• Title/Summary/Keyword: Delegation Model

Search Result 61, Processing Time 0.023 seconds

Hierarchical Delegation Model for Network Security Management (네트워크 보안 관리를 위한 계층적 위임 모델)

  • 이강희;송병욱;배현철;김장하;김상욱
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.238-240
    • /
    • 2004
  • 본 논문에서는 대규모 네트워크 보안관리를 위한 계층적인 위임 모델을 제시한다. 대규모 네트워크는 라우터, 방화벽, 침입 탐지 시스템, 웹 서버 등의 수많은 구성요소로 이루어진 네트워크들의 집합이며, 각 네트워크마다의 독립적인 지역 정책들로 관리되어 서로간의 협동이 이루어질 수 없기 때문에 이를 효과적으로 통제하고 일괄적으로 관리하기 위해 계층적인 위임 모델이 사용되어야 한다. 제시하는 모델의 중요 구성 요소로는 관리 서버. 정책 설정 고 수준 언어 고 수준 언어 컴파일러, 도메인 서버. 인터프리터, 정책 관리 데이터베이스가 있다. 관리 서버에서 정책 설정 고 수준 언어를 사용하여 세밀하고 정교한 정책을 작성할 수 있고, 이 정책을 고 수준 언어 컴파일러를 통하여 최하위 노드들에게 적절하고 간결한 형태로 만들어낸다. 각 도메인 서버는 이 결과를 하위의 도메인 서버나 인터프리터에게 전달하면서 Keynote 신뢰 관리 시스템을 이용하여 권한을 위임한다. 그리고 인터프리터는 정책을 라우터, 방화벽, 웹 서버 등의 하위 노드에 맞는 실제 룰로 변환하녀 상위 관리 서버에서 전달한 정책을 적용하게 된다. 정책을 적용한 결과를 상위로 전달하여 데이터베이스를 구축한 뒤 후에 작성된 정책이 기존의 정책과 충돌하는지 검사에 이용하고, 충돌한다면 협상 과정을 거쳐 정책에 순응할 수 있는 결과를 도굴하게 된다. 또한 네트워크에서 많은 새로운 형태들의 노드가 추가될 수 있는데, 각각의 인터프리터만 추가함으로서 다양한 하위 노드를 충족시킬 수 있는 확장성을 제공한다.

  • PDF

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication

  • Zhang, Xiaojun;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2762-2777
    • /
    • 2017
  • A fuzzy identity based signature (FIBS) scheme allows a signer with identity ${\omega}$ to generate a signature which could be verified under identity ${\omega}^{\prime}$ if and only if ${\omega}$ and ${\omega}^{\prime}$ are within a certain distance of each other as judged by some metric. In this paper, we propose an efficient FIBS scheme from lattice assumption, which can resist quantum-computer attacks. Without using the Bonsai Tree technique, we utilize the lattice basis delegation technique to generate the private key, which has the advantage of keeping the lattice dimension invariant. We also prove that our proposed scheme is existentially unforgeable under an adaptive chosen message and identity attack in the random oracle model. Compared with existing scheme, our proposed scheme is much more efficient, especially in terms of communication overhead. Since our FIBS scheme possesses similar error-tolerance property, it can be well applied in post-quantum communication biometric authentication environments, where biometric identifiers such as fingerprints, voice, iris and gait are used in human identification.

Load Distribution of Agent Delegation Model in Mobile Agent Based Workflow Systems (이동에이전트 기반 워크플로우 시스템에서 에이전트 위임모델의 부하분산)

  • Yoo, Jeong-Joon;Lee, Dong-Ik;Jung, Seung-Woog;Kim, Joong-Bae
    • Annual Conference of KIPS
    • /
    • 2001.10a
    • /
    • pp.289-292
    • /
    • 2001
  • 에이전트 위임모델 기반 워크플로우 시스템은 기존 클라이언트 서버기반 워크플로우 시스템과 이동에이전트 기반 워크플로우 시스템보다 워크플로우 수가 증가하고 워크플로우 구조가 복잡해짐에 따라 보다 좋은 성능 및 확장성을 제공한다. 이는 에이전트 위임모델이 워크플로우 엔진에서 발생하는 병목현상을 제거하여 작업수행자(Task Performer)라 명명된 호스트들로 워크플로우 엔진의 부하를 자연스럽게 분산시키기 때문이다. 에이전트 위임모텔은 워크플로우 엔진의 부하를 제거하지만, 작업수행자의 부하를 고려하지 않고 작업을 할당하기 때문에, 작업수행자에 병목현상을 발생시킬 수 있다. 이는 에이전트 위임모델의 목적인 워크플로우 시스템의 성능 및 확장성 향상을 저해하는 요인이다. 따라서, 워크플로우 시스템의 성능 및 확장성을 향상시키기 위해서는 작업수행자에 발생하는 병목현상을 제거해야 한다. 본 논문에서는 작업수행자의 병목현상을 제거하기 위해 응답리스트(Response List)를 제안하며 응답리스트 관리방법을 제시한다. 이러한 응답리스트가 에이전트 위임모델 기반 워크플로우 시스템의 성능 및 확장성 향상에 어떠한 영향을 미치는지 성능평가를 수행한다.

  • PDF

Performance Enhancement of AAA-based Authentication forHMIPv6 (AAA 기반의 인증을 이용한 HMIPv6 성능 개선 기법)

  • Kim, Mi-Young;Mun, Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.551-560
    • /
    • 2005
  • To reduce the amount of the signaling messages occurred in movement, HMIPv6 has been introduced as the hierarchical mobility management architecture tor MIPv6 by regarding the locality of movements. When approaching the visited link, the authentication procedure should be done successfully prior to any motility support message exchanges. The AAA(Authentication, Authorization and Account) authentication service is applied gradually to the wireless LAN and Cellular networks. However, It may bring about the service latency for the sessions of requiring the real-time processing due to not providing the optimized signaling in local and frequent movements. In this paper, we propose the authentication architecture with 'delegation' scheme to reduce the amount of signaling message and latency to resume for local movements by integrating it with HMIPv6 architecture. We provide the integrated authentication model and analyze the performance and effectivity of our proposal and finally offer the analysis materials comparing to the exiting authentication scheme. It cuts down the cost to $33.6\%$ at average measurement.

Design of a Modbile Agent-based Workflow System (이동에이전트 기반 워크플로우 시스템의 설계)

  • Seo, Young-Ho;Yoo, Jeong-Joon;Lee, Dong-Ik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8
    • /
    • pp.2370-2387
    • /
    • 2000
  • This paper proposes a new design strategy that can overcome limitations of two existing approaches, focusing on performance and scalability issues among various architectural issues which must be considered in designing workflow systems. In the proposed approach, we suggest to introduce 'delegation model' which corresponds to the high-level strategy utilizing the fundamental characteristics of mobile agents, after establishing a mobile agent-based workflow system architecture focused on performance and scalability. We point out three major issues that should be considered in this approach and propose a 3-tier mobile agent-based workflow system architecture that effectively reflects these considerations. Also, we show that the new approach can provide better performance and scalability than existing ones - approaches based on the client-server paradigm and other approaches based on mobile agent paradigm represented by DartFlow system - by evaluating performance of the proposed architecture through the GSPN simulation.

  • PDF

An Active Network Execution Environment for on Demand Customization of Communication Protocols and Services (맞춤형 통신 프로토콜과 서비스를 위한 액티브 네트워크 실행환경)

  • Lee Hwa Young;Kang Bo-young;Lim Kyungshik
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.937-950
    • /
    • 2004
  • In this paper, we present the design and implementation of new execution environment named Customizable Architecture for Flexible Execution Environment(CAFEs) that supports the mechanism of protocol customization and service referencing. We introduce a new concept as micro protocols and active services to enhance software reusability. Micro protocol represents a specific algorithm or functionality of existing network protocol and the active service is in charge of binding legacy application and releasing the active network oriented services. The pro-posed active network execution environment is made up of three parts, virtual network system, protocol and service manager, event engine. First, the virtual network system is used to connect each active nodes using virtual network channels which are based on multiple existing protocol layers. Second, the protocol and service manager is responsible for composing micro protocols and active services to develop new network proto-col and service easily. Finally, the event engine is used to detect the automatic transition of system components using event delegation model. To verify the CAFTs, we have an experiment about the delivery of web contents which are suitable for the user's terminals in the wireless Internet environment. As a result. we are able to obtain the availability of developed execution environment.

Privacy Protection Scheme of Healthcare Patients using Hierarchical Multiple Property (계층적 다중 속성을 이용한 헬스케어 환자의 프라이버시 보호 기법)

  • Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.275-281
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

The Effect of Empowering Leadership on Work Engagement and Job Performance through Employees' Self-Efficacy and Belonging (임파워링 리더십이 구성원의 자기효능감과 소속감, 그리고 직무열의와 직무성과에 미치는 영향)

  • Seo, JungKyu;Kwon, HyeokGi
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.5
    • /
    • pp.103-117
    • /
    • 2020
  • The importance of empowering leadership has emerged, which inspires confidence and attachment to members' task capabilities through delegation of authority between leaders and members. The purpose of this study is to analyze the effect of empowering leadership on work engagement and job performance through self-efficacy and sense of belonging in construction companies. Hypothesis testing of 271 copies of the questionnaire from Busan, Ulsan and Gyeongnam areas was conducted using the structural equation model. First, in the order of information sharing and participatory decision-making, there was a significant positive effect on self-efficacy, whereas the lead and coaching factors were not significant. Second, it was shown that all 4 factors of empowering leadership had a significant positive effect on belonging. Third, the sense of self-efficacy and belonging had a significant positive effect on both work engagement and job performance.

A Study on Case for Localization of Korean Enterprises in India (인도 진출 한국기업의 현지화에 관한 사례 연구)

  • Seo, Min-Kyo;Kim, Hee-Jun
    • International Commerce and Information Review
    • /
    • v.16 no.4
    • /
    • pp.409-437
    • /
    • 2014
  • The purpose of this study is to present the specific ways of successful localization by analyzing the success and failures case for localization within the framework of the strategic models through a theoretical background and strategic models of localization. The strategic models of localization are divided by management aspects such as the localization of product and sourcing, the localization of human resources, the localization of marketing, the localization of R&D, harmony with a local community and delegation of authority between headquarters and local subsidiaries. The results, by comparing and analyzing the success and failures case for localization of individual companies operating in India, indicate that in terms of localization of product and sourcing, there are successful companies which procure a components locally and produce a suitable model which local consumers prefer and the failed companies which can not meet local consumers' needs. In case of localization of human resources, most companies recognize the importance of this portion and make use of superior human resource aggressively through a related education. In case of localization of marketing, It is found that the successful companies perform pre-market research & management and build a effective marketing skills & after service network and select local business partner which has a technical skills and carry out a business activities, customer support, complaint handling with their own organization. In terms of localization of R&D, the successful major companies establish and operate R&D center to promote a suitable model for local customers. In part of harmony with a local community, it shows that companies which made a successful localization understand the cultural environment and contribute to the community through CSR. In aspect of delegation of authority between headquarters and local subsidiaries, it is found that most of Korean companies are very weak for this part. there is a tendency to be determined by the head office rather than local subsidiaries. Implication of this thesis is that Korean enterprises in India should carry forward localization of products and components, foster of local human resource who recognize management and system of company and take part in voluntary market strategy decision, wholly owned subsidiary, establishment and operation of R & D center, understanding of local culture and system, corporate social responsibility, autonomy in management.

  • PDF

An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP (퍼지 AHP를 이용한 헬스케어 환자의 빅 데이터 사용의 효율적 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.227-233
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.