• Title/Summary/Keyword: Access System

Search Result 6,574, Processing Time 0.041 seconds

Performance Evaluation of Access Channel Slot Acquisition in Cellular DS/CDMA Reverse Link

  • Kang, Bub-Joo;Han, Young-Nam
    • ETRI Journal
    • /
    • v.20 no.1
    • /
    • pp.16-27
    • /
    • 1998
  • In this paper, we consider the acquisition performance of an IS-95 reverse link access channel slot as a function of system design parameters such as postdetection integration length and the number of access channel message block repetitons. The uncertainty region of the reverse link spreading codes compared to that of forward link is very small, since the uncertainty region of the reverse link is determined by a cell radius. Thus, the parallel acquisiton technique in the reverse link is more efficient than a serial acquisition technique in terms of implementation and of acquisition time. The parallel acquisition is achieved by a bank of N parallel I/Q noncoherent correlator are analyzed for band-limited noise and the Rayleigh fast fading channel. The detection probability is derived for multiple correct code-phase offsets and multipath fading. The probability of no message error is derived when rake combining, access channel message block combining, and Viterbi decoding are applied. Numerical results provide the acquisition performance for system design parameters such as postdetection integration length and number of access channel message block repetitions in case of a random access on a mobile station.

  • PDF

An Implementation Method of Improved Document DRM for Preventing Information Leakage using RBAC Approach (RBAC을 이용한 정보유출 방지를 위한 보안성이 강화된 문서 DRM 구현)

  • Choi, Young Hyun;Eom, Jung Ho;Chung, Tai Myoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.57-66
    • /
    • 2011
  • We implemented the document DRM applying role based access control(RBAC) mechanism for preventing the information leakage of a document which is transmitted in network environment. It must prevent to access document not related to user role and duty, and must allow operation to document for improving security, considering user role and security level according to a document importance. We improved the security of document DRM by adding to the access control module applying RBAC for satisfying security requirements. Though the user access document, our system allows operation authorizations to document by the user's role & security level and the security attribute of RBAC. Our system prevents indiscriminate access to the documents by user who is not associated with the role, and prevents damage the confidentiality and integrity.

A Resource Management Scheme in Heterogeneous Access Network Architectures (이종 액세스 네트워크 구조에서 자원관리 방안)

  • Park, Sang-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.2
    • /
    • pp.83-92
    • /
    • 2005
  • Access networks connected in B3G networks provide its property network service. Hence, though mobile users may utilize only a network service from an access network, they can also use variety of network services from several access networks for their service satisfaction. To support heterogeneous changeable network service in access networks, the mobile terminal must implement heterogeneous system techniques so that it is able to change the network service by ISHO (Inter-System Handover) In this paper, we present the ISHO condition by the policy-based framework in B3G networks. Also, we propose an ISHO scheme to control network resources for the QoS management of a mobile session between UMTS and WLAN access networks. To support the QoS management, the proposed scheme is that it will be implemented before the resource exhaustion occurs to effect network performances.

  • PDF

Performance Evaluation of Myopic Policy for Dynamic Spectrum Access (동적 스펙트럼 접속을 위한 myopic 방식의 성능 분석)

  • Lee, Yutae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1101-1105
    • /
    • 2013
  • Due to underutilization of spectrum under the current static spectrum management policy, various kinds of dynamic spectrum access strategies have appeared. Myopic policy is a simple policy with reduced complexity that maximizes the immediate throughput. In this paper, the distribution of its medium access delay is evaluated under saturation traffic conditions. Using the distribution of the medium access delay, we also evaluate its system delay under non-saturated traffic conditions.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

Delay Analysis of the ISDN D-channel Access Protocol (ISDN D-채널 Access Protocol의 Delay 분석)

  • 이구연;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.2
    • /
    • pp.98-111
    • /
    • 1990
  • In this paper a queneing model for the D channel access protocal recommeded by CCITT is developed, and delays of the signalling and packet messages are analyzed using the model, Behaviors of packet and signalling messages in the D-channel access system are also investigated. The analytical results have been verified by simulation.

  • PDF

BACS : An Experimental Study For Access Control System In Public Blockchain (BACS : 퍼블릭 블록체인 접근 통제 시스템에 관한 실험적 연구)

  • Han, Sejin;Lee, Sunjae;Lee, Dohyeon;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.55-60
    • /
    • 2020
  • In this paper, we propose an access control system using cryptography as a method to protect personal data in public blockchain. The proposed system is designed to encrypt data according to the access policy, store it in the blockchain, and decrypt only the person who satisfy the access policy. In order to improve performance and scalability, an encryption mechanism is implemented outside the blockchain. Therefore, data access performance could be preserved while cryptographic operations executed Furthermore it can also improve the scalability by adding new access control modules while preserving the current configuration of blockchain network. The encryption scheme is based on the attribute-based encryption (ABE). However, unlike the traditional ABE, the "retention period", is incorporated into the access structure to ensure the right to be forgotten. In addition, symmetric key cryptograpic algorithms are used for the performance of ABE. We implemented the proposed system in a public blockchain and conducted the performance evaluation.

Implementation of Korea - Computer Access Assessment System (K-CAAS) for Persons with Physical Disabilities (지체장애인의 컴퓨터 접근 평가 시스템 구현)

  • Yook, Ju-Hye;Kim, Jin-Sul;Oh, Hyun-Jung
    • Journal of Digital Contents Society
    • /
    • v.13 no.3
    • /
    • pp.335-342
    • /
    • 2012
  • The purpose of the study was to develop a computer access assessment system for improving computer access of individuals with physical disabilities for the first time in Korea. Korea-Computer Access Assessment System (K-CAAS) presented in this article tests five user skills of aim, drag, menu, scan, and switch. Skill levels of the five test areas could be set as low, middle, and high according to individuals' characteristics. All tests have their default set in each level, and skill levels can be selected and controlled by the abilities and goals of a user. Tests could be selected for users' training and their results could be traced and shown. Therefore, the K-CAAS is a training program to improve computer access skills as well as an assessing program. It would help users with physical disabilities operate a computer by themselves as improving their computer access skills.

A Study on Elementary School Teachers' Needs for Access Points for Picture Books (초등학교 교사의 그림책 접근점 요구에 관한 연구)

  • Kim, Hyemi;Kim, Soojung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.233-258
    • /
    • 2022
  • The purpose of this study is to identify elementary school teachers' needs for access points when searching for picture books to be used as teaching media, and suggest ways to improve DLS(Digital Library System) in school libraries. To achieve this purpose, the study examined the access points provided by OPAC(Online Public Access Catalog) systems in seven domestic and foreign libraries. In addition, it conducted an online survey with elementary school teachers, and a total of 220 responses were finally analyzed. It was found that the most needed access points were topic, grade/age, content, subject/chapter, and cross-curricula learning topics, etc. Based on the results, this study suggests providing the most needed access points in DLS, developing controlled vocabulary tools, and improving system functions or the interface to enhance accessibility to picture books.

Channel Access Control Method for the CDMA Packet Service System (CDMA 패킷 서비스 시스템에서 채널 엑세스 제어 기법 연구)

  • 이강원
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.3
    • /
    • pp.169-184
    • /
    • 2003
  • In the IS-95 packet service system, the radio channels are generally classified into the dedicated and the common traffic channels. In this paper, a common traffic channel access method is proposed for the COMA packet service system to enhance the radio resource utilization while guaranteeing QoS to the users. The proposed method is based on the permission probability for the common traffic channel user. To derive permission probability, optimization models are developed for two different QoS constraints. Approximation methods are also developed.