• Title/Summary/Keyword: Access Authorization

Search Result 144, Processing Time 0.022 seconds

A Study on Discovery Service using JClarens in Grid Computing Environment (Grid 컴퓨팅 환경에서 JClarens를 이용한 Discovery Service 연구)

  • Shim Eui-Kyu;Lee Moo-Hun;Park Hee-Yong;Choi Eui-In
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1451-1454
    • /
    • 2006
  • Grid 컴퓨팅은 과학 분야에서 처음 시작되어 현재 과학 분야뿐만 아니라 e-business와 같은 더 많은 분야에서 폭 넓은 활용을 위하여 SOA(Services Oriented Architecture)를 채택하게 되었으며, SOA 프레임워크에 있는 기존의 어플리케이션과 프로그래밍 라이브러리를 통합하게 되었다. 특히 SOA에 기반을 둔 Clarens Grid 서비스 프레임워크는 권한 부여(authorization), 접근 제어(access control), Discovery Service를 제공한다. 본 논문에서는 Java로 구현한 JClarens를 이용하여 Discovery Service를 구현하는 두 가지 방법을 기술하고, 그 구현 방법으로 인해 발생할 수 있는 서비스 재등록으로 인한 네트워크 트래픽 증가에 대한 문제점을 진단하고 재등록을 위한 시간 간격을 차등화 함으로서 이 문제점을 해결할 수 있는 방안을 제안하였다. 따라서 Discovery Service는 Grid 컴퓨팅 환경에서 사용자에게 가장 적절한 자원을 발견할 수 있도록 지원 할 것이다.

  • PDF

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

Diagnosis and Management of Patients with Mucopolysaccharidoses in Malaysia

  • Ngu, Lock-Hock
    • Journal of mucopolysaccharidosis and rare diseases
    • /
    • v.4 no.1
    • /
    • pp.11-13
    • /
    • 2018
  • In Malaysia, diagnosis and treatment of patients with mucopolysaccharidoses (MPS) is mainly localized at Hospital Kuala Lumpur, which is the national referral center for rare diseases. To date there are 83 patients diagnosed with MPS in our center, with MPS II being the commonest. The Malaysian National Medicines Policy second edition has a specific section on the orphan drugs which includes recombinant human enzyme for enzyme replacement therapy (ERT) in MPS. So far, National Pharmaceutical Regulatory Agency Malaysia has approved recombinant human enzyme for MPS types I (Loranidase), II (idursulfase), IVA (elosulfase alfa), and VI (Galsufase). Access to Idursulfase beta (another recombinant human enzyme for MPS II) and vestronidase alfa-vjbk (MPS VII) required special authorization on named patient basic. Currently there are 25 patients receiving ERT, 70% of the funding are from Ministry of Health (MOH), the remaining 30% are from various charitable funds and humanitarian programs. Thirteen newly diagnosed patients have to queue for an additional fund. Four patients have been treated with Hematopoietic stem cell transplant. MOH has also published guidelines regarding the patient selection criteria for ERT and treatment monitoring schedule.

Cloud System Security Technology Trend

  • Yoon, Jeong-Won;Jang, Beakcheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.7
    • /
    • pp.49-56
    • /
    • 2015
  • In this paper, we introduce recent cloud system security technologies categorizing them according to Reliability, Availability, Serviceability, Integrity, and Security (RASIS), terms that evaluate robustness of the computer system. Then we describe examples of security attacks and corresponding security technologies for each of them. We introduce security technologies based on Software Defined Network (SDN) for Reliability, security technologies based on hypervisor and virtualization for Availability, disaster restoration systems for Serviceability, authorization and access control technologies for Integrity, and encryption algorithms for Security. We believe that this paper provide wise view and necessary information for recent cloud system security technologies.

Efficient Group Key Agreement Protocol (EGKAP) using Queue Structure (큐 구조를 이용한 효율적인 그룹 동의 방식)

  • Hong, Sung-Hyuck
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.217-222
    • /
    • 2012
  • Group communication on the Internet is exploding in popularity. Video conferencing, Enterprise IM, desktop sharing, and numerous forms of e-commerce are but a few examples of the ways in which the Internet is being used for business. The growing use of group communication has highlighted the need for advances in security. There are several approaches to securing user identities and other information transmitted over the Internet. One of the foundations of secure communication is key management, a building block for encryption, authentication, access control, and authorization.

XML 기반 접근제어 기술 동향

  • 김주한;문기영
    • Review of KIISC
    • /
    • v.13 no.4
    • /
    • pp.68-73
    • /
    • 2003
  • XML 기반 접근제어 기술(extensible Access Control Markup Language, XACML)의 목적은 인터넷 상의 접근제어 서비스를 위한 다양한 제품들 및 그 제품들의 서로 다른 환경들 사이에서 일관되게 적용할 수 있는 권한부여(authorization) 정책을 제공하고, 그 정책을 통하여 기존의 다양한 환경 및 f.#식을 가진 접근제어 제품들에 상호운영성을 제공하기 위한 것이다. XACML의 구성은 접근제어를 위한 XML 기반의 언어로 접근제어 정책(policy) 언어와 요청/응답(request/response) 언어로 되어 있으며 OASIS(Organization for the Advancement of Structured Information Standards)에서 표준화가 진행중이다. 정책 언어는 누가 언제 무엇을 할 수 있는 지를 기술하는 접근 제어 정책들을 표현하는 데에 사용되며, 요청/응답 언어는 특정 접근이 허용되는 지에 대한 질의를 표현하거나 그 질의에 대한 응답을 기술하는 데에 사용된다. 본 논문에서는 XACML의 대한 기술 소개와 표준화 등의 기술 동향을 분석한다.

Service Provision for Future Access Networks Using PPP Extensions

  • Lee, Jungjoon;Park, Jun-Kyun
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.695-698
    • /
    • 2000
  • The services such as real-time audio and video applications have become increasingly popular, especially over the Internet. Furthermore, as being commercialized those contents on the Internet require quality of service (QoS) support to ensure their performance. PPP is the best solution to of for those kinds of services. The reason why we want to employ PPP is this satisfies most of the requirements associated with remote connectivity to an NSP, such as IP address assignment, security, and AAA (authentication, authorization and accounting). In addition, since ISPs and corporations are familiar with PPP based connectivity, easy migration from existing ISP infrastructure is expected, if QoS is guaranteed. But so for PPP has had no field to ensure the quality of service. This article presents the solution by using some tunneling protocols and the draft [1] that proposed additional LCP option fields to negotiate QoS. To communicate each other, after negotiating those option fields, over various protocols such as ATM, Ethernet, and etc. tunneling protocol is used. Following sections will mention those briefly. And the service provision to offer the end-to-end communication with negotiated QoS will also be proposed.

  • PDF

The Security Standardization for Next Generation Network (차세대 네트워크 보안 표준화)

  • Oh Heang-Suk;Kim Jeong-Nyeo;Sohn Sung-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.122-131
    • /
    • 2006
  • This paper introduces the security standardization trend and related technology in ITU-T SG 13 Q.15. Q.15 deals with the security requirements and guidelines over NGN(Next Generation Network) release 1. Korea proposes draft recommendation on 'AAA(Authentication, Authorization and Accounting) Service for network access control over NGN' and the procedure of the user authentication for the NGN convergence service terminals.

A Propagation policy for non-specific authorization in modeling multiple access control policies (다중 접근제어 정책 모델에서 비명시적 권한을 보장하는 전파 정책)

  • Yang, Juye-On;Park, Seok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.350-352
    • /
    • 2003
  • 일반적인 접근제어 모델이 메커니즘 내에 보안 정책을 미리 설계함에 따라 보안 요구사항의 추가나 변경에 어려움이 있는 반면에, 다중 접근제어 정책 모델은 기업 환경에 필요한 다양한 보안 정책들을 융통성 있게 지원하기 위해, 권한 명세 언어를 기반으로 positive/negative 권한을 모두 표현할 뿐만 아니라, 권한의 예외적 수행, 권한의 전파와 충돌 해결 정책 등을 구현함으로써, 접근제어의 권한 적용에 유연성을 강화하였다. 그러나, 기존의 권한 전파 및 충돌 해결 정책은 권한 전파의 모든 가능한 path를 고려하지 않거나, 충돌 문제를 해결하지 않는 부분이 있는데, 이것은 특히 서로 다른 정책의 어플리케이션 통합 환경에서 권한의 남용이나 상실 등 의도하지 않은 부당한 권한의 실행을 야기시킨다. 따라서, 본 논문에서는 다수의 정책의 영향을 받은 주체에 대해서 권한의 독립적 수행을 보장하면서, 추가적인 충돌 상황을 발생시키기 않는 권한 전파 정책을 제안한다.

  • PDF

Face Recognition Technology Trends Through Patent Analysis (특허로 살펴본 얼굴인식 기술개발 동향)

  • Jeong, S.H.;Choi, B.C.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.2
    • /
    • pp.29-39
    • /
    • 2019
  • The interest in facial recognition technology has been growing with the advancement of AI technology. With a confirmed accuracy of over 99%, the areas of application of the technology have expanded, including smartphone unlocking, online payment authorization, building access management, and criminal apprehension. This indicates that the technology has effectively transitioned from laboratory to field applications. This study performs patent analysis to determine recent innovations and diffusion trends in facial recognition technology. Specifically, R&D activities involving facial recognition technology are investigated at both the country level and company level. Significant patents are also considered. This study contributes to R&D management teams by proposing useful plans and strategies.