• Title/Summary/Keyword: access

Search Result 16,565, Processing Time 0.037 seconds

A Study on Architecture of Access Control System with Enforced Security Control for Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 보안통제가 강화된 접근제어 시스템 설계에 관한 연구)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.71-81
    • /
    • 2008
  • In the paper, we designed a context aware task-role based access control system(CAT-RACS) which can control access and prevent illegal access efficiently for various information systems in ubiquitous computing environment. CAT-RACS applied CA-TRBAC, which adds context-role concept for achieve policy composition by context information and security level attribute to be kept confidentiality of information. CA-TRBAC doesn't permit access when context isn't coincident with access control conditions, or role and task's security level aren't accord with object's security level or their level is a lower level, even if user's role and task are coincident with access control conditions. It provides security services of user authentication and access control, etc. by a context-aware security manager, and provides context-aware security services and manages context information needed in security policy configuration by a context information fusion manager. Also, it manages CA-TRBAC policy, user authentication policy, and security domain management policy by a security policy manager.

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.

Study on Token based KMS for Information Sharing (정보 공유를 위한 토큰 기반 KMS 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.29-34
    • /
    • 2023
  • KMS (Knowledge Management System) is used by various organizations to share information. This KMS includes important information as well as basic information used by each organization. To protect infortant information stored in KMS, many KMS use user identification and authentication features. In such a KMS security environment, if the account information of a user who can access the KMS is leaked, a malicious attacker using the account information can access the KMS and access all authorized important information. In this study, we propose KMS with user access control function that can protect important information even if user account information is leaked. The KMS with the user access control function proposed in this study protects the stored files in the KMS by applying an encryption algorithm. Users can access important documents by using tokens after logging in. A malicious attacker without a Token cannot access important files. As a result of checking the unit function for the target user access control function for effectiveness verification, it was confirmed that the access control function to be provided by KMS is normally provided.

A Study on the Characteristics of Open Access in Korean Scholarly Journals: Focused on KCI Journals (국내 학술지의 오픈액세스 특성에 관한 연구: KCI 등재지를 대상으로)

  • Kim, Gyuhwan;Joung, Kyoung Hee
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.3
    • /
    • pp.251-267
    • /
    • 2017
  • This study aimed to analyze open access features of 1,890 Korean scientific journals registered in the Korea Citation Index (KCI). To this end, this study classified open access features of the target scientific journals into two main aspects, free access and free redistribution. The analysis results indicated that the target scientific journals had strong free access aspects. Based on websites, 67% of the target scientific journals allowed for free access without a login process and based on free database, 48% provided free access. On the other hand, the target scientific journals had weaker free redistribution aspects compared to their free access aspects. Only 14% of them offered the CC (creative commons) license. Another finding was that there were clear differences in open access aspects by academic field. Medicine, pharmacy, natural science, agriculture, fisheries, oceanography, and engineering had stronger open access aspects than humanities, sociology, arts, physical education, and interdisciplinary science. It appears that the difference was caused by the presence or absence of organizations supporting distribution of scientific journals of the fields concerned. To narrow the gap, it is recommended that the open access governance system is established to set up open access policies for Korean scientific journals regardless of academic fields and to support them.

A Study on A Model Sample for Guidance System for Copyright of Domestic Journals and Open Access Policy (국내 학술지 저작권 및 오픈액세스 정책 안내시스템 모형 연구)

  • Kim, Gyuhwan
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.4
    • /
    • pp.265-288
    • /
    • 2016
  • The study aimed to suggest a model sample for guidance system for copyright of domestic journals and open access policy. Toward this end, analyses were conducted to examine copyright of domestic journals and open access environment. As a result of analyses, it turned out that 33.8% of domestic journals had 'regulations on ownership of rights to papers published in journals,' and that the subject to ownership of rights to papers published in domestic journals accounted for 28.8%, which was the highest rate. Of domestic journals, 34% charged a subscription fee, and they were toll access journals, and 56% were free access journals. As for system examples of guide system for copyright of foreign journals and open access policy, analyses were conducted to examine and investigate SHERPA/RoMEO in the U.K. and SCPJ in Japan and generate considerations at a time of domestic application. What needs to be taken into account is that overseas examples are focused on collecting and introducing self-archiving policy by authors for academic journals, so there are limitations in offering information including open access publication policy for domestic journals. Based on the analytical result, the study designated the purpose, direction and four steps that need to be considered at a time of development of guide system models for copyright and open access policy for domestic journals before suggestion of the basic direction and operational methods by stage.

The Design and Implementation of Access Control framework for Collaborative System (협력시스템에서의 접근제어 프레임워크 설계 및 구현)

  • 정연일;이승룡
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.10C
    • /
    • pp.1015-1026
    • /
    • 2002
  • As per increasing research interest in the field of collaborative computing in recent year, the importance of security issues on that area is also incrementally growing. Generally, the persistency of collaborative system is facilitated with conventional authentication and cryptography schemes. It is however, hard to meet the access control requirements of distributed collaborative computing environments by means of merely apply the existing access control mechanisms. The distributed collaborative system must consider the network openness, and various type of subjects and objects while, the existing access control schemes consider only some of the access control elements such as identity, rule, and role. However, this may cause the state of security level alteration phenomenon. In order to handle proper access control in collaborative system, various types of access control elements such as identity, role, group, degree of security, degree of integrity, and permission should be taken into account. Futhermore, if we simply define all the necessary access control elements to implement access control algorithm, then collaborative system consequently should consider too many available objects which in consequence, may lead drastic degradation of system performance. In order to improve the state problems, we propose a novel access control framework that is suitable for the distributed collaborative computing environments. The proposed scheme defines several different types of object elements for the accessed objects and subjects, and use them to implement access control which allows us to guarantee more solid access control. Futhermore, the objects are distinguished by three categories based on the characteristics of the object elements, and the proposed algorithm is implemented by the classified objects which lead to improve the systems' performance. Also, the proposed method can support scalability compared to the conventional one. Our simulation study shows that the performance results are almost similar to the two cases; one for the collaborative system has the proposed access control scheme, and the other for it has not.

Improvement of Access Control at Partially Grade-Separated Intersection (단순입체교차 도로의 진출입로 설치 금지구간 개선방안)

  • Kim, Young-Jin;Kim, Jin-Uk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.725-733
    • /
    • 2018
  • With urbanization projects involving trunk roads progressing, many simple interchanges, which separate passing traffic into the main traffic and access subtraffic, are being constructed to maximize the traffic capacity. Under the current Road Connection Rule, the access-prohibited section in an interchange is determined based on the access lane and limit distance in the complete interchange road, but separate criteria for the simple interchange are not defined. This may cause confusion in the Road Management Office's determination of the access-prohibited section in the simple interchange, or lead to the application of the criteria for the access-prohibited section in the complete interchange without considering the features of such interchange. This study conducted a comparative analysis of the domestic and overseas systems related to the installation of access section in trunk roads, such as general national roads. This paper presents a survey of the methods for applying the access-prohibited section in the interchange along with the actual cases and proposes improvement measures for a rational calculation of the access prohibited installation section in the simple interchange to minimize the downsides associated with the application of the extremely strict criteria. The proposed road connection rule improvement measures based on the consideration of the purpose of installing the simple interchange and on the consideration the features of the simple interchange are expected to prevent administration confusion by the field road management offices as well as the waste of unnecessary efforts and costs by petitioners so they can boost the service satisfaction for people and the administrative reliability.

A Study on Methods of Implementation for the NRF Open Access Policy (한국연구재단 오픈액세스 정책 실행방안 연구)

  • Joung, KyoungHee;Lee, Jae Yun;Chung, EunKyung;Choi, Sanghee
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.255-286
    • /
    • 2020
  • This study aims to identify the methods of implementation for the 'National Research Foundation of Korea Open Access 2021(Plan)'. This study covers the methods of implementation in the three following core items: 1) developing the details on the amount, method, and procedures of APC support; 2) proposing methods for facilitating the transition of domestic Korean academic journals to open access journals; and 3) developing methods of entrusting papers to open access repositories. APC support should be guaranteed at a reasonable level. The average or median of APC values for the previous three years will be applied to set the upper limit for support each year. APC support will be provided when the paper is published to open access journals or transitioning journals to open access. Hybrid journals or dual access journals are not included. Support for open access publishing of academic journals in Korea during the transition period will be available for open access journals that have registered for CCL in KJCI or journals that have submitted their application for transitioning to open access. Publishing in hybrid, dual access or subscription-based journals must be accompanied by items related to copyright such as embargo. Research results will be used for the detailed implementation plan of 'NRF OA2021 (Plan)'. They will serve as the base data for the rapid, stable, and sustainable implementation of open access policy in NRF, addressing the Korean domestic academic journal publishing environment and the field of international academic communication.

The Development of the Automatic Computation Module for Optimum Stories of Apartment Buildings to Assure the Solar Access Right for Neighboring Areas (인근지역 일조권 확보를 위한 공동주택 층계획 자동화 모듈 개발에 관한 연구)

  • Seong, Yoon-Bok;Yeo, Myoung-Souk;Kim, Kwang-Woo
    • Journal of the Korean Solar Energy Society
    • /
    • v.25 no.1
    • /
    • pp.65-78
    • /
    • 2005
  • The objective of this paper is to develop a automatic computation module for optimum stories in apartment buildings in order to assure the solar access right for neighboring areas. Compared to the existing solar access right analysis programs, the proposed solar access right analysis program is more improved and expanded by automating the computing process of optimum stories in apartment buildings. With the result of this research, it would be possible to furnish advanced information for an amicable settlement against the civil petition and disputes, to reduce waste of the time and money, and to improve the efficiency of solar access right analysis works.

Access Control of Wireless LAN Access Point Based on IEEE 802.1X (IEEE 802.1X에 따른 무선랜 Access Point 접속 인증 시스템 개발)

  • 오경희;양대헌;강유성;함영환;정병호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.157-160
    • /
    • 2002
  • IEEE 802.11 규격에 따른 무선랜은 사설망에서 사용됨은 물론, 공중망 사업자들에 의한 핫스팟 서비스까지 제공되면서 수요가 더욱 늘어나고 있다. 사용자가 늘어남에 따라, 이에 대한 보안의 중요성 또한 늘어났다. IEEE 802.1X는 랜 접속 서비스를 받고자 하는 시스템이 인증을 거쳐 랜을 사용할 수 있도록 함으로써, 허가 받지 않은 사용자가 무단으로 사용하거나 도청하는 것을 어렵게 한다. 기존의 Linux 용 access point 디바이스드라이버에 802.1X 가상 포트를 추가하고, 이를 제어하는 가상 포트 제어기를 통하여, 사용자 인증 기능이 추가된 access point를 설계, 개발하였다. 개발된 시스템은 embedded Linux 형태의 access point고 사용되어 질 수 있다.

  • PDF