From a Korean fisheries management perspective, the benefits that flow from fishery closures are usually less easy to predict than for other management measures. Moreover, even if one accepts that implementation of fisherg clossures will provide higher production levels in adjacent fished areas, the potential benefits may often be in danger of being largely dissipated. If, for example, the fishery remains open access, the increased production is likely to attract new entrants into the fishery, thereby driving it back towards bioeconomic equilibrium. From a Korean wider fisheries conservation perspective, however, fishery closures have important and clearly defensible roles to play and some form of zoning arrangement will often effectively serve conservation values. Given the increasing trend towards the establishment of national networks of fisherg closures, it seems likely that fisheries managers throughout the world will need to ensure that they are familiar with the issues surrounding these approaches. The importance of being explicit about the goals for fishery closures in Korea have been continually emphasised throughout this study. There may, of course, be multiple justifications for the measure, in which case it is important to try and specify them in order of priority.

  • PDF