• Title/Summary/Keyword: ID management system

Search Result 197, Processing Time 0.027 seconds

Development of Identity-Provider Discovery System leveraging Geolocation Information (위치정보 기반 식별정보제공자 탐색시스템의 개발)

  • Jo, Jinyong;Jang, Heejin;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1777-1787
    • /
    • 2017
  • Federated authentication (FA) is a multi-domain authentication and authorization infrastructure that enables users to access nationwide R&D resources with their home-organizational accounts. An FA-enabled user is redirected to his/her home organization, after selecting the home from an identity-provider (IdP) discovery service, to log in. The discovery service allows a user to search his/her home from all FA-enabled organizations. Users get troubles to find their home as federation size increases. Therefore, a discovery service has to provide an intuitive way to make a fast IdP selection. In this paper, we propose a discovery system which leverages geographical information. The proposed system calculates geographical proximity and text similarity between a user and organizations, which determines the order of organizations shown on the system. We also introduce a server redundancy and a status monitoring method for non-stop service provision and improved federation management. Finally, we deployed the proposed system in a real service environment and verified the feasibility of the system.

A Study on Metadata Formats for Integration of Cultural Contents (문화콘텐츠 통합을 위한 메타데이터 포맷 연구)

  • Cho, Yoon-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.2
    • /
    • pp.114-133
    • /
    • 2003
  • Recently, the organizations related to cultural contents are gradually expanding access to cultural contents for general public through the distributed network. However, since cultural contents have different characteristics than general contents, the objects, the of cultural contents seldom contain the words generally used for organization and search of information. If the cultural contents system is created without any consideration of such differences. We cannot effectively identify and search resources. Moreover, because the names, expressions and meanings are different between metadata elements of various cultural contents, it is very difficult to interconnect or share information between different systems. In order to solve these problems, proper organization ad management of metadata is vital. In this studym we have comparatively analyzed the data elements of each format based on Dublin Core, EAD, VRA, CDWA, CIMI, and Object ID, the metadata formats approached from various aspects in the cultural contents area. Through this study, we tried to provide the basic materials for integration of cultural contents by securing interoperability of different metadata formats.

Design on Protection and Authentication System of IPTV Contents using HSI Watermark (HSI 워터마크를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.55-62
    • /
    • 2010
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents illicit copying and distribution of copyright meterials tends to draw more attentions. So we need a right service system that can protect contents and copyright using watermark inserting. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But this system can not protect the contents when acquiring them from TV output using A/D convertor. So we apply watermark method using HSI color space against contents illicit copying. And for distribution of copyright materials. we compound unique settop ID and copyrighter's ID to make new ID that is watermark. When inserting watermark, we use the watermark for copyright protection and authentication. So we can protect copyright and identify last settop's user in illicit distribution. we design download based IPTV contents protection and authentication system using HSI watermark method.

A Study on Improvement Methods for Encrytion and Authentication in Batt le Field Management System(C4I) (전장관리체계(C4I)에서의 암호 및 인증방법 개선 방안에 관한연구)

  • Lee, Won Man;Koo, Woo Kwon;Park, Tae Hyeong;Lee, Dong Hoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.39-50
    • /
    • 2012
  • Battlefield management systems are operated by the Public Key Infrastructure (PKI) and cryptographic equipment is distributed through the personal delivery to the enemy has deodorizing prone to structure. In addition, Per person each battlefield management system (C4I) encryption key operate and authentication module to manage multiple encryption so, encryption key operating is restrictions. Analysis of the problems of this public key infrastructure(PKI), Identity-Based Cryptosystem(IBC) and Attribute-Based Cryptosystem(ABC) to compare construct the future of encrypt ion and authentication system were studied. Authentication method for the connection between the system that supports data encryption and secure data communication, storage, and communication scheme is proposed.

A study on the integrated data modeling for the plant design management system and the plant design system using relational database (관계형 데이터베이스를 이용한 PDMS/PDS의 통합 데이터 모델링에 관한 연구)

  • 양영태;김재균
    • Journal of Ocean Engineering and Technology
    • /
    • v.11 no.3
    • /
    • pp.200-211
    • /
    • 1997
  • Most recently, offshore Engineering & Construction field is concerned about integration management technology such as CIM(Computer Integrated Manufacturing), PDM(Product Data Management) and Enterprise Information Engineering in order to cope with the rapid change of engineering and manufacturer specification as per owner's requirement during construction stage of the project. System integration and integrated data modeling with relational database in integration management technology improve the quality of product and reduce the period of the construction project by reason of owing design information jointly. This paper represents the design methodology of system integration using Business Process Reengineering by the case study. The case study is about the offshore plant material information process from front end engineering design to detail engineering for the construction and the basis of monitoring system by integrating and sharing the design information between the 2D intelligent P&ID and 3D plant modeling using relational database. As a result of the integrated data modeling and system integration, it is possible to maintain the consistency of design process in point of view of the material balancing and reduce the design assumption/duration. Near future, this system will be expanded and connected with the MRP(Material Requirement Planing) and the POR (Purchase Order Requisition) system.

  • PDF

Security Policy Model for the Intrusion Detection and Response on Enterprise Security Management System (통합보안 관리시스템의 침입탐지 몇 대응을 위한 보안 정책 모델)

  • 손우용;송정길
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.81-87
    • /
    • 2004
  • Very various intrusion by development of systems that is based on network is spread. To detect and respond this intrusion, security solutions such as firewall or IDS are bringing and management of security system that load these becomes more harder. Moreover, because environment of systems that require security is various, hard to manage establishing suitable security policy Therefore, need model about enterprise management of various security system and intrusion detection of each systems and response. In this paper, improve PBNM structure that manage wide network resources and presented suitable model in intrusion detection and response of security system. Also, designed policy-based enterprise security management system for effective intrusion detection and response by applying presented model to enterprise security management system.

  • PDF

Development of playlist management system using YouTube API (YouTube API를 이용한 재생목록 관리 시스템 개발)

  • Yoon, Kyung-Seob;Kim, Yeon Ji;Hong, Ji Hun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.47-50
    • /
    • 2017
  • PC 혹은 모바일 환경이 점점 발전됨에 따라 사용자들은 자신의 목적에 맞는 다양한 콘텐츠들을 쉽게 이용하고 있다. 사용자는 정상적인 콘텐츠를 이용할 경우 콘텐츠가 가지고 있는 태그정보를 통해 콘텐츠의 내용을 식별하여 사용한다. 하지만 올바른 태그정보가 들어있지 않은 콘텐츠의 경우 사용자는 잘못 입력된 태그정보로 인해 콘텐츠를 식별하는 과정에서 어려움을 겪을 수 있는 문제점을 가지고 있다. 본 논문에서는 사용자가 가지고 있는 콘텐츠에 접근하여 스마트폰 혹은 PC에 저장되어있는 다양한 콘텐츠들을 유튜브 API를 통해 유튜브 플랫폼에 존재하는 영상들과 매칭 시키고, 매칭 시킨 영상들을 사용자 계정에 동기화시키는 시스템을 제안한다.

  • PDF

KISIA가 말하는 보안기업 이야기 - 위협 수집기 TMS

  • Kim, Ji-Suk
    • 정보보호뉴스
    • /
    • s.136
    • /
    • pp.56-59
    • /
    • 2009
  • 국내 정보보호 기업의 약 60%는 벤처 창업 붐이 최고조에 달했던 1999년$\sim$2003년 사이에 설립됐다. '정보보호기술' 역시 약 10년 전인 2000년에 창업한 기업 중 하나다. 2000년 전후로 국내 IDS 시장이 활성화되던 당시 '테스(TESS) IDS'로 정보보호 제품을 선보인 정보보호기술은 기술력을 바탕으로 비교적 짧은 시간 내 정보보호 분야에서 탄탄한 기반을 다지게 된다. IDS를 통해 시장 점유율을 높이던 정보보호기술은 2004년 자체 IDS 개발 기술을 바탕으로 당시에는 생소했던 '위협관리시스템'을 내놓으며 신선한 바람을 일으켰다. 보안산업의 새로운 분야로 떠오른 위협관리시스템은 사후 대응이 아닌 위협요소에 대한 사전대응을 목표로 한 예/경보 시스템. 정보보호기술의 위협관리시스템 'TESS TMS(Threat Management System)'은 기존 IDS가 가진 분석기능과 모니터링 기능에서 출발했다.

  • PDF

Kerberos Authentication Deployment Policy of US in Big data Environment (빅데이터 환경에서 미국 커버로스 인증 적용 정책)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.435-441
    • /
    • 2013
  • This paper review about kerberos security authentication scheme and policy for big data service. It analyzed problem for security technology based on Hadoop framework in big data service environment. Also when it consider applying problem of kerberos security authentication system, it analyzed deployment policy in center of main contents, which is occurred in commercial business. About the related applied Kerberos policy in US, it is researched about application such as cross platform interoperability support, automated Kerberos set up, integration issue, OPT authentication, SSO, ID, and so on.

An Analysis of Applications and Issues in Library RFID System (도서관 RFID 시스템의 어플리케이션 및 문제점 분석에 관한 연구)

  • Lee, Eung-Bong
    • Journal of Information Management
    • /
    • v.39 no.2
    • /
    • pp.27-43
    • /
    • 2008
  • This paper analyzes feasibility studies regarding the structure, applications and issues of the library RFID system. In this study, the structure and principle, operation mode and middleware of library RFID system are reviewed in detail, Finally this paper analyzed and proposed the RFID applications that could be efficient to information management and user service of library and the major problems and improvements of library RFID system.