• Title/Summary/Keyword: User Control

Search Result 3,816, Processing Time 0.025 seconds

Multiple User Authentication based on SecuROS/FreeBSD (SecuROS/FreeBSD 기반 다단계 사용자 인증 시스템)

  • Doo, So-Young;Kim, Jong-Nyeo;Kong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.11-16
    • /
    • 2003
  • This paper implements Multiple User Authentication System to which the system authenticating with password only has been upgraded. The 4-staged authentication including user ID, password, smart card and access control information, etc. is used at the suggested Multiple User Authentication System. The user authentication system that this paper suggests has been developed based on SecuROS/FreeBSD with the function of access control added to FreeBSD kernel. It provides both the function to limit accost range to the system to each user and the function to check that when inputting important information the demand is the one if the system ; thus, the reliability becomes increased. In the SecuROS/FreeBSD system, MAC and RBAC are being used. So, in the case of users accessing to the system, the Information about the policies of MAC and RBAC to which users would access is used in the authentication. At the time, the access to system if permitted only when the access control information that users demanded satisfies all the access control rules which have been defined In the system.

Robust $H_{\infty}$ Power Control for CDMA Systems in User-Centric and Network-Centric Manners

  • Zhao, Nan;Wu, Zhilu;Zhao, Yaqin;Quan, Taifan
    • ETRI Journal
    • /
    • v.31 no.4
    • /
    • pp.399-407
    • /
    • 2009
  • In this paper, we present a robust $H_{\infty}$ distributed power control scheme for wireless CDMA communication systems. The proposed scheme is obtained by optimizing an objective function consisting of the user's performance degradation and the network interference, and it enables a user to address various user-centric and network-centric objectives by updating power in either a greedy or energy efficient manner. The control law is fully distributed in the sense that only its own channel variation needs to be estimated for each user. The proposed scheme is robust to channel fading due to the immediate decision of the power allocation of the next time step based on the estimations from the $H_{\infty}$ filter. Simulation results demonstrate the robustness of the scheme to the uncertainties of the channel and the excellent performance and versatility of the scheme with users adapting transmit power either in a user-centric or a network-centric efficient manner.

Variable Impedance Control and Fuzzy Inference Based Identification of User Intension for Direct Teaching of a Mobile Robot (이동로봇의 직접교시를 위한 가변 임피던스제어와 퍼지추론 기반 사용자 의도 파악)

  • Ko, Jong Hyeon;Bae, Jang Ho;Hong, Daehie
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.33 no.8
    • /
    • pp.647-654
    • /
    • 2016
  • Controlling a mobile robot using conventional control devices requires skill and experience, and is not intuitive, especially in complex environments. For human-mobile robot cooperation, the direct-teaching method with impedance control has been used most frequently in complex environments. This thesis proposes a new direct-teaching method for a mobile robot utilizing variable impedance control. This includes analysis of user intention, which is changed by force and moment. A fuzzy inference technique is proposed in this thesis for identification of user intension. The direct teaching of a mobile robot based on variable impedance control through fuzzy inference is experimentally verified by comparing its efficiency to that of the conventional impedance control-based direct teaching of a mobile robot. Experimental data, such as the total time consumed, path error time, and the total energy used by the user, were recorded. The results showed that the efficiency of variable impedance control was increased.

An Implementation Method of Improved Document DRM for Preventing Information Leakage using RBAC Approach (RBAC을 이용한 정보유출 방지를 위한 보안성이 강화된 문서 DRM 구현)

  • Choi, Young Hyun;Eom, Jung Ho;Chung, Tai Myoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.57-66
    • /
    • 2011
  • We implemented the document DRM applying role based access control(RBAC) mechanism for preventing the information leakage of a document which is transmitted in network environment. It must prevent to access document not related to user role and duty, and must allow operation to document for improving security, considering user role and security level according to a document importance. We improved the security of document DRM by adding to the access control module applying RBAC for satisfying security requirements. Though the user access document, our system allows operation authorizations to document by the user's role & security level and the security attribute of RBAC. Our system prevents indiscriminate access to the documents by user who is not associated with the role, and prevents damage the confidentiality and integrity.

The Effects of Training for Computer Skills on Outcome Expectations, Ease of Use, Self-Efficacy and Perceived Behavioral Control

  • Lee, Min-Hwa
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 1996.11a
    • /
    • pp.29-48
    • /
    • 1996
  • Previous studies on user training have largely focused on assessing models which describe the determinants of information technology usage or examined the effects of training on user satisfaction, productivity, performance, and so on. Scant research efforts have been made, however, to examine those effects of training by using theoretical models. This study presented a conceptual model to predict intention to use information technology and conducted an experiment to understand how training for computer skill acquisition affects primary variables of the model. The data were obtained from 32 student subjects of an experimental group and 31 students of a control group, and the information technology employed for this study was a university's electronic mail system. The study results revealed that attitude toward usage and perceived behavioral control helped to predict user intentions; outcome expectations were positively related to attitude toward usage; and self - efficacy and perceived behavioral control. The changes in those variables suggest more causal effects of user training than other survey studies.

  • PDF

Dynamic Access Control for Personalized Environment in Ubiquitous Computing

  • Kim, Yuna;Shin, IlShik;Hong, Sung Je;Kim, Jong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.4
    • /
    • pp.233-241
    • /
    • 2007
  • In an ubiquitous environment, for controlling user access according to environment of users, a number of access control models enforcing dynamic environment of users have been proposed. However, they do not support personalized environments of each user and have a run-time overhead of searching active roles. In this paper, we propose a new model, PE-RBAC, that extends the RBAC architecture by addition of a personalized environment component as a constraint to accommodate dynamic and mobile users. In this model, a dynamic role activation is presented by using a new role-to-environment structure instead of the conventional role hierarchy, which makes it efficient to find the active roles according to a user's personalized environment.

  • PDF

A Multi Upper Bound Access Control Model with Inheritance Attributes

  • Kim, Seok-Woo
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.6
    • /
    • pp.162-166
    • /
    • 1997
  • A message server have two basic functionalities, a server role for processing the processing the user environment as well as an entity role for transferring message to other entity in message system environment. The user who is going to send and receive his important information really wants to keep his own security requests. To satisfy this requirement, message server must be enforced by two seperated security policies- one for message processing security policy under department's computer working environment, the other for send/receive security policy under message system's communication path environment. Proposed access control model gurantees the user's security request by combining constrained server access control and message system access control with multi upper bound properties which come from inheritance attributes of originating user security contexts.

  • PDF

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.

Design of A User Microprogrammable Computer (사용자가 마이크로 프로그램을 할 수 있는 컴퓨터 설계)

  • 조정완;우남성
    • 전기의세계
    • /
    • v.26 no.1
    • /
    • pp.71-76
    • /
    • 1977
  • It has been expected that the 4th generation computers will be characterized for their problem adaptability. There are few techniques of implementing such a characteristic. One of the techniques that one have considered in this paper the user microprogrammable computer architecture. There are two different computer architectures that support user microprogramming. One uses the writeable control storage and another uses the main memory. The concept of utilizing writeable control storage for microprogramming was developed in 1950's and since then the most of the user microprogrammable computers produced belong to such category. The concept of utilizing the main memory for user microprogramming was first introduced by Thomas in 1973. This architecture has a strong advantage in the aspect of the system cost. In this paper, we have developed a user microprogrammable computer. The computer utilizes the main memory for user microprograms. It employs a 32 bit micro-instruction word in the form of the little encoded. The performance of the developed machine will be evaluated in the hard ware cost, programming easiness and the running time.

  • PDF

The Design of Intelligent Real Sound Play Flatform and Service Based-on User's Information (사용자 정보 기반 지능형 실감 사운드 재생 플랫폼 및 서비스 구현)

  • Jung, Jong-Jin;Lim, Tae-Beom;Lee, Seok-Pil
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.3
    • /
    • pp.174-182
    • /
    • 2011
  • Conventional home audio system (e.g. AV Receiver, CD Player etc) has a various functionality of audio play, channel mixing, but the remote controller of these audio players is too complex, difficult for user to manage them effectively. Users want to use these functionalities with more easy, comprehensible way. In this study, "intelligent real-sound presentation technology" that support high quality, realistic audio and the "design of complex information and controller of real sound using intelligent real sound play and control interface" will be introduced. So user can actively, realistically enjoy and play real sound based on user's preference, emotion and circumstance, instead of user's passive service.