• Title/Summary/Keyword: 역할계층

Search Result 536, Processing Time 0.025 seconds

Collaborative Work Applications Development Environment based on Hierarchical Coordination Model using Mobile Agent (이동 에이전트를 이용한 계층적 조정 모델 기반 협력 작업 응용 개발 환경)

  • Kim Young-Min;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.285-294
    • /
    • 2006
  • The requirements of Computer Supported Cooperative Work supporting efficient cooperative or collaborative works between multi-users have been increasing in distributed environments. The various technical sections such as group communication technology and distributed processing technology should be provided in Cooperative Work. The replicated development of Cooperative Work applications of a number of common requirements increases development costs enormously and duplicated investment parts. Therefore, systematical development environments are required to develop these common requirements and applications efficiently in Cooperative Work applications development. In this study, we propose the hierarchical role-based coordination model that improves the coordination model of legacy mobile agent to be appropriate in Cooperative Work applications, and design the development environment for Cooperative Work applications based on mobile agent. The proposed hierarchical role-based coordination model provides multi-layered group concepts of mobile agent, and enables implementation of efficient coordination policy per group. Additionally, it supports efficient Cooperative Work application development by role assignment per group unit.

  • PDF

Flexible Database security System using Improved Role Hierarchy (개선된 역할 계층을 이용한 유연한 데이터베이스 보안 시스템)

  • Jung Min-A;Lee Kwang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1834-1839
    • /
    • 2005
  • Database security is essential to protect their data in most organization such as hospitals, central or local governments, banks which manage the private, sensitive and important data. Because the duty of the department recently became more various and complicated, the changes of security requirement are needed more frequently. Therefore, easily changeable, flexible security policy and efficient security management with preserving the integrity of security policy are very important. In this paper, we implemented a flexible database security system in the specimen and clinical information management system of leukemic research center using IRH(Improved Role Hierarchy). Data is protected by MAC and we propose a flexible access control and effective administration by using the IRH that is an improved role hierarchy of RBAC. If security policy is needed for changes, this system can do it easily by simply modifying the IRH with the decentralized administration. The modified security policy can be applied flexibly after alteration because the security level of the subject is not fixed but can be derived automatically from the IRH when user connects the system.

Flattening Class Hierarchy for Reorganization of Object-Oriented Software (객체지향 소프트웨어의 재구성을 위한 클래스계층 구조의 평탄화)

  • Hwang, Seok-Hyeong;Yang, Hae-Sul;Park, Jeong-Ho
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.853-860
    • /
    • 2001
  • In the object-oriented software development, redesigning of classes and reorganizing of class hierarchy structures should be necessary to reduce many of the headaches of object-oriented software design and maintenance. To support this task, in this paper, we propose a theoretical foundation for class hierarchy reorganizations that is relatively complete, correct, formal and easy to understand and use. We introduce the flattened class hierarchy that characterizes the class hierarchy structures in object-oriented software evolution. And we also present an algorithm which transforms a given class hierarchy into the normalized form. The flattened class hierarchy helps us map the inheritance and aggregation paths in a class hierarchy to paths in an object hierarchy that is an instance of the class hierarchy. By applying the algorithm into a given class hierarchy, we can make a new, object-preserved, and flattened class hierarchy that is the cornerstone for reorganization of class hierarchy structure and plays an important role as a bridge on the incremental evolutionary changes and reuse of object-oriented software to reorganize class hierarchies.

  • PDF

Selection of Cluster Hierarchy Depth and Initial Centroids in Hierarchical Clustering using K-Means Algorithm (K-Means 알고리즘을 이용한 계층적 클러스터링에서 클러스터 계층 깊이와 초기값 선정)

  • Lee, Shin-Won;An, Dong-Un;Chong, Sung-Jong
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.4 s.54
    • /
    • pp.173-185
    • /
    • 2004
  • Fast and high-quality document clustering algorithms play an important role in providing data exploration by organizing large amounts of information into a small number of meaningful clusters. Many papers have shown that the hierarchical clustering method takes good-performance, but is limited because of its quadratic time complexity. In contrast, with a large number of variables, K-means has a time complexity that is linear in the number of documents, but is thought to produce inferior clusters. In this paper, Condor system using K-Means algorithm Compares with regular method that the initial centroids have been established in advance, our method performance has been improved a lot.

An Implementation of the URA99 Model for User-Role Assignment (사용자-역할 할당을 위한 URA99 모델의 구현)

  • 박동규;안현수;황유동
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.06a
    • /
    • pp.461-464
    • /
    • 2001
  • 역할기반 접근제어(RBAC)는 역할(Role)과 역할계층(Role hierarchy)을 통해 사용자 및 접근권한 관리를 효율적으로 수행할 수 있도록 해준다. 그러나 시스템에 수많은 사용자, 역할, 권한이 존재하는 경우 한사람의 보안 관리자가 이들을 모두 관리하는 컷은 불가능하므로 역할을 관리하는 관리역할을 두어 시스템을 효율적으로 관리할 수 있는 방법(ARBAC)이 제안되었다. ARBAC는 URA(User Role Assignment), PRA(Permission Role Assignment), RRA(Role Role Assignment)로 구성되어있다. 본 논문에서는 URA99 모델을 기반으로 사용자-역할 관리를 위하여 관리도구를 구현한다. 구현된 관리도구는 오라클의 저장 프로시저를 사용하고 자바를 기반으로 한 EJB 컴포넌트로 구현한다.

  • PDF

Role Delegation Protocal for Role-Based Access Control (역할-기반 접근 제어 모델에서 역할 위임을 위한 프로토콜 설계)

  • 나상엽;전서현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.99-101
    • /
    • 1999
  • 분산 컴퓨팅 환경에서 기업이나 조직내의 사용자들은 다른 사용자와 자원을 공유하며 상호작용을 통하여 보다 효율적으로 작업을 수행하게 된다. 이 경우에는 자원이나 정보의 불법적인 사용을 막고 데이터의 무결성을 유지하기 위하여 인증과정이 필요하며, 또한 사용자의 작업에 대한 접근 제어(Access Control)의 필요성이 더욱 중요시되고 있다. 현재 널리 알려진 임의의 접근 제어(DAC)는 객체의 소유자에게 모든 위임의 권한이 주어지고 강제적 접근제어(MAC)의 경우에는 주체와 객체단위의 정책 적용이 어려운 단점이 있다. 최근에는 역할-기반 접근 제어를 이용하여 조직의 보안 정책을 보다 효율적이고 일관성 있게 관리하고자 하는 시도가 있다. 하지만 역할-기반 접근 제어의 경우 각 역할의 계층에 의하여 권한의 상속이 결정되는 문제가 발생한다. 따라서 본 논문에서는 역할-기반 접근 제어에서 역할이 가지는 역할의 위임을 위한 위임 서버와 역할 위임 프로토콜을 제시한다.

  • PDF

A Study of Temporary Permission Delegation In Role-Based Access Control Policy (역할-기반 접근 제어 정책에서 일시적 권한 위임에 관한 연구)

  • Na, Sang-Yeob
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.1
    • /
    • pp.21-28
    • /
    • 2009
  • Role-Based Access Control Policy has a role hierarchies in which a higher case role can perform permissions of a lower case role. However, it is necessary for a lower case role to perform a higher case role's permission, which is not allowed to a lower case role, basically. In this paper propose a temporary permission delegation method. As the result of a temporary permission delegation, junior roles can perform senior roles' permissions in a dedicated interval.

  • PDF

Symmetric RBAC Model that Takes the Separation of Duties and Role Hierarchies into Consideration (임무분리와 역할 계층구조를 고려한 대칭 RBAC 모델)

  • 문창주;박대하;박성진;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.12
    • /
    • pp.699-707
    • /
    • 2003
  • RBAC is accepted as a more advanced control method than existing DAC and MAC. Studies on the permission-role part of RBAC model are relatively insufficient compared with those on the user-role part, and researches on symmetric RBAC models to overcome this is also in an incipient stage. Therefore there is much difficulty in assigning permissions suitable for roles. This paper proposes an symmetric RBAC model that supplements the constraints on permission assignment set forth by previous studies. The proposed symmetric RBAC model reflects the conflicts of interests between roles and the sharing and integration of permissions on the assignment of permissions by presenting the constraints on permission assignment that take the separation of duties and role hierarchies into consideration. In addition, by expressing constraints prescribing prerequisite relations between dynamic permissions through AND/OR graphs, it is possible to effectively limit the complicated prerequisite relations of permissions. The constraints on permission assignment for the proposed symmetric RBAC model reduce errors in permission assignment by properly detailing rules to observe at the time of permission assignment.

Hybrid Routing Protocol for Dual Radio Wireless Sensor Network (Dual Radio Wireless Sensor Network 를 위한 하이브리드 라우팅 프로토콜)

  • Ahn, Won-bin;Lee, Seung-kook;Park, Eun-woo;Lim, Sang-min;Moon, Soo-hoon;Han, Seung-jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.863-866
    • /
    • 2010
  • 무선 센서 네트워크의 규모가 커짐에 따라 대규모의 센서 네트워크의 활용에 대한 기대가 커지고 있다. 기존 IEEE 802.15.4 를 이용한 네트워크의 규모에 따른 한계를 극복하기 위해 듀얼 라디오 센서 네트워크에 대한 많은 연구가 진행되고 있다. 듀얼 라디오 센서 네트워크는 단일 라디오를 내장한 전통적인 센서 노드(싱글 라디오 노드)에 듀얼 라디오 인터페이스(IEEE 802.11g, IEEE 802.15.4)를 내장한 센서(듀얼 라디오 노드)를 포함하여 클러스터를 구성한다. 본 논문에서는 이러한 듀얼 라디오 환경에서 효과적으로 동작하는 라우팅 프로토콜을 제안한다. 듀얼 라디오 노드는 네트워크 상에서 클러스터 헤드 역할을 하고 상위 계층을 이루며, 일반 노드는 클러스터 멤버 역할을 하는 하위 계층을 이룬다. 본 논문에서는 각 계층의 네트워크가 나타내는 특징을 이동성이 적거나 높은 네트워크의 특징으로 대입하여, 상위 계층에는 Pro-Active 프로토콜, 하위 계층에는 Re-active 프로토콜이 효과적임을 설명한다. 이를 바탕으로 듀얼 라디오 센서 네트워크에 적합한 라우팅 프로토콜로써 Pro-Active 프로토콜을 대표하는 DSDV 와 Re-Active 프로토콜을 대표하는 AODV 를 조합한 하이브리드 라우팅 프로토콜을 제안한다. 제안한 프로토콜의 성능을 확인하기 위해 센서네트워크 테스트베드를 구성하여 라우팅 복구 시간과 패킷 전송 안정성에 대한 성능을 입증한다.

The Threshold Based Cluster Head Replacement Strategy in Sensor Network Environment (센서 네트워크 환경의 임계값 기반 클러스터 헤드 지연 교체 전략)

  • Kook, Joong-Jin;Ahn, Jae-Hoon;Hong, Ji-Man
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.61-69
    • /
    • 2009
  • Most existing clustering protocols have been aimed to provide balancing the residual energy of each node and maximizing life-time of wireless sensor networks. In this paper, we present the threshold based cluster head replacement strategy for clustering protocols in wireless sensor networks. This protocol minimizes the number of cluster head selection by preventing the cluster head replacement up to the threshold of residual energy. Reducing the amount of head selection and replacement cost, the life-time of the entire networks can be extended compared with the existing clustering protocols. Our simulation results show that our protocol outperformed than LEACH in terms of balancing energy consumption and network life-time.

  • PDF