• Title/Summary/Keyword: access management

Search Result 3,330, Processing Time 0.029 seconds

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.

Access Control of Pay TV Program in Digital Satellite Broadcasting System (디지털 위성방송 시스템에서 유료 TV방송 프로그램 접근제어)

  • Park, Jeong-Hyun;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3123-3132
    • /
    • 1997
  • In this paper, we describe access control system for protection of pay TV program in digital DBS(Direct Broadcast satellite) system. We also propose a possible access control system and operation scenario for scrambling and descrambling which are important in access control system. Transport stream structure and option, entitlement checking message and entitlement management message for access control on digital broadcasting system are described in this paper. Especially, the authentication based on Flat-Shamir and Gulllou-Quisquater schemes required for verification of proper subscriber as access control is oriented to smart card number and subscriber ID(Identity). It has less restriction than scheme oriented to descrambler number.

  • PDF

An Entity Attribute-Based Access Control Model in Cloud Environment (클라우드 환경에서 개체 속성 기반 접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.32-39
    • /
    • 2020
  • In the large-scale infrastructure of cloud environment, illegal access rights are frequently caused by sharing applications and devices, so in order to actively respond to such attacks, a strengthened access control system is required to prepare for each situation. We proposed an entity attribute-based access control(EABAC) model based on security level and relation concept. This model has enhanced access control characteristics that give integrity and confidentiality to subjects and objects, and can provide different services to the same role. It has flexibility in authority management by assigning roles and rights to contexts, which are relations and context related to services. In addition, we have shown application cases of this model in multi service environment such as university.

New Trend of Scholarly Communication : Open Access (학술 커뮤니케이션의 새로운 동향 : 자유이용을 중심으로)

  • Lee, Too-Young;Hwang, Ok-Gyung
    • Journal of Information Management
    • /
    • v.34 no.2
    • /
    • pp.1-23
    • /
    • 2003
  • The serials pricing and licensing crises have caused the problem of limited access to scholarly information and the problem of its preservation. To cope with these crises, various types of scholarly communication models are under study now. Open Access is one of the possible solutions among these new trials. This study has investigated the history of Open Access, articulated the first considerations for the spread of Open Access, and proposed the role of librarians during the progress.

Dynamic Data Migration in Hybrid Main Memories for In-Memory Big Data Storage

  • Mai, Hai Thanh;Park, Kyoung Hyun;Lee, Hun Soon;Kim, Chang Soo;Lee, Miyoung;Hur, Sung Jin
    • ETRI Journal
    • /
    • v.36 no.6
    • /
    • pp.988-998
    • /
    • 2014
  • For memory-based big data storage, using hybrid memories consisting of both dynamic random-access memory (DRAM) and non-volatile random-access memories (NVRAMs) is a promising approach. DRAM supports low access time but consumes much energy, whereas NVRAMs have high access time but do not need energy to retain data. In this paper, we propose a new data migration method that can dynamically move data pages into the most appropriate memories to exploit their strengths and alleviate their weaknesses. We predict the access frequency values of the data pages and then measure comprehensively the gains and costs of each placement choice based on these predicted values. Next, we compute the potential benefits of all choices for each candidate page to make page migration decisions. Extensive experiments show that our method improves over the existing ones the access response time by as much as a factor of four, with similar rates of energy consumption.

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

Design and Implementation of Unified Network Security System support for Traffic Management (종단간 트래픽 관리를 지원하는 통합 네트워크 보안시스템 설계 및 구현)

  • Hwang, Ho-Young;Kim, Seung-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.267-273
    • /
    • 2011
  • The importance of networking capability is gaining more weight for enterprise business and high-speed Internet access with guaranteed security management is essential to companies. This paper presents a unified network security management solution to support high-speed Internet access, active security management, traffic classification and control. The presented system provides firewall, VPN, intrusion detection, contents filtering, traffic management, QoS management, and history log functions in unified manner implemented in a single appliance device located at the edge of enterprise networks. This will enable cost effective unified network security solution to companies.

Development of Wireless Communication System and Application Program for Realtime Schedule Management at Construction Site (건설현장 실시간 공정관리를 위한 무선통신시스템 구축 및 응용프로그램 개발)

  • 진교홍;이혜원;김지홍
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.1
    • /
    • pp.192-199
    • /
    • 2004
  • As the construction site becomes larger, more complex and more special, the information of construction is expanded in quantity and specialized in quality. Therefore the computing system is necessary to effectively manage the construction schedule management. At present, main office at construction site bring in the computing system to perform the schedule management, so the data input and access for schedule management is performed by engineer on foot between construction site and main office. Therefore in this paper, we arrange wireless communication system between construction site and main of office and develop application program for data input and access of schedule management immediately using PDA at construction site. Through the our system we can improve the schedule management at construction site, and we can look forward to reduction of manpower, equipments, time, and money in whole construction.

Presidential Archives Management System Improvement Status and Future Directions (대통령기록관리 제도 개선 현황과 향후 추진 방향)

  • Zoh, Youngsam
    • The Korean Journal of Archival Studies
    • /
    • no.65
    • /
    • pp.47-88
    • /
    • 2020
  • Moon Jae-in as the government was launching new records & Archives management innovation is promoted. It was necessary to overhaul the Presidential Records & Archives Act and resolve the issues so far. The key issues include the establishment of individual presidential archives and the guarantee of access to former presidents. The current administration of presidential records is being carried out in the position of a manager (agency). The system's biggest "customers" are discussing management difficulties, even though they are former presidents. Record management should be a customer-centered information service. The "core customer" of managing presidential records is the former president. Another important problem is to separate the Presidential Archives from the National Archives to strengthen its status.

Analysis of the Competitiveness of Broadband over Power Line Communication in Korea

  • Jeong, Gi-Cheol;Koh, Dae-Young;Lee, Jong-Su
    • ETRI Journal
    • /
    • v.30 no.3
    • /
    • pp.469-479
    • /
    • 2008
  • This study analyzes factors affecting the competitiveness of broadband over power line communication (BPLC) and predicts demand for the service, based on quantitative information about consumer preferences drawn from a survey of Korean consumers. Findings from the estimation suggest that, although consumers value some beneficial features of BPLC, to be competitive the speed and stability of its data transmission needs to be improved. Moreover, on the basis of a market simulation, we expect BPLC to occupy only a small portion of Korea's Internet access market in the future, a finding we expect would hold true for other developed countries whose Internet access markets are already mature.

  • PDF