• Title/Summary/Keyword: 능력기반 접근제어

Search Result 27, Processing Time 0.028 seconds

Design and Safety Analysis of a Role-Based Access Control Framework for Mobile Agents in Home Network Environments (홈 네트워크 환경에서 이동 에이전트의 역할에 기반한 접근제어 프레임워크 설계 및 안전성 평가)

  • Jung, Young-Woo;Ko, Kwang-Sun;Kim, Gu-Su;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.537-544
    • /
    • 2007
  • A home network is a residential local area network in which digital home appliances are connected with each other. Applying the mobile agent technology to the home network is expected to provide a new computing model. In particular, mobility and asynchronous ability of mobile agent can be used to reduce network traffic generated for managing home appliances. However, in order to apply the mobile agent concept to the home network, access control for mobile agents is necessary. In the existing home network system, there is one special server, sometimes called home server This server generally has mapping tables to be updated periodically, which describes access control lists between users' authorities and corresponding devices. In this paper, we propose a role-based access control framework with mobile agents in home networks. This framework, called Secure KAgent framework, is designed and implemented based on KAgent system. It has two main characteristics: to control access permissions based on Role-Based Access Control(RBAC) scheme and to safety assign roles to mobile agents by role tickets.

Design and Implementation of The Capability Token based Access Control System in the Internet of Things (IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현)

  • Lee, Bum-Ki;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.439-448
    • /
    • 2015
  • IoT (Internet of Things) propels current networked communities into a advanced hyper-connected society/world where uniquely identifiable embedded computing devices are associated with the existing internet infrastructure. Therefore, the IoT services go beyond mere M2M (Machine-to-Machine communications) and should be able to empower users with more flexible communication capabilities over protocols, domains, and applications. In addition, The access control in IoT need a differentiated methods from the traditional access control to increase a security and dependability. In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments. In the proposed system, Authorities are symbolized into concepts of the capability tokens, and the access control systems manage the tokens, creation, (re)delegation and revocation. The proposed system is expected to decrease the process time of access control by using capability tokens.

IP router-based W-PAN (Wireless Personal Area Network) Authentication Control Technology (IP 공유기 기반 W-PAN(Wireless Personal Area Network) 인증 제어기술 개발)

  • Choi, Jung-In;Lee, Sun-Sook;Lee, Ha-Kyung;Lee, Jun-Hyeong;Jeong, Jung-Su;Young, Hwan-Seung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.311-313
    • /
    • 2013
  • 본 논문에서는 W-PAN 환경에서 IP공유기를 표준설계하고 구현하며 효율적인 실시간 사용자 웹기반 인증 기법을 연구하였다. 또한 W-PAN Device & Service Application 인증과 접근, 권한제어를 위한 인증 Client 모듈과 Server 모듈, Supplicant를 개발하고 제안하였다. 이를 통해 IP 공유기 기반 환경에서의 W-PAN 환경에서 인증 제어 솔루션에 대한 개발로 생산되는 단말기의 서비스 품질을 향상시키고 무선 접속 기술을 표준화 할 수 있다. 또한 유해한 트래픽을 검색하고 보호하는 안정적인 시스템 관리가 가능해졌다. W-PAN Device와 Service Application 인증, 접근 및 권한 제어를 위한 인증 시스템의 플랫폼 구축으로 향후 관련 기술의 통합과 융합 기술을 적용할 수 있는 능력을 확보하였다.

  • PDF

An Anonymity-Preserving User Authentication and Authorization Model for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.25-32
    • /
    • 2005
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'Smart space' augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack of proper authentication and authorization techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environments. In this Paper, we propose efficient user authentication and authorization model with anonymity for the privacy-preserving for ubiquitous computing environments. Our model is suitable for distributed environments with the computational constrained devices by using MAC-based anonymous certificate and security association token instead of using Public key encryption technique. And our Proposed Protocol is better than Kerberos system in sense of cryptographic computation processing.

Control of Real Time Mobile Robot Based Internet using Fuzzy Analytic Hierachy Process (퍼지AHP를 이용한 인터넷기반 이동로봇의 실시간 제어)

  • Jin, Hyeon-Su
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.11a
    • /
    • pp.91-95
    • /
    • 2007
  • 인터넷의 발전과 더불어 유무선 통신 인터페이스의 발전은 가상 인터넷 공간 및 현실세계에서의 사람과 사람 또는 컴퓨터와 컴퓨터사이의 정보전달 뿐만 아니라, 컴퓨터와 사람사이의 양방향 정보전달과 상호작용을 가능하게 하고 있다. 이러한 추세에 맞추어 지능형 디지털 주거 공간의 컴퓨터및 디지털 기기와 연통되어 언제 어디서나 접근 가능한 Ubiquitous Robot은 디지털 사회를 이끌 주요 신산업의 통력이 될 것이다. Ubibot은 스마트센서. 지능형 정보입출력 장치 등을 지니고 다양한 컴퓨터 및 디지털 기기와 스마트 환경센서 등을 제어할수 있고 정보를 전달하는 통신 능력을 지닌다.

  • PDF

Research on User-Centric Inter-Organizational Collaboration (UCICOIn) framework (사용자 제어 기반 다중 도메인 접근 제어에 대한 연구)

  • Sunghyuck Hong
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.37-43
    • /
    • 2023
  • In today's business landscape, collaboration and interoperability are crucial for organizational success and profitability. However, integrating operations across multiple organizations is challenging due to differing roles and policies in Identity and Access Management (IAM). User-centric identity (UCI) adopts a personalized approach to digital identity management, centering on the end-user for authentication and access control. It provides a decentralized system that ensures secure and customized access for each user. UCI aims to address complex security challenges by aligning access privileges with individual user requirements. This research delves into UCI's ability to streamline resource access amidst conflicting IAM roles and protocols across various organizations. The study presents a UCI-based multi-domain access control (MDAC) framework, which encompasses an ontology, a unified method for articulating access roles and policies across domains, and software services melding with UCI infrastructure. The goal is to enhance organizational resource management and decision-making by offering clear guidelines on access roles and policy management across diverse domains, ultimately boosting companies' return on investment.

유비쿼터스 센서 네트워크의 정보보호 이슈와 동향

  • 박종욱;주학수;이재일;이동훈
    • Information and Communications Magazine
    • /
    • v.21 no.6
    • /
    • pp.89-101
    • /
    • 2004
  • 최근 저전력의 무선통신과 적응형 자가조직(Self-organization)능력을 가진 초소형 마이크로센서의 하드웨어 기술 발전으로 다양한 기능의 센서를 이용한 무선 센서 네트워크의 구축이 가능하게 되었다. 무선 센서 네트워크는 현실세계의 여러 이벤트를 감지하는 센싱 작업을 기반으로 주로 과학용이나 군사용으로 많이 사용되고있다. 즉, 직접 접근이 용이하지 않은 전장에서의 적군감시, 열악한 환경을 모니터링 하는 지진감지, 교통의 감시와 제어를 위한 지능형 교통통제, 장기간의 관찰이 요구되는 생태감시 등 그 응용범위가 다양하게 확장되고 있다. (중략)

Development of Equipment Control System based on DB Access Method for Industrial IoT (Industrial IoT를 위한 데이터베이스 접근 기반 장비 제어 시스템 개발)

  • Cho, Kyoung-woo;Jeon, Min-ho;Oh, Chang-heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1142-1147
    • /
    • 2016
  • Recently, IoT(Internet of Things) has been extensively researching to provide intelligent services by fusing ICT. Especially with the advent of Germany's Industry 4.0, it is emphasized the importance of the industrial IoT to maximize the production capacity. Accordingly, a lot of efforts to spread the smart factory base of industrial IoT have continued domestically as well as abroad. But the current smart factory systems have controlled equipment using the data declared in the embedded systems. Therefore, it is difficult to control environment that lots of equipment is installed. In this paper, we proposed equipment control system based on data base access method for industrial IoT. This method controls the equipment using data base from parameter of equipment. Through experiments that the system apply to mold shot system with a number of variables, it is shown that the proposed method can efficiently control a number of devices.

Data Control Methods of Online Application based on Multi-Platform (멀티 플랫폼 기반 온라인 응용의 데이터 제어 기법)

  • Kim, Jin-Deog;Jin, Kyo-Hong
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.4
    • /
    • pp.79-89
    • /
    • 2002
  • Several multi-user online applications which are operated by the existing fixed terminals(PC) are being changed into online application based on multi-platform operated by the several PC, PDA and mobile phones to perform concurrent works recently. The contents of current online application based multi-platform are, however, very unsophisticated because the applications don't consider the simultaneous accesses of shared data by multi-user and also the asymmetry of computing power and network bandwidth among each client. This paper proposed the methods of consistency control based on multi-platform, update propagation protocols among diverse clients, object management techniques which take the characteristics of mobile clients into account. We also implemented a chatting application based on multi-platform and it showed the proposed methods perform well.

  • PDF

Concept Design of Download Over-the-Air functions for IoF-Cloud based distributed IoT device (IoF-Cloud 기반 분산된 IoT 장비들을 위한 Download Over-the-Air 기능의 개념 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, HyeongGyun;Kim, YongIl;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.9-17
    • /
    • 2016
  • Over the next 20 years it will begin the exodus from the Internet and smart phones to the Internet of Things. The heart of IoT gives new utility and value with connectivity among things around people to the human. In future, Industrial environment will be intimately connect all among machines and machines or factories and factories in all processing, and by digitizing of all goods and production life-cycle, which is a combination of virtual world and real world, the digital factory will become reality eventually. The proposed IoT or IIoT based Download OTA (Over-the-Air) provides a flexible mechanism for downloading Media objects of any type and size from a network. Moreover, proposed IoT based DLOTA provides a part of security by lightweight encryption, OTP, and CapBAC technique.