• Title/Summary/Keyword: access management

Search Result 3,330, Processing Time 0.033 seconds

Public Key based Secure Data Management Scheme for the Cloud Data Centers in Public Institution (공공기관 클라우드 데이터 센터에 활용 가능한 공개키 기반의 안전한 데이터 관리 기법)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.467-477
    • /
    • 2013
  • The cloud computing has propagated rapidly and thus there is growing interest on the introduction of cloud services in the public institution. Accordingly, domestic public institution are adoption of cloud computing impose and devise a plan. In addition, more specifically, is building a cloud computing system in the public institution. However, solutions to various security threats(e.g., availability invasion of storage, access by unauthorized attacker, data downloaded from uncertain identifier, decrease the reliability of cloud data centers and so on) is required. For the introduction and revitalize of cloud services in the public institution. Therefore, in this paper, we propose a public key based secure data management scheme for the cloud data centers in public institution. Thus, the use of cloud computing in the public institutions, the only authorized users have access to the data center. And setting for importance and level of difficulty of public data management enables by systematic, secure, and efficient. Thus, cloud services for public institution to improve the overall security and convenience.

A New Key Management Mechanism and Performance Improvement for Conditional Access System (제한수신시스템을 위한 키 관리 메카니즘과 성능향상 방안)

  • 조현숙;이상호
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.75-87
    • /
    • 2001
  • The Conditional Access System is the complete system for ensuring that broadcasting services are only accessible to those who are entitled to receive them. Four major parts to this system are scrambling, descrambling, authentication and encryption. For the proper operation, which means hard-to- break and uninterrupted service, secure key management and efficient delivery mechanism are very important design factors to this system. Performance analysis is another important factor to this system that is used in massive subscriber environment. In this thesis, one of the secure and efficient key management mechanisms is proposed. For the secrecy of this mechanism, hierarchical stacking of keys and key generation matrix are proposed. For the proof of efficient delivery of those keys, simulation results and performance analysis. which is based on queuing analysis, are presented. Lastly, optimal key generation and delivery period, maximal and minimal key deliver time, and communication capacity for data collection are presented for various subscriber volume.

  • PDF

A Cross-Layer Based Per-Application Mobility Management Platform (Cross-layer 기반 응용 별 이동성 관리를 위한 플랫폼)

  • Chang, Moon-Jeong;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.11-20
    • /
    • 2008
  • An inevitable trend in the next generation wireless network environments is coexistence of different wireless access networks in a complementary, manner. In addition, mobile devices equipped with multiple air interfaces simultaneously executing diverse applications have been emerging, In such network environment, It is required that a solution for mobile users to seamlessly roam between different access networks as well as to satisfy QoS requirements of each application by efficiently utilizing coexisting various wireless access networks. In this paper, therefore, we propose a mobility management platform based on per-application end-to-end mobility management and cross-layer handover controls. Four core functional modules composing the proposed platform for end user devices are defined: Monitoring Agents, Profile Database, Decision Engine, and IP Agent. We show through simulations that the presented platform provides an improved QoS as it selectively utilizes the best available networks.

A Study on the Copyright Policy and Open Access for Noncommercial Scholarly Works (비영리학술저작물의 저작권정책과 오픈액세스에 관한 연구)

  • Joung, Kyoung-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.24 no.4
    • /
    • pp.97-117
    • /
    • 2007
  • This study is about the copyright policies by Korean government and the revision of the article 31 library exemption provision in the Copyright Act of Korea for noncommercial scholarly works considering through cases of copyright disputes occurred in Korea during the $2005{\sim}2007$. This study proposes that works not for sale including thesis should be exempted from the copyright compensation in the article 31(5) in the Copyright Act of Korea based on the properties of noncommercial scholarly works and the regulations on works for not for sale in the current Korean copyright act. Also, this study reports that the copyright trust of scholarly articles by the copyright trust management agency is illegal in part and the government which has a duty to direct it has to control the illegal actions. Finally, this study proposes that noncommercial scholarly works such as thesis and scientific articles are to be open access and Korean government should develop open policies for them.

Attribute-Based Signatures with DNF Policies (DNF 정책을 가지는 속성 기반 서명)

  • Lee, Kwang-Su;Hwang, Jung-Yeon;Kim, Hyoung-Joong;Lee, Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.78-87
    • /
    • 2009
  • An attribute-based signature scheme is a signature scheme where a signer's private key is associate with an attribute set and a signature is associated with an access structure. Attribute-based signature schemes are useful to provide anonymity and access control for role-based systems and attribute-based systems where an identity of object is represented as a set of roles or attributes. In this paper, we formally define the definition of attribute-based signature schemes and propose the first efficient attribute-based signature scheme that requires constant number of pairing operations for verification where a policy is represented as a disjunctive normal form (DNF). To construct provably secure one, we introduce a new interactive assumption and prove that our construction is secure under the new interactive assumption and the random oracle model.

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

Enhancing Business Continuity in the Oil and Gas Industry through Electronic Records Management System Usage to Improve Off-Site Working: A Narrative Review

  • Hawash, Burkan;Mokhtar, Umi Asma';Yusof, Zawiyah M.;Mukred, Muaadh
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.2
    • /
    • pp.30-44
    • /
    • 2022
  • The primary function of an electronic records management system (ERMS) is to support organisations in providing effective records management services by enabling efficient remote access to the organisations' records. This helps the organisation to continue running during emergency events, such as the COVID-19 pandemic. The need to study ERMS for accessing records remotely has increased dramatically, due to the increase in daily use. The situation arising from the COVID-19 pandemic has increased the need for implementing proper digital systems, such as ERMS, to enable efficient work processes and enhance business continuity. An ERMS has the potential to allow organisations to create records and workflows off-site. During a pandemic, the ability to structure processes digitally helps in maintaining operations remotely. This study aims to provide a narrative review of the ERMS literature with an emphasis on explaining the primary components of ERMS that act as enablers for the implementation of the system in the oil and gas sector of developing countries. The current study proposes ERMS roles and responsibilities that could enhance business continuity. The authors use a qualitative narrative review and analyse the literature related to this study and its findings. The results show that, in cases of risk or crises, staff members need to have easy access to their records and documents to remain productive. An ERMS allows professionals to remain active and work off-site. Thus, ERMS play a significant role in protecting an organisation's content through the monitoring and control over who has authorisation to access its records.

A Study on the metadata construction of electronic information by using XML (XML을 이용한 전자정보원의 메타데이터 구성에 관한 연구)

  • 김현희;안태경
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 1999.08a
    • /
    • pp.249-253
    • /
    • 1999
  • 본 연구에서는 경제. 경영학 분야의 전자 정보원을 좀 더 효율적으로 검색하기 위해서 각 정보인의 특성 및 내용을 체계적으로 기술하는 메타데이터를 설치한 후 XML과 ACCESS 데이터베이스 시스템을 이용하여 메타데이터 검색 시스템을 구현해 보았다.

  • PDF

Mobile Contents Management

  • 서종렬
    • Proceedings of the CALSEC Conference
    • /
    • 2001.02a
    • /
    • pp.287-296
    • /
    • 2001
  • Mobile Access Management Automatic Content-Type Conversion ㆍ Automatic Content-Type Conversion Features which enable fast conversion of existing data to wireless data formats: ㆍ Automatic Content-Type Conversions - XML to Any - HTML to HDML - HTML to WML - HTML to MML - HTML to CHTML - CHTMLto HDML - CHTML to WML - HDML to WML(omitted)

  • PDF

Assessment of the Contribution of Microfinance to Entrepreneurship Development in MOGADISHU

  • Mohamud, Isse Abdikadir;Awale, Abdirahman Abdinur
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.4 no.3
    • /
    • pp.18-24
    • /
    • 2016
  • Delivery of microfinance services to operators of small and medium enterprises (SMEs) is increasingly being viewed as a strategic means of assisting growth and development. The purpose of this study was to assess the contribution of microfinance to entrepreneurship development in Mogadishu. Survey research design was adopted and Primary data was collected by using questionnaires. This research study used purposive sampling method to select 120 respondents; but 108 were found usable and analyzed. The data was analyzed using descriptive statistics. This study found the access of microfinance services to the SMEs is poor. This study also found due to the collateral, short term repayment challenges, small and medium businesses are difficult to access loan from microfinance institutions which hinder their entrepreneurship development. In addition to these, this study found that the Microfinance institutions play significance role to the growth and sustainable development of SMEs and also increases the productivity and profitability of small and medium enterprises. This study recommends the guidelines of microfinance institutions to finance SMEs needs to be flexible and microfinance institutions should give technical assistant to the SME to ensure success in the SME sector. The study also suggests access of microfinance services to the SMEs should be facilitated and awareness to microfinance purposes and activities should be created.