• Title/Summary/Keyword: 문서 접근 제어

Search Result 88, Processing Time 0.025 seconds

Analysis of Access Authorization Conflict for Partial Information Hiding of RDF Web Document (RDF 웹 문서의 부분적인 정보 은닉과 관련한 접근 권한 충돌 문제의 분석)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.49-63
    • /
    • 2008
  • RDF is the base ontology model which is used in Semantic Web defined by W3C. OWL expands the RDF base model by providing various vocabularies for defining much more ontology relationships. Recently Jain and Farkas have suggested an RDF access control model based on RDF triple. Their research point is to introduce an authorization conflict problem by RDF inference which must be considered in RDF ontology data. Due to the problem, we cannot adopt XML access control model for RDF, although RDF is represented by XML. However, Jain and Farkas did not define the authorization propagation over the RDF upper/lower ontology concepts when an RDF authorization is specified. The reason why the authorization specification should be defined clearly is that finally, the authorizatin conflict is the problem between the authorization propagation in specifying an authorization and the authorization propagation in inferencing authorizations. In this article, first we define an RDF access authorization specification based on RDF triple in detail. Next, based on the definition, we analyze the authoriztion conflict problem by RDF inference in detail. Next, we briefly introduce a method which can quickly find an authorization conflict by using graph labeling techniques. This method is especially related with the subsumption relationship based inference. Finally, we present a comparison analysis with Jain and Farkas' study, and some experimental results showing the efficiency of the suggested conflict detection method.

A UPnP Proxy System for the Remote Control of Home Appliances (댁내 장치의 원격 제어를 위한 UPnP 프록시 시스템)

  • 김동희;임경식;이화영;안준철;조충래;박광로
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.4
    • /
    • pp.337-350
    • /
    • 2004
  • Because of a security problem and not enough IPv4 address space, the home network has been made up of private network, and it has been separated from Internet. This fact prevents people in Internet from controlling and monitoring home appliances. So, this paper designs and Implements the UPnP Proxy System which offers functions for users to control and monitor home appliances. When users are in the outside of the home network, they do not know which devices were connected in the home network because the advertisement messages of UPnP devices would not be delivered to the outside of the home network. Also, users cannot access devices directly, and their control messages are not delivered into the home network. So, this paper designs and implements the UPnP Proxy System to solve these problems. The merit of the system is that users can control and monitor home appliances in realtime using presentation web documents with the HTTP push technology.

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF

Study on Enhancing National Defense Security based on RFID and Internet of Things Technology (RFID와 사물인터넷을 활용한 국방 보안 강화에 대한 연구)

  • Oh, Se-Ra;Kim, Young-Gab
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.175-188
    • /
    • 2017
  • Radio-frequency identification (RFID) is being used in various fields as a technology for identifying objects (people, things etc.) using radio frequencies. In the past, there was an attempt to apply RFID into national defense, but failed to spread RFID in the defense field because of some limitations of RFID in a specific situation (e.g., low recognition rate). Therefore, in this paper, we propose how to overcome the limitation of RFID by adopting the Internet of Things (IoT) technology which is considered as an important technology of the future. Furthermore, we propose four scenarios (i.e., healcare band and RFID, identification and anormal state detection, access control, and confidential document management) that can be used for enhancing national defense security. In addition, we analyze the basic characteristics and security requirements of RFID and IoT in order to effectively apply each technology and improve security level.

A Study on the RDP, VNC Applicaion for the computer Remote Control by Mobile (모바일 기반의 컴퓨터 원격제어를 위한 RDP, VNC Application에 관한 연구)

  • Song, Jong-gun;Jang, Won-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.459-462
    • /
    • 2009
  • The Growth in wireless Internet has made Networking possible at anytime and anywhere so that application program development is vigorous for mobile service implementation. In particular, mobile service has a feature that can present flexible service at anytime, and anywhere. This study proposes a system which is able to make a remote control of computer by means of mobile as an example of the production of application for such mobile service. This paper researches a RDP(Remote Desktop Protocol), VNC(Virtual Network Computing) system that control screen of remote computer and input devices by using smart-phone. The advantage of this system is the function that turning on and off the computer, file transfer, file upload/download, and paperwork. Therefore users are expected to use more conveniently.

  • PDF

Design of Middleware for Integration Repository of XML-based Bio and Medical Information (XML 기반의 바이오 및 임상정보 통합 저장소를 위한 미들웨어의 설계)

  • Jeong, Jong-Il;Yu, Wee-Hyuk;Lee, Tae-Heon;Shin, Dong-Kyoo;Shin, Dong-Il
    • Annual Conference of KIPS
    • /
    • 2005.05a
    • /
    • pp.63-66
    • /
    • 2005
  • 최근 환자중심의 진료환경 구축을 통한 진료의 질적인 향상을 위해 바이오 및 임상정보 통합의 필요성이 점차 커지고 있다. 따라서 기존의 폐쇄적인 의료시스템들을 개방적인 시스템으로 전환하고 각 시스템간에 정보를 교환하고 공유하기 위해 HL7 등의 표준들이 급속히 확산되고 있다. 그러나 HL7 은 임상문서 교환을 위한 유연성있는 표준이지만 시스템에 의존적인 형태의 메시지는 이질적인 시스템간의 정보교환에는 부적합하다. 따라서 HL7 표준중 XML 기반의 임상기록 저장 구조인 CDA 를 이용하여 환자의 임상정보가 통일되고 통합될 필요성이 있으며 본 논문은 새로운 CDA 를 지원하기 위해 바이오 및 임상정보를 통합하고 통합된 정보를 통합저장소에 저장하는 기능과 시스템 간 자료전송 그리고 외부의 응용프로그램을 통한 통합저장소의 접근제어 기능을 수행하는 미들 웨어를 설계한다.

  • PDF

E-DRM-based Privacy Protection Technology for Overcoming Technical Limitations of DLP-based Solutions (DLP방식의 문제점 극복을 위한 E-DRM 방식의 개인정보 보호 기술)

  • Choi, Jong-Uk;Lee, Yong-Jin;Park, Ju-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1103-1113
    • /
    • 2012
  • DLP technology has been effectively enforcing privacy protection policy in on-line computing environment. However, with wide spread use of smart devices and promotion of smart-works, it has been pointed out that DLP technology cannot effectively prevent privacy leakage at smart devices and is comparatively weak at APT attack. In this paper, we suggests a hybrid approach, PPS, which integrates E-DRM system with DLP technology, taking advantages of both technologies. The technology basically uses encryption function and access control of E-DRM system, and thus it can effectively prevent leakage of privacy information of customers, even if the documents are in the hands of malicious third parties.

A Design and Implementation of Reliability Analyzer for Embedded Software using Markov Chain Model and Unit Testing (내장형 소프트웨어 마르코프 체인 모델과 단위 테스트를 이용한 내장형 소프트웨어 신뢰도 분석 도구의 설계와 구현)

  • Kwak, Dong-Gyu;Yoo, Chae-Woo;Choi, Jae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.1-10
    • /
    • 2011
  • As requirements of embedded system get complicated, the tool for analyzing the reliability of embedded software is being needed. A probabilistic modeling is used as the way of analyzing the reliability of a software and to apply it to embedded software controlling multiple devices. So, it is necessary to specialize that to embedded software. Also, existing reliability analyzers should measure the transition probability of each condition in different ways and doesn't consider reusing the model once used. In this paper, we suggest a reliability analyzer for embedded software using embedded software Markov chin model and a unit testing tool. Embedded software Markov chain model is model specializing Markov chain model which is used for analyzing reliability to an embedded software. And a unit testing tool has host-target structure which is appropriate to development environment of embedded software. This tool can analyze the reliability more easily than existing tool by automatically measuring the transition probability between units for analyzing reliability from the result of unit testing. It can also directly apply the test result updated by unit testing tool by representing software model as a XML oriented document and has the advantage that many developers can access easily using the web oriented interface and SVN store. In this paper, we show reliability analyzing of a example by so doing show usefulness of reliability analyzer.