• Title/Summary/Keyword: 역할기반접근제어

Search Result 210, Processing Time 0.028 seconds

Energy Efficiency for Building Security Application of Adaptive Error Control and Adaptive Modulation (빌딩 보안 어플리케이션의 적응 오류제어와 적응 변조의 에너지 효율에 관한 연구)

  • Long, Bora;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.4
    • /
    • pp.423-429
    • /
    • 2007
  • Since the wireless smart card has played a main role in the identification security application for the building access; this research has its purpose to improve the performance of the smart card system and aims to offer more convenient to user. The contactless cards do not require insertion into a card reader and can work up to centimeters away from the reading device. To be able to cope with this performance the controlling of power consumption through the adaptive modulation and error control is needed. This paper addresses a forward error control (FEC) scheme with the adaptive Reed-Solomon code rate and an M-ary frequency shift keying (M-FSK) modulation scheme with the varying symbol size M over the link. The result of comparing energy efficiencies of adaptive error correction and adaptive modulation to other various static schemes shows to save over 50% of the energy consumption.

  • PDF

Adaptive Security Management Model based on Fuzzy Algorithm and MAUT in the Heterogeneous Networks (이 기종 네트워크에서 퍼지 알고리즘과 MAUT에 기반을 둔 적응적 보안 관리 모델)

  • Yang, Seok-Hwan;Chung, Mok-Dong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.104-115
    • /
    • 2010
  • Development of the system which provides services using diverse sensors is expanding due to the widespread use of ubiquitous technology, and the research on the security technologies gaining attention to solve the vulnerability of ubiquitous environment's security. However, there are many instances in which flexible security services should be considered instead of strong only security function depending on the context. This paper used Fuzzy algorithm and MAUT to be aware of the diverse contexts and to propose context-aware security service which provides flexible security function according to the context.

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF

A Lightweight Key Agreement Protocol between Smartcard and Set-Top Box for Secure Communication in IPTV Broadcasting (IPTV환경에서 스마트카드와 셋톱박스간의 안전한 통신을 위한 경량화된 키 동의 프로토콜)

  • Lee, Hoon-Jung;Son, Jung-Gap;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.67-78
    • /
    • 2010
  • CAS(Conditional Access System) is used in Pay-TV System to prohibit unauthorized user(s) accessing the contents in IPTV broadcasting environment. In the CAS, Smartcard transfers CW which is necessary in the process of descrambling the scrambled program to STB. CW hacking problem is one of the most serious problems in pay-TV system. There have been many researches on generating secure communication channel between smartcard and STB for secure transmitting, But they had problems in efficiency and security. In this paper, we propose a lightweight key agreement protocol based on a symmetric key algorithm. We show that our proposed protocol is more efficient than existing protocols by comparing the amount of computations, and analyzing the security requirement of the proposed protocol.

An Object-Oriented Analysis and Design Methodology for Secure Database Design -focused on Role Based Access Control- (안전한 데이터베이스 설계를 위한 객체지향 분석·설계 방법론 -역할기반 접근제어를 중심으로-)

  • Joo, Kyung-Soo;Woo, Jung-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.6
    • /
    • pp.63-70
    • /
    • 2013
  • In accordance with the advancement of IT, application systems with various and complex functions are being required. Such application systems are typically built based on database in order to manage data efficiently. But most object-oriented analysis design methodologies for developing web application systems have not been providing interconnections with the database. Since the requirements regarding the security issues increased, the importance of security has become emphasized. However, since the security is usually considered at the last step of development, it is difficult to apply the security during the whole process of system development, from the requirement analysis to implementation. Therefore, this paper suggests an object-oriented analysis and design methodology for secure database design from the requirement analysis to implementation. This object-oriented analysis and design methodology for secure database design offers correlations with database that most existing object-oriented analysis and design methodologies could not provide. It also uses UMLsec, the modeling language, to apply security into database design. In addition, in order to implement security, RBAC (Role Based Access Control) of relational database is used.

An Overview of Fault Diagnosis and Fault Tolerant Control Technologies for Industrial Systems (산업 시스템을 위한 고장 진단 및 고장 허용 제어 기술)

  • Bae, Junhyung
    • Journal of IKEEE
    • /
    • v.25 no.3
    • /
    • pp.548-555
    • /
    • 2021
  • This paper outlines the basic concepts, approaches and research trends of fault diagnosis and fault tolerant control applied to industrial processes, facilities, and motor drives. The main role of fault diagnosis for industrial processes is to create effective indicators to determine the defect status of the process and then take appropriate measures against failures or hazadous accidents. The technologies of fault detection and diagnosis have been developed to determine whether a process has a trend or pattern, or whether a particular process variable is functioning normally. Firstly, data-driven based and model-based techniques were described. Secondly, fault detection and diagnosis techniques for industrial processes are described. Thirdly, passive and active fault tolerant control techniques are considered. Finally, major faults occurring in AC motor drives were listed, described their characteristics and fault diagnosis and fault tolerant control techniques are outlined for this purpose.

Role-Based Network Access Control System on Open Network Two-Factor Authentication (네트워크 이중 인증을 통한 역할 기반 개방형 네트워크 접근 통제 시스템의 구현)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.502-508
    • /
    • 2007
  • This paper proposes a method to shut out all of the not certified network access packet by embodying the two-factor(MAC ADDRESS, ID/PASSWORD) authentication system. The Authenticating Gateway System takes over central server's policy and permit or hold up the packet by inherited policy. And checks the whether or not patched the OS version and getting influenced from computer virus. And takes the information about client's resources(H/W, S/W) without Agent in the client. That makes more stability of network operating circumstance and fast facing the attack from hackers. In the fixed mobile network circumstance, This method provides more simplicity and less expenses than IEEE802.1x authentication system(cisco nac).

Flash Interface Design for Home Network (플래시 기반의 감성요소를 활용한 홈 네트워크 인터페이스 디자인 연구)

  • Lee, Kun-Sik;Yang, Jung-Hwa;Shin, Sung-Won
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.304-311
    • /
    • 2007
  • 플래시 기반의 wall pad에서 보여줄 수 있는 그래픽 인터페이스의 방향은 크게 세가지로 구분할 수 있다. 첫 번째, 디스플레이 내의 자유로운 공간 이동이다. Wall pad의 주요한 기능은 제품의 원격제어이며 디스플레이에서 각 제품의 위치와 상태를 표시해 주는 것이다. 그러나 한정된 디스플레이 내에서 이러한 동작은 쉽지 않다. 플래시 기반의 환경에서 자유로운 zoom in, out을 통해 제품에 대한 정보를 명확하게 전달 가능하게 된다. 두 번째, 사용자의 감성 만족도를 극대화하는 측면이다. 감성 만족도를 높이기 위하여 모바일 제품에서도 대기화면 등에 다양한 요소를 적용하고 있다. 다만 본 제품은 모바일 제품과는 달리 항상 거실의 고정된 위치에서 보여지게 된다는 환경적 제약을 가지고 있다. 따라서 이를 활용하여 그 자체로 하나의 거실 인테리어 소품이 되어 전체 거실의 분위기를 한층 돋보이게 하는 역할까지도 가능하다. 세 번째, 메뉴 전개 방식에 활용 가능하다. 기능이 다양해지고 복잡해질수록 메뉴를 찾아 들어가는 일은 어렵고 복잡해지기 쉽다. 이러한 문제는 시간과 공간의 개념을 활용한 메뉴 전개를 통해 플래시를 활용하여 좀 더 직관적이고 인공지능적인 메뉴 방식으로 접근이 가능해진다. 이와 같이 홈 네트워크 인터페이스에서 플래시를 활용하는 것은 큰 의미가 있으며 실제 제품에 최적화해 가는 과정에서 그 효과를 얼마나 유지할 수 있느냐에 대한 문제가 가장 중요한 이슈가 될 것이다.

  • PDF

Research on Efficient Data Verification Methods Using Hyperledger Fabric (하이퍼레저 패브릭 활용 효율적 데이터 검증방안 연구)

  • Chai Bong-Soo;Baek Seunghyun;Kim Taeyoon;Lee Hanjin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.331-334
    • /
    • 2024
  • 하이퍼레저 패브릭(Hyperledger Fabric)은 참여자의 신원을 확인하고, 정보교환(트랜잭션)의 유효성을 검증하는 허가형 블록체인 모델이다. 기존의 대표적인 블록체인 모델인 비트코인, 이더리움과 대비하여 효율적인 데이터 검증 방안이 가능한대, 체인코드와 채널, 그리고 피어를 중심으로 구성되어 있기 때문이다. 먼저 본 블록체인 모델은 '체인코드'라는 스마트 계약(컨트랙트)를 실행하며 허가된 사용자만 네트워크에 참여할 수 있다. 또한, '채널' 기능이 있어 서로 다른 조직 간의 데이터 공유와 검증에 대한 새로운 접근방식을 보여줄 수 있으며, 특정 네트워크 내에서 데이터를 분리할 수 있다. 이를 통해 특정 데이터에 대한 접근권한을 제어하는 기능을 제공하며 동시에 데이터의 신뢰성과 보안성을 높일 수 있다. 마지막으로 '피어'는 체인코드를 통해 들어온 트랜잭션을 검증하고, 유효한 데이터만 원장에 추가하는 기법으로 무결성을 유지하는 데 중요한 역할 담당하고 있다. 본 연구결과를 기반으로 하이퍼레저 패브릭을 효과적으로 활용하여 데이터 검증 프로세스가 산업계에 널리 적용될 수 있기를 기대한다.

  • PDF

A Design of RBAC_Linux for Linux Security Systems (리눅스 보안 시스템을 위한 RBAC_Linux 설계)

  • 오석균;김성열
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.4
    • /
    • pp.137-142
    • /
    • 1999
  • This paper applies role-based access control(RBAC) policy for solving security problems when it will be operated business of many field on the Linux sever environments and designed RBAC_Linux security systems that it is possible to manage security systems on the Linux environments. In this paper, the RBAC_Linux is security system which is designed for applicable on the Linux enviroment The applying RBAC model is based on RBAC96 model due to Sandhu et al. Therefor, the using designed RBAC_Linux security system on the Linux sever system have the advantage of the following: it can be implemented sever system without modifying its source code, high migration, easy and simple of secure managing.

  • PDF