• Title/Summary/Keyword: Access System

Search Result 6,593, Processing Time 0.032 seconds

Design of an Access Router for Internet Access Services in the Integrate Access Node (통합 액세스 노드에서의 인터넷 액세스 라우터 설계)

  • 홍록기;이현태
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.438-442
    • /
    • 1999
  • More and more residential and mobile users are requiring access to the Internet. This paper presents an architecture of the network solution for cost-effective Internet/intranet access between users and Network Service Providers(NSPs). It also presents a functional architecture of Internet access router in the integrated access node system. The proposed Internet access router provides the functionality that users select any of a number of NSPs and mutiple user PPP calls are multiplexed over each secure tunnel between the Internet access router and NSP.

  • PDF

The Design and Performance analysis of a Process Migration Facility in a Distributed System (분산 시스템에서 프로세스 이주 기능의 설계와 성능 평가)

  • 엄태범;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.7
    • /
    • pp.656-665
    • /
    • 1992
  • In this paper, the performance of the various multiple access techniques for the mobile computer network has been studiedi in the consideration of the charactersitics of the mobile cimmunication channel. In the case of the hidden node occurring. It could be seen that the performance of the code division multiple access (CDMA) technique with simultaneous access function is better than that of the other packet access methods such as carrier sendsed multiple access (CDMA), busy tone multiple access (BTMA) and idle signal multiple access (ISMA) in the view of the throughput and mean delay time. Also, it has been shown that the performance of the CDMA method is superior to that of other packet access techniques such as multiple access (CSMA), etc. when the fading effect or impulsive noise exists in the mobile channel, Especially, in the case of the distributed mobile network it has been shown that the receivertransmitter based CDMA method using the characteristics of CDMA effectively has better throughput and less mean delay time than the commontransmitter based CDMA technique.

  • PDF

A Secure Cloud Computing System by Using Encryption and Access Control Model

  • Mahmood, Ghassan Sabeeh;Huang, Dong Jun;Jaleel, Baidaa Abdulrahman
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.538-549
    • /
    • 2019
  • Cloud computing is the concept of providing information technology services on the Internet, such as software, hardware, networking, and storage. These services can be accessed anywhere at any time on a pay-per-use basis. However, storing data on servers is a challenging aspect of cloud computing. This paper utilizes cryptography and access control to ensure the confidentiality, integrity, and proper control of access to sensitive data. We propose a model that can protect data in cloud computing. Our model is designed by using an enhanced RSA encryption algorithm and a combination of role-based access control model with extensible access control markup language (XACML) to facilitate security and allow data access. This paper proposes a model that uses cryptography concepts to store data in cloud computing and allows data access through the access control model with minimum time and cost for encryption and decryption.

Development of The Home Control System Base on USB (USB에 기반한 홈 제어 시스템 개발)

  • Lee Chang-Goo;Kim Hee-Sun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.4
    • /
    • pp.405-410
    • /
    • 2006
  • This paper presents the design of a USB home controller and a home control system that specially is focused on controlling home appliances as a part of home network systems, the implementation of the USB device access class in an OSGi service platform and a home security system as an application. Designed USB home controllers are able to control various home appliances. They can be used not only to control big home appliances like a boiler but also to control small home appliances like a toaster because they are low-cost solutions. The USB home controller supports real time control using the interrupt transfer of the USB specification. And It is easy to use by homemakers who have no technical knowledge of the system because they just plug and unplug it in a home server then it automatically joins and leaves a home control system. This technique is based on hot-plug and the USB Device Access class in an OSGi Service Platform. The USB Device Access class supports the coordination of automatic detection and attachment of the USB home controller on an OSGi Service Platform, and it downloads and installs device drivers on demand. For an application, we implemented and tested a home security system using two USB home controllers and a CDMA module.

Design and Implementation of The Capability Token based Access Control System in the Internet of Things (IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현)

  • Lee, Bum-Ki;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.439-448
    • /
    • 2015
  • IoT (Internet of Things) propels current networked communities into a advanced hyper-connected society/world where uniquely identifiable embedded computing devices are associated with the existing internet infrastructure. Therefore, the IoT services go beyond mere M2M (Machine-to-Machine communications) and should be able to empower users with more flexible communication capabilities over protocols, domains, and applications. In addition, The access control in IoT need a differentiated methods from the traditional access control to increase a security and dependability. In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments. In the proposed system, Authorities are symbolized into concepts of the capability tokens, and the access control systems manage the tokens, creation, (re)delegation and revocation. The proposed system is expected to decrease the process time of access control by using capability tokens.

Modeling and Analysis of Link Initialization Access of RE-DSRC (RF-DSRC 링크초기접속 모델링 및 분석)

  • Lee Min-Heui;Kwag Su-Jin;Jung Jong-In;Lee Sang-Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.4 no.2 s.7
    • /
    • pp.23-31
    • /
    • 2005
  • ITS(Intelligent Transportation System) implementing information collection services and information support services for cars of moving fast needs a communication system of special aim such as RF-DSRC(Radio Frequency Dedicated Short Range Communication). Before RSE(Road Side Equipment) and OBE(On-Board Equipment) will be able to communicate RF-DSRC, OBE first have to request Link Initialization Access using ACTC(Activation Channel) in allocated ACTS(Activation Slot) by Slotted ALOHA. Even though Link Initialization Access is a important element to decide performance of communication system, optimal mathematic modeling study of Link Initialization Access which is adapted RF-DSRC characteristics is not enoush. So, in this paper, we propose mathematical modeling about Link Initialization Access of RF-DSRC. And then we computed Link Initialization Access probability defining offer load(G) which is adapted RF-DSRC characteristics for analyzing performance of modeling.

  • PDF

An Implementation of Expert System wiht Knowledge Acquisition System (지식 획득 시스템을 갖춘 전문가 시스템의 구현)

  • Seo, Ui-Hyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5
    • /
    • pp.1434-1445
    • /
    • 2000
  • An expert system executes the inference, based on the knowledge of specific domain. the reliability on the results of inference depends upon both the consistency and accuracy of knowledge. This is the reason why expert system requires the facilities which can practice an access to the various kinds of knowledge and maintain the consistency and accuracy of knowledge an maintain the consistency and accuracy of knowledge. This paper is to implement an expert system permitting an access of declarative and procedural knowledge in the knowledge base and in the data base. This paper is also to implement a knowledge acquisition system which adds the knowledge a only if its accuracy and consistency are maintained, after verifying the potential errors such as contradiction, redundancy, circulation, non-reachable rule and non-lined rule. In consequence, the expert system realizes a good access to the various sorts of knowledge and increases the reliability on the results of inference. The knowledge acquisition system contributes tro strengthening man-machine interface that enables users to add the knowledge easily to the knowledge base.

  • PDF

A RBAC Model Considering the Characteristics of the Adhocracy Organization (애드호크러시 조직의 특성을 고려한 역할기반 모델)

  • Shim, Won-Bo;Park, Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.41-53
    • /
    • 2002
  • Role Based Access Control (RBAC), which is a method, using role as an access control, has been popular with users and it is recognized as an effective method to replace the Discretionary Access Control and the Mandatory Access Control However, the existing Role Based Access Control Models have only been limited to the bureaucracy organization in which a distinctive hierarchy system was used, incorporating a stable structure and a standardized work system. Only in some parts, some access control models have been used, which supports 'Team' concept, such as Team Based Access Control Model. However, it did not incorporate the characteristics of the adhocracy organization, which is similar to the company's task force team, whose characteristics are organic, temporary, no standardized operation procedures, and many frequent changes. In this study, we have discussed the characteristics of the adhocracy organization which is different from the existing bureaucracy organization, and we have also discussed the problems related to when the existing access control models are used as the access control model for the adhocracy organization due to its characteristics. In addition, based on the problems, we have suggested an improved role based access control model for the adhocracy organization, and have come up with the solutions when any problems occur in the access control system.

Trusted Non-3GPP Access Interworking in 3GPP 5G System (3GPP 5G 시스템에서 Trusted Non-3GPP 액세스 연동 기술)

  • Kang, Yoohwa;Kim, Changki
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.639-647
    • /
    • 2018
  • A common core network is the one of main architectural principles in 3GPP 5G System which has common interfaces with different multiple accesses. 3GPP 5G System Phase 1 (Release 15) supports Untrusted Non-3GPP access as well as 3GPP access with common interfaces. Non-3GPP Interworking Function (N3IWF) has been defined to interface with a UE and a core network for supporting Untrusted Non-3GPP access in 3GPP Release 15. However, interworking with Trusted Non-3GPP access is under study to be completed in 3GPP 5G System Phase 2 (Release 16). Therefore, this paper proposes a Trusted Non-3GPP access network architecture and related signaling procedures, and then the implementation based on the proposal shows how to interwork between Trusted Non-3GPP access and the 5G core network. In our proposal, N3IWF can interwork with either Untrusted or Trusted Non-3GPP access without any architectural modification or addition of 3GPP 5G system Phase 1.

An Overview of the Risk Sharing Management in Korean National Health Insurance, Focused on the Effect of the Patient Access and Insurance Finance (우리나라 건강보험의 위험분담제도가 재정 및 환자접근성에 미친 영향)

  • Lee, Jong Hyuk;Bang, Joon Seok
    • Korean Journal of Clinical Pharmacy
    • /
    • v.28 no.2
    • /
    • pp.124-130
    • /
    • 2018
  • Objective: This study examined the Risk Sharing Agreement (RSA) on pharmaceutical pricing system in Korean national health insurance. Through RSA, the insurer was able to maintain the principles in the price listing process while managing the budget effectively and improving patient access to new drugs. Despite these positive effects, there are still issues raised by some stakeholders, such as lack of transparency in the listing process and doubts about its effectiveness. Therefore, we investigated the impacts of RSA on national health insurance financing and patient access to analyze the effects of RSA. Methods: The impact of RSA was investigated by analyzing the health insurance claims data for 2014~2016. The degree of improvement in patient access was determined by the decreased amount of patients' payment. Results: Results showed that the financial impact of RSA was not significant and patients' access to the new drug greatly improved. Conclusion: These results show that RSA is a good system for improving patient access to new drugs without additional expense on insurance.