• Title/Summary/Keyword: 역할기반접근제어

Search Result 210, Processing Time 0.024 seconds

Implementation Strategy of Arithmetic Operations for Privacy-aware Role based Access Control (프라이버시-인지 역할기반 접근 제어의 산술연산 구현 전략)

  • Na, Hyun-Hea;Lee, Ji-Youn;Lee, Ha-Young;Kim, Yoon-Jeong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.111-114
    • /
    • 2011
  • PRBAC모델은 RBAC(Role Based Access Control) 모델에 조건(condition), 목적(purpose), 의무(obligation)개념을 포함시킴으로써 프라이버시를 강화한 모델이다. 그러나 조건 표현 내에 산술연산 기능을 지원하지 못한다고 알려져 있다. 본 논문에서는, 프라이버시를 보호하는 쇼핑몰 홈페이지를 구현하는 것을 목표로, 이 중 PRBAC모델을 XML로 구현하고 이를 Java와 연동함으로써 산술연산 기능을 지원하는 방안과, 홈페이지 코드와 데이터베이스를 연결하는 부분에 대한 연구결과를 소개한다.

Web 환경을 중심으로 한 RBAC의 연구동향

  • Oh, Se-Jong;Park, Seok
    • Review of KIISC
    • /
    • v.9 no.2
    • /
    • pp.45-58
    • /
    • 1999
  • 역할기반 접근제어(RBAC)는 기업을 위한 응용분야에서 특별히 주목을 받고 있는 보안 기술이다. 그 이유는 RBAC이 대규모의 네트워크로 연결된 응용분야에서 보안 관리의 복잡성과 비용을 절감시켜 주기 때문이다. 본 기술 논문은 지금까지 연구된 RBAC의 연구 결과를 소개하고 향후의 과제에 대해 제시하는데 그 목적이 있다. 먼저 RBAC의 출현배경 과 기본 모델의 여러 요소들에 대해 소개한다. 그리고 RBSAC에 관련된 연구동향을 적용시 스템을 중심으로 분석한다. 특별히 Web 환경에서 RBAC의 적용에 초점을맞춘다. Web 환 경 특별히 인트라넷에서의 보안 필요성을 제시하고 여기에 적용된 RBSC(인터라넷-RBAC) 의 내용과 더불어 인트라넷-RBAC의 구현에 대해서도 소개한다. 마지막으로 향후에 추가적 으로 연구되어야할 과제들에 대해 분석한다.

  • PDF

A Study of Integrated Authentication Model considering Mobility in Public Wireless LAN Network (공중 무선랜 망에서 이동성을 고려한 통합 인증 모델 연구)

  • 김진택;김관연;박세현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.625-633
    • /
    • 2003
  • 무선랜은 현재 무선 네트워크에서 매우 중요한 역할을 차지하며, 앞으로의 차세대 무선 통합네트워크에서 또한 그 비중이 매우 높아 질 것이다 특히 핫스팟과 같은 공중망서비스의 확산으로 무선 인터넷 등의 차세대 정보 컨텐츠 산업의 중요한 매체로 부각되고 있다. 이에 부합하여 무선랜 서비스에 있어 사용자의 프라이버시(Privacy) 및 접근제어(Access Control), 인증(Authentication), 과금(Accounting), 빌링(Billing) 등의 다양한 보안 문제가 중요한 이슈로 대두되고 있다. 본 논문에는 공중 무선랜에서의 이동성이 고려된 인증 모델을 여러 국제 표준에 맞추어 제안하고, 그에 대한 검증 결과를 함께 제시한다. 제안된 모델은 상호 연동성 및 호환성을 보장하기 위해 Diameter를 기반 기술로 사용하였다.

  • PDF

User-Level Delegation in Role-Based Access Control Model (역할기반 접근제어에 기초한 사용자 수준의 위임 기법)

  • 심재훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.49-62
    • /
    • 2000
  • Role-Based Access Control(RBAC) has recently received considerable attention as a alternative to traditional discretionary and mandatory access control to apply variant organizations function hierarchy of commercial or govemment. Also RBAC provides a delegation that is one of control principles in organization. In general delegation occurring in real organization is performed by an user giving permissions to another user. But, RBAC cannot implement these user-level delegation correctly. And delegation result in security problem such as destroying separation of duty policy information disclosure due to inappro-priate delegation. Besides security adminsitrator directly deals with that problem. In this thesis we suggests some methods that is created by the user.

Design of Security Service Model in Dynamic Cloud Environment (동적 클라우드 환경에 적합한 보안 서비스 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.2
    • /
    • pp.35-41
    • /
    • 2012
  • The rapid development of cloud computing and mobile internet service changes to an mobile cloud service environment that can serve and pay computing source that users want anywhere and anytime. But when user misses mobile device, the respond to any threat like user's personal information exposal is insufficient. This paper proposes cloud service access control model to provide secure service for mobile cloud users to other level users. The proposed role-based model performs access authority when performs user certification to adapt various access security policy. Also, the proposed model uses user's attribute information and processes before user certification therefore it lowers communication overhead and service delay. As a result, packet certification delay time is increased 3.7% and throughput of certification server is increased 10.5%.

  • PDF

An Elliptic Curve Cryptosystem based on Trust and RBAC to Reduce Security Overhead in Sensor Networks (센서네트워크의 보안 오버헤드를 줄이기 위한 신뢰와 RBAC 기반의 타원곡선암호)

  • Kim, Hyojin;Park, Ho-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.11
    • /
    • pp.747-756
    • /
    • 2013
  • It is important to reduce unnecessary overhead in sensor network using battery. In addition encryption is important because of necessity of security. Since unavoidable overhead occurs in case of encryption, security and overhead are in trade-off condition. In this paper, we use a concept called trust to reduce the encryption overhead. We reduce overhead by controlling encryption key sizes while maintaining the security level where high and low trust nodes are mixed. We simulated and compared normal encryption and trust value based encryption. As a result, the latter has lower execution time and overhead. If we define a standard of trust levels considering purpose and circumstances of real network, we can use constrained resources efficiently in sensor network.

RBAC-based health care service platform for individual recommended health information service (RBAC에 기반한 개인 맞춤형 건강 정보 제공 헬스케어 서비스 플랫폼)

  • Song, Je-Min;Kim, Myung-Sic;Jeong, Kyeong-Ja;Shin, Moon-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1740-1748
    • /
    • 2014
  • In this paper, we propose an RBAC based personalized health care service platform in order to provide smart management of personal health record using smart devices. It helps to guide healthful service and provide useful information according to one's individual health record. Personalized health care services platform supports a healthy lifestyle by measuring personal health information in a hospital clinical, imaging, and drug data, as well as that can be obtained from smart devices. Everyone can enter his health related data in everyday life such as food, sleeping time, mood, movement and exercise so that one can manage his personal health information of modern smart features. In addition, if necessary, personal health information can be provided to the hospital information system and staff with the consent of the individual. It can be contributed to simplify the complex process for remote medical. The proposed platform, which applies role based access control model to protect security and privacy, supports a smart health care services for users by providing personalized health care services through the smart applications.

Role-Based Access Control in Object-Oriented GIS (객체지향 지리정보시스템에서의 역할 기반 접근 제어)

  • Kim, Mi-Yeon;Lee, Cheol-Min;Lee, Dong-Hoon;Moon, Chang-Joo
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.3
    • /
    • pp.49-77
    • /
    • 2007
  • Role-based access control (RBAC) models are recently receiving considerable attention as a generalized approach to access control. In line with the increase in applications that deal with spatial data. an advanced RBAC model whose entities and constraints depend on the characteristics of spatial data is required. Even if some approaches have been proposed for geographic information systems. most studies focus on the location of users instead of the characteristics of spatial data. In this paper. we extend the traditional RBAC model in order to deal with the characteristics of spatial data and propose new spatial constraints. We use the object-oriented modeling based on open GIS consortium geometric model to formalize spatial objects and spatial relations such as hierarchy relation and topology relation. As a result of the formalization for spatial relations. we present spatial constraints classified according to the characteristics of each relation. We demonstrate our extended-RBAC model called OOGIS-RBAC and spatial constraints through case studies. Finally. we compare our OOGIS-RBAC model and the DAC model in the management of access control to prove the efficiency of our model.

  • PDF

Design of IoT Gateway based Event-Driven Architecture for Intelligent Buildings. (IoT 게이트웨이 기반 지능형 건물의 이벤트 중심 아키텍쳐 설계)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.256-259
    • /
    • 2016
  • The growth of mobile devices in Internet of Things (IoT) leads to a number of intelligent buildings related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The home server receives the command, then controls for instance the light system. The gateway based RESTful technology responsible for handling clients' requests attests an internet latency in case a large number of clients' requests submit toward the gateway increases. In this paper, we propose the design tasks of the IoT gateway for handling concurrency events. In the procedure of designing tasks, concurrency is best understood by employing multiple levels of abstraction. The way that is eminently to accomplish concurrency is to build an object-oriented environment with support for messages passing between concurrent objects. We also investigate the performance of event-driven architecture for building IoT gateway using node.js on one side and communication protocol based message-oriented middleware known as XMPP to handle communications of intelligent building control devices connected to the gateway through a centralized hub. The Node.JS is 40% faster than the traditional web server side features thread-based approach. The use of Node.js server-side handles a large number of clients' requests, then therefore, reduces delay in performing predefined actions automatically in intelligent building IoT environment.

  • PDF

The Smart Contract based Conference Key Distribution Scheme (스마트계약 기반 회의용 키 분배 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.1-6
    • /
    • 2020
  • Recently, epidemic of covid-19 causes rapid increase in demand for untact video conferences. In existing server-client based video conference systems such as Zoom, Google Meet, etc., the server generates the conference key and controls the access rights of meeting members and their contents with it. In this case, the server can fabricate or repudiate the meeting. So, the privacy of the meeting members is not guaranteed. It's necessary to make the conference key distribution scheme where all participants can verify the trustfulness without help of the server. The smart contract is the program stored to the blockchain. Its contents cannot be altered due to the property of the blockchain, and everybody can verify the execution results of it. In this study, we propose the smart contract based conference key distribution scheme. The proposed scheme is consisted of smart contract deployment, conference key generation and verification stages. The smart contract replaces the role of existing trustful server and the meeting members can generate the conference key according to the protocols implemented on it. The proposed scheme can be applied to the video conference systems and only the meeting members can access the conference key.