• Title/Summary/Keyword: Computer Access and Use

Search Result 662, Processing Time 0.03 seconds

A License Audit Model for Secure DRM Systems in IP-based Environments

  • Jang, Ui-Jin;Lim, Hyung-Min;Shin, Yong-Tae
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.253-260
    • /
    • 2010
  • Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by consumers who legally buy content, and damages provider contents through the indiscriminate distribution and use of illegal contents. The DRM system that emerged to solve this problem cannot protect licenses stored on communication devices, and manage licenses by redistribution. This paper proposes a license audit model, which checks for illegal access, modification and redistribution, and reports alert logs to the server.

Adaptive Security Management Model based on Fuzzy Algorithm and MAUT in the Heterogeneous Networks (이 기종 네트워크에서 퍼지 알고리즘과 MAUT에 기반을 둔 적응적 보안 관리 모델)

  • Yang, Seok-Hwan;Chung, Mok-Dong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.104-115
    • /
    • 2010
  • Development of the system which provides services using diverse sensors is expanding due to the widespread use of ubiquitous technology, and the research on the security technologies gaining attention to solve the vulnerability of ubiquitous environment's security. However, there are many instances in which flexible security services should be considered instead of strong only security function depending on the context. This paper used Fuzzy algorithm and MAUT to be aware of the diverse contexts and to propose context-aware security service which provides flexible security function according to the context.

Efficient Indoor Location Estimation using Multidimensional Indexes in Wireless Networks

  • Jun, Bong-Gi
    • International Journal of Contents
    • /
    • v.5 no.2
    • /
    • pp.59-63
    • /
    • 2009
  • Since it is hard to use GPS for tracking mobile user in indoor environments, much research has focused on techniques using existing wireless local area network infrastructure. Signal strength received at a fixed location is not constant, so fingerprinting approach which use pattern matching is popular. But this approach has to pay additional costs to determine user location. This paper proposes a new approach to find user's location efficiently using an index scheme. After analyzing characteristics of RF signals, the paper suggests the data processing method how the signal strength values for each of the access points are recorded in a radio map. To reduce computational cost during the location determination phase, multidimensional indexes for radio map with the important information which is the order of the strongest access points are used.

Intergrating Security Model for Mobile-Grid (Mobile-Grid 환경에서의 통합 보안 모델)

  • Kang, Su-Youen;Lee, Sung-Young
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.585-588
    • /
    • 2002
  • Grid provides integral ing system that enables to use distributed computing resource and services as adapts traditional infrastructures to overcome the distributed computing environments. But, computing today is moving away from a restriction of the desktop, becoming diffused into our surrounding and onto our personal digital devices. In such mobile computing environments, users expects to access resource and services at any time from anywhere in such Mobile-Grid computing. This expectation results security issues, since the computing environments is expanded. This paper describes the security challenges in Mobile-Grid computing, explaining why traditional security mechanism fail to meet the demands of these environments. This paper describes policy driven security mechanism enabled entity to use service and data in trust Mobile-Grid environments and a set of security service module that need to be realized in the Mobile-Grid security architecture presents a set of use pattern that show hew these modules can be used for billing service in a secure Mobile-Grid environments.

  • PDF

An Effective View Management in a Mediator System for the Integration of Heterogeneous Distributed Database (미디에이터 시스템에서의 이질 분산데이타베이스의 통합을 위한 효율적인 뷰관리 방법)

  • Joo, Kil-Hong;Lee, Won-Suk
    • Journal of KIISE:Databases
    • /
    • v.28 no.4
    • /
    • pp.620-632
    • /
    • 2001
  • This paper proposes a mediator system which can provide a view management function in the today's heterogeneous computing environment including operating system database management systems and other software. while most mediators use view modification mechanism only, the use of view materialization is also considered in this research. In order to optimize the management cost for materialized views the proposed method applies a decay factor for modeling the access behaviors of views In other words, the most recently access pattern gets the highest attention in the optimization process all the necessary it with the CORBA.

  • PDF

Implementation of RBAC for Access Control of SECOS(SoonchunHyang E-Commerce System) (SECOS의 접근제어를 위한 RBAC의 구현)

  • 박동규;황유동;안현수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.9-18
    • /
    • 2002
  • SECOS(SoonChunHyang E-Commerce System) is the e-commerce system which was developed by e-commerce software research center in soonchunhyang univ. The system was composed of payment system, retrieving system and framework being used to combine these systems. The modules in the system was composed of components which was developed by CBSE(Component Based Software Engineering) method. In this paper. we implement the Role Based Access Control(RBAC) component for access control of SECOS. We use Attribute Certificates(ACs) in order to implement RBAC in the distributed retrieving system, and implement Attribute Authorities(AAs) which can provide ACs. The Proposed system is implemented by EIB component based JAVA.

  • PDF

The Effect of Mesh Reordering on Laplacian Smoothing for Nonuniform Memory Access Architecture-based High Performance Computing Systems (NUMA구조를 가진 고성능 컴퓨팅 시스템에서의 메쉬 재배열의 라플라시안 스무딩에 대한 효과)

  • Kim, Jbium
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.82-88
    • /
    • 2014
  • We study the effect of mesh reordering on Laplacian smoothing for parallel high performance computing systems. Specifically, we use the Reverse-Cuthill McKee algorithm to reorder meshes and use Laplacian Smoothing to improve the mesh quality on Nonuniform memory access architecture-based parallel high performance computing systems. First, we investigate the effect of using mesh reordering on Laplacian smoothing for a single core system and extend the idea to NUMA-based high performance computing systems.

Informed Spectrum Discovery in Cognitive Radio Networks using Proactive Out-of-Band Sensing

  • Jembre, Yalew Zelalem;Choi, Young-June;Paul, Rajib;Pak, Wooguil;Li, Zhetao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2212-2230
    • /
    • 2014
  • Cognitive radio (CR) users, known as secondary users (SUs), should avoid interference with primary users (PUs) who own the licensed band, while trying to access it; when the licensed band is unused by the PUs. To detect PUs, spectrum sensing should be performed over in-band channels that are currently in use by SUs. If PUs return to access the band, SUs need to vacate it, disrupting the SUs' communication unless a non-utilized band is discovered. Obtaining a non-utilized band in a short period facilitate seamless communication for SUs and avoid interference on PUs by vacating from the channel immediately. Searching for a non-utilized band can be done through proactive out-of-band (OB) sensing. In this paper, we suggest a proactive OB sensing scheme that minimizes the time required to discover a non-utilized spectrum in order to continue communication. Although, the duration spent on OB sensing reduces the throughput of the CR networks that can be achieved on band being utilized, the lost throughput can be compensated in the new discovered band. We demonstrate that, the effect of our proposed scheme on the throughput owing to OB sensing is insignificant, while exhibiting a very short channel discovery time.

The Implementation of Communication Protocol for Semiconductor Equipments with Priority of Data Traffic (데이터 트래픽의 우선 순위를 갖는 반도체 장비 통신 프로토콜 구현)

  • Kim, Doo Yong;Kim, Kiwan;Cho, Hyun Chan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.11 no.4
    • /
    • pp.13-18
    • /
    • 2012
  • The semiconductor equipments generate a lot of data traffic via communication channels for the effective manufacturing processes of semiconductors and for the automation of semiconductor equipments. These data should be sent to a host computer in order to keep in a safe. The IEEE 802.11e specification gives differentiated and distributed access to a wireless communication medium with four access categories. These four access categories use different priority parameters which lead to quality of service in data traffic. In this paper, it is shown that the throughput of data depends upon the priority parameters provided by IEEE802.11e. We implement the usage of priority parameters in the SECS protocol for semiconductor equipments. It is necessary that the data from semiconductor equipments should be classified with certain priority for the effective use of our proposed method. Therefore, our scheme will contribute to improving the performance of the manufacturing processes of semiconductors.

Effective Multiplexing Method for Conditional Access System in Terrestrial DMB

  • Lee, Yong-Hoon;Lee, Gwang-Soon;Lee, Jin-Hwan;Ahn, Chung-Hyun;Lee, Soo-In;Kim, Nam
    • ETRI Journal
    • /
    • v.30 no.6
    • /
    • pp.859-861
    • /
    • 2008
  • This letter proposes a conditional access system (CAS) suitable for use in terrestrial digital multimedia broadcasting (T-DMB), based on an effective multiplexing method to provide encrypted T-DMB services. Specifically, the proposed multiplexing method for a CAS is designed to reduce the additional bit rate while assuring easy access to the designated encrypted services. Finally, the performance of the implemented CAS is confirmed through implementation and a broadcasting experiment under various service environments.

  • PDF