• Title/Summary/Keyword: 접근제어 모델

Search Result 517, Processing Time 0.036 seconds

Implementation of Extended Task Role-Based Access Control Model (확장된 과업 역할기반 접근제어 모델의 구현)

  • 임황빈;박동규
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.4
    • /
    • pp.431-436
    • /
    • 2002
  • This paper implements an improved model for access control enforcement in enterprise environments. The integration of the task role-based access control model and the "conflicting entities" administration paradigm supply a specification of static and dynamic separation of duty requirements in the workflow environment. The implemented Extended Task Role-Based Access Control model can deal with the conflicting entities for workflow oriented tasks. It will support elaborate separation of duty policy to tasks in enterprise environment through the classification of enterprise sessions according to their characteristics.

Design for XML-based Access Control Model in the Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 XML접근제어 모델 설계)

  • Jeong, Sung-Woo;Park, Joong-Sun;Lee, Nam-Yong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.199-201
    • /
    • 2005
  • 유비쿼터스 컴퓨팅 환경에서는 정보에 대한 접근이 시간과 공간의 제약 없이 이루어지므로 기존의 접근제어기법을 그대로 적용하는 것은 보안상의 취약점이 노출되어 중요한 정보자원의 유출의 위험을 가진다. 따라서 유비쿼터스 컴퓨팅 환경의 특성을 고려한 보안사항을 만족시키기 위해서는 단순한 신원확인 뿐만 아니라 사용자 속성 정보를 이용한 인증이 필요하다. 그리고 XML자원에 대한 상세한 접근제어 및 유비쿼터스 컴퓨팅의 다양한 환경정보와 복잡한 접근 제어정책을 효율적으로 관리할 수 있는 접근제어모델이 필요하다. 이를 위하여 본 연구에서는 PMI의 속성인증서와 표준XML접근제어 기술인 XACML을 적용한 접근제어 모델을 제시한다.

  • PDF

Database Security Model for Detail Access Control (상세 접근 제어를 위한 데이터베이스 보안 모델)

  • Lee, Keum-Soon;Kim, Yong-Ho;Won, Yong-Gwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.889-892
    • /
    • 2002
  • 데이터베이스를 사용하는 정보가 다양해짐에 따라 요구사항 또한 다양해져서 데이터 하나 하나에 대한 접근제어의 필요가 요구되고 있다. 이러한 데이터별 접근제어를 만족하는 보안정책을 정의하고, 정보의 기밀성, 무결성 및 가용성을 유지하는 데이터베이스 보안 모델을 제안한다. 본 논문의 목적은 공통된 data에 대하여 다양한 유형의 접근제어와 지속적으로 변화가 요구되는 접근제어 요구에 대한 해결방법을 제공한다.

  • PDF

Design and Implementation of the RDF Web Ontology Access Control Model based on Oracle VPD (오라클 VPD 기반의 RDF 웹 온톨로지 접근 제어 모델의 설계 및 구현)

  • Jeong, Hye-Jin;Jeong, Dong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.53-62
    • /
    • 2008
  • This paper proposes a new implementational model based on the security model of Oracle for Web ontology. Recently, several access control models using relational database security model for access control to Web ontology have been developing, and one of the most representative access control model is the RAC model. However, the RAC model is based on the standard security model, and thus it does not provide a implementational model for practical relational database management systems. In this paper, we propose an implementational model based on Oracle which is widely used and providing various security policies. This paper shows the implementation and experimental evaluation. Especially, the proposed model uses the VPD security model of Oracle and support high application and usability.

  • PDF

A RBAC Model Considering the Characteristics of the Adhocracy Organization (애드호크러시 조직의 특성을 고려한 역할기반 모델)

  • Shim, Won-Bo;Park, Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.41-53
    • /
    • 2002
  • Role Based Access Control (RBAC), which is a method, using role as an access control, has been popular with users and it is recognized as an effective method to replace the Discretionary Access Control and the Mandatory Access Control However, the existing Role Based Access Control Models have only been limited to the bureaucracy organization in which a distinctive hierarchy system was used, incorporating a stable structure and a standardized work system. Only in some parts, some access control models have been used, which supports 'Team' concept, such as Team Based Access Control Model. However, it did not incorporate the characteristics of the adhocracy organization, which is similar to the company's task force team, whose characteristics are organic, temporary, no standardized operation procedures, and many frequent changes. In this study, we have discussed the characteristics of the adhocracy organization which is different from the existing bureaucracy organization, and we have also discussed the problems related to when the existing access control models are used as the access control model for the adhocracy organization due to its characteristics. In addition, based on the problems, we have suggested an improved role based access control model for the adhocracy organization, and have come up with the solutions when any problems occur in the access control system.

An access control using the SPKI authorization certificate based on XML (XML 기반의 SPKI 권한 인증서를 이용한 접근제어)

  • 이영경;양수정;이경현
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.234-237
    • /
    • 2003
  • SPKI 권한 인증서를 이용한 기존의 방식은 각 사용자마다 임의적으로 인증서를 발행할 수 있기 때문에 상위객체에 접근권한이 불가능한 데이터에도 접근권한을 줄 수 있다. 그래서 중요한 문서에 대한 보안이 완전하지 못하다. 따라서 본 논문에서는 강제적 접근제어 모델을 기반으로 하여 서버에서 보안레벨에 따라 등급을 나누고 인증서 내에 접근권한을 명시해 줌으로써 접근권한을 추가하거나 삭제할 수 있다. 이는 강제적 모델에 유연성을 제공해주고 서버에서 하는 역할을 줄일 수 있으며, 높은 등급의 정보가 낮은 등급의 객체로 흐르는 것을 막아주므로 기존의 방식보다 좀 더 안전한 접근제어 메커니즘을 제공한다. 또한, 서버에서 XML로 접근제어 레벨을 정의해주므로 여러 플랫폼에서 사용 가능한 이점을 지닌다.

  • PDF

Object-extended Role-Based Access Control model for Secure Operating Systems (안전한 운영체제를 위한 객체확장 역할기반 접근제어 모델)

  • Kang, Hyun-Su;Heu, Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.634-636
    • /
    • 2003
  • 역할기반 접근제어모델은 기업이나 정부 등의 조직체계를 반영하는데 적합한 접근제어 모델로 컴퓨터의 자원을 접근하는 데에도 유용하게 사용될 수 있으며, 임의접근제어나 강제접근제어 방식의 단점을 대안할 수 있는 방법이기도 하다. 본 논문에서는 기존의 역할기반 접근제어 방식에서 사용자에게만 할당하던 역할을 객체에게도 할당하여 객체의 관리와 보안성을 향상시켰다. 객체의 특성에 따라 사용자들이 접근할 수 있는 권한이 비슷한 경우가 많기 때문에, 이를 기반으로 하여 객체를 역할의 단위로 관리할 경우 보다 효율적인 객체 관리를 할 수 있고, 동일한 보안 등급을 갖는 객체들이 하나의 역할로 그룹지어지기 때문에 보안 관리 측면에서도 효율적이다 할 수 있다.

  • PDF

A Role-Based Access Control Model ensuring Confidentiality and Integrity (비밀성과 무결성을 보장하는 역할기반 접근제어모델)

  • Byun Chang-Woo;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.13-29
    • /
    • 2005
  • An important characteristic of role-based access control model(RBAC) is that by itself it is policy neutral. This means RBAC articulates security policy without embodying particular security policy. Because of this reason, there are several researches to configure RBAC to enforce traditional mandatory access control(MAC) policy and discretionary access control(DAC) policy. Specifically, to simulate MAC using RBAC several researches configure a few RBAC components(user, role, role-hierarchy, user-role assignment and session) for keeping no-read-up rule and no-write-down rule ensuring one-direction information flow from low security level to high security level. We show these researches does not ensure confidentiality. In addition, we show the fact that these researches overlook violation of integrity due to some constraints of keeping confidentiality. In this paper we propose a RBAC model satisfying both confidentiality and integrity. We reexamine a few RBAC components and constructs additional constraints.

Context-based Dynamic Access Control Model for u-healthcare and its Application (u-헬스케어를 위한 상황기반 동적접근 제어 모델 및 응용)

  • Jeong, Chang-Won;Kim, Dong-Ho;Joo, Su-Chong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.493-506
    • /
    • 2008
  • In this paper we suggest dynamic access control model based on context satisfied with requirement of u-healthcare environment through researching the role based access control model. For the dynamic security domain management, we used a distributed object group framework and context information for dynamic access control used the constructed database. We defined decision rule by knowledge reduction in decision making table, and applied this rule in our model as a rough set theory. We showed the executed results of context based dynamic security service through u-healthcare application which is based on distributed object group framework. As a result, our dynamic access control model provides an appropriate security service according to security domain, more flexible access control in u-healthcare environment.

Privacy Control Using GRBAC In An Extended Role-Based Access Control Model (확장된 역할기반 접근제어 모델에서 GRBAC을 이용한 프라이버시 제어)

  • Park Chong hwa;Kim Ji hong;Kim Dong kyoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3C
    • /
    • pp.167-175
    • /
    • 2005
  • Privacy enforcement has been one of the most important problems in IT area. Privacy protection can be achieved by enforcing privacy policies within an organization's online and offline data processing systems. Traditional security models are more or less inappropriate for enforcing basic privacy requirements, such as purpose binding. This paper proposes a new approach in which a privacy control model is derived from integration of an existing security model. To this, we use an extended role-based access control model for existing security mechanism, in which this model provides context-based access control by combining RBAC and domain-type enforcement. For implementation of privacy control model we use GRBAC(Generalized Role-Based Access Control), which is expressive enough to deal with privacy preference. And small hospital model is considered for application of this model.