• Title/Summary/Keyword: Application Access Control

Search Result 404, Processing Time 0.032 seconds

Access Control Method for Software on Virtual OS Using the Open Authentication Protocol (개방형 인증 프로토콜을 이용한 가상 운영체제에 설치된 SW 접근통제 방안)

  • Kim, Sun-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.568-574
    • /
    • 2013
  • In recent years, IT companies offer various cloud services using hardware-based technologies or software-based technologies. User can access these cloud services without the constraints of location or devices. The technologies are virtualization, provisioning, and big data processing. However, security incidents are constantly occurring even with these techniques. Thus, many companies build and operate private cloud service to prevent the leak of critical data. If virtual environment are different according to user permission, many system are needed, and user should login several virtual system to execute an program. In this paper, I suggest the access control method for application software on virtual operating system using the Open Authentication protocol in the Cloud system.

Fault Tree Analysis and Failure Mode Effects Analysis for Software Security Improvements in Mobile Banking Information Systems (모바일 뱅킹 정보시스템의 소프트웨어 보안성 개선을 위한 고장 트리 분석과 고장 유형 영향 분석)

  • Kim, So Young;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1342-1350
    • /
    • 2015
  • Due to rapid development of mobile device technologies, the mobile banking through Internet has become a major service of banking information systems as a security-critical information systems. Recently, lots of mobile banking information systems which handle personal and transaction information have been exposed to security threats in vulnerable security control and management processes, mainly software systems. Therefore, in this paper, we propose a process model for software security improvements in mobile banking information system by application of fault tree analysis(FTA) and failure modes and effects analysis(FMEA) on the most important activities such as 'user authentication' and 'access control' and 'virus detection and control' processes which security control and management of mobile banking information systems are very weak.

A Study on the MAC(Media Access Control) protocol for Unmanned Aerial Vehicle(UAV) (무인항공기의 매체접속제어 프로토콜 적용에 관한 연구)

  • Jo, Yun-Hyun;Yoon, In-Seop;Kim, Sang-Uk;Park, Hyo-Dal
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.1
    • /
    • pp.119-124
    • /
    • 2016
  • In this paper, we studied on MAC(Media Access Control) protocol for UAVs application. According to the number of UAVs, ground control station should control properly increased UAVs. So, we applied CSMA/CA that used in current civil aircraft to UAV communications and verified the applicability through comparison of throughput and delays of data with various message sizes, In the results, we confirmed applicability for UAVs MAC protocol.

Development of a Remotely Controlled Intelligent Controller for Dynamical Systems through the Internet

  • Kim, Sung-Su;Jung, Seul
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2266-2270
    • /
    • 2005
  • In this paper, an internet based control application for dynamical systems is implemented. This implementation is maily targeted for the part of advanced control education. Intelligent control algorithms are implemented in a PC so that a client can remotely access the PC to control a dynamical system through the internet. Neural network is used as an on-line intelligent controller. To have on-line learning and control capability, the reference compensation technique is implemented as intelligent control hardware of combining a DSP board and an FPGA chip. GUIs for a user are also developed for the user's convenience. Actual experiments of motion control of a DC motor have been conducted to show the performance of the intelligent control though the internet and the feasibility of advanced control education.

  • PDF

Internet-Based Control and Monitoring System Using LonWorks Fieldbus for HVAC Application

  • Hong, Won-Pyo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1205-1210
    • /
    • 2004
  • The 4-20mA analog signal used in the various industrial fields to interface sensor in distributed process control has been replaced with relatively simple digital networks, called "fieldbus, and recently by Ethernet. Significant advances in Internet and computer technology have made it possible to develop an Internet based control, monitoring, and operation scheduling system for heating, ventilation and air-conditioning (HVAC) systems. The seamless integration of data networks with control networks allows access to any control point from anywhere. Field compatible field devices become so-called "smart" devices, capable of executing simple control, diagnostic and maintenance functions and providing bidirectional serial communication to higher level controller. The most important HVAC of BAS has received nationwide attention because of higher portion of more than 40% in building sector energy use and limited resources. This paper presents the Internet-based monitoring and control architecture and development of LonWorks control modules for AHU (air handling units) of HVAC in viewpoint of configuring BAS network. This article addresses issues in architecture section, electronics, embedded processors and software, and internet technologies.

  • PDF

Design of Radio Interface Protocols for Broadband CDMA Wireless Local Loop and Access Channel Performance Analysis (광대역 CDMA WLL 무선 프로토콜 설계 및 액세스채널의 성능분석)

  • 김영태;박기식;조정호;김광현;이태훈
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.1
    • /
    • pp.47-58
    • /
    • 1999
  • In this paper, we design the radio interface protocols of wideband Wireless Local Loop(WLL) that uses wideband Code Division Multiple Access(CDMA), and propose the random access procedures on access channel and analyze the performance of the channel. The structure of radio interface protocols are designed by three modular parts to meet the requirements of IMT-2000 : radio resource controlling part that depends on the radio resources, connection controlling part that is independent of the radio resources, and application part that supports the interface between different parts and user terminals. In addition, we propose the random access procedures on access channel and analyze the performance of the channel. We assume that both near-far effect and shadow fading can be compensated by open loop power control. We observe that the number of access probes(delay) depend on the initial mobile transmission power and power increment, and the poor estimation of initial mobile transmission power might increase the average number of access probes.

  • PDF

A Study on Cooperation between Kerberos system and Credit-Control Server

  • Choi, Bae-Young;Lim, Hyung-Jin;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.281-284
    • /
    • 2005
  • Kerberos is system that offer authorization in internet and authentication service. Can speak that put each server between client and user in distributed environment and is security system of symmetry height encryption base that offer authentication base mutually. Kerberos authentication is based entirely on the knowledge of passwords that are stored on the Kerberos Server. A user proves her identity to the Kerberos Server by demonstrating Knowledge of the key. The fact that the Kerberos Server has access to the user's decrypted password is a rwsult of the fact that Kerberos does not use public key cryptogrphy. It is a serious disadvantage of the Kerbercs System. The Server must be physically secure to prevent an attacker from stealing the Kerberos Server and learning all of the user passwords. Kerberos was designend so that the server can be stateless. The Kerberos Server simply answers requests from users and issues tickets. This study focused on designing a SIP procy for interworking with AAA server with respect to user authentication and Kerberos System. Kerberos is security system of encryption base that offer certification function mutually between client application element and server application element in distributed network environment. Kerberos provides service necessary to control whether is going to approve also so that certain client may access to certain server. This paper does Credit-Control Server's function in AAA system of Diameter base so that can include Accounting information that is connected to Rating inside certification information message in Rating process with Kerberos system.

  • PDF

DSSS-Based Channel Access Technique DS-CDMA for Underwater Acoustic Transmission

  • Lee, Young-Pil;Moon, Yong Seon;Ko, Nak Yong;Choi, Hyun-Taek;Huang, Linyun;Bae, Youngchul
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.53-59
    • /
    • 2015
  • This paper proposes a novel method for acoustically and wirelessly transmitting data underwater with a high transmission rate. The method uses the most promising physical layer and multiple access technique (i.e., the code division multiple channel access technique) to divide the channel into subchannels. Data is transmitted through these subchannels. The codes are pseudo-random noise (PN) sequences. In the spread-spectrum technique, a signal such as electrical, electromagnetic, acoustic signal generated in a particular bandwidth is deliberately spread in the frequency domain, which results in a signal with a wider bandwidth. This paper reviews the possibility of application of the direct-sequence code division multiple access (DS-CDMA) technique in an underwater system using MATLAB. As the result of our review, we recognize that the DS-CDMA technique can be applied to underwater environments.

Robotic Agent Design and Application in the Ubiquitous Intelligent Space (유비쿼터스 지능형 공간에서의 로봇 에이전트 설계 및 응용)

  • Yoon Han-Ul;Hwang Se-Hee;Kim Dae-Wook;Lee Doong-Hoon;Sim Kwee-Bo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.12
    • /
    • pp.1039-1044
    • /
    • 2005
  • This paper presents a robotic agent design and application in the ubiquitous intelligent space. We set up an experimental environment with Bluetooth host, Bluetooth client, furniture and home appliance, and robotic agents. First, the agents basically performed patrol guard to detect unexpected penetration, and to keep home safely from gas-leakage, electric leakage, and so on. They were out to patrol fur a robbery while navigating in a living room and a private room. In this task, we used an area-based action making and a hexagon-based Q-learning to control the agents. Second, the agents communicate with Bluetooth host device to access and control a home appliance. The Bluetooth host offers a manual control to person by inquiring a client robot when one would like to check some place especially. In this exercise, we organize asynchronous connection less (ACL) between the host and the client robots and control the robot maneuver by Bluetooth host controller interface (HCI).

A Proposal of Guidelines for Developing the Mobile Application of Infection Controls for the Elderly -Focused on the Aspects of the Universal Design (노인 감염관리를 위한 모바일 어플리케이션 개발의 가이드라인 -유니버셜 디자인(Universial Design) 관점에서)

  • Kim, Ho-Da;Joo, Ae-Ran
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.1-9
    • /
    • 2018
  • The worldwide population is aging rapidly. In this circumstance, Korean society is in need of the urgent comprehensive countermeasures that will help the elderly with their health problems and infection control in their daily life. Universal design has supportive, adaptable, accessible and safety-oriental design standards for the elderly. Is this study, we propose the guidelines of the mobile application development based on the application of the universal design for infection control in the elderly. From the perspective of the universal design, there are several important guidelines including 'generalized access', 'simple and intuitive usage', 'low physical effort', and 'visualized language' based on the KCDC(Korea centers for disease control and prevention) principles for the elderly. These findings show that the guidelines for improving the health literacy of the mobile application via universal design are necessary to enhance the health behavior of infection control for the elderly.