• Title/Summary/Keyword: access management

Search Result 3,316, Processing Time 0.034 seconds

The Design of a Multimedia Data Management and Monitoring System for using License Agent (라이센스 에이젼트를 이용한 멀티미디어 데이터관리 및 감시 시스템 설계)

  • Cho, Hyun-Seob;Ryu, In-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.1662-1664
    • /
    • 2007
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

Application Design and Execution Framework in Role-Based Access Control Systems (역할기반 접근통제 시스템에서 응용 프로그램의 설계 및 시행지원 프레임워크)

  • Lee, Hyeong-Hyo;Choe, Eun-Bok;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3020-3033
    • /
    • 1999
  • Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RBAC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is needed that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

  • PDF

A Research on Analyzing Current Status and Ways to Improve Access Transportation to Incheon International Airport (인천국제공항 접근교통시설의 현황분석 및 개선방안에 관한 연구)

  • Suh, Yang Hwan;Kim, Kyong Sook;Han, Soon Wook;Yoon, Sung Hyun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.20 no.4
    • /
    • pp.106-114
    • /
    • 2012
  • As Incheon International Airport(IIA) is located in an island 50-km away from Seoul, various travel equipments for access are required. So far two connecting bridges are constructed funded by civilian funds. For the further bridge construction, the reduction of forecast traffic amount and the government subsidy for the civilian funds are big issues. Comparing the access traffics of IIA to those other competing airports, traffic conditions inside the airport are superior to other competing airports from the management point of view, as utilization conditions and equipment capacities are periodically monitored and evaluated to set up comprehensive countermeasures following constructing by stages. However, while the accessability to IIA is very important, as IIA is built on an island the conflicts between near-by developers and traffic facility operators make further bridge construction difficult. As improving the accessibility to an airport is not easy to achieve only by the IIA management's efforts, the central government level authorities should organize a committee with agencies concerned and analyze the characteristics of access traffic periodically to suggest reform measures for each organization concerned to implement appropriate undertakings at apt timing. For the future, central government's level empirical research on the airport accessibility for synthetic and systematic plan set-up is expected.

The Design and Implementation of Intruder Access Control System by based of Ubiquitous Sensor Network (USN기반의 외부인 출입감시시스템 설계 및 구현)

  • Lee, Kyu-Su;Sim, Hyeon;Oh, Jai-Cheol
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1165-1171
    • /
    • 2012
  • Latest, it is dealt with seriously problems that an intruder kidnapping students in elementary school. Especially young students is more vulnerable in these risks. Elementary School has many limitations in controlling the intrusion of trespassers. A problem occurs that requires a lot of manpower through the deployment and management of security systems such as CCTV and control systems. In this paper, we is designed and implemented the outsider access management system using a sensor network and PZT camera called the USN's core technology to monitoring the access control for controlling the mobility of the trespassers.

An Integrated Management Model of Administrative Role-Based Access Control and Delegation Policy (ARBAC과 위임 정책의 통합 관리 모델)

  • Oh, Se-Jong;Kim, Woo-Sung
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.177-182
    • /
    • 2004
  • Delegation is one of important security policies in the access control area. We propose a management model of delegation integrated with ARBAC model for environment of distributed access control. We Integrate PBDM delegation model with ARBAC97 model, and suggest integrity rules of delegation for preventing security threats in new model. Our model supports both free delegation for users without intervention of administrators, and controlling delegation for security administrators.

The Determinants of Distribution of Credit: Evidence from Vietnam

  • TRAN, Anh Thi;NGUYEN, Tue Dang;PHAM, Giang Hoang
    • Journal of Distribution Science
    • /
    • v.18 no.6
    • /
    • pp.47-55
    • /
    • 2020
  • Purpose: The issue of access to credit for private enterprises has been given an increased amount of attention given their crucial role in fueling economic growth. Vietnamese small and medium-sized businesses, however, face many obstacles in accessing financing for profitable investment opportunities, with up to 70% unable to access or obtain bank loans. This paper aims to address the factors affecting the credit accessibility of Vietnamese enterprises, and provide further insights of this issue under the new context of Basel II. Research design, data and methodology: We adopt a pooled sections approach to construct a sample of 155 firm observations before and after the implementation of Basel II accord in Vietnam and employing binary logistic regression and interaction terms for data analysis. Results: We find that firm characteristics (export participation, female ownership) and proxies for bank-borrower relationship (deposit, overdraft facility) have significant and positive effects on firm's access to credit. Notably, the sign of interaction coefficient shows that the implementation of Basel II tends to benefit small-sized firms in terms of credit accessibility. Conclusions: The finding further emphasizes the important role of relationship lending in Vietnam's credit market, which is even more critical for small firms when Basel II is universally applied as the new banking standards in the coming years.

User Authentication Technology using Multiple SSO in the Cloud Computing Environment

  • Cho, Min-Hee;Jang, Eun-Gyeom;Choi, Yong-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.4
    • /
    • pp.31-38
    • /
    • 2016
  • The interface between servers and clients and system management in the cloud computing environment is different from the existing computing environment. The technology for information protection. Management and user authentication has become an important issue. For providing a more convenient service to users, SSO technology is applied to this cloud computing service. In the SSO service environment, system access using a single key facilitates access to several servers at the same time. This SSO authentication service technology is vulnerable to security of several systems, once the key is exposed. In this paper, we propose a technology to solve problems, which might be caused by single key authentication in SSO-based cloud computing access. This is a distributed agent authentication technology using a multiple SSO agent to reinforce user authentication using a single key in the SSO service environment. For user authentication reinforcement, phased access is applied and trackable log information is used when there is a security problem in system to provide a safe cloud computing service.

A New Optimization Model for Designing Broadband Convergence Network Access Networks

  • Lee Young-Ho;Jung Jin-Mo;Kim Young-Jin;Lee Sun-Suk;Park No-Ik;Kang Kuk-Chang
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.05a
    • /
    • pp.1616-1640
    • /
    • 2006
  • In this paper, we deal with a network optimization problem arising from the deployment of Ethernet-based BcN access network. BcN convergence services require that access networks satisfy QoS measures. BcN services have two types of traffics: stream traffic and elastic traffic. Stream traffic uses blocking probability as a QoS measure, while elastic traffic uses delay factor as a QoS measure. Incorporating the QoS requirements, we formulate the problem as a nonlinear mixed-integer programming model. The proposed model seeks to find a minimum cost dimensioning solution, while satisfying the QoS requirement. We propose tabu search heuristic algorithms for solving the problem, and simulate tabu result. We demonstrate the computational efficacy of the proposed algorithm by solving a network design problem.

  • PDF

Design and Implementation of Multi-mode Mobile Device for supporting License Shared Access (면허기반 주파수 공동 사용을 위한 멀티모드 단말기 설계 및 구현)

  • Jin, Yong;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.81-87
    • /
    • 2016
  • Recently, as the heterogeneous network (HetNet) has been deployed widely to support various kinds of Radio Access Networks(RANs) with a combination of Macro, Pico, and/or Femto cells, research and standardization efforts have been very active regarding the concept of Licensed Shared Access (LSA) for supporting spectrum sharing. In order for a mobile device to efficiently support the spectrum sharing, the mobile device shall be reconfigurable, meaning that its radio application code has to be adaptively changed in accordance with the hopping of desired spectral band. Especially, Working Group 2 (WG2) of Technical Committee (TC) Reconfigurable Radio System (RRS) of European Telecommunications Standards Institute (ETSI) has been a main driving force for developing standard architecture for Multi-mode Mobile Device (MD) that can be applied to the LSA system. In this paper, we introduce the Multi-mode MD architecture for supporting LSA-based spectrum sharing. An implementation of a test-bed of Multi-mode MD is presented in order to verify the feasibility of the standard MD architecture for the purpose of LSA-based spectrum sharing through various experimental tests.