• Title/Summary/Keyword: access management

Search Result 3,316, Processing Time 0.034 seconds

Considering Read and Write Characteristics of Page Access Separately for Efficient Memory Management

  • Hyokyung Bahn
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.70-75
    • /
    • 2023
  • With the recent proliferation of memory-intensive workloads such as deep learning, analyzing memory access characteristics for efficient memory management is becoming increasingly important. Since read and write operations in memory access have different characteristics, an efficient memory management policy should take into accountthe characteristics of thesetwo operationsseparately. Although some previous studies have considered the different characteristics of reads and writes, they require a modified hardware architecture supporting read bits and write bits. Unlike previous approaches, we propose a software-based management policy under the existing memory architecture for considering read/write characteristics. The proposed policy logically partitions memory space into the read/write area and the write area by making use of reference bits and dirty bits provided in modern paging systems. Simulation experiments with memory access traces show that our approach performs better than the CLOCK algorithm by 23% on average, and the effect is similar to the previous policy with hardware support.

A Suggestion for the activation of Open Access Scholarly Communication in Domestic Libraries (국내 도서관에서의 자유이용(Open Access) 학술 커뮤니케이션 활성화 방안)

  • Hwang, Ok-Gyung
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.2 s.56
    • /
    • pp.253-273
    • /
    • 2005
  • The study investigated the 7 problems of journal publishing based scholarly communication and suggested that the open access scholarly communication could be an alternative to that scholarly communication. To understand the status of open access scholarly communication in Korea, the study investigated open access journal or archive, open access license and softwares in Korea, and suggested the expected role of library to be the herb in scholarly communication.

Smart Healthcare Access Management System using Iris Recognition (홍채인식을 이용한 스마트 헬스케어 출입관리 시스템)

  • Kwan-Hee Lee;Ji-In Kim;Goo-Rak Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.5
    • /
    • pp.971-980
    • /
    • 2023
  • Safety accidents and industrial accidents are constantly occurring in existing industrial sites. In addition, the probability of accidents occurring due to physical and mental fatigue of workers is increasing. Accordingly, it is required to introduce systematic management and various systems for the safety of workers. In this paper, by developing an access control system using bio-metric information at industrial sites, we develop efficient health management and access control management functions for workers. Workers are identified through face recognition for access control, and health status is determined through iris recognition. It aims to improve accuracy and develop a more efficient management system by diagnosing signs of health abnormalities through the congestion of the iris and eyes of workers. Finally, the contents of the development consist of an on-site access control system, an access control program for administrators, and a main server system that diagnoses signs of abnormal health of users.

An Analysis of Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting (안전한 브로드 캐스팅을 위한 Time-Bound Hierarchical Key Management 스킴 비교 분석)

  • Kim, Hyun-Cheol;Goo, Woo-Guen;Lee, Jun-Ho;Lee, Dong-Hoon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.556-558
    • /
    • 2008
  • Secure broadcasting is requirement for payment of TV systems, government or company. Hierarchical key management for access control provides efficient key management in those environment. Also, time-bound hierarchical key management technique generates different keys in each time period. In 2004, Tzeng proposed a time-bound cryptgraphic key assignment scheme for access control in a hierarchy and in 2008, Bertino et al proposed an efficient time-bound hierarchical key management scheme for secure broadcasting. Tzeng's scheme and Bertino et al's scheme are organized in different environment and primitive. In this paper, we analysis above two time-bound hierarchical key management scheme.

  • PDF

분산 데이타베이스에서의 동적 화일배정에 관한 연구

  • 황영헌;김대환;김영호;강석호
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.10a
    • /
    • pp.275-278
    • /
    • 1996
  • We propose dynamic file allocation method in distributed database management system with changing access patterns. There are a lot of studies on file allocation problem in D-DBMS, and those studies deal with off-line analysis and optimization. Those works are well for systems with static database access patterns, but are inadequate for systems that have changing access patterns. In these systems, dynamic file allocation along with access pattern is more proper. In advance, Brunstrom et al. studied on this area, but they dealt a extremely simplified model. So, we make more practical models to simulate real system. In these models, many factors that were disregard in the advance study are considered. These models are composed with the non-replication system and the replication system. In addition to, we deal with CPU workload balancing in such system in order to improve performance of systems. Our methodology is very simple and realistic, therefore we think that it will give a lot of improvement in D-DBMS with changing access pattern.

  • PDF

An Access Control Based Privacy Protection Model in ID Management System (ID관리시스템의 접근통제기반 프라이버시 보안모델)

  • Choi Hyang-Chang;Noh Bong-Nam;Lee Hyung-Hyo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.1-16
    • /
    • 2006
  • The vulnerability of privacy in the Identity Management System (IMS) is the most pressing concern of ordinary users. Uncertainty about privacy keeps many users away from utilization of IMS. Therefore, this paper proposes an access-control oriented privacy model for IMS. The proposed model protects privacy using access control techniques with privacy policies in a single circle of trust. We address characteristics of the components of for the proposed model and describe access control procedures. After that, we show the architecture of privacy enforcement and XML-based schema for privacy policies.

  • PDF

Design and Implementation of Access Structure-based Contents Management System (CMS(Contents Management System)의 Access Structure에 관한 설계 및 구현)

  • 문남미;유소연
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05c
    • /
    • pp.133-137
    • /
    • 2002
  • 대량의 컨텐츠에 대한 정보 관리 및 잦은 사이트 변화에 따른 퍼블리케이션의 용이성으로 CMS(Contents Management System)의 도입이 많이 이루어지고 있다. 본 논문에서는 CMS의 백앤드와 프론트 엔드를 연결하는 Access Structure 에 관해 고찰해보고, 이를 통해 시스템의 컨텐츠 검색을 효율적으로 지원할 수 있는 방안과 카테고리 수의 무분별한 증가를 막고자 하며, 퍼블리케이션에서의 확장된 아키텍쳐를 지원하기 위한 모델을 제안하고자 한다.

  • PDF

Mobile Access Network Design (이동통신 액세스망 설계)

  • Kim, Hu-Gon;Paik, Chun-Hyun;Kwon, Jun-Hyuk;Chung, Yong-Joo
    • Korean Management Science Review
    • /
    • v.24 no.2
    • /
    • pp.127-142
    • /
    • 2007
  • This study deals with the optimal design of mobile access network connecting base stations(BSs) and mobile switching centers(MSCs). Generally mobile operators constitute their access networks by leasing communication lines. Using the characteristic of leased line rate based on administration region, we build an optimization model for mobile access network design which has much smaller number of variables than the existing researches. And we develop a GUI based optimization tool integrating the well-known softwares such as MS EXCEL. MS VisualBasic, MS PowerPoint and Ip_solve, a freeware optimization software. Employing the current access network configuration of a Korean mobile carrier, this study using the optimization tool obtain an optimal solution for both single MSC access network and nation-wide access network. Each optimal access network achieves 7.45% and 9.49% save of lease rate, respectively. Considering the monthly charge and total amount of lease line rate, our optimization tool provides big amount of save in network operation cost. Besides the graphical representation of access networks makes the operator easily understand and compare current and optimal access networks.

Access Control Method and Key Management Method for H.264/SVC (H.264/SVC에 대한 접근 제어 방법 및 키 관리 방법)

  • Cho, Tae-Nam;Yong, Seung-Lim
    • The KIPS Transactions:PartC
    • /
    • v.17C no.5
    • /
    • pp.415-426
    • /
    • 2010
  • CAS is an access control system by which only legal users can access contents. IPTV is a spotlighted system that uses CAS. H.264/SVC is a coding standard that provides a scalable coding method by which users who are in various network environments and have various devices can receive the contents. In this method, the contents are coded in a layered structure to make users choose the quality of the receiving contents. Therefore, contents provider should be able to control users to access only appropriate contents according to their subscriptions. The structure of CAS being employed in many applications is not suitable to control access for H.264/SVC. In this paper, we provide an efficient access control method and a key management method for H.264/SVC contents using CAS.

Key Generation and Management Scheme for Efficient Interoperability among Different Downloadable Conditional Access Systems (서로 다른 DCAS 간 효율적 상호운용을 위한 키 생성 및 관리 기법)

  • Lee, Hoonjung;Eun, Hasoo;Oh, Heekuck
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.2
    • /
    • pp.75-82
    • /
    • 2013
  • CAS (Conditional Access System) is a content protection solution that restricts access to the system according to user's standing and only authorized users can access the content in a pay-TV system. DCAS (Downloadable Conditional Access System) can download CAS client which is a software implemented via network. In recent years, research and development has been carried out on DCAS to solve the problems of compatibility among heterogeneous devices and internetworking with other services. In this paper, we propose key generation and management scheme for efficient interoperability among different DCASs based on PBC (Pairing Based Cryptography).