• Title/Summary/Keyword: access management

Search Result 3,330, Processing Time 0.031 seconds

Design and Implementation of IP-based Network Management System Supporting WLAN Integrated Management System (IP 네트워크를 기반으로 하는 무선망 통합 관리 시스템 설계 및 구현)

  • Shin, Myung-Sik;Yang, Hae-Sool;Lee, Kee-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.7
    • /
    • pp.33-40
    • /
    • 2010
  • The hand over between different radio access networks, especially where their coverage overlaps, suffers various complications since the different access networks provide different service characteristics. In this paper, it is about the system which can control the wireless LAN network management system and the wireless LAN access point of variety vendor which is in different areas. Successful development of mobile sink wireless LAN network management system which supports multi-vendor devices and have center-local interoperability structure. In proposed system, speed of the mobile station give about 10% improvement when the map domain size is 5 than the existing system. Through a data plane and management system of message way, it give a stability system and consistency network.

WiFi Access User Authentication in Broadband Wireless Access Network (광대역 무선 엑세스 망에서 WiFi 액세스 사용자 인증)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.28 no.B
    • /
    • pp.33-37
    • /
    • 2008
  • Recently, there have been intensive researches on the wireless Internet access through WiFi WLAN using WiRro network as backhaul link in the Internet service providing business area. However, in the wireless Internet access method, we need to solve the compatibility problem for different user authentications between licensed WiBro network and unlicensed WiFi network for billing and user management. In this paper, we propose an authentication method for WiFi users by BWAN operators through WiNNERs which is RS connecting the two networks, and discuss the effectiveness of the method.

  • PDF

Reducing Rekeying Time Using an Integrated Group Key Agreement Scheme

  • Gu, Xiaozhuo;Zhao, Youjian;Yang, Jianzu
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.418-428
    • /
    • 2012
  • With the requirement for providing multiple levels of access control for group members, many group key management schemes designed for hierarchical access control have been put forward. However, most of these schemes focus on the efficiency of group key establishment and rekeying in centralized environments. This paper proposes an integrated group key agreement (IGK) scheme for contributory environments. The IGK scheme employs the integrated key graph to remove key redundancies existing in single key trees, and reduces key establishment and rekeying time while providing hierarchical access control. Performance analyses and simulations conducted with respect to computation and communication overheads indicate that our proposed IGK scheme is more efficient than the independent group key agreement scheme.

The Analysis of an Opportunistic Spectrum Access with a Strict T-preemptive Priority Discipline (엄격한 T-축출 우선순위 대기행렬을 이용한 기회 주파수 접근 방식의 성능 분석)

  • Kim, Kilhwan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.35 no.4
    • /
    • pp.162-170
    • /
    • 2012
  • We propose a new priority discipline called the strict T-preemptive priority discipline, and derive the waiting time distributions of each class in the strict T-preemptive priority M/G/1 queue. Using this queueing analysis, we evaluate the performance of an opportunistic spectrum access in cognitive radio networks, where a communication channel is divided into time slots, a licensed primary user is assigned to one channel, and multiple unlicensed secondary users may opportunistically exploit time slots unused by the primary user. We also present a numerical example of the analysis of the opportunistic spectrum access where the arrival rates and service times distributions of each users are identical.

System Design for Access to Subway Vent based Bluetooth Smart Door-Lock (지하철 환기구 출입관리를 위한 블루투스 스마트 도어락 시스템)

  • Kim, Tae-Yong;Lee, Dae-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.63-65
    • /
    • 2016
  • In this paper, smart door-lock system to access public facilities will be proposed. An existed door-lock system using physical door-lock, NFC Tag, and RFID could be replaced by our proposed system. Automatic access control management system with security authentication module enables the worker to access public facilities efficiently.

  • PDF

Assessment and Access Control for Ubiquitous Environments

  • Diep, Nguyen Ngoc;Lee, Sung-Young;Lee, Young-Koo;Lee, Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1107-1109
    • /
    • 2007
  • Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are inadequate for the increased flexibility and performance that ubiquitous computing environment requires because such systems can not utilize effectively all benefit from this environment. In this paper, we propose a solution based on risk to make use of many context parameters in order to provide good decisions for a safety environment. We design a new model for risk assessment in ubiquitous computing environment and use risk as a key component in decision-making process in our access control model.

Policy System of Data Access Control for Web Service (웹 서비스를 위한 데이터 접근 제어의 정책 시스템)

  • Jo, Sun-Moon;Chung, Kyung-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.11
    • /
    • pp.25-32
    • /
    • 2008
  • Access control techniques should be flexible enough to support all protection granularity levels. Since access control policies are very likely to be specified in relation to document types, it is necessary to properly manage a situation in which documents fail to be dealt with by the existing access control policies. In terms of XML documents, it is necessary to describe policies more flexibly beyond simple authorization and to consider access control methods which can be selected. This paper describes and designs the access control policy system for authorization for XML document access and for efficient management to suggest a way to use the capacity of XML itself. The system in this paper is primarily characterized by consideration of who would exercise what access privileges on a specific XML document and by good adjustment of organization-wide demands from a policy manager and a single document writer.

An Effective Query Rewriting Method in Secure XML Access Control (안전한 XML 접근제어에서 효율적인 질의 재작성 기법)

  • An, Dong-Chan;Byun, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.127-137
    • /
    • 2006
  • We propose two phase filtering scheme to develop an efficient mechanism for XML databases to control query-based access. An access control environment for XML documents and some techniques to deal with fine-grained authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query-based access. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form through a query optimization technique, which is guaranteed to have no access violations using tree-aware metadata of XML schemas. The scheme can be applied to any XML database management system and has several advantages such as small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

  • PDF

A Study on Developing a Name Access Point Control System to Improve the Performance of Information Retrieval from Institutional Repositories (기관 리포지터리의 검색기능 향상을 위한 인명 접근점제어 시스템 구축 연구)

  • Kim, Mi-Hyang;Kim, Tae-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.3
    • /
    • pp.125-146
    • /
    • 2010
  • This study developed a name access point control system for better performance of information retrieval from institutional repositories, which are equipped with authorgenerated metadata processes for self-archiving. In developing name access point control data for the system, the primary data were created from the existing authority. However, unlike the existing authority data, the primary data did not use any authority forms. Instead, the data utilized all the forms provided by the resources as access points. Specifically, field of activity(subject) and title information on authorship were used to distinguish between persons who have the same name. The result showed that the system improved the performance of the information retrieval. The system has been also expected to be utilized over other metadata provided by libraries, in addition to the institutional repositories, in order to provide better quality information.

VRML Database Access for 3D Real-time Data Visualization in MiWiTM Thermal Wireless Sensor Network (마이와이 표준의 열 센서망의 3차원 실시간 자료 시각화를 위한 가상 현실 모델링 언어 데이터베이스 액세스)

  • Wan, Xue-Fen;Yang, Yi;Cui, Jian;Zheng, Tao;Ma, Li
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.164-170
    • /
    • 2012
  • A Virtual Reality Modeling Language (VRML) database access in remote virtual reality control platform for dyeing enterprise $MiWi^{TM}$ thermal sensor network is presented in this paper. The VRML-ASP framework is introduced for 3D real-time data plotting in this application. The activities of thermal sensor nodes and sensor area are analyzed. The database access framework is optimized for $MiWi^{TM}$ wireless sensor networks. The experimental results show that VRML-ASP database access framework could be a reliable and competitive data-manage candidate for targeted virtual reality remote industrial visualization application.