• Title/Summary/Keyword: Privilege

Search Result 200, Processing Time 0.02 seconds

Design of Security Policy-based Intrusion Detection System Model (보안정책 기반 침입탐지 시스템 모델 설계)

  • Kim, Kang;Jeon, Jong-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.81-86
    • /
    • 2003
  • Computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion Detection System has been an active research area to reduce the risk from intruders. Especially, The paper proposes a new Security Policy-based Intrusion Detection System Model, which consists of several computer with Intrusion Detection System, based on Intrusion Detection System and describes design of the Security Policy-based Intrusion Detection System model and prototype implementation of it. The Security Policy-based Intrusion Detection Systems are distributed and if any of distributed Security Policy- based Intrusion Detection Systems detect anomaly system call among system call sequences generated by a privilege process, the anomaly system call can be dynamically shared with Security Policy-based Intrusion Detection Systems, This makes the Security Policy - based Intrusion Detection Systems improve the ability of countermeasures for new intruders.

  • PDF

A Time Constraints Permission Based Delegation Model in RBAC (RBAC을 기반으로 하는 시간제한 권한 위임 모델)

  • Kim, Tae-Shik;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.163-171
    • /
    • 2010
  • RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. Delegation is a mechanism of assigning access rights to a user. RBDM0 and RDM2000 models deal with user-to-user delegation. The unit of delegation in them is a role. However, RBAC does not process delegation of Role or Permission effectively that occurs frequently in the real world. This paper proposes a Time Constraints Permission-Based Delegation Model(TCPBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. TCPBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation with time constraints. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.

"All This is Indeed Brahman" Rammohun Roy and a 'Global' History of the Rights-Bearing Self

  • Banerjee, Milinda
    • Asian review of World Histories
    • /
    • v.3 no.1
    • /
    • pp.81-112
    • /
    • 2015
  • This essay interrogates the category of the 'global' in the emerging domain of 'global intellectual history'. Through a case study of the Indian social-religious reformer Rammohun Roy (1772/4-1833), I argue that notions of global selfhood and rights-consciousness (which have been preoccupying concerns of recent debates in intellectual history) have multiple conceptual and practical points of origin. Thus in early colonial India a person like Rammohun Roy could invoke centuries-old Indic terms of globality (vishva, jagat, sarva, sarvabhuta, etc.), selfhood (atman/brahman), and notions of right (adhikara) to liberation/salvation (mukti/moksha) as well as late precolonial discourses on 'worldly' rights consciousness (to life, property, religious toleration) and models of participatory governance present in an Indo-Islamic society, and hybridize these with Western-origin notions of rights and liberties. Thereby Rammohun could challenge the racial and confessional assumptions of colonial authority and produce a more deterritorialized and non-sectarian idea of selfhood and governance. However, Rammohun's comparativist world-historical notions excluded other models of selfhood and globality, such as those produced by devotional Vaishnava, Shaiva, and Shakta-Tantric discourses under the influence of non-Brahmanical communities and women. Rammohun's puritan condemnation of non-Brahmanical sexual and gender relations created a homogenized and hierarchical model of globality, obscuring alternate subaltern-inflected notions of selfhood. Class, caste, and gender biases rendered Rammohun supportive of British colonial rule and distanced him from popular anti-colonial revolts and social mobility movements in India. This article argues that today's intellectual historians run the risk of repeating Rammohun's biases (or those of Hegel's Weltgeschichte) if they privilege the historicity and value of certain models of global selfhood and rights-consciousness (such as those derived from a constructed notion of the 'West' or from constructed notions of various 'elite' classicized 'cultures'), to the exclusion of models produced by disenfranchised actors across the world. Instead of operating through hierarchical assumptions about local/global polarity, intellectual historians should remain sensitive to and learn from the universalizable models of selfhood, rights, and justice produced by actors in different spatio-temporal locations and intersections.

Development and Operation of Integrated Technical Information System(ITIS) for an Aircraft Development (항공기 통합기술정보시스템(ITIS) 개발 및 운용)

  • Chung, Joon-Young;Lee, Joon-Woo;Kim, Cheon-Young
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.2
    • /
    • pp.75-83
    • /
    • 2006
  • The Aircraft Development Department operated a Technical Document Management System that was effectively managed using a database management system for the management of the technical information created by a research and development phase of an aircraft and managed a technical information of a research and development varied by the project on a lot of the aircraft development program. While managing the user management and technical information project, it caused some problems on the workflow of the Work Memo and a search of some technical information, etc. As result, we developed the web-based Integrated Technical Information System(ITIS) which be able to totally manage the Technical Document Management System varied by program. According to the construction and operation of this system, we can access by program using user account and privilege and dramatically increased the productivity of a research and development because of performing the workflow of the Work Memo and some search of technical information by the integrated screen of the ITIS.

  • PDF

Reliable Cascaded Delegation Scheme for Mobile Agent Environments (이동 에이전트 환경을 위한 안전한 연속 위임 구현 기법)

  • Lee, Hyun-Suk;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.31-38
    • /
    • 2004
  • In mobile agent environments, migration of an agent occurs continuously due to the mobility of agents. So cascaded delegation can occur among places for delegating the privilege to execute the agent. Because the existing delegation scheme considers only the delegation between two places that participate in migration of an agent, it does not support secure cascaded delegation. In this paper, we propose a cascaded delegation scheme that provides agents with secure cascaded delegation in mobile agent environments. Depending on the trust-relationship among places, the proposed scheme achieves the goal by nesting each delegation token or by nesting only initial token signed by creator of the agent within the signed part of the next immediate delegation token. And we prove that the proposed scheme is secure against the attack of replaying a message and the attack of substituting a delegation token.

Multi-Factor Authentication System based on Software Secure Card-on-Matching For Secure Login (안전한 로그인을 위한 소프트 보안카드 기반 다중 인증 시스템)

  • Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.3
    • /
    • pp.28-38
    • /
    • 2009
  • Login process uses both ID and password information to authenticate someone and to permit its access privilege on system. However, an attacker can get those ID and password information by using existing packet sniffing or key logger programs. It cause privacy problem as those information can be used as a hacking and network attack on web server and web e-mail system. Therefore, a more secure and advanced authentication mechanism should be required to enhance the authentication process on existing system. In this paper, we propose a multi-factor authentication process by using software form of secure card system combined with existing ID/Password based login system. Proposed mechanism uses a random number generated from the his/her own handset with biometric information. Therefore, we can provide a one-time password function on web login system to authenticate the user using multi-factor form. Proposed scheme provide enhanced authentication function and security because it is a 'multi-factor authentication mechanism' combined with handset and biometric information on web login system.

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

A Post-Management System of Digital Assets on Social network Services (소셜 네트워크 서비스에 게시된 디지털 자산의 사후 관리 시스템)

  • Moon, Wonsuk;Kim, Seoksoo
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.209-214
    • /
    • 2015
  • Social network services such as Facebook and Flickr is a very useful service that was the foundation of the Internet. If a state in which the Internet is connected, music, photos, and us to be able to share it freely post such as documents. However, even when the digital information posted in such social network services the user has died, and have been published, it is also used for people who do not intend the bad purposes some problems can occur. Facebook is trying to apply the findings Jed R. Brubaker of UC Irvine University in order to solve this problem. However, in Korea, such efforts, not much appears for now. Therefore, we proposed a method that can be managed by delegated Facebook, safely a Delegator digital information posted on social networking services such as Flickr. Our proposed system, as compared with Jed R. Brubaker and Jeong-Kyung Moon is executed previous studies, we studied a method proposed by the appropriate compensates points shortage is passed through the future research. And I consider to have been proposed a method to safely use posted digital assets in a social network service.

Storytelling of Korean Virtual Reality Game Fiction (한국 가상현실 게임소설의 스토리텔링)

  • Kim, Hu-In;Lee, Minhee;Han, Hye-Won
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.1
    • /
    • pp.55-63
    • /
    • 2018
  • This study aims to analyze remediation of games and fictions in Korean virtual reality game fictions and to derive the storytelling of virtual reality game fictions through them. The purpose of this study is to explore the possibilities that Korean game fiction based on the web can be expanded as popular literature. The main character of the fiction is a male in his twenties. In the neoliberal society, he is set as a member of the neglected class and lacking privilege. He enters the virtual world because of the deficiency experienced in the real world. It minimizes the mediation process between the real world and the interface. On the other hand, the repetitive actions performed by the protagonist belong to the category of self - destructive labor. As a result, he shows signs of narcissism. In the Korean virtual reality game fiction, the magic circle appears blurred, and the real world and the virtual world are linked. In this process, the virtual world functions as a substitute space to solve the problem of reality. The establishment of such a space, and the resolution of conflicts are merely narrative characteristics of Korean game fictions that are different from North America and Europe.

A Study on Repression of the Female Body as Expressed by Chinese Foot-binding and the Western Corset (전족과 코르셋에 표현된 몸의 억압에 대한 의미해석)

  • Jeong, Ki-Sung;Kim, Min-Ja
    • Journal of the Korean Society of Costume
    • /
    • v.61 no.7
    • /
    • pp.35-50
    • /
    • 2011
  • In this study, repression of the body is defined as a restriction on natural developments or movements and a modification either temporarily or permanently of the human body in shape, color, texture and odor. In addition, it involves physical and (or) mental pain. Chinese foot-binding and the Western corset are extreme examples of female body's being repressed in the history of fashion. The analysis of this type of repression will be based on historical research and theoretical concepts such as Darwin's (1809-1882) survival condition, Freud's (1856-1939) renunciation of desire, Weil's (1909-1943) privilege, and Foucault's (1926-1984) L'Usage des Plaisirs(the use of pleasure). Chinese foot-binding symbolically represents ideal beauty, the distinction of an ethnic group, and a desire for improved social status in the struggle for political power. It also represents psychology and a esthetics of eroticism and fetishism that originate from a man's desire and his individual taste. Symbolically, the Western corset represents abundance and fecundity, obedience and devotion to religion, the sanctity of God and ideal beauty as defined by political power. It also represents psychology and aesthetics of eroticism and fetishism as man's desire and a fashion icon. In conclusion, Chinese foot-binding was pursuit of power in male ideology but Western corset was a power struggle between God and mankind.