• Title/Summary/Keyword: AccessON

Search Result 11,239, Processing Time 0.037 seconds

Role-Behavior Based Access Control on Mobile Agent System for Workflow Management System (워크플로우 응용을 위한 이동 에이전트 시스템에의 역할-행위 기반 접근통제 적용)

  • Shin, Wook;Lee, Dong-Ik;Yoon, Seok-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.11-28
    • /
    • 2000
  • In these days it is rapidly increasing that multi-user, multi-layered commercial software developments for companies or public institutions. Security services are necessary for most of systems and the access control service is the essential of security services. Current access control methods that are used as access control policies are classified as Discretionary Access Control Mandatory Access Control and Role Based Access Control. However there are some inefficiencies when those methods are applied to current multi-user, multi-layered systems. Therefore it is required that a new access control method that takes complex system resources into account from the side of policy. In this paper extending previous Role Based of 'Behavior' and a basic model of the method. And we simply implement the method on the mobile agent based workflow management system that is a representative example of multi-user. multi-layered softwares and shows implementation results to tap possibilities of real-world application.

A Study on Access Control running on Distance Environment for Computer-Based Integrated Multimedia (컴퓨터 기반의 통합 멀티미디어를 위한 원격 환경 상에서 접근 제어에 관한 연구)

  • Kim, Soon-Gohn;Ko, Eung-Nam
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.173-177
    • /
    • 2015
  • This paper proposed an access control for computer-based integrated multimedia running on shepherd and SIP(Session Initiation Protocol). But, conventional framework for access control SIP environment has not yet fully progressed a shepherd and an access control for computer-based integrated multimedia running on SIP(Session Initiation Protocol). Session management include function of session creation, session end, late comer process, and access control. Therefore, this paper described access control based on a shepherd and SIP environment to maintain good session condition.

A Study on Enhancing Accessibility to the National Archives (기록물관리기관의 열람환경 운영에 관한 연구)

  • Lee, Sook-hee
    • The Korean Journal of Archival Studies
    • /
    • no.10
    • /
    • pp.65-111
    • /
    • 2004
  • In the modern society, Archives are an available subject to the people of a nation and it is indispensable to build and appropriate access environment in order to connect the users and the registered records stored in the facilities. Specially, the Closed Shelves Access system, based on the notion of "a Policy of Archives Preservation", needs to be fully equipped with an access environment more adequate to its necessities. Hence, this study has analyzed all sorts of environments-institutional, organizational, human, physical and intellectual- from a general perspective in order to activate users to read the archives and based on this, the objective of the research is in proposing a program that effectively provides archives to the users and provides the basis for putting into practice an active access environment. The use of archives is the fountainhead in order to preserve archives. By using the archives, the meaning of preserving them is maximized. Whether these archives may be used or not will depend on the quality of information and the advancement of the access environment. Therefore, in order to motivate users to access the archives, first of all the facilities and the archivists must establish norms regarding the access, based on statutes and once they have been settled, they should provide other changes such as ; the development and fixation in the organization's structure, the education of specialized human labor, the expansion of physical space and the facilities and diverse positive services.

Performance Analysis of Opportunistic Spectrum Access Protocol for Multi-Channel Cognitive Radio Networks

  • Kim, Kyung Jae;Kwak, Kyung Sup;Choi, Bong Dae
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.77-86
    • /
    • 2013
  • Cognitive radio (CR) has emerged as one of effective methods to enhance the utilization of existing radio spectrum. Main principle of CR is that secondary users (SUs) are allowed to use the spectrum unused by primary users (PUs) without interfering PU's transmissions. In this paper, PUs operate on a slot-by-slot basis and SUs try to exploit the slots unused by PUs. We propose OSA protocols in the single channel and we propose an opportunistic spectrum access (OSA) protocols in the multi-channel cognitive radio networks with one control channel and several licensed channels where a slot is divided into contention phase and transmission phase. A slot is divided into reporting phase, contention phase and transmission phase. The reporting phase plays a role of finding idle channels unused by PUs and the contention phase plays a role of selecting a SU who will send packets in the data transmission phase. One SU is selected by carrier sense multiple access / collision avoidance (CSMA/CA) with request to send / clear to send (RTS/CTS) mechanism on control channel and the SU is allowed to occupy all remaining part of all idle channels during the current slot. For mathematical analysis, first we deal with the single-channel case and we model the proposed OSA media access control (MAC) protocol by three-dimensional discrete time Markov chain (DTMC) whose one-step transition probability matrix has a special structure so as to apply the censored Markov chain method to obtain the steady state distribution.We obtain the throughput and the distribution of access delay. Next we deal with the multi-channel case and obtain the throughput and the distribution of access delay by using results of single-channel case. In numerical results, our mathematical analysis is verified by simulations and we give numerical results on throughput and access delay of the proposed MAC protocol. Finally, we find the maximum allowable number of SUs satisfying the requirements on throughput and access delay.

A Study on the CLR Performance Improvement for VBR Traffic in the Wireless ATM Access Network (무선 ATM 가입자망에서 VBR 트래픽의 CLR 성능개선)

  • 이하철
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.713-720
    • /
    • 2004
  • In this paper we suggest error control scheme to improve CLR performance degradation on wireless ATM access networks which consist of access node and wireless channel. Based on the cell scale and hurst scale, traffic model of wireless ATM access network is analyzed. The CLR equation due to buffer overflow for wireless access node is derived for VBR traffic. the CLR equation due to random bit errors and burst errors for wireless channel is derived. Using the CLR equation for both access node and wireless channel, the CLR equation of wireless ATM access network is derived, and we evaluate the CLR performance on the wireless ATM access networks with conventional SR ARQ scheme and recommended error control scheme, that is, Type I Hybrid ARQ scheme. It is confirmed that CLR performance of the access networks with recommended error control schemes is superior to that of access networks with conventional error control scheme.

  • PDF

Extended Role Based Access Control Model with Multilevel Security Control (다단계 보안통제가 가능한 확장된 역할기반 접근통제 모델)

  • Kim, Hak-Beom;Hong, Gi-Yung;Kim, Dong-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1886-1902
    • /
    • 2000
  • RBAC(Role Based Access Control) is an access control method based on the user's roles and it provides more flexibility and applicability on the various computer and network security fields than DAC(Discretionary Access Control) or MAC(Mandator Access Control). In this paper, e newly propose ERBAC\ulcorner(Extended RBAC\ulcorner) model by considering subject's and object's roles and security levels for roles additionally to RBAC\ulcorner model which is firstly proposed by Ravi S. Sandhu as a base model. The proposed ERBAC\ulcorner model provides finer grained access control with multilevel security on he base of subject and object level than RBAC\ulcorner model.

  • PDF

Context Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 컨텍스트 접근 제어 고찰)

  • Jung Heon-Man;Lee Se-Hoon
    • KSCI Review
    • /
    • v.14 no.1
    • /
    • pp.175-184
    • /
    • 2006
  • In this paper, we study to two research direction about information security in ubiquitous computing environment. First, researches on context-aware access control using user's context or environment conditions based on role-based control. Second, researches on model for access control about context information in ubiquitous computing utilizing role base access control model. Two research directions are the one of the most important point technology in that embody ubiquitous environment in the actual world.

  • PDF

A Study on Secure Role-Based Access Control (안전한 직무 기반 접근 제어에 대한 연구)

  • Lee, Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.119-124
    • /
    • 2001
  • In the paper, is proposed a secure role-based access control model that not only has s functions such as security, integrity and flow control, but also can easily meet access requirements of role-based social organizations. The proposed role-based access control mod designed based on proven existing rule-based access control mechanisms in order to be app real access control systems. The model proposed in the paper is simple and secure. It can be used for the web-based application systems working on the Internet.

  • PDF

Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing

  • Yin, Hongjian;Zhang, Leyou;Cui, Yilei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2768-2780
    • /
    • 2019
  • Ciphertext-policy attribute-based encryption (CP-ABE) is one of the practical technologies to share data over cloud since it can protect data confidentiality and support fine-grained access control on the encrypted data. However, most of the previous schemes only focus on data confidentiality without considering data receiver privacy preserving. Recently, Li et al.(in TIIS, 10(7), 2016.7) proposed a CP-ABE with hidden access policy and testing, where they declare their scheme achieves privacy preserving for the encryptor and decryptor, and also has high decryption efficiency. Unfortunately, in this paper, we show that their scheme fails to achieve hidden access policy at first. It means that any adversary can obtain access policy information by a simple decisional Diffie-Hellman test (DDH-test) attack. Then we give a method to overcome this shortcoming. Security and performance analyses show that the proposed scheme not only achieves the privacy protection for users, but also has higher efficiency than the original one.

Multi-access Monitoring System for Biological Signal Collection (생체신호수집을 위한 다중접속 모니터링 시스템)

  • Kim, Tae-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.145-148
    • /
    • 2020
  • Wearable computing is growing rapidly as research on body area communication network using wireless sensor network technology is actively conducted. In particular, there is an increasing interest in smart clothing measuring unrestrained and insensitive bio signals, and research is being actively conducted. However, research on smart clothing is mainly based on 1: 1 wireless communication. In this paper, we propose a multi-access monitoring system that can measure bio-signals by multiple users wearing smart clothing. The proposed system consists of wireless access device, multiple access control server and monitoring system. It also provides a service that allows multiple users to monitor and measure bio signals at the same time.