• Title/Summary/Keyword: Delegation Model

Search Result 61, Processing Time 0.025 seconds

Design and Implementation of Permission Delegation in Role-Based Access Control Model (권한의 위임을 위한 역할-기반 접근 제어 모델의 설계 및 구현)

  • 나상엽
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.1-10
    • /
    • 2003
  • In the distributed-computing environment, applications or users have to share resources and communicate with each other in order to perform their jobs more efficiently. In this case, it is important to keep resources and information integrity from the unexpected use by the unauthorized user. Therefore, there is a steady increase in need for a reasonable way to authentication and access control of distributed-shared resources. In RBAC, there are role hierarchies in which a higher case role can perform permissions of a lower case role. No vise versa. Actually, however, it is necessary for a lower case role to perform a higher case role's permission, which is not allowed to a lower case role basically. In this paper, we will propose a permission delegation method, which is a permission delegation server, and a permission delegation protocols with the secret key system. As the result of a permission delegation, junior roles can perform senior role's permissions or senior role itself on the exceptional condition in a dedicated interval.

  • PDF

The Authentication Structure Based Mobile PKI (모바일 PKI 기반한 인증 구조)

  • 김미혜;서세영
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.67-75
    • /
    • 2004
  • In this paper, we design an authentication model based mobile PKI (Public Key Infrastructure). The authentication mood consists of Root-CA Home-network agent and Foreign-network agent. CA will going to gave the delegation ticket to Home-Agent or Foreign-Agent when they request. The authentication mode information security is various characteristic more then high speed, mobile network and low cost more then previous structure of assure information security.

  • PDF

Trends in Privacy-Preserving Quantum Computing Research (프라이버시 보호 양자 컴퓨팅 연구 동향)

  • Y.K. Lee
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.5
    • /
    • pp.40-48
    • /
    • 2024
  • Quantum computers can likely perform computations that are unattainable by classical computers, and they represent the next generation of computing technologies. Due to high costs and complex maintenance, direct ownership of quantum computers by individuals users is challenging. Future utilization is predicted to involve quantum computing servers performing delegated computations for clients lacking quantum capabilities, similar to the current utilization of supercomputing. This delegation model allows several users to benefit from quantum computing without requiring ownership, thereby providing innovation potential in various fields. Ensuring data privacy and computational integrity in this model is critical for ensuring the reliability of quantum cloud computing services. However, these requirements are difficult to achieve because classical security techniques cannot be directly applied to quantum computing. We review research on security protocols for the delegation of quantum computing with focus on data privacy and integrity verification. Our analysis covers the background of quantum computing, privacy-preserving quantum computational models, and recent research trends. Finally, we discuss challenges and future directions for secure quantum delegated computations, highlighting their importance for the commercialization and widespread adoption of quantum computing.

Competition between Mobile Pay and Credit Card Systems (모바일페이사와 신용카드사의 경쟁)

  • Lee, Ying-Ai;Park, Chong-Kook
    • Asia-Pacific Journal of Business
    • /
    • v.9 no.4
    • /
    • pp.49-65
    • /
    • 2018
  • This paper illustrates the competition between the mobile pay and credit card systems by utilizing the theory of two-sided markets. Two firms, as platforms, maximize the profit collecting fees from consumers on one side and from retailers on the other side. Consumers pay to buy goods and services with mobile pay, credit card, or cash. The basic model is one that each platform maximizes its profit. We show that the fees for credit card holders and retailers are higher than the respective costs. The fee for retailers of the mobile payment is higher than its cost, while the buyer's fee may be higher or lower than its cost. Applied model is the one that employs the delegation game model. The total profit of the mobile pay system is composed of its profit and the weighted demand for the mobile pay. It is shown that buyers' fee under the applied model is lower than that under the basic model, resulting in an increase of the demand for the mobile pay. The fee for the retailers rises, albeit the sum of fees for the buyers and retailers falls. The profit for the mobile pay system is increased, while that for the credit card company stays the same.

Network Management Script Construction in Delegation Model (위임 모델에서의 네트워크 관리 스크립트 작성에 관한 연구)

  • 한순희;이기현;조국현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.11
    • /
    • pp.1228-1237
    • /
    • 1992
  • Network management represents those activities which control and moitor the use of resources. Remote delegation model supports flexible and effective distribution of management functions among managers and agents, and it may cause an reliable network management in a relatively complex and high-speed networks. in this model, managers delegate to agents execution of management programs as prescribed in a management scripting language. In addition, primitives included in the management programs enable agents to monitor and control localmanaged objects effectively. We suggest management algorithms in which management scripts are delegated from managers to agents and partiality implement OSI fault management. This mans gement algorithm can effectively support delegation and control concurrent accesses to management information. Moreover, it can be easily translated into object-based concurrent programming language: ABCL. In this paper, we will scrutinize some essential aspects of this management.

  • PDF

A Study of Regular Donors' Giving Duration : Identification effect vs. Authority delegation effect (정기기부자의 기부 지속기간에 대한 영향요인 연구: 기부대상에 대한 인식(identification) vs. 권한 위임(authority delegation))

  • 강철희;김기석;편창훈
    • Journal of Korean social welfare administration
    • /
    • v.21 no.1
    • /
    • pp.105-130
    • /
    • 2019
  • This study focuses on the duration of regular donors who are one of the key resources for stable operation of nonprofit charity organizations. Regular donors can have a choice between selecting preferred target subjects on different target subjects and delegating authority to charity organizations for execution of the contribution. This study examine the comparative validity of the hypothesis of identification effect and the hypothesis of authority delegation effect. It fully uses the regular donors' data from one charitable organization called S charity organization. In analysis, it employes Weibull model among parametric survival analysis methods based on the fitness of distribution. The result showed that regular donors who delegate authority have significantly longer duration of donation than regular donors who designate and donate international target subjects. In other words, regular donors who select domestic target subjects as beneficiaries have significantly longer duration than regular donors who select international target subjects. This result suggests that in the two hypothetical explanations, domestic identification and authority delegation are equally valid. Finally, among control variables, age, committed amount each donation, status difference (regular donation vs. temporary donation) at the starting point, and the payment method were statistically significant predictors on the duration of regular donors. This study meaningfully deepen and broaden our understandings of regular donors' donation behavior and also provides strategic knowledge regarding managing and retaining regular donors for non-profit charity organizations.

Patient Information Transfer System Using OAuth 2.0 Delegation Token (OAuth 2.0 위임 Token을 이용한 환자정보 전달 시스템)

  • Park, Jungsoo;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1103-1113
    • /
    • 2020
  • Hospitals store and manage personal and health information through the electronic medical record (EMR). However, vulnerabilities and threats are increasing with the provision of various services for information sharing in hospitals. Therefore, in this paper, we propose a model to prevent personal information leakage due to the transmission of patient information in EMR. A method for granting permission to securely receive and transmit patient information from hospitals where patient medical records are stored is proposed using OAuth authorization tokens. A protocol was proposed to enable secure information delivery by applying and delivering the record access restrictions desired by the patient to the OAuth Token. OAuth Delegation Token can be delivered by writing the authority, scope, and time of destruction to view patient information.This prevents the illegal collection of patient information and prevents the leakage of personal information that may occur during the delivery process.

A Delegation Model based on Agent in Distributed Systems

  • Kim, Kyu-Il;Lee, Joo-Chang;Choi, Won-Gil;Lee, Eun-Ju;Kim, Ung-Mo
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.82-88
    • /
    • 2007
  • Web services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. Recently in web services environment, security has become one of the most critical issues. The hackers attack one of fragile point and can misuse legitimate user privilege because all of the connected devices provide services for the user control and monitoring in real time. Also, the users of web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This fact risks the exposure of user privacy information. In this paper, we propose secure delegation model based on SAML that provides confidentiality and integrity about the user information in distributed systems. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers.

A Study on Design and Implementatio of Script Management of Script Management Function (스크립트 관리 기능의 설계 및 구현에 관한 연구)

  • 한순희;이재오;조국현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.5
    • /
    • pp.746-756
    • /
    • 1993
  • Delegation model supports effective and highly reliable network management. It reduces traffic overhead caused by transmission of management informations. In this model, management scripts can be composed by the designers of managers, these are delegated to agents. Delegation models support effective distribution of management functions among managers and agents. Therefore, various functions are needed to create and delegate management scripts. In this paper, we design simple script language and implement script interpreter for efficient network management. And, we define script management functions and services. Moreover, we present manager/agent models and algorithms for script management. As an implementation environment, the ISODE services are ported. The methods employed for the implementation are also described.

  • PDF

An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server (개인키 위탁관리 서버를 이용한 전자의무기록 지문인증 모델)

  • Lee, Yong-Joon;Jeon, Taeyeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.1-8
    • /
    • 2019
  • Medical information is an important personal information for patients, and it must be protected. In particular, when medical personnel approach electronic medical records, authentication for enhanced security is essential. However, the existing public certificate-based certification model did not reflect the security characteristics of the electronic medical record(EMR) due to problems such as personal key management and authority delegation. In this study, we propose a fingerprint recognition-based authentication model with enhanced security to solve problems in the approach of the existing electronic medical record system. The proposed authentication model is an EMR system based on fingerprint recognition using PEMS (Private-key Escrow Management Server), which is applied with the private key commission protocol and the private key withdrawal protocol, enabling the problem of personal key management and authority delegation to be resolved at source. The performance experiment of the proposed certification model confirmed that the performance time was improved compared to the existing public certificate-based authentication, and the user's convenience was increased by recognizing fingerprints by replacing the electronic signature password.