• Title/Summary/Keyword: access management

Search Result 3,316, Processing Time 0.037 seconds

A Study on the Methods to Manage Private Records Utilizing AtoM (Access to Memory): Focused on 'Archive Village' (AtoM을 활용한 민간기록물 관리방안 -'기록사랑마을' 중심으로-)

  • Yuk, Hye-In;Kim, Yong;Jang, Jun-Kab
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.2
    • /
    • pp.79-105
    • /
    • 2015
  • This study aims to propose management plans for 'Archive Village' that are operating in order to protect important private records and archives. Since 2008, Archive Villages from National Archives of Korea have had nearly 3,000 more records by 2014. However, many users have had difficulties to know the status of the recorded material, even less access to record's informations. This problem arising is that it is difficult to manage and use records. The purpose of this study is to propose a plan for the management of records, which is to realize the 'Computerization of records' official opinion, one of which was raised in the previous study. Because the project is facing the issue of 'human resources and costs', 'the burden of system construction'. This study is implemented records management system considering the problems noted above, utilizing AtoM (Access to Memory).

Advanced Resource Management with Access Control for Multitenant Hadoop

  • Won, Heesun;Nguyen, Minh Chau;Gil, Myeong-Seon;Moon, Yang-Sae
    • Journal of Communications and Networks
    • /
    • v.17 no.6
    • /
    • pp.592-601
    • /
    • 2015
  • Multitenancy has gained growing importance with the development and evolution of cloud computing technology. In a multitenant environment, multiple tenants with different demands can share a variety of computing resources (e.g., CPU, memory, storage, network, and data) within a single system, while each tenant remains logically isolated. This useful multitenancy concept offers highly efficient, and cost-effective systems without wasting computing resources to enterprises requiring similar environments for data processing and management. In this paper, we propose a novel approach supporting multitenancy features for Apache Hadoop, a large scale distributed system commonly used for processing big data. We first analyze the Hadoop framework focusing on "yet another resource negotiator (YARN)", which is responsible for managing resources, application runtime, and access control in the latest version of Hadoop. We then define the problems for supporting multitenancy and formally derive the requirements to solve these problems. Based on these requirements, we design the details of multitenant Hadoop. We also present experimental results to validate the data access control and to evaluate the performance enhancement of multitenant Hadoop.

A Recording of the Transition Process to the Open Access Publishing in JKSARM (한국기록관리학회지의 오픈액세스 출판 전환 과정 기록)

  • Joung, Kyoung Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.20 no.4
    • /
    • pp.205-227
    • /
    • 2020
  • This paper is a record of the transitioning of the Journal of Korean Society of Archives and Records Management to open access. To understand this process, this paper explains the meaning of the conflict over the copyright among commercial journal aggregators, scholarly societies and public sector aggregators. In addition, this paper explains the declarations for open access transition in scholarly societies in the fields of library and information science and other humanities & social sciences in Korea. This paper records the practices and problems that the scholarly society as a publisher has faced in related to securing the journal publication cost, expanding the channels of distribution, and reforming the regulation of the journal. This paper also attempts to understand this transition process as making a knowledge commons.

Key Management Server Design for Providing Cryptographic Service in Cloud Computing Environment (Services in a Cloud Environment)

  • Jung, Ki Hyun;Shin, Seung Jung
    • International journal of advanced smart convergence
    • /
    • v.5 no.4
    • /
    • pp.26-31
    • /
    • 2016
  • In a cloud computing environment, a cryptographic service allows an information owner to encrypt the information and send it to a cloud server as well as to receive and decode encrypted data from the server which guarantees the confidentiality of shared information. However, if an attacker gains a coded data and has access to an encryption key via cloud server, then the server will be unable to prevent data leaks by a cloud service provider. In this paper, we proposed a key management server which does not allow an attacker to access to a coded key of the owners and prevents data leaks by a cloud service provider. A key management server provides a service where a server receives a coded public key of an information user from an owner and delivers a coded key to a user. Using a key management server proposed in this paper, we validated that the server can secure the confidentiality of an encryption key of data owners and efficiently distribute keys to data users.

Identify Management System with improved security based working time supervising (근태관리 중심으로 보안성을 향상시킨 2-Factor 인증 계정관리시스템)

  • Choi, Kyong-Ho;Kim, Jongmin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.71-76
    • /
    • 2017
  • Today, it is an information society where a large number of users access and view important data in a large number of information assets as needed. In this complexity, techniques related Identify Management are being applied, in order to verify authorized user access to important information assets and manage of history. But, the ability access to sensitive information using account has the disadvantage of being able to open the way for information to the attacker when it is hijacked. Thus, in this paper, we propose a secure Identify Management System that can control the use of accounts based on the attitude of the account holder, but also enhances the security and does not hinder the convenience.

Record Management of Scientific Research Institutes: The Access and Use of Research Records at KARI (과학기술분야 연구기관의 기록관리: 한국항공우주연구원 연구기록의 공개와 활용방안 모색)

  • Kim, Seul-gi;Yeon, Ji-hyun
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.20 no.1
    • /
    • pp.201-205
    • /
    • 2020
  • Established in 1989, Korea Aerospace Research Institute is a national research institute that is highly sensitive about the security management of research records given the nature of the research areas. As a result, procedures for security and confidential records are already well established. On the contrary, there has not been enough discussion about the release or use of records. This page introduces some examples such as the access re-review and archives exhibition, and how institutions' perceptions of records management have changed.

Cloud Radio Access Network: Virtualizing Wireless Access for Dense Heterogeneous Systems

  • Simeone, Osvaldo;Maeder, Andreas;Peng, Mugen;Sahin, Onur;Yu, Wei
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.135-149
    • /
    • 2016
  • Cloud radio access network (C-RAN) refers to the virtualization of base station functionalities by means of cloud computing. This results in a novel cellular architecture in which low-cost wireless access points, known as radio units or remote radio heads, are centrally managed by a reconfigurable centralized "cloud", or central, unit. C-RAN allows operators to reduce the capital and operating expenses needed to deploy and maintain dense heterogeneous networks. This critical advantage, along with spectral efficiency, statistical multiplexing and load balancing gains, make C-RAN well positioned to be one of the key technologies in the development of 5G systems. In this paper, a succinct overview is presented regarding the state of the art on the research on C-RAN with emphasis on fronthaul compression, baseband processing, medium access control, resource allocation, system-level considerations and standardization efforts.

Implementation of bluetooth LAN Access Point for the wireless Local access (근거리 무선 제어를 위한 Bluetooth LAN Access Point 구현)

  • Lee, Byeong-Woong;Oh, Won-Geun;Yoe, Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.5
    • /
    • pp.676-683
    • /
    • 2002
  • In this paper, LAN Access Point is realized by making out bluetooth protocol stack in Linux Kernel, porting Linux in an embeded system employed bluetooth module. Hardware for a general-purpose embeded system is designed and Linux Kernel is ported after deploying Bluetooth Module. Also, Boot loader for system booting and management is composed, and Kernel is modified to meet with the system. Finally, Ethernet devise driver is made out, and bluetooth protocol Stack and Lan Access Point are realized. The possibility of TCP/IP communication through LAN Access Point to PC employed Bluetooth module, which is considered as client, is evaluated. From the evaluation results, we can see that the performance in Telnet FTP, Web browsing through Bluetooth LAN Access Point is satisfactory.

Analysis of a Decentralized Mobility Management Support for u-City Wireless Network Infrastructure

  • Caytiles, Ronnie D.;Park, Byungjoo
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.73-81
    • /
    • 2020
  • The number of mobile devices roaming into a ubiquitous city (u-city) continues to rise as wireless systems have been widely deployed. The number of mobile devices also varies with time, and they tend to frequently change their locations. In addition, the available wireless access networks may belong to different domains, administrations, management, and internet service providers (ISPs). A fusion of overlapping heterogeneous wireless access networks (e.g., WiMax, Wi-Fi, LTE, etc.) serves the u-city in order to reach different coverage. In this context, technical challenges arise in mobility management for heterogeneous networks to realize their potential coverage and capacity benefits. This paper deals with the analysis of a decentralized mobility management support for u-City wireless network infrastructure. This scheme takes advantage of the features of the fully-distributed model of networked-based mobility management protocol to alleviate and realize the ubiquitous requirements of a u-City.

IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment (Inter-Cloud 환경에서의 IAM 구조 및 액세스 토큰 전송 프로토콜)

  • Kim, Jinouk;Park, Jungsoo;Yoon, Kwonjin;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.573-586
    • /
    • 2016
  • With the adoption of cloud computing, the number of companies that take advantage of cloud computing has increased. Additionally, various of existing service providers have moved their service onto the cloud and provided user with various cloud-based service. The management of user authentication and authorization in cloud-based service technology has become an important issue. This paper introduce a new technique for providing authentication and authorization with other inter-cloud IAM (Identity and Access Management). It is an essential and easy method for data sharing and communication between other cloud users. The proposed system uses the credentials of a user that has already joined an organization who would like to use other cloud services. When users of a cloud provider try to obtain access to the data of another cloud provider, part of credentials from IAM server will be forwarded to the cloud provider. Before the transaction, Access Agreement must be set for granting access to the resource of other Organization. a user can access the resource of other organization based on the control access configuration of the system. Using the above method, we could provide an effective and secure authentication system on the cloud.