• Title/Summary/Keyword: Access Control

Search Result 3,688, Processing Time 0.028 seconds

E-BLP Security Model for Secure Linux System and Its Implementation (안전한 리눅스 시스템을 위한 E-BLP 보안 모델과 구현)

  • Kang, Jung-Min;Shin, Wook;Park, Chun-Gu;Lee, Dong-Ik
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.391-398
    • /
    • 2001
  • To design and develop secure operating systems, the BLP (Bell-La Padula) model that represents the MLP (Multi-Level Policy) has been widely adopted. However, user\`s security level in the most developed systems based on the BLP model is inherited to a process that is actual subject on behalf of the user, regardless whatever the process behavior is. So, there could be information disclosure threat or modification threat by malicious or unreliable processes even though the user is authorized in the system. These problems can be solved by defining the subject as (user, process) ordered pair and by defining the process reliability. Moreover, when the leveled programs which exist as objects in a disk are executed by a process and have different level from the process level, the security level decision problem occurs. This paper presents an extended BLP (E-BLP) model in which process reliability is considered and solves the security level decision problem. And this model is implemented into the Linux kernel 2.4.7.

  • PDF

A Study on Interdependence of Private Security and Techniques of CPTED (민간경비와 환경설계를 통한 범죄예방(CPTED) 기법의 상호의존성에 관한 연구)

  • Lee, Jung-Duk;Lim, You-Seok
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.223-249
    • /
    • 2011
  • In modern society, citizens' quality of life aspects of safety and crime prevention activities are actively considering the incidence of crime prevention in advance. It also can be quite important elicit the interest of who community members through effective crime prevention strategies. For crime prevention policies and techniques over time as more scientific and advanced methods are made. Today, A typical crime prevention strategies is private security zones and Crime Prevention Through Environmental Design (CPTED) is a corresponding to the new strategy. CPTED is a diversification can be called a crime prevention approach that emphasizes the principle of natural surveillance, access control, territoriality, activity support, maintenance and management. The defensible space of the space area related to crime prevention setting the activities of private security and CPTED determine. Also, the reality of crime prevention and protection should be considered space. The emphasis on proactive prevention of crime in modern society for the prevention of crime how to approach differing perspectives and disparate aspects of private security and CPTED. Technical and professional areas that overlap to some extent in a homogeneous aspect. Ultimately, CPTED is a crime prevention through space and environmental approach for crime. In addition, Ultimate goal of convergence, crime prevention, with the same or higher is required to study for the area after looking for the characteristics and limitations of private security and CPTED.

  • PDF

A Priority Based Multipath Routing Mechanism in the Tactical Backbone Network (전술 백본망에서 우선순위를 고려한 다중 경로 라우팅 방안)

  • Kim, Yongsin;Shin, Sang-heon;Kim, Younghan
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1057-1064
    • /
    • 2015
  • The tactical network is system based on wireless networking technologies that ties together surveillance reconnaissance systems, precision strike systems and command and control systems. Several alternative paths exist in the network because it is connected as a grid to improve its survivability. In addition, the network topology changes frequently as forces and combatants change their network access points while conducting operations. However, most Internet routing standards have been designed for use in stable backbone networks. Therefore, tactical networks may exhibit a deterioration in performance when these standards are implemented. In this paper, we propose Priority based Multi-Path routing with Local Optimization(PMPLO) for a tactical backbone network. The PMPLO separately manages the global and local metrics. The global metric propagates to other routers through the use of a routing protocol, and it is used for a multi-path configuration that is guaranteed to be loop free. The local metric reflects the link utilization that is used to find an alternate path when congestion occurs, and it is managed internally only within each router. It also produces traffic that has a high priority privilege when choosing the optimal path. Finally, we conducted a simulation to verify that the PMPLO can effectively distribute the user traffic among available routers.

Analysis of IEEE 802.11n System adapting SVD-MIMO Method based on Ns(Network simulator)-2 (Ns-2 기반의 SVD-MIMO 방식을 적용한 IEEE 802.11n 시스템 분석)

  • Lee, Yun-Ho;Kim, Joo-Seok;Choi, Jin-Kyu;Kim, Kyung-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.8
    • /
    • pp.1109-1119
    • /
    • 2009
  • WLAN(Wireless Local Area Network) standard is currently developing with increased wireless internet demand. Though existing IEEE 802.11e demonstrates that data rates exceed 54Mbps with assuring QoS(Quality of Service), wireless internet users can't be satisfied with real communication system. After IEEE 802.11e system, Study trends of IEEE 802.11n show two aspects, enhanced system throughput using aggregation among packets in MAC (Medium Access Control) layer, and better data rates adapting MIMO(Multiple-Input Multiple-Output) in PHY(Physical) layer. But, no one demonstrates IEEE 802.11n system performance results considering MAC and PHY connection. Therefore, this paper adapts MIMO in PHY layer for IEEE 802.11n system based on A-MPDU(Aggregation-MAC Protocol Data Unit) method in MAC layer considering MAC and PHY connection. SVD(Singular Value Decomposition) method with WLAN MIMO TGn Channel is used to analyze MIMO. Consequently, Simulation results show enhanced throughput and data rates compared to existing system. Also, We use Ns-2(Network Simulator-2) considering MAC and PHY connection for reality.

  • PDF

TradeB: A Blockchain-based Property Trade Service Using Trusted Brokers (TradeB: 신뢰성있는 중개인을 통한 블록체인 기반 재화 계약 서비스)

  • Yoon, Yeo-Guk;Eom, Hyun-Min;Lee, Myung-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.9
    • /
    • pp.819-831
    • /
    • 2019
  • The types of properties traded in modern times are rapidly increasing due to changes in consumption patterns. However, as the type of properties traded increases, estimation about the value of properties may become inaccurate. There is a problem that it is difficult for consumers to estimate the right value and the variety of trading forms makes it difficult to guarantee the reliability of value estimation As access to a variety of properties has expanded, these shortcomings are considered to be a factor that hinders the stability of the shared economic market. In this paper, to resolve this issue, we present a blockchain-based property contract service through a trusted broker. The developed service registers trusted brokers into smart contracts on the Ethereum blockchain and use them for the evaluation and contract process of properties. In addition, registered contents, proposals and contracts of properties are stored in the blockchain to ensure the reliability of the contract process. Every step of the contract process is stored in the smart contract, recorded in the transaction history of the blockchain, ensuring the reliability of the stored data. In addition, the entire process of registration, proposal, and contract is driven by smart contracts designed by state machine technology, enabling users to more securely control the contract process.

A Study on the Block Structure of the Land Readjustment Project Districts Focused on the case study of Cheongju City in the 1970's (토지구획정리사업지구의 가구(街區)체계에 관한 연구 -1970년대 청주시 사례를 중심으로-)

  • Kim, Mi Yeon;Oh, Deog-Seong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.551-563
    • /
    • 2019
  • This study examined the characteristics of a district through the concept of a block system in the physical aspect of the four land readjustment project districts of Cheongju City in the 1970s. The results of this study are as follows. First, the local road system for accessing the main road network and blocks was well established compared with the current urban development standards. On the other hand, since the access roads to the individual lots in the block were not equipped properly, it was difficult to improve a house. Second, according to the characteristics of the block, the Aspect Ratio of blocks was 1: 2 on average and most of those directions was east-west. The area of block from the 1st to 3rd districts was increasing, but districts 4 were decreasing. This also was changed to the shape of a contemporary block system. The larger the size of the block area, the lower the Jeobdoyul. Third, in terms of the characteristics of the lot array, blocks with a multi-row system of $4{\times}4$ or more were lots up to the 1st to 3rd district, but 4th district was improved greatly. Because blocks close a square shape have become excessively poor with Jeobdoyul, it was judged that it is difficult to improve the residential environment. Moreover, as the type of the residential development by the land readjustment project is standardized considerably and this type of land area is extensive, it can be an alternative to control the urban sprawl of suburbs if it finds the way to improve this type of the residential area considering this characteristic.

Conceptual Design of Networking Node with Real-time Monitoring for QoS Coordination of Tactical-Mesh Traffic (전술메쉬 트래픽 QoS 조율을 위한 네트워킹 노드의 개념 설계 및 실시간 모니터링)

  • Shin, Jun-Sik;Kang, Moonjoong;Park, Juman;Kwon, Daehoon;Kim, JongWon
    • Smart Media Journal
    • /
    • v.8 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • With the advancement of information and communication technology, tactical networks are continuously being converted to All-IP future tactical networks that integrate all application services based on Internet protocol. Futuristic tactical mesh network is built with tactical WAN (wide area network) nodes that are inter-connected by a mesh structure. In order to guarantee QoS (quality of service) of application services, tactical service mesh (TSM) is suggested as an intermediate layer between infrastructure and application layers for futuristic tactical mesh network. The tactical service mesh requires dynamic QoS monitoring and control for intelligent QoS coordination. However, legacy networking nodes used for existing tactical networks are difficult to support these functionality due to inflexible monitoring support. In order to resolve such matter, we propose a tactical mesh WAN node as a hardware/software co-designed networking node in this paper. The tactical mesh WAN node is conceptually designed to have multi-access networking interfaces and virtualized networking switches by leveraging the DANOS whitebox server/switch. In addition, we explain how to apply eBPF-based traffic monitoring to the tactical mesh WAN node and verify the traffic monitoring feasibility for supporting QoS coordination of tactical-mesh traffic.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

Study of Riverline Change around Sannam Wetland in the Hangang River Estuaty using LANDSAT Image Processing (LANDSAT 위성사진을 활용한 한강하구 산남습지 인근 하안선 변화 연구)

  • Youn, Sukzun;Lee, Samhee;Jang, Changhwan
    • Journal of Wetlands Research
    • /
    • v.23 no.2
    • /
    • pp.154-162
    • /
    • 2021
  • The naturally opened Han river estuary is a place where the flows of the Han river, Imjin river, Yaesung river meet with West Sea of Korea, so the hydrodynamic mechanism(Impact-Response) structure of Han river estuary is complex. Continuous observation and measurement due to the morphological characteristics at the estuary are required to maintain the estuary environment and river management facilities. However, the Sannam wetland(the study area) is in the military operation area. Therefore, Sannam wetland has the limited access under the control from military office. In 2020, there had a natural disaster due to flooding in August and COVID-19, and it made a survey hard. The noncontact survey technique, the analysis of LANDSAT images at Sannam wetland, was applied to analyze riverbed fluctuation and morphological transformation around Sannam wetland. LANDSAT images obtained from EarthExplorer, USGS and analyzed by QGIS. The analysis was performed based on the area and the distance near Sannam wetland. As a result, an erosion was happened on the downstream of the study area, and the upstream of the study area did not have any serious sediment transport. Considering the resolution of LANDSAT images, this noncontect survey technique is applicable to manage the study area. From the analysis of LANDSAT images, it is assumed that the tidal effect is greater than the inflow from the upstream. The pattern change of tidal response causes the damage of the river facilities near the Hangang river estuary.

Fat Client-Based Abstraction Model of Unstructured Data for Context-Aware Service in Edge Computing Environment (에지 컴퓨팅 환경에서의 상황인지 서비스를 위한 팻 클라이언트 기반 비정형 데이터 추상화 방법)

  • Kim, Do Hyung;Mun, Jong Hyeok;Park, Yoo Sang;Choi, Jong Sun;Choi, Jae Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.3
    • /
    • pp.59-70
    • /
    • 2021
  • With the recent advancements in the Internet of Things, context-aware system that provides customized services become important to consider. The existing context-aware systems analyze data generated around the user and abstract the context information that expresses the state of situations. However, these datasets is mostly unstructured and have difficulty in processing with simple approaches. Therefore, providing context-aware services using the datasets should be managed in simplified method. One of examples that should be considered as the unstructured datasets is a deep learning application. Processes in deep learning applications have a strong coupling in a way of abstracting dataset from the acquisition to analysis phases, it has less flexible when the target analysis model or applications are modified in functional scalability. Therefore, an abstraction model that separates the phases and process the unstructured dataset for analysis is proposed. The proposed abstraction utilizes a description name Analysis Model Description Language(AMDL) to deploy the analysis phases by each fat client is a specifically designed instance for resource-oriented tasks in edge computing environments how to handle different analysis applications and its factors using the AMDL and Fat client profiles. The experiment shows functional scalability through examples of AMDL and Fat client profiles targeting a vehicle image recognition model for vehicle access control notification service, and conducts process-by-process monitoring for collection-preprocessing-analysis of unstructured data.