• Title/Summary/Keyword: Security Service Model

Search Result 753, Processing Time 0.022 seconds

Design Patterns for Building Context-Aware Transactional Services in PaaS-Enabled Systems

  • Ettazi Widad;Riane Driss;Nassar Mahmoud
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.91-100
    • /
    • 2023
  • Pervasive computing is characterized by a key characteristic that affects the operating environment of services and users. It places more emphasis on dynamic environments where available resources continuously vary without prior knowledge of their availability, while in static environments the services provided to users are determined in advance. At the same time, Cloud computing paradigm introduced flexibility of use according to the user's profile and needs. In this paper, we aimed to provide Context-Aware Transactional Service applications with solutions so that it can be integrated and invoked like any service in the digital ecosystem. Being able to compose is not enough, each service and application must be able to offer a well-defined behavior. This behavior must be controlled to meet the dynamicity and adaptability necessary for the new user's requirements. The motivation in this paper is to offer design patterns that will provide a maximum of automatism in order to guarantee short reaction times and minimal human intervention. Our proposal includes a cloud service model by developing a PaaS service that allows CATS adaptation. A new specification for the validation of CATS model has been also introduced using the ACTA formalism.

Temporal constraints GEO-RBAC for Context Awareness Service (공간 인식 서비스를 위한 Temporal constraints GEO-RBAC)

  • Shin Dong-Wook;Hwang Yu-Dong;Park Dong-Gue
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.382-389
    • /
    • 2006
  • Developing context awareness service In these day, It demands high security in context awareness service. So GEO-RBAC that provide user assignment of spatial role, assignment of permission, role schema, role instance and spatial role hierarchy to context awareness service is access control model to perfect in context awareness service. But GEO-RBAC is not considering temporal constraints that have to need context awareness environment. Consequently this paper improves the flexibleness of GEO-RBAC to consider time and period constraints notion and the time of GTRBAC that presents effective access control model. also we propose GEO-RBAC to consider temporal constraints for effective access control despite a various case.

  • PDF

Digital Forensic Methodology of IaaS Cloud Computing Service (IaaS 유형의 클라우드 컴퓨팅 서비스에 대한 디지털 포렌식 연구)

  • Jeong, Il-Hoon;Oh, Jung-Hoon;Park, Jung-Heum;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.55-65
    • /
    • 2011
  • Recently, use of cloud computing service is dramatically increasing due to wired and wireless communications network diffusion in a field of high performance Internet technique. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. In a view of digital forensic investigation, it is difficult to obtain data from cloud computing service environments. therefore, this paper suggests analysis method of AWS(Amazon Web Service) and Rackspace which take most part in cloud computing service where IaaS formats presented for data acquisition in order to get an evidence.

A Study of Web Application Security Quality Architecture Management Process referenced ISO/IEC9000 Model (ISO/IEC9000모델을 참조한 웹 애플리케이션 보안품질 관리체계 설계)

  • Kim, Jeom-Goo;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.11-17
    • /
    • 2012
  • According to ISO/IEC 9000, quality to satisfy users' requirements when using the product or service is defined as the characteristics of the synthesized concept. Secure web application coding information systems with the reliability and quality of service is one of the determining factor. Secure coding in order to achieve the quality based on the model is necessary. The reason is that the security is in quality properties in the range of non-functional requirements that necessitates. Secure coding for the design of quality systems based on the quality of the definition of quality attributes, quality requirements, quality attribute scenarios are defined, and must be set. To this end, referring to IEEE 1061 quality model for web application, quality model structure is developed. Secure web application architecture design is composed of coding quality of the model systems, web applications draw interest to stakeholders, decision drivers secure coding architecture, quality attributes, eliciting quality requirements of the security settings, creating web application architecture descriptions and security framework.

A Trusted Sharing Model for Patient Records based on Permissioned Blockchain

  • Kim, Kyoung-jin;Hong, Seng-phil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.75-84
    • /
    • 2017
  • As there has been growing interests in PHR-based personalized health management project, various institutions recently explore safe methods of recording personal medical and health information. In particular, innovative medical solution can be realized when medical researchers and medical service institutes can generally get access to patient data. As EMR data is extremely sensitive, there has been no progress in clinical information exchange. Moreover, patients cannot get access to their own health data and exchange it with researchers or service institutions. It can be operated in terms of technology, yet policy environment are affected by state laws as well as Privacy and Security Policy. Blockchain technology-independent, in transaction, and under test-is introduced in the medical industry in order to settle these problems. In other words, medical organizations can grant preliminary approval on patient information exchange by using the safely encrypted and distributed Blockchain ledger and can be managed independently and completely by individuals. More apparently, medical researchers can gain access to information, thereby contributing to the scientific advance in rare diseases or minor groups in the world. In this paper, we focused on how to manage personal medical information and its protective use and proposes medical treatment exchange system for patients based on a permissioned Blockchain network for the safe PHR operation. Trusted Model for Sharing Medical Data (TMSMD), that is proposed model, is based on exchanging information as patients rely on hospitals as well as among hospitals. And introduce medical treatment exchange system for patients based on a permissioned Blockchain network. This system is a model that encrypts and records patients' medical information by using this permissioned Blockchain and further enhances the security due to its restricted counterfeit. This provides service to share medical information uploaded on the permissioned Blockchain to approved users through role-based access control. In addition, this paper presents methods with smart contracts if medical institutions request patient information complying with domestic laws by using the distributed Blockchain ledger and eventually granting preliminary approval for sharing information. This service will provide an independent information transaction and the Blockchain technology under test will be adopted in the medical industry.

A Study on the Mutual Cooperation of Private Security and Local Government (지방자치단체와 민간경비의 상호협력에 관한 연구)

  • Song, Sang-Wk;Lee, Min-Hyong
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.105-128
    • /
    • 2006
  • The suggestions that follow are about the plan for the cooperation between private security and local government and the enhancement of its service for facing the change of public peace environment. Fist, by a local government collecting funds, the business for revitalization of local economics should be done to enhance local economic independence. Second, the autonomous right of a local government should be reinforced and the center for taking complete charge of local security should be established in the self-governing body. Third, the private security should be connected with the local characteristics, the role of which enlarged as well. For this developing the model of security service for the local area and working together between private security and police should be achieved. Fourth, it is necessary for a local government to entrust the private security with its public security service. For this it should be achieved to set up the range of local security service and inform local residents of the advantage of security service entrusted to private security. Finally, in connection with the new system of local police, it is necessary to have clear grasp of the work related to the private security among local police services and private security business and local police should take partial charge of the public peace service. Through the cooperation between private security and local government, the role of private security will be enlarged and its business revitalized as well.

  • PDF

A Study on the Perceived characteristics of the mobile payment service using the technology acceptance model (기술수용모델을 활용한 모바일 소액결제 시스템의 인지적 특성 분석)

  • 이석기;김성희
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.103-109
    • /
    • 2004
  • Mobile payment service is a new innovating technology in the micro payment industry. Although it emerged only one or two years a9o in Korea, it is now highly used and prospered by many online companies. Traditional studies concerning the electronic payment system are usually about the payment process itself, so they stressed the security or the robustness of the process. The study from the angle of behavioral science seldom exists. This article describes the phenomenon of technology adoption with a particular focus on telephone Payment service. The article identifies which characteristic of the telephone payment service affects to the user status (user, non-users). To do this, this article mainly used Roger's Technology Acceptance Model and some characteristics are added to the model. The most important perceptual characteristic that affects to the user status was not security, but ease of use-the telephone payment service had to enhance continuously for the competitive advantage over the other payment service. Observability and convenience are also noted as important.

  • PDF

A Study on Reuse Intention of the Easy Payment Service (간편 결제서비스 재사용의도에 관한 연구)

  • Kim, Jun-Woo;Nam, Jung-Ki;Jeon, Dong-Jin
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.303-312
    • /
    • 2018
  • The purpose of this study is to design the easy payment service research model and to find the influencing effect on the intention for the reuse of easy payment service by analysing the factors such as the social influence, the promotion condition, the security and the convenience as UTAUT model has. Also the research model employs the trust and the user satisfaction as parameters. The result shows that even though people feel the trust due to the convenience by the social influence, it has a negative influence on the user satisfaction if the risk recognized in the easy payment service and the weakness in the security are anticipated. The results of this study are academically meaningful as they established the research model for the easy payment service and the theoretical basis of the easy payment service area; they have provided the various practical implications.

Effects of Mentoring Function on Career Development and Organizational Effectiveness in Private Security Service Organization (경호경비조직의 멘토링기능이 경력개발 및 조직유효성에 미치는 영향)

  • Yoo, Young-Chang;Kim, Hyo-Joon;Kim, Chan-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.326-336
    • /
    • 2011
  • The Purpose of this study was to examine effects of mentoring function on career development and organizational effectiveness in private security service organization. Example number used on interpretation finally using purposive sampling method after this study establishes 5 places private security service company's security guard by population in Seoul on March, 2010 is total 227 people. Reliability of questionnaire appeared Cronbach's ${\alpha}$ value more than .667. Conclusions that appears in this study is as following. First, private security service organization's Mentoring function affects in career development. That is, if friendship, patronage, career management, society mind, and role model are mobilized, innovative own development, special capacity development, and information competitive power development are helped. Second, private security service organization's Mentoring function affects in organization effectiveness. If friendship, patronage, career management, society mind, and role model are mobilized, career satisfaction, organization immersion, and job satisfaction increase. On the other hand, change of jobs intention decreases if function of society mind is mobilized. Third, private security service organization's career development affects in organization effectiveness. If reform and special capacity development are helped, career satisfaction, organization immersion, and job satisfaction increase. While change of jobs intention decreases as development of information competition is helped. Fourth, Mentoring function exerts influence of causality on career development and organization effectiveness. That is, Mentoring exerts direct influence on organization effectiveness, but it exerts indirect effect through career development.

The Effect of Education Service Quality Related to Physical Security of Security Department Students on College Life Satisfaction and Academic Continuation Decision (경호학과 학생들의 물리보안 관련 교육서비스품질이 대학생활만족과 학업지속결정에 미치는 영향)

  • Ye-Jin Jang;Jeong-Il Choi
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.83-91
    • /
    • 2023
  • The purpose of this study is to verify how much the education service quality related to physical security of security department students affects college life satisfaction and academic continuation decision. To this end, a survey was conducted from April 10 to 28, 2023 targeting 200 university students receiving physical security education at the university. The survey contents were composed by dividing the variables into "first, educational service quality, second, college life satisfaction and third, academic continuation decision," and based on this, 3 research hypotheses were selected. We calculated regression analysis to examine the study model. Analysis result, among the 3 research hypotheses, "Educational service quality ⇨ College life satisfaction, College life satisfaction ⇨ Academic continuation decision" was significantly calculated and adopted, but "Education service quality ⇨ Academic continuation decision" was found to be insignificant and rejected. According to the results of a survey conducted among students, it seems that students will have the academic continuation decision only when they are college life satisfaction.