• Title/Summary/Keyword: ID management system

Search Result 197, Processing Time 0.033 seconds

Internet ID Management System based on ID Federation: e-IDMS (ID 연계 기반의 인터넷 ID Management System: e-IDMS)

  • Cho Yeong-Sub;Jin Seung-Hun;Moon Phil-Joo;Chung Kyo-Il
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.104-114
    • /
    • 2006
  • In order to use an Internet service, it is a general procedure that user subscribes to the service and then registers her or his id(identifier). As Internet has been more widely used, however, user has more and more ids than ever before. In this environments, whenever user uses an Internet service, she or he must authenticate to the service provider, which makes her or him inconvenient. As user's data is scattered and unmanaged on various web sites, user privacy has been revealed more often. This paper specifies e-IDMS which ETRI has been developing to solve such problems. e-IDMS is an Internet ID(IDentity) management system based on ID Federation Mechanism e-IDMS provides ID Federation-based facilities such as composite authentication, Internet SSG, ID information management, privacy protection and interactive query. e-IDMS is used in establishing integrated ill management system for public institutions.

Design and Implementation of Scalable ID Federation System in Mobile Computing Environments (모바일 컴퓨팅 환경에서 확장 가능한 ID 연동 시스템 설계 및 구현)

  • Ryoo, In-Tae;Kim, Bae-Hyun;Moon, Young-Jun;Cho, Yeong-Sub;Jin, Seung-Hun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.155-166
    • /
    • 2005
  • Currently, almost of all the Internet users have as many IDs as the number of sites they have subscribed for, The users should memorize and input every independent ID and password whenever they want to login to the system. Although ID management system is used to solve this problem, 10 and password management will become more complicated in the forthcoming ubiquitous computing environments because so many computers will be interconnected on various kinds of wired and wireless networks, Furthermore, it is not enough to use the existing single Circle of Trust (COT) ID management system for the forthcoming computing environments. To solve this problem, the paper proposes ID federation models in multiple COT domain and implements an ID federation system that can be scaled to mobile computing environment as well as wired computing environment. The proposed ID federation models has been verified to operate with no problem between the systems in different trust domains by doing the ID scaability test.

  • PDF

A Study on Authentication and Authorization on Entity in Grid (Grid 환경에서 엔티티 인증과 권한부여에 관한 연구)

  • Kug, Joung-Ook;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.273-280
    • /
    • 2003
  • When an existing user authorization systems in Grid access many user to local system and subject DN (Distinguished Name) in a user-proxy authenticate and ID in local system is one-to-one mapping, they have difficulties in ID management, memory resource management and resource management. At this, a variety of subject DN is shared of one local ID in an existing Grid. But this faces many difficulties in applying all requirements for many Grid users. Thus, we suppose user authorization system based on a certificate not them based on ID in this paper. That is, we add user's access level to extension field in a certificate, and make a supposed authorization system decide access limitation level on resources instead of an existing ID mapping methods.

An Access Control Based Privacy Protection Model in ID Management System (ID관리시스템의 접근통제기반 프라이버시 보안모델)

  • Choi Hyang-Chang;Noh Bong-Nam;Lee Hyung-Hyo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.1-16
    • /
    • 2006
  • The vulnerability of privacy in the Identity Management System (IMS) is the most pressing concern of ordinary users. Uncertainty about privacy keeps many users away from utilization of IMS. Therefore, this paper proposes an access-control oriented privacy model for IMS. The proposed model protects privacy using access control techniques with privacy policies in a single circle of trust. We address characteristics of the components of for the proposed model and describe access control procedures. After that, we show the architecture of privacy enforcement and XML-based schema for privacy policies.

  • PDF

Pattern Analysis of an Evaluation Model on Disaster Management System Using Fuzzy ID3 (퍼지 ID3를 이용한 재난관리시스템 평가모델의 패턴분석)

  • Kim, Hong-Jin;Hwang, Seung-Gook;Park, Young-Man;Park, Kwang-Bak
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.6
    • /
    • pp.826-831
    • /
    • 2008
  • In this paper, an evaluation model of disaster management system which is developed by using GRI G3 version and BCP process for the sustainability management of small and middle enterprises was proposed. The proposed evaluation model can be used to evaluate the disaster management system directly, and to establish the disaster management system as an index. Also, the rules obtained by pattern analysis using fuzzy ID3 for the proposed evaluation model are expected to use the guideline effectively for self evaluation in the small and middle enterprises.

Implementation of Expert System Simulation based on 2th Security of Network (네트워크 2중 보안을 위한 전문가시스템 시뮬레이션의 구현)

  • Lee Chang-Jo
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.309-325
    • /
    • 2000
  • Organizations rely on Secure ID resources today to handle vast amounts of information. Because the data can vary widely in type and in degree of sensitivity, employees need to be able to exercise flexibility in handling and protecting it. It would not be practical or cost-effective to require that all data be handled in the same manner or be subject to the same protection requirements. Without some degree of standardization, however inconsistencies can develop at introduce risks. Policy formulation is an important step toward standardization of security activities for ID resources. ID security policy is generally formulated from the input of many members of an organization, including security officials, line managers, and ID resource specialists. However, policy is ultimately approved and issued by the organization's senior management. In environments where employees feel inundated with policies, directives, guidelines and procedures, an ID security policy should be introduced in a manner that ensures that management's unqualified support is clear. The organization's policy is management's vehicle for emphasizing the commitment to ID security and making clear the expectations for employee involvement and accountability. This paper will discuss ID security Policy in terms of the different types (program-level and issue-specific), components, and Implementation of Expert System Simulation based on 4GL, PowerBuilder.

  • PDF

Interface Construction for Printout Security Management System (출력물 보안 관리 시스템을 위한 인터페이스 구축)

  • Hon, Jung-Soo;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.235-241
    • /
    • 2018
  • The printout management system should analyze the pattern of existence of personal information (resident number, card number) in the output log and users should be provided with functions such as warning message pop-up, forced printing termination, mailing to administrator, independently logs management. Authentication management can also be performed only by registered users by installing an agent on a user PC, and it should have a restriction function to permit or deny work according to user information. In addition, when printing/copying/scanning using this equipment, it is possible to use document printing and multifunction copier after ID card authentication and ID/PW should be input to device when ID card is not used. In this study, we developed these interfaces with WOWSOFT co., Ltd, a security company that has better technology than the existing printout security methods, to construct the printout management system. Also we designed the interface of basic functions necessary for printout management and contributed to the establishment of printout management system.

Electronic Identity Wallet System to Provide User-Centric ID Management Facilities (사용자 중심 ID 관리 기능을 제공하는 전자 ID 지갑 시스템)

  • Jo, Yeong-Seop;Jin, Seung-Heon
    • Electronics and Telecommunications Trends
    • /
    • v.23 no.4
    • /
    • pp.10-18
    • /
    • 2008
  • 본 고에서는 사용자의 자기 정보 통제권을 강화시키는 전자 ID 지갑 시스템을 기술한다. 전자 ID 지갑 시스템은 ID 정보 제공자로부터 ID 정보 소비자로 유통되는 사용자의 정보를 사용자가 직접 제어할 수 있는 기능을 제공한다. 또한 전자 ID 지갑 시스템은 사용자가 가입한 사이트, 사용자의 크리덴셜 및 사용자의 데이터 공유 정보 등을 사용자에게 모두 카드-기반의 인터페이스로 제공하여 사용자에게 편리함과 일관성을 제공한다. 전자 ID 지갑 시스템은 현재의 웹 환경뿐만 아니라 사용자의 참여와 공유가 더욱 더 중요해지는 웹 2.0 환경에 적합한 사용자 중심 ID 관리 시스템이다.

Overview and Comparison of Internet Identity Management System (인터넷 ID 관리 시스템 개요 및 비교)

  • Cho, Y.S.;Jin, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.22 no.3 s.105
    • /
    • pp.136-143
    • /
    • 2007
  • 인터넷의 확산과 웹 2.0 환경의 도래에 따라, 사용자가 관리해야 하는 디지털 형태의ID 정보가 기하 급수적으로 증가하고 있다. 이것은 사용자의 ID 관리 부담, 동일한 패스워드의 반복적인 사용으로 인한 보안성 저하, ID 정보의 유출에 의한 사용자 프라이버시 침해 문제 등을 발생시키고 있다. 따라서 사용자를 인증하고, 사용자의 ID 정보를 관리해주는 ID 관리 시스템이 매우 중요해지고 있다. 본 고에서는 인터넷 규모의 온라인 서비스를 대상으로 사용자를 인증하고 사용자의 ID 정보를 관리하는 대표적인 ID관리 시스템인 SAML, CardSpace, Open ID를 살펴 보고, 이들 시스템의 특징을 비교 분석한다.

ID-Based Group Key Management Protocols for Dynamic Peer Groups (피어 그룹을 위한 ID 기반의 그룹키 관리 프로토콜)

  • Park, Young-Ho;Lee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.922-933
    • /
    • 2004
  • In recent years, peer-to-peer network have a greate deal of attention for distributed computing or collaborative application, and work of ID-based public key systems have been focusing on the area of cryptography. In this paper, we propose ID-based group key management protocols for secure communication in autonomous peer group. Each member obtains his public/private key pair derived from his identification string from Private Key Generator. No central server participates in group key management protocol instead, all group members share the burden of group key management by the collaboration of themselves, so that our scheme avoids the single point of failure problem. In addition, our scheme considers the nature of dynamic peer group such as frequent joining and leaving of a member.

  • PDF