• Title/Summary/Keyword: 접근 통제

Search Result 723, Processing Time 0.028 seconds

Location-Based Authentication Mechanism for Server Access Control (서버 접근 통제를 위한 위치기반 인증 기법)

  • Choi, Jung Min;Cho, Kwantae;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1271-1282
    • /
    • 2012
  • Recently, security incidents occur continuously, resulting in the leakages of a large amount of the company's confidential and private information. For these reasons, the security technologies such as the authentication and the access control in order to prevent the information leakage are attracting attention. In particular, location-based authentication that utilizes the user's current location information which is used an authentication factor. And it provides more powerful authentication by controlling the users who attempt to access and blocks internal information leakage path. However, location information must be handled safely since it is the personal information. The location based authentication scheme proposed in this paper enhances the stability of the process location information compared with existing relevant location-based authentication protocol. Also it strengthens the end-user authentication by using one-time password. In addition, the proposed scheme provides authentication to prevent information leakage and employs the concept of the user's physical access control. Resultingly, the proposed scheme can provide higher security than the previous studies, while guarantee to low communication cost.

Network Group Access Control system using piggy-backing prevention technique based on Infrared-Ray (적외선 기반 피기백킹 방지 기법을 적용한 네트워크 그룹 접근통제 시스템)

  • Kim, JongMin;Choi, KyongHo;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.109-114
    • /
    • 2012
  • Information society in recent times, lots of important information have been stored in information systems. In this situation, unauthorized person can obtains important information by piggy-backing and shoulder surfing in specific area of organization. Therefore, in this study, we proposed network group access control system by combining RFID and infrared-ray for blocking information leakage due to unauthorized access by internal threats and enhancing personnel security. So it can provides a more secure internal network environment.

A Design and Implementation of Access Control Mechanism for Secure Downgrading of Objects (객체의 안전한 보안등급의 하강을 위한 접근통제 메커니즘의 설계 및 구현)

  • Park, Chun-Gu;Shin, Wook;Kang, Jung-Min;Lee, Dong-Ik
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.281-286
    • /
    • 2001
  • 다중등급보안(MLS: Multi-Level Security)기반 안전한 운영체제는 정보의 흐름을 안전하게 통제하기 위하여 주체 및 객체의 보안등급변화를 허용하지 않는다. 하지만 안전한 운영체제의 사용성(Usability) 측면에서 주체 및 객체의 보안등급변화는 고려되어야한다. 주체 및 객체의 보안등급변화에 관련된 요구사항은 시스템의 환경 및 보안정책에 따라 다양하게 발생할 수 있고, 이러한 보안등급변화에 관련된 다양한 요구사항들은 모두 해결하기 어렵다. 뿐만 아니라, 기존 접근통제 메커니즘은 보안등급변화에 관련된 요구사항을 해결할 수 없다. 따라서, 본 논문에서는 MLS 기반 안전한 운영체제에서 빈번하게 발생할 수 있는 보안등급 변화에 관련된 요구사항 중 특히, 시스템의 환경에 의해 주체의 보안등급이 하강되었을 때 해당 주체가 생성했던 객체들의 안전한 보안등급 하강과 관련된 보안요구사항을 해결할 수 있는 접근통제 메커니즘을 설계하고 구현한다.

  • PDF

Role Graph Security Management Model based on Lattice (격자기반 역할그래프 보안 관리 모델)

  • Choi, Eun-Bok;Park, Ju-Gi;Kim, Jae-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.109-121
    • /
    • 2006
  • In this paper, we suggest lattice based role graph security management model which changes security level in mandatory access control model as well as constraint and role hierarchy systematically in role base access control model. In this model, we solved privilege abuse of senior role that is role graph model's problem, and when produce conflict between privileges, we can keep integrity of information by reseting grade of subject through constraint. Also, we offer strong security function by doing to be controlled by subject's security level as well as privilege inheritance by role hierarchy, Finally, we present the role graph algorithms with logic to disallow roles that contain conflicting privileges.

  • PDF

Security Treats about Union File System and Responce Methodology (유니온 파일시스템에 대한 보안 위협 및 대응 방법)

  • Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.445-446
    • /
    • 2021
  • Union file system is a technology that can be used as a single file system by integrating various files and directories. It has the advantage of maintaining the source file/directory used for integration, so it is used in many applications like container platform. When using the union file system, the user accesses the write-able layer, to which the security technology provided by the operating system can be applied. However, there is a disadvantage in that it is difficult to apply a separate security technology to the source file and directory used to create the union file system. In this study, we intend to propose an access control mechanism to deny security threats to source file/directory that may occur when using the union file system. In order to verify the effectiveness of the access control mechanism, it was confirmed that the access control mechanism proposed in this study can protect the source file/directory while maintaining the advantages of the union file system.

  • PDF

Effect of Fitness Among CEO characteristics, Company's Innovation, Management on the Performance of Organization (CEO특성, 경영혁신, 경영통제시스템 적합성이 재무성과에 미치는 영향)

  • Jung, Jae-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.5
    • /
    • pp.377-386
    • /
    • 2013
  • The purposes of this study is to examine the effect of fitness Among Characteristics of CEO, Company's innovation and Management Control on Organization Performance. CEO characteristics are investigated by the risk-taking propensity, need for achievement. Company's Innovation are measured by product innovation, technological innovation. Management control are applied by action control and result control. Organization performances are analyzed by internal performance, growth performance, financial performance. the research methodology applied in this paper is contingency theory by Drazin and Van de Ven(1985) - selective approach, Interaction approach, system approach. This paper was applied by the Three way interaction term among CEO characteristics, Company's Innovation and Management control to analyze the influences to the organization performances. As a result of this paper, there are the differences between Two way interaction terms or three way interaction terms to affect the organization performances. this paper can confirm the desirable combinations between two or three variables(CEO characteristics, Company's Innovation and Management control) to affect significantly to the particular organization performance.

Implementation of the E-BLP Security Model for Trusted Embedded Systems (안전한 임베디드 시스템을 위한 E-BLP 보안 모델의 구현)

  • Kang Jungmin;Nam Taelliun;Jang Insook;Lee Jinseok
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.10
    • /
    • pp.512-519
    • /
    • 2005
  • E-BLP security model considers the reliability of the processes that are real subjects in systems. This paper deals with the implementation of the E-BLP model for secure embedded systems. Implemented EBSM(E-BLP Based Security Module) consists of three components: identification and authentication, access control and BRC(Dynamic Reliability Check) that checks the process behavior dynamically. Access Control of EBSM ensures unreliable processes not to access the sensitive objects and the DRC detects the buffer overflow attack by normal user. Besides, the performance overhead of the embedded system applying the EBSM is introduced.

Implementation of A Network-based Multi-Level Security System using LDAP (LDAP을 이용한 네트워크 기반의 다중레벨보안 시스템의 구현)

  • 이병주;이승형;홍순좌;박중길
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.298-301
    • /
    • 2002
  • 다중레벨보안은 하나의 시스템 내에 여러 보안등급의 데이터와 사용자를 수용하여 효율성을 높이기 위한 것이다. 본 논문에서는 네트워크를 통해서 여러 보안등급의 데이터가 저장된 디렉토리 서버에 다중레벨의 사용자들의 접근을 통제하기위한 방안을 제시하고 구현한다. 보안과 무결성 모두를 보장해주기 위해서 보안 모델과 무결성 모델을 결합한 새로운 형태의 모델을 정의한다. 이 모델을 OpenLDAP의 ACL(Access Control List)을 사용하여 구현하고 사용자의 등급에 따른 시스템의 접근통제를 가능하게 한다.

  • PDF

RBAC 표준 참조 모델 연구동향

  • 김학범;김동규
    • Review of KIISC
    • /
    • v.10 no.2
    • /
    • pp.51-60
    • /
    • 2000
  • 역할기반 접근 통제(RBAC)는 사용자의 역할에 기반을 둔 접근통제 방법으로 Ravi S. Sandhu가 제안한 기본 모델 이후로 다양한 모델들이 제안되어졌다 그러나 이러한 모델들은 RBAC을 구성하는 특성들에 대한 일반적인 합의 없이 이루어지고 있으며 표준 참조 모델의 부재는 RBAC의 사용과 의미에 대해 혼란을 가져오고 있다. NIST(National Institute of Standards and Technology)에서는 이러한 문제점을 해결하기 위하여 현재까지 제안된 RBAC 모델과 상용제품등을 통하하여 단일화된 RBAC 모델을 제안하였고 앞으로 표준 제정을 위한 기초로서 활용한 예정이다 본논문에서는 NIST가 제안한 RBAC 표준 참조모델을 소개한다.

  • PDF

Conflict analysis of RBAC in Multi-Domain Security (다중 도메인 보안에서 RBAC의 상충문제)

  • 김형찬;이동익;김형천;강정민;이진석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.625-627
    • /
    • 2003
  • 역할기반 접근통제(RBAC)모델은 쉬운 관리성과 정책 적용의 유연성, 그리고 정책 중립적인 이점으로 인하여, 현재 많은 컴퓨팅 환경에서 적용되고 있다. 하지만 기존에 연구되었던 RBAC 모델들은 대부분 단일 보안 관리를 가정하므로 최근의 협업 컴퓨팅 환경을 위한 접근통제를 설계하는 데 문제가 있다. 본 논문에서는 협업 컴퓨팅 환경을 다중 도메인 보안(Multi-Domain Security)으로 사상하고, 협업환경을 적절하게 고려하지 않은 RBAC의 적용이 야기할 수 있는 문제점들을 살펴본다.

  • PDF