• Title/Summary/Keyword: Control of Access

Search Result 3,688, Processing Time 0.032 seconds

Context-based Dynamic Access Control Model for u-healthcare and its Application (u-헬스케어를 위한 상황기반 동적접근 제어 모델 및 응용)

  • Jeong, Chang-Won;Kim, Dong-Ho;Joo, Su-Chong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.493-506
    • /
    • 2008
  • In this paper we suggest dynamic access control model based on context satisfied with requirement of u-healthcare environment through researching the role based access control model. For the dynamic security domain management, we used a distributed object group framework and context information for dynamic access control used the constructed database. We defined decision rule by knowledge reduction in decision making table, and applied this rule in our model as a rough set theory. We showed the executed results of context based dynamic security service through u-healthcare application which is based on distributed object group framework. As a result, our dynamic access control model provides an appropriate security service according to security domain, more flexible access control in u-healthcare environment.

Access Control for Efficient Query Processing on Limited Resource Mobile Terminal (자원제약적인 모바일 단말기에서 효율적인 질의처리를 위한 접근제어)

  • An, Dong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.19-27
    • /
    • 2011
  • Access control that has been previously performed mainly on safety, and thus not much effort has been done to consider access control in terms of efficiency. This paper proposes a method for an efficient and secure query processing of XML data streams, such as a personal digital assistant and a portable terminal, at the client side with limited resources. Specifically, this paper proposes an access control processing that possesses a small overhead for attaining a secure result with limited memory and a method to enhance the performance, finding the parts capable of optimizing each processing step for offsetting the overhead caused by the addition of access control processing. The superiority of the new method is analyzed through an experiments.

Future of Railways - in Open Systems?

  • Macheret, Dmitry A.
    • International Journal of Railway
    • /
    • v.5 no.4
    • /
    • pp.135-138
    • /
    • 2012
  • The article suggests criteria of dividing transport systems into systems of limited and open access. Possibilities of implementing principles of the open access in conjunction with the adaptive control at the railway transport have been analyzed. The author makes a grounded conclusion that the development of transport systems based on the open access and adaptive control can play a positive role in overcoming the global instability of the economy and form prerequisites of its stable grows.

Relationship-based Dynamic Access Control Model with Choosable Encryption for Social Network Service (소셜 네트워크 서비스를 위한 선별적 암호화 기능을 제공하는 관계 기반 동적 접근제어 모델)

  • Kwon, Keun;Jung, Youngman;Jung, Jaewook;Choi, Younsung;Jeon, Woongryul;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.59-74
    • /
    • 2014
  • The social network service is a online service letting users express the personality and enhancing the human network. However, these features result in side effects which diffuse personal information and make users access to treacherous information. Therefore, various access control models have been proposed. However, the access control mechanisms which encrypt data are only able to be applied for controlling access from direct node, and the access control mechanisms without data encryption allow service provider to access all the information. Moreover, both mechanisms do not consider dynamic changes in reliability of the users. In this paper, we propose relationship-based dynamic access control model including encryption of sensitive data, which consider the characteristics of SNS and improves the security of SNS.

Access Control Method and Key Management Method for H.264/SVC (H.264/SVC에 대한 접근 제어 방법 및 키 관리 방법)

  • Cho, Tae-Nam;Yong, Seung-Lim
    • The KIPS Transactions:PartC
    • /
    • v.17C no.5
    • /
    • pp.415-426
    • /
    • 2010
  • CAS is an access control system by which only legal users can access contents. IPTV is a spotlighted system that uses CAS. H.264/SVC is a coding standard that provides a scalable coding method by which users who are in various network environments and have various devices can receive the contents. In this method, the contents are coded in a layered structure to make users choose the quality of the receiving contents. Therefore, contents provider should be able to control users to access only appropriate contents according to their subscriptions. The structure of CAS being employed in many applications is not suitable to control access for H.264/SVC. In this paper, we provide an efficient access control method and a key management method for H.264/SVC contents using CAS.

Performance Evaluation of an Underwater Propagation Delay-Aware Medium Access Control Protocol (수중 전파 지연을 고려한 매체 접근 제어 프로토콜에 대한 성능 평가)

  • Hwang, Ho Young;Kim, Woo-Sik;Lee, Sang-Kug;Cho, Ho-Shin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.34 no.6
    • /
    • pp.463-469
    • /
    • 2015
  • In this paper, we propose an underwater propagation delay-aware medium access control protocol and evaluate the performance of the proposed protocol. In the proposed propagation delay-aware medium access control protocol, a sink node can restore the received RTS frames that are not piled up in a slot time. We analyze and compare the performance of the proposed underwater propagation delay-aware medium access control protocol with that of the conventional medium access control protocol in various environments.

Role based access control of healthcare information system for Mobile environments (모바일 환경에 적합한 헬스 케어 정보 시스템에서의 역할기반 접근제어)

  • Lee You-Ri;Park Dong-Gue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.119-132
    • /
    • 2005
  • The health care system revolutionized by the use of information and communication technologies. Computer information processing and electronic communication technologies play an increasingly important role in the area of health care. We propose a new role based access control model for pervasive health care systems, which changed location, time, environment information. Also our model can be solved the occurrence of an reduction authority problem to pervasive health care system at emergency environment. We propose a new role based access control model for pervasive health care systems, which combines role-to-role delegations, negative permission, context concept and dynamic context aware access control. With out approach we aim to preserver the advantages of RBAC and offer groat flexibility and fine-grained access control in pervasive healthcare information systems.

  • PDF

An Effective Query Rewriting Method in Secure XML Access Control (안전한 XML 접근제어에서 효율적인 질의 재작성 기법)

  • An, Dong-Chan;Byun, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.127-137
    • /
    • 2006
  • We propose two phase filtering scheme to develop an efficient mechanism for XML databases to control query-based access. An access control environment for XML documents and some techniques to deal with fine-grained authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query-based access. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form through a query optimization technique, which is guaranteed to have no access violations using tree-aware metadata of XML schemas. The scheme can be applied to any XML database management system and has several advantages such as small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

  • PDF

A Design of Resource Access Control Architecture Driven by Accounting in Grid Computing Environment (그리드 컴퓨팅 환경에서 어카운팅에 의해 구동되는 자원 접근 제어 구조 설계)

  • Hwang, Ho-Jeon;An, Dong-Un;Chung, Seung-Jong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.1
    • /
    • pp.1-9
    • /
    • 2007
  • At present various methods relating resource access control in grid environment are being studied. Most of the access authorization to grid resource is designed fit to the attributes and the role of user. But resource access control is to be made in the respect of business model to activate grid. Therefore this study suggests a model that can operate resource access control driven by grid accounting information. On the base of collection of accounting information about grid job, processing cost is yielded. If the user's available fund is less than processing cost, it gets to control grid job by the resource access control policy. Finally when grid job is completed, user is assigned to pay the charges for using resource of supplier. Then resource provider gets to supply stable resource in grid by participating it voluntarily to use idle resource. This study is esteemed to realize utility computing environment correspondent to economic principle by ensuring resource access policy of organizations which participate in grid.

Optimized Medium Access Probability for Networked Control Systems (네트워크 제어 시스템을 위한 최적화된 매체 접근 확률)

  • Park, Pangun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2457-2464
    • /
    • 2015
  • Distributed Networked Control Systems (NCSs) through wireless networks have a tremendous potential to improve the efficiency of various control systems. In this paper, we define the State Update Interval (SUI) as the elapsed time between successful state vector reports derived from the NCSs. A simple expression of the SUI is derived to characterize the key interactions between the control and communication layers. This performance measure is used to formulate a novel optimization problem where the objective function is the probability to meet the SUI constraint and the decision parameter is the channel access probability. We prove the existence and uniqueness of the optimal channel access probability of the optimization problem. Furthermore, the optimal channel access probability for NCSs is lower than the channel access probability to maximize the throughput. Numerical results indicate that the improvement of the success probability to meet the SUI constraint using the optimal channel access probability increases as the number of nodes increases with respect to that using the channel access probability to maximize the throughput.