• Title/Summary/Keyword: Delegation Network

Search Result 37, Processing Time 0.024 seconds

Network Management Script Construction in Delegation Model (위임 모델에서의 네트워크 관리 스크립트 작성에 관한 연구)

  • 한순희;이기현;조국현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.11
    • /
    • pp.1228-1237
    • /
    • 1992
  • Network management represents those activities which control and moitor the use of resources. Remote delegation model supports flexible and effective distribution of management functions among managers and agents, and it may cause an reliable network management in a relatively complex and high-speed networks. in this model, managers delegate to agents execution of management programs as prescribed in a management scripting language. In addition, primitives included in the management programs enable agents to monitor and control localmanaged objects effectively. We suggest management algorithms in which management scripts are delegated from managers to agents and partiality implement OSI fault management. This mans gement algorithm can effectively support delegation and control concurrent accesses to management information. Moreover, it can be easily translated into object-based concurrent programming language: ABCL. In this paper, we will scrutinize some essential aspects of this management.

  • PDF

Design and Implementation of eduroam Authentication-Delegation System (eduroam 사용자 대리인증 시스템의 설계 및 구현)

  • Lee, KyoungMin;Jo, Jinyong;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1730-1740
    • /
    • 2016
  • This paper introduces a guest identity provider system for eduroam which is a global Wi-Fi service targeting users enrolled in higher education and research institutions. Developed eduroam AND (AutheNtication Delegation) system enables users to create their eduroam user accounts and to access eduroam regardless of their locations. Users with no organizational eduroam account therefore can freely access eduroam using the system. A federated authentication model is implemented in the system, and thus the system has merits of having high accessibility, indirectly verifying users and organizations possible, saving management overhead. Status monitoring is essential because authentication request and response messages are routed by eduroam network. eduroam AND performs active monitoring to check service availability and visualizes the results, which increases operational and management efficiency. We leveraged open-source libraries to implement eduroam AND and run the system on KREONET (Korea REsearch Open NETwork). Lastly, we present implementation details and qualitively evaluate the system.

An Extended SAML Delegation Model Based on Multi-Agent for Secure Web Services (안전한 웹서비스를 위한 멀티 에이전트 기반의 확장된 SAML 위임 모델)

  • Kim, Kyu-Il;Won, Dong-Ho;Kim, Ung-Mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.111-122
    • /
    • 2008
  • Web service is defined to support interoperable machine to machine interaction over a network and defined as distributed technologies. Recently in web service environment, security has become one of the most critical issues. An attacker may expose user privacy and service information without authentication. Furthermore, the users of web services must temporarily delegate some or all of their behalf. This results in the exposure of user privacy information by agents. We propose a delegation model for providing safety of web service and user privacy in ubiquitous computing environments. In order to provide safety of web service and user privacy, XML-based encryption and a digital signature mechanism need to be efficiently integrated. In this paper, we propose web service management server based on XACML, in order to manage services and policies of web service providers. For this purpose, we extend SAML to declare delegation assertions transferred to web service providers by delegation among agents.

A Study on Design and Implementatio of Script Management of Script Management Function (스크립트 관리 기능의 설계 및 구현에 관한 연구)

  • 한순희;이재오;조국현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.5
    • /
    • pp.746-756
    • /
    • 1993
  • Delegation model supports effective and highly reliable network management. It reduces traffic overhead caused by transmission of management informations. In this model, management scripts can be composed by the designers of managers, these are delegated to agents. Delegation models support effective distribution of management functions among managers and agents. Therefore, various functions are needed to create and delegate management scripts. In this paper, we design simple script language and implement script interpreter for efficient network management. And, we define script management functions and services. Moreover, we present manager/agent models and algorithms for script management. As an implementation environment, the ISODE services are ported. The methods employed for the implementation are also described.

  • PDF

Route Optimization Using a Limited Prefix Delegation Method in Multi-level Nested Mobile Network Environments (다단 중첩된 이동네트워크 환경에서 제한된 프리픽스 위임 방법을 이용한 경로최적화)

  • Song, Jung-Wook;Han, Sun-Young
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.309-321
    • /
    • 2009
  • Nowadays, requests of connecting to the Internet while moving are increasing more and more, and various technologies have been developed for satisfying those requests. The IETF nemo WG standardized "Network Mobility Basic Support Protocol" for supporting mobile network through extending existing MIPv6 protocol for supporting host mobility. But, mobile networks can be nested while they are changing their location. And if they are multi -level nested, that causes some problems because of protocol characteristic. In this paper, we try to solve the problem that is complicated routing path caused by multi-level nesting of mobile networks with our limited prefix delegation method. We give a little modification to the standard protocol and add some functions to mobile router. With results from analysis, we could say that our method has better performance than other proposed methods.

Route Optimization Scheme in Nested NEMO Environment based on Prefix Delegation (프리픽스 할당에 기반한 중첩된 NEMO 환경에서의 경로최적화 기법)

  • Rho, Kyung-Taeg;Kang, Jeong-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.95-103
    • /
    • 2008
  • The Network Mobility (NEMO) basic support protocol extends the operation of Mobile IPv6 to provide uninterrupted Internet connectivity to the communicating nodes of mobile networks. The protocol is not efficient to offer delays in data delivery and higher overheads in the case of nested mobile networks because it uses fairly sub-optimal routing and multiple encapsulation of data packets. In this paper, our scheme combining Hierarchical Mobile IPv6 (HMIPv6) functionality and Hierarchical Prefix Delegation (HPD) protocol for IPv6, which provide more effective route optimization and reduce packet header overhead and the burden of location registration for handoff. The scheme also uses hierarchical mobile network prefix (HMNP) assignment and tree-based routing mechanism to allocate the location address of mobile network nodes (MNNs) and support micro-mobility and intra-domain data communication. The performance is evaluated using NS-2.

  • PDF

A Study of a Secure Smart Car System using Attribute-based Delegation Method (속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.71-79
    • /
    • 2019
  • The demand of smart cars is increasing rapidly. International stand organize such as 3GPP and 5GAA are proposing standard communication protocvols for connected-car, and automotive network infrastructure. But Smart car network have many security threats and more dangerous against the existed wire communication network. Typically, peripheral devices of a smart car may disguise their identity and steal location information and personal information about the vehicle. In addition, the infrastructure elements around smart cars can conspire and put driving cars in danger, threatening lives. This is a very serious security threat. Therefore, in order to solve these problems, we proposed a system that is secure from collusion and tampering attacks using attribute-based authorize delegation method and threshold encryption algorithms. We have demonstrated using a semantic safety model that the proposed system can be safe from collusion attack.

Hierarchical Prefix Configuration for IPv6 Network

  • Kim Byung Yeob;Park Jung Soo;Kim Hyoung Jun
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.567-570
    • /
    • 2004
  • IPv6 enables stateless address configuration of hosts. Using this technique, a host in an IPv6 network can configure its address automatically with the help of a router. This eliminates the need for a server to manage the address dispatching state in conventional IPv4 networks. In this paper, we present a stateless configuration technique for routers. By expanding IPv6 stateless address configuration, a router can configure its network with the help of an upper level router, enabling a hierarchical, router-to-router network automatic configuration

  • PDF

Delegation-based Authentication Protocol for Cognitive Radio Network (인지무선네트워크를 위한 위임기반 인증 프로토콜)

  • Kim, Hyunsung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.79-86
    • /
    • 2015
  • Cognitive radio networks (CRNs) offer the promise of intelligent radios that can learn from and adapt to their environment. CRN permits unlicensed users to utilize the idle spectrum as long as it does not introduce interference to the primary users due to the Federal Communications Commission's recent regulatory policies. Thereby, the security aspects in CRNs should be different with the other networks. The purpose of this paper is to devise a new delegation-based authentication protocol (NDAP) by extracting out the security aspects for unlicensed user authentication over CRNs from Tsai et al's delegation-based authentication protocol (TDAP). First of all, we will provide security analyses on the TDAP and set design goal for unlicensed user authentication. Then, we will propose a NDAP as a remedy mechanism for the TDAP and a new protocol for CRNs. The NDAP could be used as a security building block for the CRNs and various convergence applications.

The Effect on Network Diversity and Network Strength of Social Enterprise Member with the Developmental Model (사회적 기업구성원의 네트워크 다양성과 네트워크 강도가 기업발전모형에 미치는 영향)

  • Chung, Dae-Yong;Kim, Min-Sug
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3772-3778
    • /
    • 2010
  • The leaders such as The Robert Foundation of the U.S., Social Firms U.K., EMES European Research Network worldwide are groping for the survival strategies of social enterprises and of their developmental methods with the utilization of social capital. Along with the way the world economy goes on, this study is first of all to empirically analyze how the diversity and strength of network as independent variables work with the studies of the survival of enterprises of Granovetter Mark, Burt Ronald, Coleman James, Peter Witt, Andreas Schroeter, Christin Merz, Helen Haugh, mainly concerned with the increase in employment, the increment in sales, delegation of authorization as dependent variables and secondly it is to present a theoretical possibility of optimizing the development of social enterprises. The object of this study consists of 25 companies recommended by experts out of the current national 295 social enterprises in 2009 through the analysis of sources of SPSS 12.0, appropriateness, reliability, interrelation, etc; besides, hypotheses are proved by multiple regression analysis. A result of the investigation indicates that there is the necessity of network in all the processes of the survival of enterprises, the growth in employment, the increase in sales, delegation of authorization; especially, it suggests that it is necessary to manage, maintain and develop primary factors relating to a variety of networks to improve sales, and relating to the intensity of network for the survival of corporations. At last, I think that this study could be a help to the strategies of utilizing social capital in order for many companies or nonprofit social organizations in Korea to develop into constant enterprises.