• Title/Summary/Keyword: Access System

Search Result 6,593, Processing Time 0.037 seconds

A Role-driven Security and Access Control Model for Secured Business Process Management Systems

  • Won Jae-Kang;Kim Kwang-Hoon
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.1-8
    • /
    • 2005
  • This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net(ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domain's and the application domain's. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC(Role-based Access Control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations.

  • PDF

Design of a Small Conditional Access System with DRM (DRM을 적용한 소규모 제한수신시스템 설계)

  • Jung, Seok-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10C
    • /
    • pp.1051-1058
    • /
    • 2007
  • Digital Broadcasting Services get abroad from satellite services to terrestrial services and cable services. As broadcasting services become digital from analog, diverse services such as multi-channel, high quality, time-shift function and so on can be possible. It also generates new digital businesses. The Conditional Access System(CAS) is a technology for providing prevention of illegal access to digital contents. It was applied to digital satellite services at Europe and America from the beginning of 90's. In 2002, a domestic digital satellite service provider adopt a CAS system to their broadcasting services. DRM technologies protect intellectual properties and digital rights of digital contents. This paper suggests a design method to construct a CAS system with DRM which can be applied to a CAS for a small digital broadcasting service.

Design and Implemetation of an Object-Relational Geographic Information System based on a commercial ORDB (상용 ORDB를 하부구조로 갖는 객체관계형 지리정보 시스템의 설계 및 구현)

  • 윤지희
    • Spatial Information Research
    • /
    • v.5 no.1
    • /
    • pp.77-88
    • /
    • 1997
  • This paper presents the design and implementaion of an object-relational geographic information system. This system has been developed on top of a commercial object-relational database management system. It provides flexible spatial data model, spatial query language, visual user interface, and efficient spatial access methods(D0T) in which traditional primary-key access methods can be applied. We report on our design choices and describe the current status of Implementation. The conceptual model of the system is based on SDTS, and is mapped to the intemal obiect-oriented data model. Kevwords : object-oriented data model, GIS, spatial data model, spatial access method.

  • PDF

Implementation of Integrated CPU-GPU for Efficient Uniform Memory Access Method and Verification System (CPU-GPU간 긴밀성을 위한 효율적인 공유메모리 접근 방법과 검증 시스템 구현)

  • Park, Hyun-moon;Kwon, Jinsan;Hwang, Tae-ho;Kim, Dong-Sun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.2
    • /
    • pp.57-65
    • /
    • 2016
  • In this paper, we propose a system for efficient use of shared memory between CPU and GPU. The system, called Fusion Architecture, assures consistency of the shared memory and minimizes cache misses that frequently occurs on Heterogeneous System Architecture or Unified Virtual Memory based systems. It also maximizes the performance for memory intensive jobs by efficient allocation of GPU cores. To test between architectures on various scenarios, we introduce the Fusion Architecture Analyzer, which compares OpenMP, OpenCL, CUDA, and the proposed architecture in terms of memory overhead and process time. As a result, Proposed fusion architectures show that the Fusion Architecture runs benchmarks 55% faster and reduces memory overheads by 220% in average.

Prototype for the Weather Monitoring System with Web - Based Data Management - Construction and Operation

  • Kim, Jinwoo;Kim, Jin-Young;Oh, Jai-Ho;Kim, Do-Yong
    • Atmosphere
    • /
    • v.20 no.2
    • /
    • pp.153-160
    • /
    • 2010
  • In this paper, an attempt has been made to build and test self-configuring weather sensor networks and internet based observation system to gather atmospheric data. The aim is to provide integrated or real-time weather information in standard form using network data access protocol. This system was successfully developed to record weather information both digital as well as visual using sensor network and web-enabled surveillance cameras. These data were transformed by network based data access protocol to access and utilize for public domain. The competed system has been successfully utilized to monitor different types of weather. The results show that this is one of the most useful weather monitoring system.

Experiment and Analysis for the Horizontal Vibration Control of Access Floor on Reinforced Concrete Structures (철근 콘크리트 구조물의 Access Floor 수평진동 제어를 위한 실험 및 해석)

  • 변근주;김문겸;송하원;이호범
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.1 no.1
    • /
    • pp.31-39
    • /
    • 1997
  • This paper is on the vibration control of access floor on the frames of reinforced structure. In this study, the horizontal anti-vibration system using precise spring damper was developed and modeling and vibration analysis of the RC structure was performed for the control of horizontal vibration coused by machinery and worker's moving. Experiment was done in three cases, no damper at the RC structures, dampers connecting pedestal to pedestal and pedestal to the structure, for the investigation of the effect of the system on disigned RC structure. For each experiment, the occeleration responses on slab and access floor after giving impact wave and external vibration were measured. It was shown that the magnitude of resonance response of the system with dampers are smaller than without damper and the resonance peak also partly moved to low-frequency range. Furthermore. It was shown that the acceleration components of the system with domoers decreased greatly in high-frequency range and the system was very much effective especially for external vibration. In order to verify the anti-vibration effect of the developed system, the vibration analysis was also done for the system by using the finite element modelling. The analysis results was in good agreement with experimental results. Thus, It is concluded that this study is useful for the design of precise anti-vibration system and micro-vibration control of concrete structures.

  • PDF

A Database Security System for Detailed Access Control and Safe Data Management (상세 접근 통제와 안전한 데이터 관리를 위한 데이터베이스 보안 시스템)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha;Hong, Sung-Jin;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.36 no.5
    • /
    • pp.352-365
    • /
    • 2009
  • Recently, data access control policies have not been applied for authorized or unauthorized persons properly and information leakage incidents have occurred due to database security vulnerabilities. In the traditional database access control methods, administrators grant permissions for accessing database objects to users. However, these methods couldn't be applied for diverse access control policies to the database. In addition, another database security method which uses data encryption is difficult to utilize data indexing. Thus, this paper proposes an enhanced database access control system via a packet analysis method between client and database server in network to apply diverse security policies. The proposed security system can be applied the applications with access control policies related to specific factors such as date, time, SQL string, the number of result data and etc. And it also assures integrity via a public key certificate and MAC (Message Authentication Code) to prevent modification of user information and query sentences.

A study on application plan of access control requirements in ERMS Standard (ERMS 표준에 나타난 접근통제 요건의 적용방안에 관한 연구)

  • Cheon, Kwon-Ju
    • The Korean Journal of Archival Studies
    • /
    • no.18
    • /
    • pp.179-220
    • /
    • 2008
  • Under the physical records management system, both the records and users could be controlled and secured by closing the door of Archives or using permitted records which is used only approved users. According to the electronic records management system and the concept of service on the basis of users, we have to give up the classical manner. As an alternative, we have to consider the electronic access control system. To accomplish this purpose, functional requirements of ERMS that is issued by UK, EU, U.S and Australia must be compared and analyzed. On the basis of U.K ERMS which is more detailed, 'common access control functional requirements' are arranged. As the access control functional requirements is applied in the records classification scheme, we could find out how the access control is executed in ERMS.

Design and Implementation of Applet for Multi-Users File Access based on Java Card (자바카드기반 다중 사용자 파일접근에 대한 애플릿 설계 및 구현)

  • Shin, Sang-Jun;Song, Young-Sang;Shin, In-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1201-1204
    • /
    • 2005
  • Whereas conveniences deriving from the development of information and telecommunication technology increase, information outflow and illegal data use are also rapidly on the rise. Consequently, many studies to prevent illegal information outflow are currently under way, and the use of Smart Card is in steep jump. Recently, Java Card is diffused fast as an alternative to complement the technical problems of the Smart Card. This paper designed and materialized the system for multi-users authentication and file access control by user through designing a Java Card applet that is used for information protection and in various application fields. For allowing a file access competence, each user's file access competence is processed via drawing up the access condition table in the applet. Therefore, illegal correction, exposure and destruction of information, which become the concerns when multi-users have an access, can be prevented. In addition, its application becomes possible in the system requiring multi-users certifications.

  • PDF

An Access Control Method considering Semantic Context for Privacy-preserving (개인정보 보호를 위한 의미적 상황을 반영하는 접근제어 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.1-14
    • /
    • 2015
  • To conform to new emerging computing paradigm, various researches and challenges are being done. New information technologies make easy to access and acquire information in various ways. In other side, however, it also makes illegal access more powerful and various threat to system security. In this paper, we suggest a new extended access control method that make it possible to conform to security policies enforcement even with discrepancy between policy based constraints rules and query based constraints rules, based on their semantic information. New method is to derive security policy rules using context tree structure and to control the exceed granting of privileges through the degree of the semantic discrepancy. In addition, we illustrate prototype system architecture and make performance comparison with existing access control methods.