• Title/Summary/Keyword: access management

Search Result 3,330, Processing Time 0.033 seconds

Development of AMIS Method (AMIS기법 개발에 관한 연구)

  • 정진혁
    • Proceedings of the KOR-KST Conference
    • /
    • 1999.10a
    • /
    • pp.47-52
    • /
    • 1999
  • The methods currently in use to evaluate traffic impacts on the transportation network involve some fundamental shortcomings. First, the methodss do not properly take into account regional and local traffic impacts on the transportation network simultaneously. Second, temporal distribution of traffic, a major contributor to transportation problems, is not accurately accounted for. Third, traffic impact studies require costly and labor-intensive efforts to collect necessary data and to establish to collect necessary data and to establish traffic impact models. In this research, a new method called AMIS is developed for congestion management, access control, and impact simulation to overcome the shortcomings involved in the current methods. The new method is designed for a variety of scenarios such as access management strategies, land use policies, traffic impacts, and other congestion management strategies. This method can effectively be used, with little modification, anywhere in the United States. It is an improvement over the current traffic impact simulation methods that produces more reliable and accurate traffic impact estimates. The case studies conducted in this research have offered evidence that the new method, AMIS, is a credible congestion management tool. Most importantly, a case study presented in this paper illustrates how the new method can be used not only to estimate regional and local impacts of alternate supply management policies in the course of a day, but virtually on an hour-by-hour basis.

  • PDF

Mobility Management Algorithm with Reduced Wireless Signaling Cost in the Wireless Internet (무선 인터넷에서 무선 시그널링 양을 줄이기 위한 이동성 관리 알고리듬)

  • Kim, Tae-Hyoun;Lee, Jai-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.2B
    • /
    • pp.27-35
    • /
    • 2005
  • As the number of Mobile IP users is expected to grow, the signaling overhead associated with mobility management in the wireless Internet is bound to grow. And since the wireless link has far less bandwidth resources and limited scalability compared to the wired network link, the signaling overhead associated with mobility management has a severe effect on the wireless link. In this paper, we propose IP-Grouping algorithm that can greatly reduce the signaling cost in the wireless link as Access Routers(ARs) with a large rate of handoff are grouped into a Group Zone. Based on the numerical analysis and simulation, we show that the wireless signaling cost in the IP-Grouping is much lower than that of the Hierarchical Mobile IPv6 under various condition.

Performance Evaluation of the HomePNA 3.0 Asynchronous MAC Mode with Collision Management Protocol (HomePNA 3.0 비동기 MAC 모드의 Collision Management Protocol 성능 분석)

  • 김희천;정민영;이태진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.727-734
    • /
    • 2004
  • Collision Management Protocol (CMP) efficiently resolves collisions when data frames are transmitted in networks consisting of HomPNA 3.0 asynchronous MAC mode device with random access. Unlike Distributed Fair Priority Queueing (DFPQ) algorithm in HomePNA 2.0 or Binary Exponential Backoff (BEB) algorithm in IEEE 802.11, order of retransmission is decided according to Collision Signaling Sequence (CSS) values allocated to each device. Thus, CMP can minimize the number of mean collisions because order of retransmission is decided in a deterministic way. In this paper. we evaluate the saturation performance of CMP in HomePNA 3.0 using an analytic method.

Dynamic Service Assignment based on Proportional Ordering for the Adaptive Resource Management of Cloud Systems

  • Mateo, Romeo Mark A.;Lee, Jae-Wan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.12
    • /
    • pp.2294-2314
    • /
    • 2011
  • The key issue in providing fast and reliable access on cloud services is the effective management of resources in a cloud system. However, the high variation in cloud service access rates affects the system performance considerably when there are no default routines to handle this type of occurrence. Adaptive techniques are used in resource management to support robust systems and maintain well-balanced loads within the servers. This paper presents an adaptive resource management for cloud systems which supports the integration of intelligent methods to promote quality of service (QoS) in provisioning of cloud services. A technique of dynamically assigning cloud services to a group of cloud servers is proposed for the adaptive resource management. Initially, cloud services are collected based on the excess cloud services load and then these are deployed to the assigned cloud servers. The assignment function uses the proposed proportional ordering which efficiently assigns cloud services based on its resource consumption. The difference in resource consumption rate in all nodes is analyzed periodically which decides the execution of service assignment. Performance evaluation showed that the proposed dynamic service assignment (DSA) performed best in throughput performance compared to other resource allocation algorithms.

An Efficient Attribute Certificate Management Technique for Highly Distributed Environment (고도로 분산된 컴퓨팅 환경을 위한 효율적 속성 인증서 관리 기법)

  • Yang, Soo-Mi
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.85-92
    • /
    • 2005
  • For an efficient role based access control in highly distributed computing environment to reduce management cost, we utilize attribute certificates. Especially highly distributed computing environments such as ubiquitous computing environments which cannot have global or broad control, need another attribute certificate management technique. The techniques for transmission of the attribute certificates and management of the group keys should be considered to reduce management cost. For better performance we structure attribute certificates. We group roles and make the role group relation tree. It results secure and efficient role renewing and distribution. For scalable attribute certificate distribution, multicasting packets are used. We take into account the packet loss and quantifying performance enhancements of structuring attribute certificates.

  • PDF

Enhance Security Management for SNMPv3 using Task-Based Privacy Model (직무기반 보안모델을 이용한 SNMPv3 보안관리 강화)

  • 양기철;오승훈;신성권;김민수;권오범
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.3
    • /
    • pp.351-362
    • /
    • 2002
  • Today, management object using SNMP is not only covered network but also more privacy object like personal or billing data. To enforce security management, view-based access control model is introduced in SNMPv3. However, they are not designed to enforce more privacy object such as purpose and increase complexity of user management. Task-based access control can provide enhanced security service using purpose binding and leverage the complexity of user management using purpose of task.

  • PDF

Document Management System based on SGML (SGML 을 기반으로 하는 문서관리시스템 개발)

  • Park, Nam-Kyu;Shin, D.S.
    • IE interfaces
    • /
    • v.10 no.3
    • /
    • pp.109-116
    • /
    • 1997
  • Document management system is a tool, based on the document life cycle concept, for structured management of various documents within an organization. In this paper, we address a development process of document management system based on SGML. We have developed a document management system which can support a variety of types in documents such as informal data, HTML, CGI and so on. Using the developed system, users can access documents in the system through an internet browser, and also add or modify existing documents.

  • PDF

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.

Sustainable Technology for Land Management (토지 관리를 위한 지속가능한 기술)

  • Kim, Young Hag
    • Journal of Cadastre & Land InformatiX
    • /
    • v.47 no.2
    • /
    • pp.213-231
    • /
    • 2017
  • The development of new spatial technologies enables sustainability as well as the efficiency of future land management while maintaining the efficiency of current land management. In this context, what are the challenges facing land management and sustainability, how can set the relationship between the land management and sustainability? What is sustainable technology for land management? And how can sustainability challenges and technologies be applied to land management? and so on. Therefore, this study is to search sustainable land management direction by investigating and applying sustainable technologies for more efficient and continuous maintenance of land management. To describe and approach sustainable technologies for land management, in particular, capacity, security, IT resource, new device, standards, transparency, and data, access to data and so on that can be considered as the challenges of sustainability and land management.