• Title/Summary/Keyword: Application Access Control

Search Result 404, Processing Time 0.028 seconds

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

The application of Ubiquitous Technology To The Remote Control System for Unmanned Power Plant (무인원격발전소 원격제어시스템 유비쿼터스 기술적용 방안)

  • Ahn, Byung-Woo;NamKung, Bung;Ka, Pil-Sun;Go, Young-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.1674_1675
    • /
    • 2009
  • This paper aims to analyze characteristics of Network administration and its security and study a method of applying new Ubiquitous technology which can raise up the stability and efficiency of remote control systems in unmanned power plants so that the states of systems are recognized by unrestricted and diverse access in the ubiquitous circumstance and services wanted are supplied for anyone to access to them anytime and anywhere.

  • PDF

sDBMS for Hacking Prevention on Based PMI for Contents Protection in Web Environment (Web 환경에서 컨텐츠 보호를 위한 PMI 기반의 해킹방지 sDBMS)

  • Ryoo Du-Gyu;Kim Young-Chul;Jun Moon-Seog
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.5
    • /
    • pp.679-690
    • /
    • 2005
  • Business model in Web environments is usually provided by multimedia data. Information exchange between users and service providers should be made in encrypted data. Encrypted data are secure from being hacked. Application of DB encryption is a main technology for contents protection. We have applied the access control based on RBAC and prevented the unauthorized users from using the contents. In this paper, we propose a new DB encryption scheme which uses RHAC and digital signature based on PMI.

  • PDF

A Remote Data Access Interface Model Using the Monitor IPC Mechanism

  • 김동규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.4
    • /
    • pp.358-381
    • /
    • 1991
  • In this paper, we construct a remote data access interface model using the IPC mechanism based on the monitor concept. A general purpose IPC mechanism which can be used to implement arbitrary forms of communications control over distributed processes in a network environment is developed as a basis to build the framework for the model. The interface model and synchronization mechanisms are presented for providing application processes with remote data access capability using the above IPC mechanism.

  • PDF

A Study on the Design of the Security Gateway for Role-based Dynamic Security Rule-Set (역할 기반 변동 보안 룰셋 적용을 위한 네트워크 보안 게이트웨이 설계에 관한 연구)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.719-726
    • /
    • 2008
  • In this thesis investigate the security gateway that manage authorization for user access dynamically by recognizing automatically and comparison & distinction between database and User-information while a terminal unit(PC) trying to access to the network of subnet. Also, it present User-interfaced authorization allowance role model, so administrator can assign united access control between network level(L2) and application level(L7) in relation to system construction.

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

A Study on the Effects of the FRAD Model on the Related Standards (IFLA FRAD 모형이 관련 표준에 미친 영향 연구)

  • Ahn, Young-Hee;Lee, Sung-Sook
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.1
    • /
    • pp.279-303
    • /
    • 2009
  • This study aims to clearly understand 'Functional Requisite of Authority Data(FRAD)' being studied by IFLA focused on aspect of change from FRAR. In addition, it has established relationship between FRAD and concerned rules by analyzing effect of FRAD on RDA and MARC21 and reviewed cataloguing rules, format and situations of major authority DB implementations concerned about domestic authority controls in reflection of IFLA's activities for authority control. Based on the analysis, it has looked into considerations for domestic authority controls standards such as access control methods, expansion of application scope, introduction of new approaches such as entity-relationship model, reinforcement of roles for national bibliographic agency. These study results would be utilized as basic data for authority control.

차세대 엔터프라이즈웨어 마이포스 소개

  • 정창현
    • Proceedings of the Korea Database Society Conference
    • /
    • 1995.12a
    • /
    • pp.3-19
    • /
    • 1995
  • 시스템 Technology ★ Server Technology - 운영환경구축 ★ Network 구성설계 - ATM, FDDI, NMS ★ Client/Server시스템 구성별 Bench Marking ★ Windows 메뉴 및 GUI 설계 ★다기능 PC 운영환경 설정 시스템 Technology ★ Data Base Technology - DB Administration - BB Performance Tuning ★ System Integration Technology - Application Integration - System Flow Control - Task Control - Applicational Interface - S/W Down Load 시스템 Technology ★ Memory Optimization ★ IBM/Facom Host API ★ 영상전화 Customizing - Intel Proshare ★ Auto Dialing - CTI Link ★ IC-Card Interface 시스템 Technology ★ Sound 처리 - Voice Mail - 음절 처리 ★ Image 처리 ★도움말 처리 - Hyper Text 시스템 Technology ★ Socket Programming - 긴급메일 - Peer to peer message switching ★ Set Up Programming -Install Shield ★ DB Access Programming - DB-Library ★ TCP/IP Programming(중략)

  • PDF

A study of web-based remote control systems using Java language

  • Park, Chuloh;Insung Song;Kyungkwan Ahn;Soonyong Yang;Lee, Byungryong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.65.1-65
    • /
    • 2002
  • Recently, increased accessibility to the Internet makes it possible to access to Internet-connected devices easily. For this reason, anyone can reach and command any device that is connected to the network. But these teleoperation systems have several problems like the network time delay, data loss and development cost of an application for communication with each other. The network time delay phenomenon is the most important in teleoperation system, which disturbs a real time control. The loss data also causes some users not to send correct commands to device or not to receive correct information from devices. To develop an application to communicate between user and device, it needs a comp..

  • PDF

Metal-Organic Chemical Vapor Deposition of $Pb(Zr_xTi_{1-x})O_3$ Thin Films for High-Density Ferroelectric Random Access Memory Application

  • Lee, June-Key;Ku, June-Mo;Cho, Chung-Rae;Lee, Yong-Kyun;Sangmin Shin;Park, Youngsoo
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.2 no.3
    • /
    • pp.205-212
    • /
    • 2002
  • The growth characteristics of metal-organic chemical vapor deposition (MOCVD) $Pb(Zr_xTi_{1-x})O_3 (PZT) thin films were investigated for the application of high-density ferroelectric random access memories (FRAM) devices beyond 64Mbit density. The supply control of Pb precursor plays the most critical role in order to achieve a reliable process for PZT thin film deposition. We have monitored the changes in the microstructure and electrical properties of films on increasing the Pb precursor supply into the reaction chamber. Under optimized conditions, $Ir/IrO_2/PZT(100nm)/Ir capacitor shows well-saturated hysteresis loops with a remanent polarization (Pr) of $~28{\mu}C/textrm{cm}^2$ and coercive voltage of 0.8V at 2.5V. Other issues such as step coverage, compositional uniformity and low temperature deposition was discussed in viewpoint of actual device application.