• Title/Summary/Keyword: privilege

Search Result 200, Processing Time 0.031 seconds

Secure Storage to Prevent Private Information Leakage in Android (Android에서 개인정보 유출 방지를 위한 안전한 저장소)

  • Jeong, Youn-Sik;Park, Yeong-Ung;Cho, Seong-Je
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.42-44
    • /
    • 2012
  • 최근 안드로이드 애플리케이션의 수가 폭발적으로 증가함에 따라, 개인정보 유출 등 악성 행위를 하는 애플리케이션의 수 또한 증가하고 있다. 이에 대응하기 위해 스마트폰에서 개인정보 유출을 막기 위한 연구가 진행되어 왔으나, 이를 우회하는 악성코드도 지속적으로 출현하고 있다. 본 논문에서는 안드로이드 플랫폼에서 개인정보 유출을 방지하기 위해 안전한 저장소를 적용하는 방법을 제안한다. 기존의 UID와 퍼미션(Permission)에 의한 자원 접근제어와 달리, 안전한 저장소는 자원에 접근하는 주체의 권한(Privilege)에 관계없이 오직 app_Whitelist에 명시된 애플리케이션만이 해당 자원에 접근을 할 수 있도록 허용한다. 본 제안 방법을 위해 시스템 콜 후킹, 디렉터리명 변경, app_Whitelist 구축 등을 구현하였으며, 제안 방법을 적용하여 사용자 수준 및 커널 수준의 불법 데이터 접근을 차단할 수 있다.

Velvetweaving today: A worldwide overview

  • Pickett, Barbara Setsu
    • The Research Journal of the Costume Culture
    • /
    • v.21 no.3
    • /
    • pp.452-456
    • /
    • 2013
  • Velvet is a luxury cloth. In Fashion it dresses the Elite. In Interiors, it covers palace walls and upholsters elegant furniture. In every culture throughout its history velvet's sumptuous surfaces denotes luxury, status, power, privilege and wealth. My humble aim is to reveal the artisan in the art-to comprehend the mastery of weaving techniques, to understand the design principles, to study the everyday practice of the weavers at work. In the few ateliers that still weave silk velvet by hand, I have documented their processes and now want to share this knowledge with the broader textile community in hopes of expanding the appreciation of their art. I approach as a fellow weaver striving to learn the mechanics, the practical aspects that guide the work from initial idea to finished cloth. I leave the difficulties of establishing provenance and other important analyses to my more learned textile historian colleagues.

A D2D communication architecture under full control using SDN

  • Ngo, Thanh-Hai;Kim, Younghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3435-3454
    • /
    • 2016
  • Device-to-device (D2D) communication is a potential solution to the incessant increase in data traffic on cellular networks. The greatest problem is how to control the interference between D2D users and cellular mobile users, and between D2D users themselves. This paper proposes a solution for this issue by putting the full control privilege in cellular network using the software-defined networking (SDN) concept. A software virtual switch called Open vSwitch and several components are integrated into mobile devices for data forwarding and radio resource mapping, whereas the control functions are executed in the cellular network via a SDN controller. This allows the network to assign radio resources for D2D communication directly, thus reducing interference. This solution also brings out many benefits, including resource efficiency, energy saving, topology flexibility, etc. The advantages and disadvantages of this architecture are analyzed by both a mathematical method and a simple implementation. The result shows that implementation of this solution in the next generation of cellular networks is feasible.

Design of an Access Control for WebDAV-based Collaborative System (WebDAV기반 협업시스템 접근 제어 설계)

  • 변상희;박희종;박양수;이명준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.562-564
    • /
    • 2004
  • WebDAV(Web-based Distributed Authoring and Versioning)는 웹 통신 프로토콜로서 인터넷을 통하여 다양한 콘텐츠의 비동기적인 협업 저작을 지원한다. 따라서 WebDAV를 지원하는 다양한 종류의 서버들은 상호간의 협업 작업이 가능하다. 특히 WebDAV의 접근 제어 프로토콜은 특정 자원에 대한 접근 제어 권한을 정의하기 위하여 표준 Privilege들을 정의하고 있다. 본 논문에서는 웹기반 협업시스템의 핵심 기능인 팀 작업장과 공개 작업장의 자원에 접근할 때, 사용자의 권한과 작업장의 특성 그리고 자원의 특징에 따라 접근 제어 관리를 할 수 있도록 접근 제어 기법을 설계하였다. 특히 공개 작업장은 파일 올리기만 가능한 작업장, 내려받기만 가능한 작업장, 올리기/내려받기 가능한 작업장과 같이 성격이 다양하다. 이를 지원하기 위하여 작업장내 파일에 대한 접근 권한을 구체적으로 설계함으로써 협업작업을 체계적이고 안정적으로 지원할 수 있다.

  • PDF

A study on the development of British museum library and its cataloguing rules (대영박물관도서관의 발전과정과 그 목록규칙에 관한 고찰)

  • 배영활
    • Journal of Korean Library and Information Science Society
    • /
    • v.16
    • /
    • pp.69-98
    • /
    • 1989
  • The purpose of this study is to review the historical development of British Museum Library and its cataloging rules which really marked the beginning of the modern era of cataloguing. The results of the study can be summarized as follows (1) Sir Anthony Panizzi was the most creative force in the history of the British Museum Library. He devoted himself to the formation of the British Museum Library cataloging policy and the compilation of printed catalogues. Moreover, he laid down the sound acquisitions policy and the vigorous a n.0, pplication of the copyright deposit privilege. He designed a great circular reading room and raised standards of library service and administration. (2) British Museum Library Cataloging Rules : 1. are notable for their pioneering efforts-this was the first major catalogue code-and for their influence on all subsequent codes. 2. introduced the concept of corporate authorship but has never dealt with problem very satisfactory. 3. went to great lengths to avoid title entry. 4. used a number of form heading, example for, ACADEMIES, PERIODICAL PUBLICATION, EPHEMERIDES, CATALOGUES etc.

  • PDF

Design of Privilege Authentication for Secure OS based on PKI (PKI 기반 보안운영체제의 권한 인증 설계)

  • Lee, Yun-Hee;Jung, Chang-Sung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.40-43
    • /
    • 2007
  • 보안운영체제에서는 등급기반 사용자, 프로세스, 파일에 대한 영역분리 및 등급별 보안관리를 하는 다중등급보안(Multi Level Security)을 구현하고 있다. 안전한 운영체제에서는 사용자가 등급 즉, 자신의 보안등급과 보호범주를 설정하기 위해 권한 인증절차를 수행한다. 권한은 보안운영체제에서 강제적 접근 제어(Mandatory Access Control)의 기본이 되므로 그 보안에 중요성이 크다. 따라서, 권한 인증 절차의 보안이 부각되고 있다. 본 논문에서는 PKI 기반 전자서명 인증절차를 이용하여 신원 확인과 권한 인증을 한번에 수행할 수 있는 방법을 제시한다.

  • PDF

A distributed algorithm for the coordination of dynamic barricades composed of autonomous mobile robots

  • Lee, Geun-Ho;Defago, Xavier;Chong, Nak-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2030-2035
    • /
    • 2005
  • In this paper, we study the distributed coordination of a set of synchronous, anonymous, memoryless mobile robots that can freely move on a two-dimensional plane but are unable to communicate directly. Based on this model, we analyze the application problem that consists in having a group of robots form a barricade line to protect from car traffic a crowd of demonstrators parading on the street. For the sake of robustness, we privilege fully decentralized solutions to the problem. In particular, we give a self-stabilizing distributed algorithm to address the problem, in this presentation

  • PDF

Restoration of Damaged Anterior Teeth with Incremental Technique and Composite Resin: Case Reports (Incremental Technique과 Composite Resin을 이용한 손상된 전치부 수복: Case Reports)

  • Kim, Hyo-Jun
    • Journal of the Korean Academy of Esthetic Dentistry
    • /
    • v.9 no.1
    • /
    • pp.48-57
    • /
    • 2000
  • Direct bonded restoration with composite resin is one of the few areas which the achievement and result are available in chair side. Especially free-hand bonding technique and incremental technique give us challengeable opportunity for restoring severely damaged anterior teeth. If clinicians have keen sense of observation to evaluate polychromatic characteristics of natural teeth, hue, chroma, value, translucency, opacity and correlate the observation result with various kinds of composite resins, they will have privilege to share joy from restoring damaged anterior teeth in chair side immediately.

  • PDF

An Access Control using SPKI Certificate in Web Environment (웹 환경에서 SPKI 인증서를 이용한 접근 제어)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.11-19
    • /
    • 2006
  • Web service is giving an equal privilege to all user for sharing their resources. Under this situation, a lot of vulnerability against the various attacks through the Internet is possible, more sophisticated security services are necessary. In this paper, we propose an access control scheme using SPKI (Simple Public Infrastructure). The scheme designates an access control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own rights.

  • PDF

Variance of waiting time in the priority scheme of token bus protocols (토큰버스 프로토콜의 우선순위기능에서 대시시간의 분산)

  • Hong, Seung-Ho
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.5
    • /
    • pp.42-53
    • /
    • 1995
  • Token bus protocols have been sidely accepted for Medium Access Control (MAC) in real-time networks such as those used in factory automation, distributed process control, nuclear power plant, aircraft and spacecraft. Token bus protocols provide timer-controlled priority mechanism, which offers multiple level of privilege of medium access to different type of traffic. This paper presents and approximate analytical model for the evaluation of variance of waiting time in the time-controlled proiority scheme of token bus protocols. Token bus system is assumed to be operated with singe-service discipline which is the practical case of real-time networks such as those used in distributed process control and factory automations. The approximate analytical model is validated by comparison with the simulation resuls.

  • PDF