• Title/Summary/Keyword: 권한관리기반구조

Search Result 74, Processing Time 0.026 seconds

Proxy Management Protocol for based on Verifier for Efficient Proxy Signature (효율적인 위임서명을 위한 검증자 중심의 위임관리 프로토콜)

  • Park Se-Joon;Lee Yong-Joon;Oh Dong-Yeol;Oh Hae-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1C
    • /
    • pp.93-101
    • /
    • 2006
  • Proxy signature schemes based on delegation of warrant are frequently studied in these days. Proxy signature schemes that used in these days have some problems about the security. Especially, it is difficult to prevent misuse of certification and private key. In this thesis, we propose the more stronger security structure by turning the point from original signer with proxy signer to original signer with verifier, and the proposed protocol is more stronger than previous scheme and can be applied to various PKI based application.

A study on the integrated interworking and management method of the warning system for disaster information delivery (재난정보전달을 위한 예·경보 시스템 통합 연동 및 관리 방안에 대한 연구)

  • Oh, Seung-hee;Jung, Woo-Sug;Lee, Yong-Tae;Kim, Kyung-Seok
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.07a
    • /
    • pp.492-494
    • /
    • 2020
  • 본 논문에서는 지방자치단체(지자체)에서 관리하는 다양한 예·경보시스템들이 별도의 서버로 관리되어 다원화 운영으로 복잡할 뿐만 아니라 제공하는 정보의 내용과 범위도 통일되지 않았던 문제점과 중앙 정부에서 재난정보 전달에 대한 결과 정보를 실시간으로 확인이 어려웠던 문제점을 해결하기 위한 방안 및 시스템에 대해서 제안한다. 제안하는 차세대 통합 예·경보 플랫폼은 웹서비스 형태로 접속하여 부여된 권한에 따라 재난정보를 한 번의 클릭을 통해 다양한 매체로 전달할 수 있을 뿐만 아니라, 재난정보 전달에 대한 결과도 실시간으로 확인 가능한 장점을 지니고 있다. 본 논문에서는 국내 예·경보시스템의 현황을 살펴보고 이를 기반으로 차세대 통합 예·경보 플랫폼의 구조 및 전달하는 재난정보 프로파일을 제안하고 이를 통해 기존 예·경보 시스템을 통합 연동 및 관리하는 방안에 대해 설명한다.

  • PDF

Study on Establishing Earthquake-resistance Reinforcement Measures for Earthquake Disasters in National Industrial Complexes (국가산업단지의 지진재난 내진보강대책 수립 연구)

  • Chang Young Song
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.882-896
    • /
    • 2023
  • Pupose: The purpose is to prepare safety management and seismic reinforcement measures that can effectively improve the potential risks of earthquake-resistant design and the deficiencies of safety guidance and inspection of factory facilities in national industrial complexes. Method: In this study, problems and improvement measures were derived through investigation and analysis of overall earthquake disaster safety management, such as safety management status and management system in preparation for earthquake disasters in national industrial complexes. was implemented to suggest improvement plans based on facility types and structural characteristics. Result: In conclusion, the problems of safety management and seismic reinforcement in preparation for earthquake disasters in national industrial complexes were summarized and classified into four types (seismic performance evaluation and related system supplementation, authority of tenant companies and local governments, seismic reinforcement and safety management support measures, organizational structure capacity building) to derive improvement measures. Conclusion: Based on this, seismic reinforcement measures that companies in national industrial complexes should implement in preparation for earthquake disasters were prepared, and detailed plans for each measure were presented.

Developing Tool of Distributed Application Program Based on Distributed Object Group Framework (분산객체그룹 프레임워크 기반 분산응용 프로그램 개발 도구)

  • Lim Jeong-Taek;Shin Chang-Sun;Joo Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.71-83
    • /
    • 2005
  • In this paper, we developed the Distributed Programming Developing Tool(DPDT) which can make distributed application program efficiency based on the distributed object group framework supporting group management and dynamic binding for object resources requested from clients on distributed systems. The distributed object group framework we constructed provides not only the group register/withdraw, the access right and the name/property services for server objects from a point of view of group management services, but also dynamic binding, replicated object supporting, load balance, and federation among the object groups from a point of view of the supporting services of distributed application, When developing distributed application, by using our tool, server programming developer implements objects in each server system, next registers the properties to need for service provision to the object group. Client programming developer can also develop client program easily by obtaining the access right for the object or the object group and using the properties of objects with the access right permitted to the client. For providing above application developing environment in this paper. we described the definition of object group, the architecture of the distributed object group framework which our tool supports, and its functionalities, then specified the 3 GUI environments of DPDT implemented for providing efficient interfaces between the distributed object group and distributed applications. Finally, by using the DPDT, we showed the group register/withdraw and the access right grant procedure of objects which are server programs, the developing process of client program, and the executing results of the distributed application developed.

  • PDF

Token-Based IoT Access Control Using Distributed Ledger (분산 원장을 이용한 토큰 기반 사물 인터넷 접근 제어 기술)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.377-391
    • /
    • 2019
  • Recently, system studies using tokens and block chains for authentication, access control, etc in IoT environment have been going on at home and abroad. However, existing token-based systems are not suitable for IoT environments in terms of security, reliability, and scalability because they have centralized characteristics. In addition, the system using the block chain has to overload the IoT device because it has to repeatedly perform the calculation of the hash et to hold the block chain and store all the blocks. In this paper, we intend to manage the access rights through tokens for proper access control in the IoT. In addition, we apply the Tangle to configure the P2P distributed ledger network environment to solve the problem of the centralized structure and to manage the token. The authentication process and the access right grant process are performed to issue a token and share a transaction for issuing the token so that all the nodes can verify the validity of the token. And we intent to reduce the access control process by reducing the repeated authentication process and the access authorization process by reusing the already issued token.

Design and Implementation of Fieldbus Data Link Layer Protocol for Intelligent Sensor (지능형 센서용 필드버스 데이터링크계층 프로토콜 설계 및 구현)

  • Kim, Yu-Chul;Hong, Seung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1999.07b
    • /
    • pp.945-947
    • /
    • 1999
  • 첨단의 자동화 시스템을 구축하기 위해서는 각 필드기기에서 생산되는 정보들을 적절한 형태로 가공하여 적시에 필요한 공정으로 제공하여 줄 수 있는 지능형 센서 및 필드기기의 도입이 필요하다. 이러한 필드기기들이 유기적으로 정보를 교환하고 공유하기 위해서는 통신망 시스템을 구축할 필요가 있다. 필드버스는 자동화 및 분산 제어 시스템의 컴퓨터 통신망 계층구조에서 최하위 계층 기기들 간에 실시간 통신을 제공하는 산업용 통신망이다. 본 연구에서는 통신용 프로세서인 Mc68360을 기반으로 하여 필드버스의 일종인 Profibus의 물리계층과 데이터링크계층 프로토콜을 구현하였다. 물리계층은 프로세서의 UART 통신 기능과 RS-485칩을 사용하여 구현하고, 데이터링크계층 프로토콜은 프레임 분석과 송수신, 에러처리, 흐름제어, 매체접속권한 관리 등의 기능을 소프트웨어로 구현하였다. 또한 지능형 센서 본래의 목적중의 하나인 원격관리 기능을 위하여 각 필드기기의 노드 주소, 타이머 값 등의 통신 파라미터를 원격 마스터에서 설정할 수 있도록 관리계층의 기능을 추가하였다. 본 연구에서는 각각 하나의 노드기능을 담당하는 여러 개의 보드들로 구성된 testbed를 구축하고, 다양한 통신환경에서 초기화, 정상, 비정상 상태 등의 동작을 실험하였으며, 이를 통하여 지능형 센서용 필드버스의 데이터링크계층 프로토콜이 정상적으로 동작됨을 확인하였다.

  • PDF

A Formal Specification of Role Graph Model Increasing Integrity (무결성이 강화된 역할 그래프 모델의 정형적 명세)

  • Choi EunBok;Lee HyeongOk
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1620-1629
    • /
    • 2004
  • The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control(RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, We present the role graph model which enhanced flexibility and integrity to management of many access permission. Also, In order to represent those rule and constraints clearly, formal descriptions of role assignment rule and constraints in Z language are also given.

  • PDF

A Integration Systems of REL/RDD based on MPEG-21 (MPEG-21 기반의 REL/RDD 연동 시스템)

  • Yeon, Dong-Hee;Kim, Yoon-Gi;Song, Jong-Chul;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.421-424
    • /
    • 2005
  • Recently, As the managing techniques of consuming method and transmission for the sharply increasing multimedia contents has been developed regardless of compatibility by each company, It is a serious obstacle to the development of the organized copyright techniques because nothing can be shared by each other. The MPEG committee under ISO established MPEG-21 framework for it and proposed the REL as the words taking care of copyright and standardized them. However, there seemed to be some problems that special knowledge such as Schema defining the structures of XML and REL should be necessary. Furthermore, There can be some obscurity when the authority of REL document and one of consumer side is different. Therefore, in this paper, we laid out and realized the copyright including consuming system to copyright and prove the REL documents more conveniently and RDD integration system using Web Services technology which can get rid of the vagueness of REL.

  • PDF

A Study of Security Authentication for Cloud Computing Based on Smart Phone (스마트폰 기반의 클라우드 컴퓨팅 보안 인증 연구)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1027-1035
    • /
    • 2012
  • Recently, the smart phone including web and mobile service based on the reliability and extendability of cloud computing is receiving huge attention. However, most of current cloud services provide just an application service for synchronizing data between mobile entity and server. Business model developed by communication companies have problems with interoperability. This paper proposes a new service security authentication model to efficiently manage smart phone users using different business models between smartphones and to keep the reliability and extendability of cloud computing. Proposed model authenticates for smart phone users to stay with in the unified communication with smart phone user's identity and access control to effectively use the current cloud computing system.

Design and implementation of protection and management system of digital contents based on MPEG-21 IPMP (MPEG-21 IPMP 기반 디지털 콘텐츠 보호 관리 시스템 설계 및 구현)

  • Ryu Kwang-Hee;Kim Yun-Ki;Kim Kwang-Yong;Kim Jae-Gon;Hong Jin-Woo;Jung Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.149-152
    • /
    • 2006
  • The usage increase of digital contents required solution for protection technology and interoperability of system. MPEG proposed MPEG-21 Multimedia Frameworks. MPEG-21 IPMP is standard that provides the means to enable digital item and rights information to be persistently managed and protected across networks and devices. In this paper, MPEG-21 IPMP based system to protect digital contents designed by four structures of license server, production server, consumption server, tool sewer. License sewer create rights information document using the XML-based REL about multimedia contents of users. Production server makes a digital item by packaging multimedia resource and metadata, which is combined by REL information and IPMP information of multimedia resource. Consumption server takes care of the functions of players that use digital item, and tool server was implement to transmit for missing tool that night occur in all procedures.

  • PDF