• Title/Summary/Keyword: Access to information

Search Result 8,979, Processing Time 0.032 seconds

Mandatory Access Control Protection Profile for Secure Operating System (보안 운영체제를 위한 강제적 접근 제어 보호 프로파일)

  • Ko Young Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.141-148
    • /
    • 2005
  • Nowadays, it is possible to access sharing data from unauthorized People. Access control prevents unauthorized access to computing resource, information resources, and communication resources. It is very important to defend the critical system resources from the unauthorized. The importance of this study is to develop Protection Profile for Mandatory Access Control (MAC) that satisfies TCSEC assurance level B2. protection profile for MAC will help developers to use reference for the development of requirements and formulating security specification.

  • PDF

The Relation of Cell Scale and Call Connection Level for the VBR Trafac in the Wireless ATM Access Transport (무선 ATM 액세스 전달구조에서 VBR 트래픽에 대한 셀 스케일과 호 접속레벨간의 관계)

  • Lee Ha-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9B
    • /
    • pp.596-601
    • /
    • 2005
  • In this paper it is focused on the relation between CLR(Cell Loss Ratio) and blocking probability in the wireless ATM access transport. Traffic model of wireless ATH access transport is based on the cell scale, burst scale and call connection level. The CLR due to buffer overflow for wireless access node is derived for VBR traffic. The CLR due to transmission errors for wireless channel is derived. Using the CLR for both access node and wireless channel: the CLR of wireless ATM access transport is derived. The relation between CLR and blocking probability is analyzed for VBR traffic to evaluate performance of wireless ATM access transport.

Efficient Congestion Control Technique of Random Access and Grouping for M2M according to User Type on 3GPP LTE-A s (3GPP LTE-A 시스템 기반 사용자 특성에 따른 효율적 Random Access 과부하 제어 기술 및 M2M 그룹화)

  • Kim, Junghyun;Ji, Soonbae;You, Cheolwoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.48-55
    • /
    • 2015
  • This paper studies how to solve a problem caused by M2M terminals sending a few data based on $3^{rd}$ Generation Partnership Project(3GPP) Long Term Evolution-Advanced(LTE-A) system and then it is analyzed, proposed, and introduced into the techniques. Especially, it is introduced solution for the lack of Random Access Channel and an increasing number of latency caused by countless M2M devices. It is proposed the technology for M2M grouping as well as allowable access probability according to user type. As it decreases the number of terminal by grouping M2M devices to try random access at PRACH, it can be reduced collision between Cellular users and M2M devices. So, it is proved that the proposed mechanism can solve the increasing average latency of random access on system coexisting Cellular users and M2M devices through simulations.

Perceptions of Researchers on Cooperative Utilization of Research Outcomes (R&D 성과물 공동활용에 대한 연구자들의 인식에 관한 연구)

  • Chang, Durk-Hyun;Roh, Ryu-Ha;Lee, Soo-Sang
    • Journal of Information Management
    • /
    • v.39 no.4
    • /
    • pp.1-20
    • /
    • 2008
  • The purpose of this study is to scrutinize the copyright issue under Open Access environment. A survey has been carried out to investigate researchers' awareness and recognitions about such issues. For this, bioinformatics researchers were selected and surveyed. Descriptive statistics method is employed for analysis of collected data. The findings of this study summarized as follow. (1) Although the researchers regarded the Open Access a positive initiative, the perceptions about open access were very low. (2) The researchers demanded possession of copyright depending on type of research information. (3) Many agencies did not required the transfer of copyright to the researcher. Thus, there is a possibility of dispute regarding copyright issues between researchers and agencies. (4) The researchers are willing to participate in open access activity on the assumption that their study is used in legitimate objective. On the basis of these findings, suggestions are added in as an impetus to lower the barrier against a copyright and higher the approach to information seekers and information providers.

A Study on Access Control Technique for Provision of Cloud Service in SSO-based Environment

  • Eun-Gyeom Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.73-80
    • /
    • 2023
  • In this paper, a technology to protect important information from access in order to revitalize the cloud service market. A technology is proposed to solve the risk of leakage of important confidential and personal information stored in cloud systems, which is one of the various obstacles to the cloud service market. To protect important information, access control rights to cloud resources are granted to cloud service providers and general users. The system administrator has superuser authority to maintain and manage the system. Client computing services are managed by an external cloud service provider, and information is also stored in an external system. To protect important in-house information within the company, all users, it was designed to provide access authority with users including cloud service providers, only after they are authenticated. It is expected that the confidentiality of cloud computing resources and service reliability achieved through the proposed access control technology will contribute to revitalizing the cloud service market.

An Efficient Priority Based Adaptive QoS Traffic Control Scheme for Wireless Access Networks

  • Kang Moon-sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9A
    • /
    • pp.762-771
    • /
    • 2005
  • In this paper, an efficient Adaptive quality-of-service (QoS) traffic control scheme with priority scheduling is proposed for the multimedia traffic transmission over wireless access networks. The objective of the proposed adaptive QoS control (AQC) scheme is to realize end-to-end QoS, to be scalable without the excess signaling process, and to adapt dynamically to the network traffic state according to traffic flow characteristics. Here, the reservation scheme can be used over the wireless access network in order to get the per-flow guarantees necessary for implementation of some kinds of multimedia applications. The AQC model is based on both differentiated service model with different lier hop behaviors and priority scheduling one. It consists of several various routers, access points, and bandwidth broker and adopts the IEEE 802.1 le wireless radio technique for wireless access interface. The AQC scheme includes queue management and packet scheduler to transmit class-based packets with different per hop behaviors (PHBs). Simulation results demonstrate effectiveness of the proposed AQC scheme.

Model Coupling Technique for Level Access in Hierarchical Simulation Models and Its Applications (계층의 구조를 갖는 시뮬레이션 모델에 있어서 단계적 접근을 위한 모델연결 방법론과 그 적용 예)

  • 조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.5 no.2
    • /
    • pp.25-40
    • /
    • 1996
  • Modeling of systems for intensive knowledge-based processing requires a modeling methodology that makes efficient access to the information in huge data base models. The proposed level access mothodology is a modeling approach applicable to systems where data is stored in a hierarchical and modular modules of active memory cells(processor/memory pairs). It significantly reduces the effort required to create discrete event simulation models constructed in hierarchical, modular fashion for above application. Level access mothodology achieves parallel access to models within the modular, hierarchical modules(clusters) by broadcasting the desired operations(e.g. querying information, storing data and so on) to all the cells below a certain desired hierarchical level. Level access methodology exploits the capabilities of object-oriented programming to provide a flexible communication paradigm that combines port-to-port coupling with name-directed massaging. Several examples are given to illustrate the utility of the methodology.

  • PDF

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud

  • Xiong, Jinbo;Yao, Zhiqiang;Ma, Jianfeng;Liu, Ximeng;Li, Qi;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.282-304
    • /
    • 2014
  • Each cloud service has numerous owners and tenants, so it is necessary to construct a privacy preserving identity management and access control mechanism for cloud computing. On one hand, cloud service providers (CSP) depend on tenant's identity information to enforce appropriate access control so that cloud resources are only accessed by the authorized tenants who are willing to pay. On the other hand, tenants wish to protect their personalized service access patterns, identity privacy information and accessing newfangled cloud services by on-demand ways within the scope of their permissions. There are many identity authentication and access control schemes to address these challenges to some degree, however, there are still some limitations. In this paper, we propose a new comprehensive approach, called Privacy pReserving Identity and Access Management scheme, referred to as PRIAM, which is able to satisfy all the desirable security requirements in cloud computing. The main contributions of the proposed PRIAM scheme are threefold. First, it leverages blind signature and hash chain to protect tenant's identity privacy and implement secure mutual authentication. Second, it employs the service-level agreements to provide flexible and on-demand access control for both tenants and cloud services. Third, it makes use of the BAN logic to formally verify the correctness of the proposed protocols. As a result, our proposed PRIAM scheme is suitable to cloud computing thanks to its simplicity, correctness, low overhead, and efficiency.

Design of an Access Router for Internet Access Services in the Integrate Access Node (통합 액세스 노드에서의 인터넷 액세스 라우터 설계)

  • 홍록기;이현태
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.438-442
    • /
    • 1999
  • More and more residential and mobile users are requiring access to the Internet. This paper presents an architecture of the network solution for cost-effective Internet/intranet access between users and Network Service Providers(NSPs). It also presents a functional architecture of Internet access router in the integrated access node system. The proposed Internet access router provides the functionality that users select any of a number of NSPs and mutiple user PPP calls are multiplexed over each secure tunnel between the Internet access router and NSP.

  • PDF

The Design and Performance analysis of a Process Migration Facility in a Distributed System (분산 시스템에서 프로세스 이주 기능의 설계와 성능 평가)

  • 엄태범;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.7
    • /
    • pp.656-665
    • /
    • 1992
  • In this paper, the performance of the various multiple access techniques for the mobile computer network has been studiedi in the consideration of the charactersitics of the mobile cimmunication channel. In the case of the hidden node occurring. It could be seen that the performance of the code division multiple access (CDMA) technique with simultaneous access function is better than that of the other packet access methods such as carrier sendsed multiple access (CDMA), busy tone multiple access (BTMA) and idle signal multiple access (ISMA) in the view of the throughput and mean delay time. Also, it has been shown that the performance of the CDMA method is superior to that of other packet access techniques such as multiple access (CSMA), etc. when the fading effect or impulsive noise exists in the mobile channel, Especially, in the case of the distributed mobile network it has been shown that the receivertransmitter based CDMA method using the characteristics of CDMA effectively has better throughput and less mean delay time than the commontransmitter based CDMA technique.

  • PDF