• Title/Summary/Keyword: target system access control

Search Result 70, Processing Time 0.031 seconds

Modeling of Feeding System for Optical Disk Drive and Nonlinear Dynamic Analysis of it (광 디스크 드라이브 이송계의 모델링 및 비선형 특성 분석)

  • Lee, Kwang-Hyun;Choi, Jin-Young;Park, Tae-Wook;Yang, Hyun-Seok;Park, Young-Pil
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2004.11a
    • /
    • pp.75-78
    • /
    • 2004
  • In an optical disk drive, a feeding system which is used to move the optical pick-up system to the target position and the proper control scheme of it are important in random access performance. Since the effect of control is directly affected by the modeling precision of the real system, the precise modeling to the real system should be acquired. Although a simple linear order modeling to the feeding system of an optical disk drive is useful in understanding of the overall dynamic characteristics, the dynamic characteristics which are belongs to the nonlinear area cannot be predicted correctly. Furthermore, the feeding system of an optical disk drive has many nonlinear characteristics such as a nonlinear friction and backlash. For this reason, the understanding of the nonlinear properties in the feeding system is very important. In this paper, the nonlinear items of the feeding system, friction and backlash, are introduced and the effect of it are investigated. Finally, the mathematical model considering the nonlinear properties is compared to the real system, and some comments of it are given.

  • PDF

Development of Marine Emission Control System on NOx and SOx through Seawater Electrolysis

  • Kim Houng-Soo
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.30 no.1
    • /
    • pp.81-87
    • /
    • 2006
  • In marine air pollution control, SCR (Selective Catalytic Reduction) is reconized as the most effect method to control NOx, but on the other hand. seawater scrubber applying the basic characteristic that is naturally alkaline (pH typically around 8.1) is viewed as an economical SOx removal system at present. Especially, seawater scrubber would not be necessary to follow any of the various land based flue gas desulfurization methods. i.e. wet, dry or alkali scrubbing. However, these methods are not readily adaptable to marine conditions due to the quantifies of consumables required i.e. lime or limestone, the means of operation and the commercial availability. This research is undertaken to develop a new method as the main target of eliminating all exhaust emissions, particularly vessel, because of easy access to seawater and apt to apply a wet scrubber system. First, using the acidic seawater by seawater electrolysis, nitric monoxide(NO) is adequately oxidized to nitric dioxide $(NO_2)$by ClOx-in the acidic seawater, the electrolyzed alkaline seawater by electrolysis which contains mainly NaOH together with alkali metal ions $(i.e\;Na^{+}\;K^{+},\;Mg_{2}\;^{+},\;Ca_{2}\;^{+})$, is used as the absorption medium of NOx, the SOx are absorbed by relatively high solubility compared to other components of exhaust pollutants. The results found that the NOx and SOx removals could be achieved nearly Perfect.

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

Chaotic Prediction Based Channel Sensing in CR System (CR 시스템에서 Chaotic 예측기반 채널 센싱기법)

  • Gao, Xiang;Lee, Juhyeon;Park, Hyung-Kun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.1
    • /
    • pp.140-142
    • /
    • 2013
  • Cognitive radio (CR) has been recently proposed to dynamically access unused-spectrum. Since the spectrum availability for opportunistic access is determined by spectrum sensing, sensing control is identified as one of the most crucial issues of cognitive radio networks. Out-of-band sensing to find an available channels to sense. Sensing is also required in case of spectrum hand-off. Sensing process needs to be done very fast in order to enhance the quality of service (QoS) of the CR nodes, and transmission not to be cut for longer time. During the sensing, the PU(primary user) detection probability condition should be satisfied. We adopt a channel prediction method to find target channels. Proposed prediction method combines chaotic global method and chaotic local method for channel idle probability prediction. Global method focus on channel history information length and order number of prediction model. Local method focus on local prediction trend. Through making simulation, Proposed method can find an available channel with very high probability, total sensing time is minimized, detection probability of PU's are satisfied.

Positioning Accuracy on Robot Self-localization by Real-time Indoor Positioning System with SS Ultrasonic Waves

  • Suzuki, Akimasa;Kumakura, Ken;Tomizuka, Daisuke;Hagiwara, Yoshinobu;Kim, Youngbok;Choi, Yongwoon
    • Journal of Power System Engineering
    • /
    • v.17 no.5
    • /
    • pp.100-111
    • /
    • 2013
  • Indoor real-time positioning for multiple targets is required to realize human-robot symbiosis. This study firstly presents positioning accuracy on an autonomous mobile robot controlled by 3-D coordinates that is obtained by a real-time indoor positioning system with spread spectrum (SS) ultrasonic signals communicated by code-division multiple access. Although many positioning systems have been investigated, the positioning system with the SS ultrasonic signals can measure identified multiple 3-D positions in every 70 ms with noise tolerance and error within 100 mm. This system is also robust to occlusion and environmental changes. However, thus far, the positioning errors in an autonomous mobile robot, controlled by these systems using the SS ultrasonic signals, have not been evaluated as an experimental study. Therefore, a positioning experiment for trajectory control is conducted using an autonomous mobile robot and our positioning system. The effectiveness of this positioning method for robot self-localization is shown, from this experiment, because the average control error between the target position and the robot's position at 29 mm is obtained.

Design and Implementation of File Access Control System using Java Card (자바카드를 이용한 파일 접근제어 시스템의 설계 및 구현)

  • Koo, Eun-Bee;Woo, Chan-Il
    • 전자공학회논문지 IE
    • /
    • v.43 no.1
    • /
    • pp.46-51
    • /
    • 2006
  • Recently, smart card system which is known as easy to portable and also safe from physical, electrical, and software attack is observed to manage information that becomes the target of security in safety. And java card graft upon java technology to smart card platform is having very good advantage with object-oriented techniques and also, java card have the open type OS that can show the same action in different hardware characteristic which allows various application programs. In this paper, we introduced independent execution characteristic of java platform because being set to each smart card was uncomfortable till now and we designed access control member card that allows several administrators in different access privilege by single card using java card. Several administrators can approach to various information of file type that is included on issued card to user by using different PIN. In the proposed method, confirmation of personal information, administration contents update, demand by contents, is possible by single card. At this moment, wish to do safer user certification that improve security limitation which is from PIN, used for user certification, and signature data. In the proposed method, as design and implementation of utilization technology of java card, biometrics, user certification which uses multi PIN, provide that more safety and conveniently.

Study on APT Penetration Analysis and Plan of Reaction for Secure XaaS (안전한 XaaS 구현을 위한 APT 공격 분석과 대응방안에 관한 연구)

  • Lee, Sun Ho;Kim, DaeYoub
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.841-850
    • /
    • 2015
  • XaaS (Everything as a Service) provides re-usable, fine-grained software components like software, platform, infra across a network. Then users usually pay a fee to get access to the software components. It is a subset of cloud computing. Since XaaS is provided by centralized service providers, it can be a target of various security attacks. Specially, if XaaS becomes the target of APT (Advanced Persistent Threat) attack, many users utilizing XaaS as well as XaaS system can be exposed to serious danger. So various solutions against APT attack are proposed. However, they do not consider all aspects of security control, synthetically. In this paper, we propose overall security checkup considering technical aspect and policy aspect to securely operate XaaS.

Study on Methodology of Collecting Realtime File Access Event Information (실시간 파일 접근 이벤트 정보 수집 방법에 관한 연구)

  • Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.447-448
    • /
    • 2021
  • The boundary-based security architecture has the advantage of easy deployment of security solutions and high operational efficiency. The boundary-based security architecture is easy to detect and block externally occurring security threats, but is inappropriate to block internally occurring security threats. Unfortunately, internal security threats are increasing in frequency. In order to solve this problem, a zero trust model has been proposed. The zero trust model requires a real-time monitoring function to analyze the behavior of a subject accessing various information resources. However, there is a limit to real-time monitoring of file access of a subject confirmed to be trusted in the system. Accordingly, this study proposes a method to monitor user's file access in real time. To verify the effectiveness of the proposed monitoring method, the target function was verified after the demonstration implementation. As a result, it was confirmed that the method proposed in this study can monitor access to files in real time.

  • PDF

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

Security Verification of Wireless Remote Control System Using CPN (CPN을 이용한 무선원격제어시스템의 안전성 검증)

  • 이문구
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.81-90
    • /
    • 2003
  • Existing web-based system management software solutions show some limitations in time and space. Moreover, they possess such as shortcomings unreliable error message announcements and difficulties with real-time assistance suppers and emergency measures. In order to solve these deficiencies, Wireless Remote Control System was designed and implemented. Wireless Remote Control System is able to manage and monitor remote systems by using mobile communication devices for instantaneous control. The implementation of Wireless Remote Control System leads to these security Problems as well as solutions to aforementioned issues with existing web-based system management software solutions. Therefore, this paper has focused on the security matters related to Wireless Remote Control System. The designed security functions include mobile device user authentication and target system access control. For security verification of these security functions introduced CPN(Coloured Petri Nets) which is capable of expressing every possible state for each stage. And then in this paper was verified its security through PI(Place Invariant) based on CPN(Coloured Petri Nets). The CPN expression and analysis method of the proposed security function can also be a useful method for analyzing other services in the future.