• 제목/요약/키워드: AccessON

검색결과 11,239건 처리시간 0.032초

A MATHEMATICAL MODEL FOR HISTORY-BASED ACCESS CONTROL

  • Kim, Hee-Young
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제8권1호
    • /
    • pp.11-30
    • /
    • 2004
  • Access Control is one of essential branches to provide system's security. Depending on what standards we apply, in general, there are Role-based access control, History-based access control. The first is based on subject's role, The later is based on subject's history. In fact, RBAC has been implemented, we are using it by purchasing some orders through the internet. But, HBAC is so complex that there will occur some errors on the system. This is more and more when HBAC is used with other access controls. So HBAC's formalization and model which are general enough to encompass a range of policies in using more than one access control model within a given system are important. To simplify these, we design the mathematical model called non-access structure. This Non-access structure contains to historical access list. If it is given subjects and objects, we look into subject grouping and object relation, and then we design Non-access structure. Then we can determine the permission based on history without conflict.

  • PDF

Characterization Studies on Data Access Bias in Mobile Platforms

  • Bahn, Hyokyung
    • International journal of advanced smart convergence
    • /
    • 제10권4호
    • /
    • pp.52-58
    • /
    • 2021
  • Data access bias can be observed in various types of computing systems. In this paper, we characterize the data access bias in modern mobile computing platforms. In particular, we focus on the access bias of data observed at three different subsystems based on our experiences. First, we show the access bias of file data in mobile platforms. Second, we show the access bias of memory data in mobile platforms. Third, we show the access bias of web data and web servers. We expect that the characterization study in this paper will be helpful in the efficient management of mobile computing systems.

WDM passive star coupler 망에서 예약 방식에 기반한 임의 접근 프로토콜에 관한 연구 (A study on random access protocol based on reservation access for WDM passive star coupler network)

  • 백선욱;최양희;김종상
    • 한국통신학회논문지
    • /
    • 제21권4호
    • /
    • pp.893-910
    • /
    • 1996
  • Recently, there ary many researches on local area multichannel network as WDM technology developes. An ideal media access protocol in a multichannel network is one that shows short access delay under low load and high throughput under heavy load. This paper proposed a new media access protocol for WDM passive star coupler network. The proposed one is a random access rpotocol based on reservation. Access delay is short under low load by using random access method, and high throughput is achieved under heavy load by usin greservation access. Analytic model for the performance analysis of the proposed protocol is developed and performance of the proposed protocol is compared with the previous ones. The effect on the performance of the number of the nodes and channels, and the number of transceivers in each node are analyzed.

  • PDF

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권11호
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.

출입문 보안을 위한 블록체인 기반의 출입코드키 검증 서비스 모델 (An Access Code Key for Verification Service Model on the Blockchain in a Door Security)

  • 홍기현;이병문
    • 한국멀티미디어학회논문지
    • /
    • 제25권10호
    • /
    • pp.1416-1432
    • /
    • 2022
  • The access control system is a system that allows users to selectively enter the building by granting an access key to the user for security. Access keys with weak security are easily exposed to attackers and cannot properly perform the role that authenticates users. Access code keys should be protected from forgery or spoofing. For this reason, access key verification service models is important in security. However, most models manage all access keys on one central server. This method not only interrupts all services due to server errors, but also risks forgery and spoofing in the process of transmitting access keys. Therefore, blockchain algorithms are used to reduce this risk. This paper proposes a blockchain-based access key verification service model that used distributed stored blockchain gateways on storing access keys and authenticates the user's identity based on them. To evaluate the performance of this model, an experiment was conducted to confirm the performance of the access key forgery recovery rate and the blockchain network performance. As a result, the proposed method is 100% forgery recovery rate, and the registration and verification process is evaluated at 387.58 TPS and 136.66 TPS.

오픈액세스 학술출판 지원 인터페이스 사용성 평가 및 개선안 사례 연구 (Case Study of Usability Evaluation and Improvement Plan for Open Access Academic Publishing Support Interface)

  • 이정미;황혜경
    • 한국비블리아학회지
    • /
    • 제32권4호
    • /
    • pp.47-66
    • /
    • 2021
  • 본 연구는 오픈액세스 출판지원 서비스 플랫폼인 AccessON 학술지 리포지터리 인터페이스 중 관리자 인터페이스의 사용성 평가를 통해 오픈액세스 출판지원 서비스 플랫폼의 개선방안을 모색하고자 하는 연구이다. 인터페이스의 사용경험 응답 수집, 이를 통한 이슈 및 개선점 도출, 타 오픈액세스 출판지원 서비스 플랫폼을 위한 제안사항 분석 및 도출이라는 세 가지 연구 질문에 대한 응답을 위해 오픈액세스 출판 및 사용성 평가에 관련된 각종 문헌과 사례같은 선행연구를 검토하였으며, 설문조사와 포커스그룹 인터뷰를 통해 관리자 인터페이스 사용경험에 대한 응답을 수집하였다. 이를 종합하여 AccessON 학술지 리포지터리 인터페이스의 사용성 평가 결과를 각종 수치정보를 통해 제시할 수 있었다. 사용성 평가의 결과는 AccessON 학술지 리포지터리 관리자 인터페이스의 이슈 및 개선점을 제안가능하게 하였으며 최종적으로 이후 개발될 오픈액세스 학술출판지원 서비스 플랫폼을 위한 제안사항을 도출할 수 있었다.

A Global Analysis of Open Access Books: A Study Based on Directory of Open Access Books

  • Dhanavandan, Sadagopan
    • International Journal of Knowledge Content Development & Technology
    • /
    • 제6권1호
    • /
    • pp.85-103
    • /
    • 2016
  • The Directory of Open Access Books (DOAB) provides a searchable index peer-reviewed monographs and edited volumes published under an Open Access business model, with links to the full texts of the publications at the publisher's website or repository. This paper discusses a global analysis of open access books, which are available in the Directory of Open Access Books (DOAB). The data was collected from the open access directory at http://www.doabooks.org/ on $20^{th}$ October 2015. In total 3379 books are listed as available on the directory; the first and second books were published in 1866 and 1867 respectively. After 1962, the publication of books, increased gradually and the greatest number of books more than 300, was published in 2010, 2012, 2013 and 2014. Nearly 47 percent of the books (1584) were published in the English language only.

ISDN 가입자 - 망 접속에서의 실험적 경험에 대한 고찰 (ISDN Experimental Experiences on User-Network Interfaces)

  • 정일영;정희창;조규섭;임주환
    • ETRI Journal
    • /
    • 제10권1호
    • /
    • pp.3-13
    • /
    • 1988
  • With the contunuing trends towards an information based society, telecommunications services are becoming an integral part of social activities. So, emphasis on ISDN is growing rapidly and placed on supporting integrated services delivery of different levels to the end user. The end user’s perception of an integraged services delivery(in particular, ISDN services) should reflect three interrelated capabilities, ISDN access capabilities and ISDN network capabilities. For turning the ISDN concept of above capabilities into reality, we have implemented the experimental system on user-network interfaces, which are three kinds of implementations in user access arrangements, namely basic access, intermediate rate multiplexed access and primary rate multiplexed access. Through these implementations, NTE(Network Terminating Equipment) is used for single basic access [2B+D], IMUX (Intermediate rate Multiplexer) for 4 basic accesses [4X(2B+D)] and PMUX(Primary rate Multiplexer) for [10/12 X (2B+D)]. This paper describes the outlines of system features on user access equipments, system architectures of testbed and experiment result of each access arrangements.

  • PDF

웹데브 기반 협업시스템에서의 접근 제어 관리 (Management of the Access Control for a WebDAV-based Collaborative System)

  • 김성훈;이홍창;이명준;박양수
    • 인터넷정보학회논문지
    • /
    • 제11권1호
    • /
    • pp.167-181
    • /
    • 2010
  • 웹데브는 분산 저작활동을 지원하는 IETF의 표준 프로토콜이다. 웹데브 접근 제어 프로토콜은 웹데브 서버에 의하여 관리되는 자원과 이들의 속성에 대한 접근을 임의적으로 제어할 수 있는 기능을 제공하며 높은 수준의 협업작업이 웹데브 서버를 통하여 수행될 수 있는 길을 열어주고 있다. 본 논문에서는 높은 수준의 협업을 제공하도록 웹데브 접근 제어 프로토콜을 통하여 웹데브 자원들에 대한 접근 제어를 관리하는 기법을 소개하고 이러한 기법을 CoSlide 협업시스템에 적용시킨 접근 제어 관리자의 개발에 대하여 기술한다. 웹데브 접근 제어 프로토콜에서 제공하는 표준 권한를 사용자에게 쉽게 이해할 수 있는 방법으로 접근 제어 기능을 제공하기 위하여 웹데브 메소드 기반으로 제시한다. 또한 이미 설정되어 있는 접근 제어와 새로 추가하려는 접근 제어 사이에 충돌을 탐지하고 이를 해결하는 기법을 제공한다. 이러한 웹데브 메소드 기반의 접근 제어 관리 기능을 CoSlide 협업시스템에 적용하였다. 개발된 접근 제어 관리자는 그룹작업장에 소속된 사용자들과 자원들에 대하여 유연한 접근 제어 관리 기능을 가진 그룹작업장을 생성하고 이를 관리하는 기능을 제공한다.

A Secure Cloud Computing System by Using Encryption and Access Control Model

  • Mahmood, Ghassan Sabeeh;Huang, Dong Jun;Jaleel, Baidaa Abdulrahman
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.538-549
    • /
    • 2019
  • Cloud computing is the concept of providing information technology services on the Internet, such as software, hardware, networking, and storage. These services can be accessed anywhere at any time on a pay-per-use basis. However, storing data on servers is a challenging aspect of cloud computing. This paper utilizes cryptography and access control to ensure the confidentiality, integrity, and proper control of access to sensitive data. We propose a model that can protect data in cloud computing. Our model is designed by using an enhanced RSA encryption algorithm and a combination of role-based access control model with extensible access control markup language (XACML) to facilitate security and allow data access. This paper proposes a model that uses cryptography concepts to store data in cloud computing and allows data access through the access control model with minimum time and cost for encryption and decryption.