• Title/Summary/Keyword: 네트워크 접근제어시스템

Search Result 266, Processing Time 0.028 seconds

Context-Aware Contents Delivery Control System for U-Learning (유비쿼터스 러닝을 위한 상황인식 컨텐츠 전송제어 시스템)

  • Chung, Jeong-Hyeon;Lee, Eun-Seok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.628-630
    • /
    • 2005
  • 유비쿼터스 컴퓨팅 환경의 중요한 이슈 중 하나인 상황인식은 컴퓨팅환경(예를 들어 가용 처리장치, 사용자 입력과 표시를 위한 장치, 네트워크 수용량, 다른 기기와의 접속용이성 및 컴퓨팅비용 등), 사용자 환경(위치, 주위 사람들과의 접촉, 사회적 입장 등) 및 물리적 환경(밝기, 소음, 온도 등)이 지속적으로 변화하는 수행 환경에서 인간으로 하여금 본연의 목적을 달성하는데 집중할 수 있도록 지원하는 인간 친화적인 시스템을 제공하기 위한 필수 기술이다. 이러한 상황인식을 이용하여, 사람이나 장소 및 사물의 입장이나 처지 혹은 관계 등을 특징 지을 수 있는 신원, 위치, 상태(혹은 활동) 및 시간의 4가지 상황정보를 고려한 학습이 이루어지도록 지원함으로써 학습에 있어서의 접근용이성과 적응성을 높이기 위한 컨텐츠 전승제어 시스템을 제안한다.

  • PDF

Automation System for Sharing CDM Data (CDM 데이터 공유를 위한 자동화 시스템)

  • Jeong, Chae-Eun;Kang, Yunhee;Park, Young B.
    • Journal of Platform Technology
    • /
    • v.8 no.3
    • /
    • pp.3-9
    • /
    • 2020
  • As the need for sharing for research purposes in the medical field increases, the use of a Common Data Model (CDM) is increasing. However, when sharing CDM data, there are some problems in that access control and personal information in the data are not protected. In this paper, in order to solve this problem, access to CDM data is controlled by using an encryption method in a blockchain network, and information of CDM data is recorded to enable tracking. In addition, IPFS was used to share a large amount of CDM data, and Celery was used to automate the sharing process. In other words, we propose a multi-channel automation system in which the information required for CDM data sharing is shared by a trust-based technology, a distributed file system, and a message queue for automation. This aims to solve the problem of access control and personal information protection in the data that occur in the process of sharing CDM data.

  • PDF

Study on the Technical Security Factor for the Implementation of Secure DB System (안정적인 DB보안 시스템 구축을 위한 보안기술요소 분석에 관한 연구)

  • Yoon, Sun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.143-152
    • /
    • 2014
  • This paper introduces Database security to prevent the rapidly increasing issue of private information leakage. The Database security examined in the paper separates into DB access control area and DB encryption area which further leads the paper to analyze the factors of the two areas and suggest necessary elements for creating stable Database security. In addition, the paper examines previous DB security programs by areas and analyzes pros and cons from the tested result. The experiment indicated that while DB access control presents less degradation and reduced the need to modify the existing DBMS since the access control operates at the end point of the network, DB encryption presented strength in protecting the data from unauthorized access. On the other hand, DB access control is less useful in preventing the attack in advance which leaves the log to enable tracking afterward while DB encryption can only be operated by limited types of Database and causes degradation due to system load and shows higher percentage of failure when creating the system. This paper examines characteristics of Database security areas in order to be used as a reference for institutions or companies seeking stable Database security.

Performance Analysis of OCDMA on Plastic Optical Fiber Access Network (플라스틱 광섬유를 사용한 통신망에서 OCDMA의 성능 분석)

  • Zhang, Ke;Suh, Hee-Jong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1083-1092
    • /
    • 2016
  • In this paper, the performance of the optical code-division multiple access (OCDMA) technology on a plastic optical fiber (POF) access network, which had received much attention due to its low weight, large core diameter, flexibility, easy installation, and especially its high bandwidth, is analyzed. Recently, POF was a very attractive candidate for transmission media in an access network based on OCDMA technology. But the conventional OCDMA system only allows finite units to transmit and access simultaneously according to the number of channels which are restricted by BER, and so, in this paper, to resolve this problem a novel multi-priority reservation protocol is also proposed. By using this reservation scheme and a distributed arbitration algorithm, channel collision and destination conflict could be avoided. And this protocol can efficiently support the transmission of multimedia messages that require the different time-delay. The network throughput and average delay using various system parameters have been investigated by numerical analysis and simulation experiments. These results shows that the multi-priority reservation protocol in this POF access network based on OCDMA technology is valid and efficient.

Processor-Architecture for the Faster Processing of Genetic Algorithm (유전 알고리듬 처리속도 향상을 위한 프로세서 구조)

  • 윤한얼;정재원;심귀보
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.169-172
    • /
    • 2004
  • 유전 알고리듬은 NP-Hard 문제의 해결이나, 함수 최적화, 복잡한 제어기의 파라미터 값 추적 등, 광범위한 분야에 걸쳐 이용되고 있다 일반적인 유전 알고리듬은 적합도 함수를 통해 해들의 품질을 결정하고, 해들의 품질에 따라 선택 연산을 거쳐, 교차나 돌연변이를 통해 우수한 품질의 해를 찾는 과정을 가진다 현재 이 과정은 대부분 소프트웨어적으로 구현되어 범용 프로세서를 통해 수행된다. 그러나 높은 소프트웨어 의존성은 해집단의 크기가 커질수록 교차/변이 연산과 해들의 품질비교에 수행되는 시간을 크게 증가시키는 약점이 있다. 따라서 본 논문에서는 순위 기반 선택과 일점 교차(one-point crossover)를 사용한다는 제약하에, 해들의 순위를 정렬 네트워크를 통해 결정하고 해들을 Residue Number System(RNS)로 표현하여 하드웨어적으로 교차연산을 처리하는 프로세서 구조를 제안한다 이러한 접근을 통해 해들의 품질비교에 걸리는 시간을 크게 줄이고 교차/변이 연산의 효율을 높일 수 있다.

  • PDF

The Elevator Control System Integrated Wire and Wireless based on Information Technology (IT기반 유무선 통합 승강기 제어 시스템)

  • Kim, Woon-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.113-120
    • /
    • 2011
  • The information of the IT convergence has extended through the whole business ares with supplying intelligence terminal such as smart phone and the technology of sensors and wireless networks. And also, the existed industry became to high technology and extended various parts. The industry of the elevator became the center of the life offering the diversification of the user environment access and high building control. In this paper, we suggest the elevator control system integrated wire and wireless based on Information technology. We suggest the service model of user friendly connected by internet. For this, we make the relation model of the elevator system and IT environments and then design the service model for wire service and wireless service using smart phone. It can make to supply efficient information with wire and wireless environments and also make improvement in accessability for the disabled peoples.

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF

웹 서비스 보안기술 표준화 동향

  • 홍기융;홍기완;박종운;이규호
    • Review of KIISC
    • /
    • v.14 no.4
    • /
    • pp.19-26
    • /
    • 2004
  • 웹 서비스는 인터넷 기술을 이용한 표준화된 오픈 네트워크를 통해 조직 내 및 조직간 모든 컴퓨터 시스템을 결합시키는 새로운 컴퓨팅 패러다임으로 자리 잡으면서, 기술과 서비스의 융합(Convergence), 표준화(Standardization)가 급속도로 진행되고 있다. 이러한 현상은 정보 및 서비스의 공유를 필수적으로 수반하므로, 프라이버시, 기밀성, 무결성, 인증, 및 접근제어 등과 같은 보안과 신뢰성에 대한 중요성을 부각시킨다. 현재 웹 서비스 보안기술은 W3C, OASIS, WS-I의 세 표준화 단체를 중심으로 표준화가 진행되고 있다. 본 논문에서는 각 표준화 단체에서 추진하고 있는 웹서비스 보안기술의 최근 동향을 분석한다.

Token-Based IoT Access Control Using Distributed Ledger (분산 원장을 이용한 토큰 기반 사물 인터넷 접근 제어 기술)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.377-391
    • /
    • 2019
  • Recently, system studies using tokens and block chains for authentication, access control, etc in IoT environment have been going on at home and abroad. However, existing token-based systems are not suitable for IoT environments in terms of security, reliability, and scalability because they have centralized characteristics. In addition, the system using the block chain has to overload the IoT device because it has to repeatedly perform the calculation of the hash et to hold the block chain and store all the blocks. In this paper, we intend to manage the access rights through tokens for proper access control in the IoT. In addition, we apply the Tangle to configure the P2P distributed ledger network environment to solve the problem of the centralized structure and to manage the token. The authentication process and the access right grant process are performed to issue a token and share a transaction for issuing the token so that all the nodes can verify the validity of the token. And we intent to reduce the access control process by reducing the repeated authentication process and the access authorization process by reusing the already issued token.

A Study to Hierarchical Visualization of Firewall Access Control Policies (방화벽 접근정책의 계층적 가시화 방법에 대한 연구)

  • Kim, Tae-yong;Kwon, Tae-woong;Lee, Jun;Lee, Youn-su;Song, Jung-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1087-1101
    • /
    • 2020
  • Various security devices are used to protect internal networks and valuable information from rapidly evolving cyber attacks. Firewall, which is the most commonly used security device, tries to prevent malicious attacks based on a text-based filtering rule (i.e., access control policy), by allowing or blocking access to communicate between inside and outside environments. However, in order to protect a valuable internal network from large networks, it has no choice but to increase the number of access control policy. Moreover, the text-based policy requires time-consuming and labor cost to analyze various types of vulnerabilities in firewall. To solve these problems, this paper proposes a 3D-based hierarchical visualization method, for intuitive analysis and management of access control policy. In particular, by providing a drill-down user interface through hierarchical architecture, Can support the access policy analysis for not only comprehensive understanding of large-scale networks, but also sophisticated investigation of anomalies. Finally, we implement the proposed system architecture's to verify the practicality and validity of the hierarchical visualization methodology, and then attempt to identify the applicability of firewall data analysis in the real-world network environment.