• Title/Summary/Keyword: multi-user

Search Result 2,180, Processing Time 0.03 seconds

A Method of Risk Assessment for Multi-Factor Authentication

  • Kim, Jae-Jung;Hong, Seng-Phil
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.187-198
    • /
    • 2011
  • User authentication refers to user identification based on something a user knows, something a user has, something a user is or something the user does; it can also take place based on a combination of two or more of such factors. With the increasingly diverse risks in online environments, user authentication methods are also becoming more diversified. This research analyzes user authentication methods being used in various online environments, such as web portals, electronic transactions, financial services and e-government, to identify the characteristics and issues of such authentication methods in order to present a user authentication level system model suitable for different online services. The results of our method are confirmed through a risk assessment and we verify its safety using the testing method presented in OWASP and NIST SP800-63.

The Effects of Multi-Modality on the Use of Smart Phones

  • Lee, Gaeun;Kim, Seongmin;Choe, Jaeho;Jung, Eui Seung
    • Journal of the Ergonomics Society of Korea
    • /
    • v.33 no.3
    • /
    • pp.241-253
    • /
    • 2014
  • Objective: The objective of this study was to examine multi-modal interaction effects of input-mode switching on the use of smart phones. Background: Multi-modal is considered as an efficient alternative for input and output of information in mobile environments. However, there are various limitations in current mobile UI (User Interface) system that overlooks the transition between different modes or the usability of a combination of multi modal uses. Method: A pre-survey determined five representative tasks from smart phone tasks by their functions. The first experiment involved the use of a uni-mode for five single tasks; the second experiment involved the use of a multi-mode for three dual tasks. The dependent variables were user preference and task completion time. The independent variable in the first experiment was the type of modes (i.e., Touch, Pen, or Voice) while the variable in the second experiment was the type of tasks (i.e., internet searching, subway map, memo, gallery, and application store). Results: In the first experiment, there was no difference between the uses of pen and touch devices. However, a specific mode type was preferred depending on the functional characteristics of the tasks. In the second experiment, analysis of results showed that user preference depended on the order and combination of modes. Even with the transition of modes, users preferred the use of multi-modes including voice. Conclusion: The order of combination of modes may affect the usability of multi-modes. Therefore, when designing a multi-modal system, the fact that there are frequent transitions between various mobile contents in different modes should be properly considered. Application: It may be utilized as a user-centered design guideline for mobile multi modal UI system.

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.

Security Analysis of a Secure Dynamic ID based Remote User Authentication Scheme for Multi-server Environment (멀티서버를 위한 안전한 동적 ID 기반 원격 사용자 인증 방식에 대한 안전성 분석)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.273-278
    • /
    • 2013
  • Recently, user authentication schemes using smart cards for multi-server environment have been proposed for practical applications. In 2009, Liao-Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environment that can withstand the various possible attacks and provide user anonymity. In this paper, we analyze the security of Liao-Wang's scheme, and we show that Liao-Wang's scheme is still insecure against the forgery attack, the password guessing attack, the session key attack, and the insider attack. In addition, Liao-Wang's scheme does not provide user anonymity between the user and the server.

Scheduling Method based on SINR at Cell Edge for multi-mode mobile device (멀티모드 단말기를 위한 셀 경계 지역에서의 SINR 기반 사용자 선택 방법)

  • Kum, Donghyun;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.63-68
    • /
    • 2015
  • We consider a cell edge environment. In cell edge, a user interfered by signal which is generated by a base stations not including the user. In cell edge environment, that is, there are inter cell interference (ICI) as well as multi user interference (MUI). Coordinated multi-point transmission (CoMP) is a technique which mitigates ICI between base stations. In CoMP, therefore, base stations can coordinate with each other by sharing user state information (CSI) in order to mitigate ICI. To improve sum rate performance in CoMP, each base station should generate optimal user group and transmit data to users selected in the optimal user group. In this paper, we propose a user selection algorithm in CoMP. The proposed method use signal to interference plus noise ratio (SINR) as criterion of selecting users. Because base station can't measure accurate SINR of users, in this paper, we estimate SINR equation considering ICI as well as MUI. Also, we propose a user selection algorithm based on the estimated SINR. Through MATAL simulation, we verify that the proposed method improves the system sum rate by an average of 1.5 ~ 3 bps/Hz compared to the conventional method.

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption

  • Hu, Shengzhou;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5100-5119
    • /
    • 2018
  • Most of existing privacy-preserving multi-authorities attribute-based encryption schemes (PP-MA-ABE) only considers the privacy of the user identity (ID). However, in many occasions information leakage is caused by the disclosing of his/her some sensitive attributes. In this paper, we propose a collusion-resisting ciphertext-policy PP-MA-ABE (CRPP-MACP-ABE) scheme with hiding both user's ID and attributes in the cloud storage system. We present a method to depict anonymous users and introduce a managerial role denoted by IDM for the management of user's anonymous identity certificate ($AID_{Cred}$). The scheme uses $AID_{Cred}$ to realize privacy-preserving of the user, namely, by verifying which attribute authorities (AAs) obtain the blinded public attribute keys, pseudonyms involved in the $AID_{Cred}$ and then distributes corresponding private keys for the user. We use different pseudonyms of the user to resist the collusion attack launched by viciousAAs. In addition, we utilize IDM to cooperate with multiple authorities in producing consistent private key for the user to avoid the collusion attack launched by vicious users. The proposed CRPP-MACP-ABE scheme is proved secure. Some computation and communication costs in our scheme are finished in preparation phase (i.e. user registration). Compared with the existing schemes, our scheme is more efficient.

A Multi-Modal Complex Motion Authoring Tool for Creating Robot Contents

  • Seok, Kwang-Ho;Kim, Yoon-Sang
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.6
    • /
    • pp.924-932
    • /
    • 2010
  • This paper proposes a multi-modal complex motion authoring tool for creating robot contents. The proposed tool is user-friendly and allows general users without much knowledge about robots, including children, women and the elderly, to easily edit and modify robot contents. Furthermore, the tool uses multi-modal data including graphic motion, voice and music to simulate user-created robot contents in the 3D virtual environment. This allows the user to not only view the authoring process in real time but also transmit the final authored contents to control the robot. The validity of the proposed tool was examined based on simulations using the authored multi-modal complex motion robot contents as well as experiments of actual robot motions.

A Collaborative Visual Language

  • Kim, Kyung-Deok
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.2
    • /
    • pp.74-81
    • /
    • 2003
  • There are many researches on visual languages, but the most of them are difficult to support various collaborative interactions on a distributed multimedia environment. So, this paper suggests a collaborative visual language for interaction between multi-users. The visual language can describe a conceptual model for collaborative interactions between multi-users. Using the visual language, generated visual sentences consist of object icons and interaction operators. An object icon represents a user who is responsible for a collaborative activity, has dynamic attributes of a user, and supports flexible interaction between multi-users. An interaction operator represents an interactive relation between multi-users and supports various collaborative interactions. Merits of the visual language are as follows: supporting of both asynchronous interaction and synchronous interaction, supporting flexible interaction between multi-users according to participation or leave of users, supporting a user oriented modeling, etc. For example, an application to a workflow system for document approval is illustrated. So we could be found that the visual language shows a collaborative interaction.

A Multi-User Authentication Scheme for a Smart Medication Management and Monitoring System (스마트 복약관리 및 모니터링 시스템에서 다중 사용자 인증 방법)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.5
    • /
    • pp.571-578
    • /
    • 2015
  • Even though DOT (Directly Observed Treatment) is the most definite method for the patients who need a long-term medication, its implementation is almost impossible considering the manpower and economic cost for it. The smart medication management and monitoring system that has appeared as an alternative requires a device for its implementation. In this paper, we propose so-called a smart pillbox for the smart medication management and monitoring system and the multi-user authentication scheme for sharing the smart pillbox among the patients. Through the smart pillbox and the multi-user authentication scheme, it is expected that the recovery rate would be raised by enabling the patients to take medicine in both timely and correct manner.

Behavior Realization of Multi-Robots Responding to User's Input Characters (사용자 입력 문자에 반응하는 군집 로봇 행동 구현)

  • Jo, Young-Rae;Lee, Kil-Ho;Jo, Sung-Ho;Shin, In-Sik
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.5
    • /
    • pp.419-425
    • /
    • 2012
  • This paper presents an approach to implement the behaviors of multi-robots responding to user's input characters. The robots are appropriately displaced to express any input characters. Using our method, any user can easily and friendly control multirobots. The responses of the robots to the user's input are intuitive. We utilize the centroidal Voronoi algorithm and the continuoustime Lloyd algorithm, which have popularly been used for the optimal sensing coverage problems. Collision protection is considered to be applied for real robots. LED sensors are used to identify positions of multi-robots. Our approach is evaluated through experiments with five mobile robots. When a user draw alphabets, the robots are deployed correspondingly. By checking position errors, the feasibility of our method is validated.