• Title/Summary/Keyword: AccessON

Search Result 11,372, Processing Time 0.036 seconds

An Access Control running on Session Initiation Protocol for Computer Supported Cooperated Works (컴퓨터 협동 지원 작업의 세션 초기 프로토콜 환경에서 실행되는 접근 제어)

  • Ko, Eung Nam
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.3
    • /
    • pp.17-20
    • /
    • 2008
  • This paper describes an access control which is running on SIP(Session Initiation Protocol) environment for computer supported cooperated works. Session management include function of session creation, session end, late comer process, and access control. But, conventional framework for access control SIP environment for computer supported cooperated works environment has not yet fully progressed. Therefore, this paper suggests an access control based on SIP environment for computer supported cooperated works environment to maintain good session condition.

  • PDF

The influence of different access cavity designs on fracture strength in endodontically treated teeth

  • Lee, Young-Gyun;Cho, Kyung-Mo;Kim, Jin-Woo
    • Proceedings of the KACD Conference
    • /
    • 2003.11a
    • /
    • pp.556-556
    • /
    • 2003
  • It is generally agreed that endodontic success often depends on canal debridement, disinfection and canal obturation. Access opening to a canal is one of the key to canal debridement. Advantages of straight line access opening are allowed a greater proportion of the root canal walls to be prepared than conventional lingual access cavities, minimized the loss of the tooth structure, reduced incidence of file fracture in curved canals. The purpose of this study is determine the influence of different access opening methods on fracture strength in endodontically treated teeth.(omitted)

  • PDF

A Study on Average Access Times by Priority Levels of FDDI MAC Protocol (FDDI MAC 프로토콜의 우선순위 등급에 따른 매체 이용 평균시간에 관한 연구)

  • 김경식;강준길
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.14 no.4
    • /
    • pp.369-373
    • /
    • 1989
  • This paper investigates average access times on eight asynchronous priority levels of FDDI MAC protocol with parameters on offered loads, message sizes, and number of stations. In case of parameter with offered loads, higher priority levels exhibit similar variances and in case of parameter with message sizes and number of satations, higher priority levels exhibit almost invariables but as increase of message sizes, increase only a small amount of access time on the other hand, as number of stations increase, average access times decrease little by little. But in case of lowest priority level. average access times decrease little by little. But in case of lowest priority level, average access times exhibit relatively large variances about above three parameters.

  • PDF

Design of Radio Interface Protocols for Broadband CDMA Wireless Local Loop and Access Channel Performance Analysis (광대역 CDMA WLL 무선 프로토콜 설계 및 액세스채널의 성능분석)

  • 김영태;박기식;조정호;김광현;이태훈
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.1
    • /
    • pp.47-58
    • /
    • 1999
  • In this paper, we design the radio interface protocols of wideband Wireless Local Loop(WLL) that uses wideband Code Division Multiple Access(CDMA), and propose the random access procedures on access channel and analyze the performance of the channel. The structure of radio interface protocols are designed by three modular parts to meet the requirements of IMT-2000 : radio resource controlling part that depends on the radio resources, connection controlling part that is independent of the radio resources, and application part that supports the interface between different parts and user terminals. In addition, we propose the random access procedures on access channel and analyze the performance of the channel. We assume that both near-far effect and shadow fading can be compensated by open loop power control. We observe that the number of access probes(delay) depend on the initial mobile transmission power and power increment, and the poor estimation of initial mobile transmission power might increase the average number of access probes.

  • PDF

Implementation Access Control System Based on CAN Communication (CAN통신 기반 출입통제 시스템 구현)

  • Song, Chong-kwan;Park, Jang-sik;Kim, Hyun-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.467-470
    • /
    • 2009
  • CAN communication developed for communication between electric control devices in vehicle, was recently applied to automatic braking devices, and can also be applied to field bus for production automation. Recently, field bus is introduced in engine control, etc. for large ship. In this paper, cabin access control system can be implemented, based on CAN communication. The cabin access control system based on CAN communication consists of access control server, embedded system based on ARM9, and micro-controller built-in CAN controller. The access control server can be able to manage overall access control system by accessing with manager. And embedded system adopted ARM9 processor transmits access information of RFID reader controller connected with CAN networks to server, also performs access control. The embedded system can carry CAN frames to server, so it can be used as gateway.

  • PDF

Radio Resource Sharing Among Users in Hybrid Access Femtocells

  • Becvar, Zdenek;Plachy, Jan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.8
    • /
    • pp.2590-2606
    • /
    • 2014
  • A problem related to deployment of femtocells is how to manage access of users to radio resources. On one hand, all resources of the femtocell can be reserved for users belonging to a closed subscriber group (CSG), which is a set of users defined by a femtocell subscriber. This approach, known as closed access, however, increases interference to users not included in the CSG as those users do not have a permission to access this femtocell. Contrary, resources can be shared by all users with no priority in an open access mode. In this case, the femtocell subscriber shares radio as well as backhaul resources with all other users. Thus, throughput and quality of service of the subscriber and the CSG users can be deteriorated. To satisfy both the CSG as well as non-CSG users, a hybrid access is seen as a compromise. In this paper, we propose a new approach for sharing radio resources among all users. As in common cases, the CSG users have a priority for usage of a part of resources while rest of the resources is shared by all users proportionally to their requirements. As the simulation results show, the proposed resource sharing scheme significantly improves throughput of the CSG users and their satisfaction with granted bitrates. At the same time, throughput and satisfaction of the non-CSG users is still guaranteed roughly at the same level as if conventional sharing schemes are applied.

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF

An Extended Role-Based Access Control Model with Multi-level Security Control (다단계 보안통제가 가능한 확장된 역할 기반 접근통제 모델)

  • Yim, Hwang-Bin;Park, Dong-Gue
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.90-96
    • /
    • 2002
  • RBAC(Role-Based Access Control) is an access control method based on the user's role and it provides more flexibility on the various computer and network security fields. But, RBAC models consider only users for roles or permissions, so for the purpose of exact access control within real application systems, it is necessary to consider additional subjects and objects. In this paper, we propose an Extended RBAC model, $ERBAC_3$, for access control of multi-level security system by adding users, subjects, objects and roles level to RBAC, which enables multi-level security control. 

A Study on the Design and the Performance Improvement of IP Access Control Protocol for External Mobile terminal (외부 이동단말의 접근제어를 위한 IP 프로토콜 설계 및 성능 개선에 관한 연구)

  • 박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.41-48
    • /
    • 2004
  • Access control protocol have verified security of external mobile terminal that access to inner information sever at Ubiquitous ages. In this paper, I would design for If Access Control Protocol of considering operation time when make cipher digital signature. Public key are used Individual identification number that issued from certify communication company, and cipher algorithm are used ECDSA definition factor for generation and verification of digital signature and it used Elliptic Curve with over 160 bit Key. Also, Access control operate on If level that designed IPv6 frame architecture. I would conclude that IP Access Control Protocol have verified security and improved performance in operation time more 4 times than before protocols when through the communication of use cipher digital signature for authentication and verification.

  • PDF

Wireless Internet-IMT-2000/Wireless LAN Interworking

  • Roman pichna;Tero Ojanpera;Harro Posti;Jouni Karppinen
    • Journal of Communications and Networks
    • /
    • v.2 no.1
    • /
    • pp.46-57
    • /
    • 2000
  • Ongoing standardization effort on 3G cellular system in 3GPP (UNTS) is based on GPRS core network and promises a global standard for systems capable of offering ubiquitous access to internet for mobile users. Considered radio access systems(FDD CDMA, TDD CDMA, and EDGE) are optimized for robust mobile use. However, there are alternative relatively high-rate radio interfaces being standardized for WLAN (IEEE802.11 and HIPER-LAN/2) which are capable of delivering significantly higher data rates to static or semi-static terminals with much less overhead. Also WPANs(BLUETOOTH, IEEE802.15), which will be present in virtually every mobile handset in the near future, are offering low cast and considerable access data rate and thus are very attractive for interworking scenarios. The prospect of using these interfaces as alternative RANs inthe modular UMTS architecture is very promising. Additionally, the recent inclusion of M-IP in the UMTS R99 standard opens the way for IP-level interfacing to the core network. This article offers an overview into WLAN-Cellular interworking. A brief overview of GPRS, UMTS cellular architectures and relevant WLAN standards is given. Possible interworking architectures are presented.

  • PDF