• Title/Summary/Keyword: computer access

Search Result 3,132, Processing Time 0.026 seconds

A CASA-Based Dynamic Access Control Scheme for Ubiquitous Environments (유비쿼터스 환경을 위한 CASA 기반의 동적 접근 제어 기법)

  • Kim, Kyoung-Ja;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.205-211
    • /
    • 2008
  • Conventional context-aware service models permit the access of resources only by user authentication, but the ubiquitous environments where the context information around users is changing frequently require the resource access control according to the rapid changes. This paper proposes a scheme to control access permission of resource dynamically as context information of user changes. Our access control model is based on traditional CASA (Context-Aware Security Architecture), but can restrict the access of the user already has been authorized. With the real-time checking of context information, our scheme gives different access controls according to changes in environmental information, and provides more secure services than conventional context-aware models.

  • PDF

Access Control Mechanism for CouchDB

  • Ashwaq A., Al-otaibi;Reem M., Alotaibi;Nermin, Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.107-115
    • /
    • 2022
  • Recently, big data applications need another database different from the Relation database. NoSQL databases are used to save and handle massive amounts of data. NoSQL databases have many advantages over traditional databases like flexibility, efficiently processing data, scalability, and dynamic schemas. Most of the current applications are based on the web, and the size of data is in increasing. NoSQL databases are expected to be used on a more and large scale in the future. However, NoSQL suffers from many security issues, and one of them is access control. Many recent applications need Fine-Grained Access control (FGAC). The integration of the NoSQL databases with FGAC will increase their usability in various fields. It will offer customized data protection levels and enhance security in NoSQL databases. There are different NoSQL database models, and a document-based database is one type of them. In this research, we choose the CouchDB NoSQL document database and develop an access control mechanism that works at a fain-grained level. The proposed mechanism uses role-based access control of CouchDB and restricts read access to work at the document level. The experiment shows that our mechanism effectively works at the document level in CouchDB with good execution time.

Implementation of Location Tracking System of Wireless Access Point based PDA (PDA기반 무선 AP의 위치 탐색 시스템 구현)

  • Park, Ju-Pyung;Hong, Jin-Keun;Han, Kun-Hee;Kim, Ki-Hong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.952-957
    • /
    • 2008
  • In this paper, explain about collect that Access Point signal and Implementation of Location Tracking System of Wireless Access Point based PDA. Collect Access point signal in PDA then Signal transmits by computer so Computer is analyze collected signal and is seen on picture. we show the Present problem of wireless LAN and position feeler algorithm through this writing paper.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

Mandatory Access Control Protection Profile for Secure Operating System (보안 운영체제를 위한 강제적 접근 제어 보호 프로파일)

  • Ko Young Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.141-148
    • /
    • 2005
  • Nowadays, it is possible to access sharing data from unauthorized People. Access control prevents unauthorized access to computing resource, information resources, and communication resources. It is very important to defend the critical system resources from the unauthorized. The importance of this study is to develop Protection Profile for Mandatory Access Control (MAC) that satisfies TCSEC assurance level B2. protection profile for MAC will help developers to use reference for the development of requirements and formulating security specification.

  • PDF

A Study on Direction of the Electronic Government: with Focused on Freedom of Information

  • Kim, Taek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.10
    • /
    • pp.113-119
    • /
    • 2015
  • In this paper, we propose an efficient freedom of information and Information access right which improves transparent and speedy administration process. To build open Information, we scrutinize that causes of non access right and change of civil service consciousness, attitude for open information by effectively open system circumstances. The Important thing is basic information that is available to the public through an agency's FOIA Reference Guide, all agencies must notify potential FOIA requesters of the formal rules and requirements for the making and handling of FOIA request, through their FOIA regulations. The characteristics of this paper focused on Information access right, causes of non access right and proposed policy. In this paper, The author emphasize are as follows: first, to examine freedom of information' necessity and problem that scrutinize a theoretic analysis, second, to understand civil servant's attitude for the freedom of information, third, to suggest action plan and agenda for the better of Good Governance and Democracy of information.

Crowdsourced Risk Minimization for Inter-Application Access in Android

  • Lee, Youn Kyu;Kim, Tai Suk
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.5
    • /
    • pp.827-834
    • /
    • 2017
  • Android's inter-application access enriches its application ecosystem. However, it exposes security vulnerabilities where end-user data can be exploited by attackers. While existing techniques have focused on minimizing the risks of inter-application access, they either suffer from inaccurate risk detection or are primarily available to expert users. This paper introduces a novel technique that automatically analyzes potential risks between a set of applications, aids end-users to effectively assess the identified risks by crowdsourcing assessments, and generates an access control policy which prevents unsafe inter-application access at runtime. Our evaluation demonstrated that our technique identifies potential risks between real-world applications with perfect accuracy, supports a scalable analysis on a large number of applications, and successfully aids end-users' risk assessments.

High Performance IP Address Lookup Using GPU

  • Kim, Junghwan;Kim, Jinsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.5
    • /
    • pp.49-56
    • /
    • 2016
  • Increasing Internet traffic and forwarding table size need high performance IP address lookup engine which is a crucial function of routers. For finding the longest matching prefix, trie-based or its variant schemes have been widely researched in software-based IP lookup. As a software router, we enhance the IP address lookup engine using GPU which is a device widely used in high performance applications. We propose a data structure for multibit trie to exploit GPU hardware efficiently. Also, we devise a novel scheme that the root subtrie is loaded on Shared Memory which is specialized for fast access in GPU. Since the root subtrie is accessed on every IP address lookup, its fast access improves the lookup performance. By means of the performance evaluation, our implemented GPU-based lookup engine shows 17~23 times better performance than CPU-based engine. Also, the fast access technique for the root subtrie gives 10% more improvement.

Grid Access Control System for Site Autonomy

  • Kim Beob Kyun;Jang Haeng Jin;Doo Gil Su;Hwang Ho Jean;An Dong Un;Chung Seung Jong
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.739-742
    • /
    • 2004
  • The term 'Grid' refers to systems and applications that integrate and manage resources and services distributed across multiple control domains. Resource sharing is, necessarily, highly controlled, with resource providers and consumers defining clearly and carefully just what is shared, who is allowed to share, and the conditions under which sharing occurs. In this paper, we design and implement a grid access control system, called PGAM. This system works on heterogeneous resources, can be applied to the additional service development and its service, provides template account management mechanism, and tries to ensure site autonomy. This system is implemented to increase portability and to be tit tll any kind of economic model.

  • PDF

An Opportunistic Channel Access Scheme for Interweave Cognitive Radio Systems

  • Senthuran, Sivasothy;Anpalagan, Alagan;Kong, Hyung Yun;Karmokar, Ashok;Das, Olivia
    • Journal of Communications and Networks
    • /
    • v.16 no.1
    • /
    • pp.56-66
    • /
    • 2014
  • We propose a novel opportunistic access scheme for cognitive radios in an interweave cognitive system, that considers the channel gain as well as the predicted idle channel probability (primary user occupancy: Busy/idle). In contrast to previous work where a cognitive user vacates a channel only when that channel becomes busy, the proposed scheme requires the cognitive user to switch to the channel with the next highest idle probability if the current channel's gain is below a certain threshold. We derive the threshold values that maximize the long term throughput for various primary user transition probabilities and cognitive user's relative movement.