• Title/Summary/Keyword: Access Structure Tree

Search Result 92, Processing Time 0.026 seconds

A Study on the Analysis of the Configuration and Properties of University Campus Cores through Space Syntax (공간구문론을 이용한 대학교 캠퍼스 코어의 공간구조 유형 및 특성 분석)

  • Lee, Dong-Joo;Ko, Eun-Hyung
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.16 no.6
    • /
    • pp.13-20
    • /
    • 2009
  • The purpose of this study is to analyze the configuration and properties of university campus cores for systematic approach and planning through space syntax based on master plans of 55 universities in Korea. The results of this study showed that: first, the campus cores were classified into 10 types through axial map analysis. They were '一 type', '二 type', 'ㄱ type', 'T type', '+ type', 'radiation type', 'grid type', 'polygon type', 'tree structure type' and 'combination type'.(table 7) The frequency of '一 type' was the highest by 27.2%, and 'radiation type' was the next by 14.5%; second, the integration value was 2.03(+ type), te90(grid type), te75(ㄱ type), te74(一 type), te67(二 type), te63(T type), te46(polygon type), te347(tree structure type) and te343(radiation type).(table 9) We could categorize the 'radiation type' and the 'tree structure type' as the first group, the 'polygon type' as the second group, the 'T type', the '二 type', the '一 type', and the 'ㄱ type' as the third group, the 'grid type' as the fourth group, the '+ type' as the fifth group; third, cases that the integration value of access road was very low(58.2%) was much more frequent than that of very high(32.7%); fourth, the most important space in the campus core were as follows: library and media center(18.1%), administration buildings and headquarters(15.7%), student center(15.7%), lecturing building(13.9%), streets and squares(13.3%).

An Index Method for Wireless XML Streams (무선 XML 스트림을 위한 색인 기법)

  • Chung, Yon-Dohn;Lee, Ji-Yeon
    • Journal of KIISE:Databases
    • /
    • v.32 no.4
    • /
    • pp.416-428
    • /
    • 2005
  • In the paper we propose an index method for XML streaming services, where a server broadcasts XML data to a lot of clients in wireless information systems. In order to control the access and tuning time of mobile clients, the proposed method constructs the XML stream through replicating partial index intermixed with parts of data. For this purpose, we propose a two-level tree structure for separating index and XML data into two parts: replicated vs. non-replicated. We analyze the performance of the proposed method with respect to access time and tuning time. With the analysis result, we derive the optimal level value.

An Efficient Role Based Access Control Technique by Structuring of Role Specification Certificate (역할 명세 인증서의 구조화에 의한 효율적 역할기반 접근제어 기법)

  • Yang, Soo-Mi
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.1-9
    • /
    • 2005
  • In a role based access control through attribute certificate, the use of role assignment certificates and role specification certificates can reduce management cost and the overhead incurred by changing roles, Highly distributed computing environments such as ubiquitous computing environments not having global or broad control. need another attribute certificate management technique, Actually just having role specification certificate separately reduce management cost, But for better performance we structure role specification, We group roles and make the role group relation tree, It results secure and efficient role renewing and distribution, For scalable role specification certificate distribution, the multicasting of packets is used, We take into account the packet lass and quantify performance enhancements of structuring role specification certificates.

  • PDF

Conditional Access System with A Group Hierarchy to Improve Broadcasting Channel Efficiency (방송 채널 효율 향상을 위한 그룹 계층 구성 기반 접근 제어 시스템)

  • Yang, Jang-Hoon;Kim, Dong-Ku
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.5
    • /
    • pp.726-735
    • /
    • 2009
  • In this paper, we proposed a novel conditional access system to reduce the overhead transmission rate for messages which verify the entitlement of subscribers in bandwidth-limited system. We adapted a key update system with the tree structure which had been used for IP multicast to a group hierarchy for the subscriber groups or channel groups. We also analyzed the overhead transmission rate for periodic key update and aperiodic one for change in a subscriber. The numerical evaluations show that the proposed system can significantly reduce the overhead transmission rate for dynamic subscriber change up to several hundred thousands times for various system configuration.

  • PDF

Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System

  • Zhang, Wei;Wu, Yi;Xiong, Hu;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.302-322
    • /
    • 2021
  • In the system of ciphertext policy attribute-based encryption (CP-ABE), only when the attributes of data user meets the access structure established by the encrypter, the data user can perform decryption operation. So CP-ABE has been widely used in personal health record system (PHR). However, the problem of key abuse consists in the CP-ABE system. The semi-trusted authority or the authorized user to access the system may disclose the key because of personal interests, resulting in illegal users accessing the system. Consequently, aiming at two kinds of existing key abuse problems: (1) semi-trusted authority redistributes keys to unauthorized users, (2) authorized users disclose keys to unauthorized users, we put forward a CP-ABE scheme that has authority accountability, user traceability and supports arbitrary monotonous access structures. Specifically, we employ an auditor to make a fair ruling on the malicious behavior of users. Besides, to solve the problem of user leaving from the system, we use an indirect revocation method based on trust tree to implement user revocation. Compared with other existing schemes, we found that our solution achieved user revocation at an acceptable time cost. In addition, our scheme is proved to be fully secure in the standard model.

The Dynamic Split Policy of the KDB-Tree in Moving Objects Databases (이동 객체 데이타베이스에서 KDB-tree의 동적 분할 정책)

  • Lim Duk-Sung;Lee Chang-Heun;Hong Bong-Hee
    • Journal of KIISE:Databases
    • /
    • v.33 no.4
    • /
    • pp.396-408
    • /
    • 2006
  • Moving object databases manage a large amount of past location data which are accumulated as the time goes. To retrieve fast the past location of moving objects, we need index structures which consider features of moving objects. The KDB-tree has a good performance in processing range queries. Although we use the KDB-tree as an index structure for moving object databases, there has an over-split problem in the spatial domain since the feature of moving object databases is to increase the time domain. Because the over-split problem reduces spatial regions in the MBR of nodes inverse proportion to the number of splits, there has a problem that the cost for processing spatial-temporal range queries is increased. In this paper, we propose the dynamic split strategy of the KDB-tree to process efficiently the spatial-temporal range queries. The dynamic split strategy uses the space priority splitting method for choosing the split domain, the recent time splitting policy for splitting a point page to maximize the space utilization, and the last division policy for splitting a region page. We compare the performance of proposed dynamic split strategy with the 3DR-tree, the MV3R-tree, and the KDB-tree. In our performance study for range queries, the number of node access in the MKDB-tree is average 30% less than compared index structures.

MPI: A Practical Index Scheme for XML Data in Object Databases

  • Song Ha-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.6
    • /
    • pp.729-734
    • /
    • 2005
  • In order to access XML data stored in object databases, an efficient index scheme is inevitable. There have been several index schemes that can be used to efficiently retrieve XML data stored In object databases, but they are all the single path indexes that support indexing along a single schema path. Henee, if a query contains an extended path which is denoted by wild character ('*'), a query processor has to examine multiple index objects, resulting in poor performance and inconsistent index management. In this paper, we propose MPI (Multi-Path Index) scheme as a new index scheme that provides the functionality of multiple path indexes more efficiently, while it uses only one index structure. The proposed scheme is easy to manage since it considers the extended path as a logically single schema path. It is also practical since it can be implemented by little modification of the B -tree index structure.

  • PDF

An Efficient Privacy Preserving Method based on Semantic Security Policy Enforcement (의미적 보안정책 집행에 의한 효율적 개인정보보호 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.173-186
    • /
    • 2013
  • New information technologies make it easy to access and acquire information in various ways. However, It also enable powerful and various threat to system security. To challenge these threats, various extended access control methods are being studied. We suggest a new extended access control method that make it possible to conform to security policies enforcement even with discrepancy between policy based constraints rules and query based constraints rules via their semantic relationship. New our approach derives semantic implications using tree hierarchy structure and coordinates the exceed privileges using semantic gap factor calculating the degree of the discrepancy. In addition, we illustrate prototype system architecture and make performance comparison with existing access control methods.

Unusual data local access using inverse order tree (역순트리를 이용한 특이데이터 국소적 접근)

  • Rim, Kwang-Cheol;Seol, Jung-Ja
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.595-601
    • /
    • 2014
  • With the advent of the Smart information-communication era, the number of data has increased exponentially. Accordingly, figuring out and analyzing in which area and circumstance the data has been created becomes one of the factors for prompt actions. In this paper identifies how to analyze the data by implementing a route from the lowest module to highest one in an inverse order for the part judgement for the particular data. The script first identifies cluster analisys, paralizes the analysis using the sum of each factors of the cluster with the tree structure, and finally transpose the answer into number. Also, it is designed to place priority on particular answer, thereafter, draws the wanted answer real-time.

Effective Streaming of XML Data for Wireless Broadcasting (무선 방송을 위한 효과적인 XML 스트리밍)

  • Park, Jun-Pyo;Park, Chang-Sup;Chung, Yon-Dohn
    • Journal of KIISE:Databases
    • /
    • v.36 no.1
    • /
    • pp.50-62
    • /
    • 2009
  • In wireless and mobile environments, data broadcasting is recognized as an effective way for data dissemination due to its benefits to bandwidth efficiency, energy-efficiency, and scalability. In this paper, we address the problem of delayed query processing raised by tree-based index structures in wireless broadcast environments, which increases the access time of the mobile clients. We propose a novel distributed index structure and a clustering strategy for streaming XML data which enable energy and latency-efficient broadcast of XML data. We first define the DIX node structure to implement a fully distributed index structure which contains tag name, attributes, and text content of an element as well as its corresponding indices. By exploiting the index information in the DIX node stream, a mobile client can access the wireless stream in a shorter latency. We also suggest a method of clustering DIX nodes in the stream, which can further enhance the performance of query processing over the stream in the mobile clients. Through extensive performance experiments, we demonstrate that our approach is effective for wireless broadcasting of XML data and outperforms the previous methods.