• Title/Summary/Keyword: Access Method

Search Result 3,450, Processing Time 0.028 seconds

Role-Behavior Based Access Control on Mobile Agent System for Workflow Management System (워크플로우 응용을 위한 이동 에이전트 시스템에의 역할-행위 기반 접근통제 적용)

  • Shin, Wook;Lee, Dong-Ik;Yoon, Seok-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.11-28
    • /
    • 2000
  • In these days it is rapidly increasing that multi-user, multi-layered commercial software developments for companies or public institutions. Security services are necessary for most of systems and the access control service is the essential of security services. Current access control methods that are used as access control policies are classified as Discretionary Access Control Mandatory Access Control and Role Based Access Control. However there are some inefficiencies when those methods are applied to current multi-user, multi-layered systems. Therefore it is required that a new access control method that takes complex system resources into account from the side of policy. In this paper extending previous Role Based of 'Behavior' and a basic model of the method. And we simply implement the method on the mobile agent based workflow management system that is a representative example of multi-user. multi-layered softwares and shows implementation results to tap possibilities of real-world application.

An Access Code Key for Verification Service Model on the Blockchain in a Door Security (출입문 보안을 위한 블록체인 기반의 출입코드키 검증 서비스 모델)

  • Hong, Ki Hyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1416-1432
    • /
    • 2022
  • The access control system is a system that allows users to selectively enter the building by granting an access key to the user for security. Access keys with weak security are easily exposed to attackers and cannot properly perform the role that authenticates users. Access code keys should be protected from forgery or spoofing. For this reason, access key verification service models is important in security. However, most models manage all access keys on one central server. This method not only interrupts all services due to server errors, but also risks forgery and spoofing in the process of transmitting access keys. Therefore, blockchain algorithms are used to reduce this risk. This paper proposes a blockchain-based access key verification service model that used distributed stored blockchain gateways on storing access keys and authenticates the user's identity based on them. To evaluate the performance of this model, an experiment was conducted to confirm the performance of the access key forgery recovery rate and the blockchain network performance. As a result, the proposed method is 100% forgery recovery rate, and the registration and verification process is evaluated at 387.58 TPS and 136.66 TPS.

An XML Access Control Method through Filtering XPath Expressions (XPath 표현식의 필터링을 통한 XML 접근 제어 기법)

  • Jeon Jae-myeong;Chung Yon Dohn;Kim Myoung Ho;Lee Yoon Joon
    • Journal of KIISE:Databases
    • /
    • v.32 no.2
    • /
    • pp.193-203
    • /
    • 2005
  • XML (extensible Markup Language) is recognized as a standard of data representation and transmission on Internet. XPath is a standard for specifying parts of XML documents anda suitable language for both query processing and access control of XML. In this paper, we use the XPath expression for representing user queries and access control for XML. And we propose an access control method for XML, where we control accesses to XML documents by filtering query XPath expressions through access control XPath expressions. In the proposed method, we directly search XACT (XML Access Control Tree) for a query XPath expression and extract the access-granted parts. The XACT is our proposedstructure, where the edges are structural summary of XML elements and the nodes contain access-control information. We show the query XPath expressions are successfully filtered through the XACT by our proposed method, and also show the performance improvement by comparing the proposed method with the previous work.

Random Access Method of the Wibro System

  • Lee, Kang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1A
    • /
    • pp.49-57
    • /
    • 2011
  • Random access method for Wibro system is proposed using the Bayesian Technique, which can estimate the number of bandwidth request messages in a frame only based on the number of successful slots. The performance measures such as the maximum average throughput, the mean delay time and the collision ratio are investigated to evaluate the performance of the proposed method. The proposed method shows better performance than the binary exponential backoff algorithm used currently.

The Efficacy of Chlorhexidine in Hemodialysis Vascular Access Device Disinfection (혈액투석 혈관통로 소독에 있어 클로르헥시딘의 효과)

  • Yang, Ji-Hyun;Yu, Young-Mi;Yu, Min-Gyeong;Moon, Sung-Mi;Park, Sue-Jean
    • Quality Improvement in Health Care
    • /
    • v.23 no.1
    • /
    • pp.55-67
    • /
    • 2017
  • Purpose:The purpose of this study was to apply the disinfection method using chlorhexidine in practice on disinfection of vascular access for hemodialysis. Methods: This study was designed as a randomized controlled trial for examining effectiveness on infection of the vascular access device for hemodialysis when using chlorhexidine and betadine/alcohol. One-hundred-thirty study participants were separated into two groups randomly. Infection signs of the vascular access device for hemodialysis were observed and recorded before disinfection on vascular access device. Result: Before the study, there was no difference between the experimental group (chlorhexidine group) and the control group (betadine/alcohol group) in general characteristics and hematological index. Incidence of infection rate of chlorhexidine group was 0 percent and the betadine/alcohol group was 1.5 percent. There was no significant difference between the two groups. Conclusion: This study examined the effectiveness of prevention of infection with the disinfection method using chlorhexidine and betadine/alcohol. The disinfection method using chlorhexidine is considered an effective and alternative method of betadine/alcohol.

A Physical Storage Design Method for Access Structures of Image Information Systems

  • Lee, Jung-A;Lee, Jong-Hak
    • Journal of Information Processing Systems
    • /
    • v.14 no.5
    • /
    • pp.1150-1166
    • /
    • 2018
  • This paper presents a physical storage design method for image access structures using transformation techniques of multidimensional file organizations in image information systems. Physical storage design is the process of determining the access structures to provide optimal query processing performance for a given set of queries. So far, there has been no such attempt in the image information system. We first show that the number of pages to be accessed decreases as the shape of the given retrieval query region and that of the data page region become similar in the transformed domain space. Using these properties, we propose a method for finding an optimal image access structure by controlling the shapes of the page regions. For the performance evaluation, we have performed many experiments with a multidimensional file organization using transformation techniques. The results indicate that our proposed method is at least one to maximum five times faster than the conventional method according to the query pattern within the scope of the experiments. The result confirms that the proposed physical storage design method is useful in a practical way.

Performance Characteristic of the β-Human Chorionic Gonadotropin Assay on the Access 2 for Its Use in Doping Control

  • Kang, Min-Jung;Lee, Hye-Im;Shin, Sang-Mi;Yoo, Hye-Hyun;Kwon, Oh-Seung;Jin, Chang-Bae;Chung, Bong-Chul
    • Bulletin of the Korean Chemical Society
    • /
    • v.31 no.10
    • /
    • pp.2889-2892
    • /
    • 2010
  • The objective of this study was to validate performance characteristics of the Access 2 (Beckman coulter) system for hCG assays for use as a confirmation test for doping control. The Access 2 assay was linear up to 500 IU/L. The correlation coefficient was higher than 0.999, and the sensitivity of the linearity was 0.82. There were no false positive or false negative cases. LOD was 0.59 IU/L. The method was robust when performed by different people. Repeatability and reproducibility were below 7%. We compared reproducibility and recoveries of Access 2 and Elecsys 2010. Access 2 demonstrated higher reproducibility than Elecsys 2010. Recoveries (accuracy) of Access 2 were between 85 and 105%. Recoveries for Elecsys 2010 were between 91 and 104%.

Security Improvement of File System Filter Driver in Windows Embedded OS

  • Seong, Yeon Sang;Cho, Chaeho;Jun, Young Pyo;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.834-850
    • /
    • 2021
  • IT security companies have been releasing file system filter driver security solutions based on the whitelist, which are being used by several enterprises in the relevant industries. However, in February 2019, a whitelist vulnerability was discovered in Microsoft Edge browser, which allows malicious code to be executed unknown to users. If a hacker had inserted a program that executed malicious code into the whitelist, it would have resulted in considerable damage. File system filter driver security solutions based on the whitelist are discretionary access control (DAC) models. Hence, the whitelist is vulnerable because it only considers the target subject to be accessed, without taking into account the access rights of the file target object. In this study, we propose an industrial device security system for Windows to address this vulnerability, which improves the security of the security policy by determining not only the access rights of the subject but also those of the object through the application of the mandatory access control (MAC) policy in the Windows industrial operating system. The access control method does not base the security policy on the whitelist; instead, by investigating the setting of the security policy not only for the subject but also the object, we propose a method that provides improved stability, compared to the conventional whitelist method.

Multiaccess Scheme with Implicit Reservation for VSAT Data commmunication (VSAT 데이터 통신을 위한 묵시적 예약 방식의 다중접속 기법)

  • 이창건;최양희;정선종;김종상
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.7
    • /
    • pp.1-16
    • /
    • 1994
  • In this paper, we propose a new multiple access scheme for VSAT(Very Small Aperture Terminal) data communications. The proposed scheme has better performance in terms of delay throughput than Controlled Multiaccess Scheme which has excellent performance. The proposed scheme use the spare reservation method, adaptation method to offered load, and fixed bandwidth reservation method. In this paper, we analyze the performance using simple queueing model and present the simulation results. When network traffic is very low, the new scheme and the controlled multiaccess scheme have almost the same access delay characteristic. As the network load becomes higher, the new scheme's access delay gain becomes larger. Futhermore, even when the network traffic is very high it is possible to access satellite link within the delay similar to one round-trip delay. In addition to access delay performance enhancement, the new scheme has facility that supports fixed bandwidth reservation. So it shows more enhanced performance in the environment that stream traffic is dominant such as in VSAT communication environment.

  • PDF

Sparse Index Multiple Access for Multi-Carrier Systems with Precoding

  • Choi, Jinho
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.439-445
    • /
    • 2016
  • In this paper, we consider subcarrier-index modulation (SIM) for precoded orthogonal frequency division multiplexing (OFDM) with a few activated subcarriers per user and its generalization to multi-carrier multiple access systems. The resulting multiple access is called sparse index multiple access (SIMA). SIMA can be considered as a combination of multi-carrier code division multiple access (MC-CDMA) and SIM. Thus, SIMA is able to exploit a path diversity gain by (random) spreading over multiple carriers as MC-CDMA. To detect multiple users' signals, a low-complexity detection method is proposed by exploiting the notion of compressive sensing (CS). The derived low-complexity detection method is based on the orthogonal matching pursuit (OMP) algorithm, which is one of greedy algorithms used to estimate sparse signals in CS. From simulation results, we can observe that SIMA can perform better than MC-CDMA when the ratio of the number of users to the number of multi-carrier is low.