• Title/Summary/Keyword: Access Management

Search Result 3,347, Processing Time 0.043 seconds

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

Revenue Management Model for Internet Access Service (인터넷 접속서비스 사업의 수익관리모형에 관한 연구)

  • 윤문길;이필환
    • Korean Management Science Review
    • /
    • v.19 no.1
    • /
    • pp.143-162
    • /
    • 2002
  • The concept of revenue management have been used widely In the hotel and all transportation industries, and considered as a good system for managing a perishable asset. Recently, its' application area is being increasingly expanded to service industries such as the travel, the railway, the Internet and the sport industries. Internet business can be classified into several groups according to the characteristics of the individual business. One of groups is Internet Access Servoce business which connects each users to the internet. In this paper, since internet Access Services (IAS) business has a similar property to the service Industry, we will apply a revenue management concept to It. With some modification of existing model developed by Subramanian et.al. for airlines, we suggest the revenue management model being applied to IAS business. Computational experiment shows that the Increase of the revenue Is up to 7% by appluing our model. It means our model has a potential to manage IAS business effectively.

Micro-mobility Management Scheme Using Link-layer Information in the Wireless Internet (무선 인터넷 망에서 링크 계층 정보를 이용한 마이크로 이동성 관리 기법)

  • 정상환;김도현;조유제
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6B
    • /
    • pp.563-572
    • /
    • 2003
  • When the Mobile IP is applied for mobility management protocol in the next-generation mobile communication networks, it can cause a serious performance degradation called micro-mobility problem. In this paper, we propose ANMM(Access Network Mobility Management) to efficiently support micro-mobility in the IP-based wireless access network. The ANMM scheme can reduce the handoff latency and signaling overhead resulting in performance enhancement by managing the mobility of mobile nodes within access network.

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

The Recent Trends of Open Access Movements and the Ways to Help the Cause by Academic Stakeholders (오픈 액세스 운동의 동향과 학술적 이해관계자의 대응전략)

  • Choi, Jae-Hwang;Cho, Hyun-Yang
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.3 s.57
    • /
    • pp.307-326
    • /
    • 2005
  • Open access movement supports the principle that the published output of scientific research should be available to everyone without charge. The term open access is used in the broad context of the wider movement. To achieve the objectives of open access to scholarly journal literature, BOAI(Budapest Open Access Initiative) recommends using two complementary strategies: 'self-archiving' in institutional/disciplinary repositories and 'open access journals.' This study introduces the strategies of open access movements and analyzes the ways to help the cause of open access by academic stakeholders(i.e., researchers, librarians, universities, publishers, foundations, learned societies, and government) from the perspective of two BOAI strategies.

A GateSensor for Effective and Efficient Entering/Taking Management of Vehicles for Construction Logistics (건설 자재 반출입 차량 관리 효율화를 위한 게이트센서)

  • Yoon, Su-Won;Song, Jae-Hong;Shin, Tae-Hong;Chin, Sang-Yoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.1
    • /
    • pp.85-96
    • /
    • 2011
  • The access monitoring and control system of vehicles involved in construction logistics has been evolved from paper-based through bar code-based and to RFID-based management with pursuing automatic data collection and management. However, existing management methods have a limit that they still need manpower allocation for access control of vehicles. Therefore this research has proposed an framework that includes devices and an information system for effective and efficient data collection for access control of vehicles for construction logistics. And the proposed framework has been verified through a laboratory test using a prototype system developed in this research. It is expected that the installation methods of RFID antenna and tag for the framework could be applied to not only the access control of construction site but also various RFID applications at construction sites.

An MIB Access Control Modeling for the Secure Management of Large Networks (대규모 망의 안전한 관리를 위한 관리 정보베이스의 접근 제어 모형화)

  • Seo, Jae-Hyeon;Lee, Chang-Jin;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.4
    • /
    • pp.581-591
    • /
    • 1995
  • An MIB is the heart of a network management system and it stores all information that is necessary for network management. To operate networks safely, it is essential to control accesses to managed objects. This paper provides three-level architecture of managers so as to perform network management more efficiently in large networks. Moreover, mandatory access control(MAC) policy and role-based access control policy are adopted to ensure the secure access to the MIB. These policies are modeled by using the active object-oriented data model, which makes easy to map these access control models into the active object-oriented database.

  • PDF

Family Resources and Life Satisfaction among Middle-aged Married Men and Women (중년기 기혼남녀의 가정자원 수준 및 집단별 생활만족도)

  • Park, Mee-Sok;Kim, Mi-Young
    • Journal of Family Resource Management and Policy Review
    • /
    • v.16 no.3
    • /
    • pp.35-51
    • /
    • 2012
  • The purpose of this study was to assess middle-aged married men and women's access to family resources (economic and relationship) and to examine how this affects their life satisfaction. Data were drawn from the second wave of the Korean Longitudinal Study of Ageing (KLoSA). The sample consisted of 3,265 middle-aged married men and women aged between 45 and 60, who had children. The collected data were analyzed using multiple regression, ANOVA and the Scheff$\acute{e}$ctest using SPSS 18.0 The results showed that there was significant difference between men and women in terms of their access to economic and human relationship resources. In addition, the life satisfaction of the middle-aged was found to be significantly predicted by their access to economic and human relationship resources. In particular, the life satisfaction of group (A), who had low economic resource access but high family relationship satisfaction, was found to be higher than that of group (B), who had access to high economic resources but had low family relationship satisfaction This result indicated that there was an interaction effect between family resources. A number of policy implications were made.

  • PDF

A Study of Password Management Methods for System in Access Control (시스템 접근통제를 위한 패스워드 관리 방안에 대한 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.303-306
    • /
    • 2011
  • System solutions for access control to the user's personal when you want to authenticate to the system is used. The valid user is really just a part of authorized users, the suitability of a valid user has been authenticated are not sure whether the problem is the fact. For example, one developer in the Unix operating system can be valid, but do not have permission to access the system should be limited for. In this paper, a single account for multiple users to use the system operational issues to improve the fine-grained delegation of authority, the session audit, the administrator account's policy-based management, with full rights the administrator account of distribution management and auditing the system overall is the study of access control measures.

  • PDF

Improvement on Access Control of Hazard Zone in a Steel Manufacturing Industry (철강 제조업에서의 유해.위험구역 출입 관리 방안)

  • Seo, Seong-Hwa;Kim, Min;Weon, Jong-Il;Woo, Heung-Sik
    • Journal of the Korean Society of Safety
    • /
    • v.26 no.3
    • /
    • pp.63-68
    • /
    • 2011
  • Access-control of hazard zone in a steel manufacturing industry is studied in terms of safety management. Based on the results of risk evaluation for hazard zone, three risk zones with low, middle and high level are categorized. These zones have different color door and locking shape depending on their risk levels. At the high level, red door and key-based locking system are employed to accessed-controled path. Furthermore, tagout, lockout, interlock system for emergency stop, warning and flashing are also introduced. New standardized procedure of access-control for various hazard zones, which could help to greatly contribute to the prevention of accidents in advance, is proposed considering the risk level and the condition of given hazard zones. The standardized procedure of access-management suggested in this study will take an effective role as one of safety guide lines for hazardous workshop of manufacturing industries.