• Title/Summary/Keyword: Access Scope

Search Result 167, Processing Time 0.05 seconds

A study for the RBAC based on Request Scope using AOP (AOP를 이용한 Request Scope 기반 RBAC 모델에 관한 연구)

  • Yoon, Dong-Uk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.267-269
    • /
    • 2016
  • 정보 보안 기법 중 접근 제어 기법(Access Control)은 네트워크 기반 어플리케이션에 기본적인 정보 보안 틀을 제공한다. 아울러 권한 기반 접근 제어 기법(RBAC)으로 다양한 권한 요구 사항을 충족하는 네트워크 기반 어플리케이션의 운용이 가능하다. 그러나 Session Scope의 권한 기반 제어 기법으로 동적 페이지들에 대한 접근 제어를 설계 배포 하기는 어렵다. 관점 지향 프로그래밍(AOP)를 이용한 동적 권한 생성으로 Session Scope의 권한과 결합, Request Scope의 권한을 생성해 디자인 레벨에서의 유연한 접근 권한 설계 방법에 대해 제안하며, 구현 후 확인했다.

Exploring the Revision Direction and Scope of the Korean Cataloging Rules for Religious Works (종교 저작에 대한 한국목록규칙의 개정 방향과 범위 탐색)

  • Rho, Jee-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.4
    • /
    • pp.153-177
    • /
    • 2021
  • The revision of the Korean Cataloging Rules (KCR) is in progress in order to conform IFLA LRM conceptual model and to strengthen its internal stability. Religious works, along with musical works and legal works, have been treated as special and important in cataloging rules. This trend continues in the new cataloging rules that seek a bibliographic model that interconnects related materials. However since KCR2(1966), there are no rules for access points or specific rules on religious works. Under the circumstances, this study analyzed (1) the contents of religious works in the recently revised cataloging rules, (2) the access points and their functions for religious works implemented in online catalogs and authority system, and finally (3) the direction and scope of KCR revision. As a result of the study, this study suggested that it is necessary to prepare detailed rules for preferred title and authorized access points for various religious works in KCR. In conclusion, some issues for further discussion were summarized.

A Role Based Access Control Method Considering Tasks in the Mobile Agent-based Workflow System

  • Jeong, Seong-Min;Han, Seung-Wan;Lim, Hyeong-Seok
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.549-552
    • /
    • 2000
  • We address an access control in the mobile agent-based workflow system. The Role Based Access Control (RBAC) is suitable to model the access control for business processes. However, current RBAC models are not adequate to mobile agent-based workflow system. Because separation of duties becomes complicated and it is impossible to perform several workflows at the same time. To solve these problems, we limit the scope of privilege within the specified task. We define considerations, specification of constraints needed in RBAC when tasks are involved. Also, we present an access control scenario and algorithms in the mobile agent-based workflow system.

  • PDF

Issues on Radio Access Technologies for the Fourth-Generation Mobile Communication System

  • Kim, Jin-Young
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1459-1462
    • /
    • 2002
  • Emergence of the fourth generation mobile communication system (4G system) is now in its dawn. This paper pro- poses a perspective framework on the 4G system, and discusses system aspects of radio access technologies. The focus of the paper is to define the scope and features of the 4G system in an overall system/network viewpoint. From the foreseeable development trends, it is highly expected that whatever emerges in the 4G system will be some kind of constantly evolving and grand recursive concatenation of all the existing system/network developments.

  • PDF

IPv6 Multicast Packet Transmission over IEEE 802.16 Networks (IEEE 802.16 망에서의 IPv6 멀티캐스트 패킷 전송 방법)

  • Jeong, Sang-Jin;Shin, Myung-Ki;Kim, Hyoung-Jun
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.235-236
    • /
    • 2006
  • IEEE 802.16 networks support mobile stations (MSs) to access broadband wireless networks while moving at a vehicular speed. However, IEEE 802.16 networks do not provide link layer native multicast capability because of point-to-multipoint connection characteristic. Due to this feature, it is not easy to adopt protocols or applications which need native link layer multicast capability. In order to solve the multicast support problem, we use the built-in LAN emulation feature of IEEE 802.16 which is based on Convergence Sublayer (CS). Our proposed operational procedures support not only the delivery of link local scope multicast packets, but also the delivery of non-link local scope multicast packets such as site local or global scope multicast packets. We also present the method of forming multicast Connection Identifier (CID) which is used to transport IP packets over IEEE 802.16 networks.

  • PDF

Interactive Remote Lecture System Based on IPv6 Multicast Services (IPv6 멀티캐스트 기반의 쌍방향 원격 강의 시스템)

  • Kang, Sung-Ho;Choo, Young-Yeol
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.11
    • /
    • pp.295-301
    • /
    • 2006
  • The scope ID field of IPv6 multicast address indicates the zone of the destination for which a multicast traffic is intended. Without any further examination on the header field, the scope ID enables a router to determine whether the traffic will be forwarded to a subnet or not. For the graceful migration from IPv4 networks to IPv6 networks, various IPv6 applications working through IPv4 networks are indispensable during the migration period. This paper describes development of an interactive remote lecture system providing service integration on voice, image, and data of teaching materials. Access right to the network for dialog among multicast group members is controlled via additional TCP (Transmission Control Protocol) session. A jitter buffer algorithm was implemented to improve the voice communication jitters.

  • PDF

Optimal Neighbor Scope-Based Location Registration Scheme in Mobile IP Networks (이동 IP 망에서의 최적 이웃 스코프 값 기반의 위치 등록 방법)

  • Suh, Bong-Sue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.139-144
    • /
    • 2007
  • The mobile terminal's frequent changes to the access point introduce significant network overhead in mobile IP networks. To solve this problem, we introduce a hierarchical structure with consideration given to the dynamic value of neighbor scope in IP regional registration[1]. When a mobile terminal moves within the neighbor given by the scope value, it makes registration locally without registration with its home agent. We analyze the algorithm mathematically and show the numerical results. As a result, optimization of the scope value for the localized registration under the hierarchical structure makes the proposed scheme outperform the standard mobile IP protocol[2]. This can be explained from the fact that there is only local registration for terminal's movement within the scope region. Moreover, as the signaling cost for home agent increases, the proposed scheme becomes more advantageous.

  • PDF

A Study on Concept of the Mobile Access Part based on the ITU's Access Network Functional Model (ITU Access Network의 기능적 모형에 근거한 이동망의 가입자 접속 부문 정립에 관한 연구)

  • Kim, Moon-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1A
    • /
    • pp.17-24
    • /
    • 2003
  • Access network is one of the most critical components of telecommunication networks. Essentially it provides the final connection through to the subscriber and at the same it is usually the most expensive component in terms of capital investment and ongoing cost of maintenance and repair In recent, various access technologies with broadband have been developed and also are emerging newly Comparing fixed access networks, the concrete concept as well as the scope of mobile access networks or parts has not been defined yet although it is caused by peculiarities of mobile network with mobility-guarantee technology, use of RF resource, fixed-exchange and transport networks This article examines the characteristics and detailed functions of BTS, BSC, MSC and other components in CDMA mobile network under the IS-95 A/B and cdma 2000-1x standards comparing the ITU's access network functional model From the systematic and functional perspectives, futhermore, an alternative definition for access parts of mobile network is proposed.

A Physical Storage Design Method for Access Structures of Image Information Systems

  • Lee, Jung-A;Lee, Jong-Hak
    • Journal of Information Processing Systems
    • /
    • v.14 no.5
    • /
    • pp.1150-1166
    • /
    • 2018
  • This paper presents a physical storage design method for image access structures using transformation techniques of multidimensional file organizations in image information systems. Physical storage design is the process of determining the access structures to provide optimal query processing performance for a given set of queries. So far, there has been no such attempt in the image information system. We first show that the number of pages to be accessed decreases as the shape of the given retrieval query region and that of the data page region become similar in the transformed domain space. Using these properties, we propose a method for finding an optimal image access structure by controlling the shapes of the page regions. For the performance evaluation, we have performed many experiments with a multidimensional file organization using transformation techniques. The results indicate that our proposed method is at least one to maximum five times faster than the conventional method according to the query pattern within the scope of the experiments. The result confirms that the proposed physical storage design method is useful in a practical way.

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud

  • Xiong, Jinbo;Yao, Zhiqiang;Ma, Jianfeng;Liu, Ximeng;Li, Qi;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.282-304
    • /
    • 2014
  • Each cloud service has numerous owners and tenants, so it is necessary to construct a privacy preserving identity management and access control mechanism for cloud computing. On one hand, cloud service providers (CSP) depend on tenant's identity information to enforce appropriate access control so that cloud resources are only accessed by the authorized tenants who are willing to pay. On the other hand, tenants wish to protect their personalized service access patterns, identity privacy information and accessing newfangled cloud services by on-demand ways within the scope of their permissions. There are many identity authentication and access control schemes to address these challenges to some degree, however, there are still some limitations. In this paper, we propose a new comprehensive approach, called Privacy pReserving Identity and Access Management scheme, referred to as PRIAM, which is able to satisfy all the desirable security requirements in cloud computing. The main contributions of the proposed PRIAM scheme are threefold. First, it leverages blind signature and hash chain to protect tenant's identity privacy and implement secure mutual authentication. Second, it employs the service-level agreements to provide flexible and on-demand access control for both tenants and cloud services. Third, it makes use of the BAN logic to formally verify the correctness of the proposed protocols. As a result, our proposed PRIAM scheme is suitable to cloud computing thanks to its simplicity, correctness, low overhead, and efficiency.