• Title/Summary/Keyword: Control of Access

Search Result 3,688, Processing Time 0.034 seconds

Role-Behavior Based Access Control on Mobile Agent System for Workflow Management System (워크플로우 응용을 위한 이동 에이전트 시스템에의 역할-행위 기반 접근통제 적용)

  • Shin, Wook;Lee, Dong-Ik;Yoon, Seok-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.11-28
    • /
    • 2000
  • In these days it is rapidly increasing that multi-user, multi-layered commercial software developments for companies or public institutions. Security services are necessary for most of systems and the access control service is the essential of security services. Current access control methods that are used as access control policies are classified as Discretionary Access Control Mandatory Access Control and Role Based Access Control. However there are some inefficiencies when those methods are applied to current multi-user, multi-layered systems. Therefore it is required that a new access control method that takes complex system resources into account from the side of policy. In this paper extending previous Role Based of 'Behavior' and a basic model of the method. And we simply implement the method on the mobile agent based workflow management system that is a representative example of multi-user. multi-layered softwares and shows implementation results to tap possibilities of real-world application.

A Design and Implementation of Java Library for Multiple Access Control Models (다중 접근제어 모델을 위한 Java 라이브러리의 설계 및 구현)

  • Oh, Se-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1394-1401
    • /
    • 2007
  • Secure access control is a hot issue of large-scale organizations or information systems, because they have numerous users and information objects. In many cases, system developers should implement an access control module as a part of application. This way induces difficult modification of the module and repeated implementation for new applications. In this paper we implement a Java API library for access control to support system developers who use Java. They can easily build up access control module using our library. Our library supports typical access control models, and it can offer new types of access control. Furthermore, it is able to run multiple access control models at the same time.

  • PDF

Reasoning about Multiple Access Control Configurations

  • Dangprasert, Supakit;Permpoontanalarp,Yongyuth
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.2047-2050
    • /
    • 2002
  • At present, many applications independently provide access control for their own resources, for example Web, Databases and Operating Systems, etc. Such independent access control systems result in multiple access control configurations each of which deals with the access control in its own application context. Since those multiple configurations are operated in isolation, and maintained by possibly different administrators, they are likely to be incoherent. In this paper, we propose a logical specification to reason about multiple access control configurations. Our specification can be used to detect the incoherence in multiple configurations. Furthermore, it of offers many kinds of policies for multiple configurations that can capture several kinds of requirements for multiple access control systems.

  • PDF

A Design of Access Control Mechanism for the Secure Use of Internet (안전한 인터넷 사용을 위한 접근제어 메커니즘 설계)

  • Lee, Ho;Jung, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.84-90
    • /
    • 2000
  • This paper presents a design of an access control mechanism that can resolves the complicated problems of access control requirements in internet environment. In this paper, we proposed an access control mechanism which can satisfy the combined goals of confidentiality integrity and availability of any resource. We defined an access control mechanism from the viewpoints of identity-based, rule-based and role-based policy and implemented 6 access control operations. The Proposed access control mechanism can protect resources from unauthorized accesses based on the multi-level security policies of security label, integrity level, role and ownership.

  • PDF

Task-Role-Based Access Control Model For Enterprise Environment (기업환경을 위한 과업-역할기반 접근제어 모델)

  • Oh, Se-Jong;Park, Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.55-63
    • /
    • 2001
  • There are many information objects and users in a large company. It is important issue how to control users access in order that only authorized user can access information objects, Traditional access control models do not properly reflect the characteristics of enterprise environment. This paper proposes an improved access control model for enterprise environment. The characteristics of access control in an enterprise are examined and a task role-based access control(T-RBAC) model founded on concept of classification of tasks is introduced. T-RBAC deals with each task differently according to its class, and supports task level access control and supervision role hierarchy.

A Study on Policy Design of Secure XML Access Control (안전한 XML 접근 제어의 정책 설계에 관한 연구)

  • Jo, Sun-Moon;Joo, Hyung-Seok;Yoo, Weon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.11
    • /
    • pp.43-51
    • /
    • 2007
  • Access control techniques should be flexible enough to support all protection granularity levels. Since access control policies are very likely to be specified in relation to document types, it is necessary to properly manage a situation in which documents fail to be dealt with by the existing access control policies. The existing access control has not taken information structures and semantics into full account due to the fundamental limitations of HTML. In addition, access control for XML documents allows only read operations, and there exists the problem of slowing down system performance due to the complex authorization evaluation process. In order to resolve this problem, this paper designs a XML Access Control Management System which is capable of making fined-grained access control. And then, in developing an access control system, it describes the subject and object policies of authorization for XML document on which authorization levels should be specified and which access control should be performed.

Building Access Control System Using MAC Address of Smart Device (Smart Device의 MAC Address를 이용한 건물 출입통제 시스템)

  • Jung, Yong-jin;Lee, Jong-sung;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.873-875
    • /
    • 2014
  • In this paper, we propose the access control system based bluetooth using the MAC address of the smart device. Access control system that propose compares the smart device MAC address entry and exit and MAC address that is registered with the server. Depending on whether the match was compared, access control is performed. Result of the experiment, control of door is possible only by bluetooth pairing of the bluetooth module and smart device. Therefore, it does not require access to another tool.In addition, Action for access approval is omitted. Therefore, the access authorization procedure is simplified compared to existing access control systems, it is possible to improve the convenience.

  • PDF

Design of Access Control Model for Secure EDI Service (안전한 EDI 서비스를 위한 접근제어 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Journal of Digital Contents Society
    • /
    • v.1 no.1
    • /
    • pp.23-37
    • /
    • 2000
  • EDI is basically the concept of computer-to-computer exchange of messages relating to various types of activities or business areas, such as banking, trade, medicine, publishing, etc. Therefore, security, reliability and special functionality will be implicit requirements of EDI systems. We will design access control model to content security of these requirements. Access controls in information systems are responsible for ensuring that all direct access to the entities occur exclusively according to the access modes and rules fixed by security policies. On this paper, security policies for access control model are presented from the viewpoints of identity-based, rule-based, role-based policy. We give a design of access control model for secure EDI service based on the derived access control rules and operations to enforce the defined security policies. The proposed access control model provides integrity, confidentiality and a flow control of EDI messages.

  • PDF

AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran;Jia, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2052-2072
    • /
    • 2012
  • Access control is an essential security component in protecting sensitive data and services from unauthorized access to the resources in mission-critical Cyber-Physical Systems (CPSs). CPSs are different from conventional information processing systems in such that they involve interactions between the cyber world and the physical world. Therefore, existing access control models cannot be used directly and even become disabled in an emergency situation. This paper proposes an adaptive Access Control model for Emergences (AC4E) for mission-critical CPSs. The principal aim of AC4E is to control the criticalities in these systems by executing corresponding responsive actions. AC4E not only provides the ability to control access to data and services in normal situations, but also grants the correct set of access privileges, at the correct time, to the correct set of subjects in emergency situations. It can facilitate adaptively responsive actions altering the privileges to specific subjects in a proactive manner without the need for any explicit access requests. A semiformal validation of the AC4E model is presented, with respect to responsiveness, correctness, safety, non-repudiation and concurrency, respectively. Then a case study is given to demonstrate how the AC4E model detects, responds, and controls the emergency events for a typical CPS adaptively in a proactive manner. Eventually, a wide set of simulations and performance comparisons of the proposed AC4E model are presented.

A Study of Digital Message Transfer System based on R-NAD for FM Radios (FM무전기를 통한 디지털 메시지 전송장비에 R-NAD 적용 연구)

  • Rho, Hai-Hwan;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.523-526
    • /
    • 2010
  • FM Radio communication operating mode is half-duplex mode. FM radio network access control shall be used to detect the presence of active transmissions on a multiple-subscriber-access communications network and shall provide a means to preclude data transmissions from conflicting on the network. In this study, we implemented R-NAD(Random Network Access Delay) that is one of network access control method.

  • PDF