• Title/Summary/Keyword: consistent access

Search Result 133, Processing Time 0.026 seconds

ENTERPRISE WIDE CENTRALIZED APPLICATION LEVEL ACCESS CONTROL USING XACML

  • Shaikh, Riaz A.;Rajput, Saeed;Zaidi, S.M.H.;Sharif, Kashif
    • Proceedings of the CALSEC Conference
    • /
    • 2005.03a
    • /
    • pp.62-67
    • /
    • 2005
  • In traditional approach, enterprise-wide consistent security policy enforcement for applications is very difficult task. Therefore, industry is now moving towards new unified enterprise application security concept that consist of centralized authentication and authorization mechanism. The eXtensible Access Control Markup Language (XACML); an XML-based standard defined by OASIS, is most suitable choice which can support centralized, role based, context aware access control mechanism. It is designed to provide universal standard for writing authorization policies and access control request/response language for managing access to the resources. This paper includes a brief overview on XACML and discusses its benefits, limitations and a data flow process. We propose a new generic access control architecture that supports enterprise wide centralized application level access control mechanism using XACML. The other benefits which can be achieved through this architecture are, reduce adnministration cost and complexity, support of heterogeneous computing platforms, centralized monitoring system, automatic fail over, scalability and availability, open standard based solution and secure communication.

  • PDF

First step of root canal therapy-access cavity preparation (근관치료의 시작 - 치수강 개방)

  • Song, Minju
    • The Journal of the Korean dental association
    • /
    • v.56 no.10
    • /
    • pp.572-580
    • /
    • 2018
  • Adequate access cavity is the key to achieving endodontic success. The aims of the access cavity can be considered as follows: 1) Creation of a smooth unimpeded pathway for instruments to canal orifices 2) Removal of the entire roof of the pulp chamber in order to inspect the pulp floor, 3) Preservation of natural tooth substance consistent with the above. Recently, contracted endodontic cavities based on minimally invasive endodontics has introduced. This has the benefit of preserving the pericervical dentin more than traditional access cavity with achieving long-term success. However, some studies reported controversial results regarding root canal detection, instrumentation efficacy (noninstrumented canal area, hard tissue debris accumulation, canal transportation, and centering ratio) as well as fracture resistance. Therefore, further studies are required for accepting contracted access cavity, and modified form of traditional and contracted access cavity could be considered.

  • PDF

A Study on Secure Cooperative Caching Technique in Wireless Ad-hoc Network (Wireless Ad-hoc Network에서 보안 협력 캐싱 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.91-98
    • /
    • 2013
  • Node which plays the role of cache server does not exist in the wireless ad-hoc network consisting of only mobile nodes. Even if it exists, it is difficult to provide cache services due to the movement of nodes. Therefore, the cooperative cache technique is necessary in order to improve the efficiency of information access by reducing data access time and use of bandwidth in the wireless ad-hoc network. In this paper, the whole network is divided into zones which don't overlap and master node of each zone is elected. General node of each zone has ZICT and manages cache data to cooperative cache and gateway node use NZCT to manage cache information of neighbor zone. We proposed security structure which can accomplish send and receive in the only node issued id key in the elected master node in order to prepare for cache consistent attack which is vulnerability of distributed caching techniques. The performance of the proposed method in this paper could confirm the excellent performance through comparative experiments of GCC and GC techniques.

A Study on Access Authorization Inference Modes for Information Security of Specialized Private Networks (특성화 사설 네트워크 정보보호를 위한 접근권한 추론모드에 관한 연구)

  • Seo, Woo Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.99-106
    • /
    • 2014
  • The most significant change and trend in the information security market in the year of 2014 is in relation to the issue and incidents of personal information security, which leads the area of information security to a new phase. With the year of 2011 as the turning point, the security technology advanced based on the policies and conditions that combine personal information and information security in the same category. Such technical changes in information security involve various types of information, rapidly changing security policies in response to emerging illegal techniques, and embracing consistent changes in the network configuration accordingly. This study presents the result of standardization and quantification of external access inference by utilizing the measurements to fathom the access authorization performance in advance for information security in specialized networks designed to carry out certain tasks for a group of clients in the easiest and most simple manner. The findings will provide the realistic data available with the access authorization inference modes to control illegal access to the edge of a client network.

Improved Single Packet Authentication and Network Access Control Security Management in Software Defined Perimeter (소프트웨어 정의 경계의 단일 패킷 인증 및 네트워크 접근통제 보안관리 개선)

  • Jung, Jin-kyo;Lee, Sang-ku;Kim, Young-Min
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.407-415
    • /
    • 2019
  • As the IT environment changes with cloud computing and smart work, the existing perimeter security model is showing its limitations and Software Defined Perimeter is being discussed as an alternative. However, SDP Spec 1.0 does not specify the device registration procedure, policy distribution process and authentication key generation and sharing process.In this paper, we propose a method to solve the problem of SDP access control by improving the operation procedure of Single Packet Authentication. This paper suggests that the proposed method can implement a consistent and automated integrated access control policy compared to the existing access control methods.

Design and Implementation of Network Management System Based on Mobile Sink Networks (모바일 싱크 네트워크를 적용한 망 관리 시스템의 설계 및 구현)

  • Kim, Dong-Ok
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.4
    • /
    • pp.216-222
    • /
    • 2009
  • This paper proposes an integrated mobile sink networks management system which can monitor and control various kinds of wireless lan access points, located in many different areas divided by their managing groups, from multi-vendors, and their operations in networks. The proposed system has the center-local interoperability structure cooperating with local-center servers which can perform the same operations as the central servers for wireless lan access points from multi-vendors and wireless lan centric management features. For this purpose, we propose a new way of data design, messaging policy, and hierarchical system structure such that we can achieve stable and consistent management methods for various wireless access points on distributed networks.

  • PDF

Concurrency Control of RFID Tag Operations for Consistent Tag Memory Accesses (RFID 태그 메모리 접근의 일관성을 위한 태그 연산의 동시성 제어)

  • Ryu, Woo-Seok;Hong, Bong-Hee
    • Journal of KIISE:Databases
    • /
    • v.37 no.3
    • /
    • pp.171-175
    • /
    • 2010
  • This paper analyzes the tag data inconsistency problem caused by incomplete execution of the tag access operation to the RFID tag's memory and proposes a protocol to control consistent tag data accesses with finalizing the incomplete operation. Passive RFID tag cannot guarantee complete execution of the tag access operations because of uncertainty and unexpected disconnection of RF communications. This leads to the tag data inconsistency problem. To handle this, we propose a concurrency control protocol which defines incomplete tag operations as continuous queries and monitors the tags're-observation continuously. The protocol finalizes the incomplete operation when the tag is re-observed while it blocks inconsistent data accesses from other operations. We justify the proposed protocol by analyzing the completeness and consistency. The experiments show that the protocol shows better performance than the traditional lock-based concurrency control protocol.

A Design and Implementation of Home Network Access Agent and its Testbed (홈 네트워크 액세스 에이전트 및 테스트베드 설계 구현)

  • Kim, Dong-Kyun;Lee, Myoung-Kun;Jeon, Byung-Chan;Lee, Sang-Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.167-176
    • /
    • 2006
  • In this paper, a home network access agent, which controls and monitors networked appliances at home using various terminals regardless of user's location, is designed and implemented. The proposed access agent integrates wire and wireless network on a home gateway (or home server) and is accessed with consistent messages using various terminals such as a web terminal, a PDA and a cellular phone. Also, in order to verify the operation and availability of the agent, a user interface for the various terminals is designed and a home network testbed which is accessed and controlled by the terminals is implemented.

  • PDF

Product Database Modeling for Collaborative Product Development

  • Do, Nam-Chul;Kim, Hyun;Kim, Hyoung-Sun;Lee, Jae-Yeol;Lee, Joo-Haeng
    • Proceedings of the CALSEC Conference
    • /
    • 2001.08a
    • /
    • pp.591-596
    • /
    • 2001
  • To deliver new products to market in a due time, companies often develop their products with numerous partners distributed around the world. Internet technologies can provide a cheap and efficient basis of collaborative product development among distributed partners. This paper provides a framework and its product database model that can support consistent product data during collaborative product development. This framework consists of four components for representing consistent product structure: the product configuration, assembly structure, multiple representations and engineering changes. A product database model realizing the framework is designed and implemented as a system that supports collaborative works in the areas of product design and technical publication. The system enables participating designers and technical publishers to complete their tasks with shared and consistent product data. It also manages the propagation of engineering changes among different representations for individual participants. The Web technologies introduced in this system enable participants to easily access and operate shared product data in a standardized and distributed computing environment.

  • PDF

The Impact of Omnichannel Shopping Experience and Channel Integration on Customer Retention: Empirical Evidence from China

  • WANG, Junbin;JIANG, Xinyu
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.2
    • /
    • pp.229-242
    • /
    • 2022
  • Creating a new retailing environment to meet the seamless experience requirements of consumers is a challenge for Omnichannel-related businesses. Based on the "appraisal-emotion-response" chain, the purpose of this research is to explore the psychological mechanism of omnichannel integration influencing customer retention and the moderating effect of customer showrooming experience. This research uses a structural equation model in partial least square software to analyze a two-stage survey (Study 1: n = 210; Study 2: n = 342) conducted in China. The results show that channel control experience has three dimensions: perceived channel attribute familiarity, channel type matching, and cross-channel access convenience; consistent interactive experience has two dimensions: information cross-channel consistency and cross-channel service support. Furthermore, both channel control experience and consistent interactive experience are favorable for customer retention through increased customer satisfaction (transactional and retailer satisfaction). Finally, customer showrooming experience positively moderates the relationship between consistent interactive experience and customer satisfaction. This research proposes a self-regulation process model to explain how omnichannel integration enhances consumers' experience, finally leading to consumer retention. The findings contribute to the omnichannel retail business literature and provide management implications for Asian retailers to implement an omnichannel business strategy.