• Title/Summary/Keyword: Access System

Search Result 6,584, Processing Time 0.034 seconds

Resource management service model implemented for the Internet of Things services access control (사물인터넷 서비스 접근제어를 위한 리소스 서비스 관리 모델 구현)

  • Kim, Jin-Bo;Kim, Mi-Sun;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.9-16
    • /
    • 2016
  • Many countless services form using the Internet technology of things, in order to provide a variety of services in the current also many institutions, have created a new technology and protocols. In this paper, we design the resource service model for the efficient service provided by the system for controlling access to the Internet services of the things, to implement. The resources of the service that the user tries to access modeled using LCRS (Left Child-Right Sibling) tree, by utilizing the service token resource, it is possible to perform access control to services.

Performance Analysis of modified PRMA: PRHMA(Packet Reservation Hold Multiple Access) (변형된 PRMA 방식인 PRHMA의 성능분석)

  • Kim Hwan Ui;Kim Doug Nyun
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.1 no.2
    • /
    • pp.122-130
    • /
    • 2000
  • This paper mainly deals with the modified version of conventional PRMA(Packet Reservation Multiple Access). In the existing PRMA schemes, the occupied slot in the initial access state is not allowed to be reserved in the silent period and retrial of gaining the slot access has to pay additional packet dropping. Whereas in the modified model, we propose to utilize a control minislot that maintains slot reservation and this prevents additional packet drop occurrence since initial access, and this slightly improves the system performance.

  • PDF

Design and Implementation of Role-Based Access Control Package for Java Applications (자바 애플리케이션을 위한 역할기반 접근제어 패키지의 설계 및 구현)

  • Oh, Se-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1134-1141
    • /
    • 2006
  • Java is platform-independent and supports uniform solutions from mobile area (J2ME) to enterprise area (J2EE), so Java is a good development tool for the environment of heterogeneous machines and distributed applications. Java applications need access control module as a Java package. In this paper, we design and implement it. Therefore Java developers can reduce development time, and system managers easily do access control work. Proposed module is based on Role-Based Access Control (RBAC) model and includes a Java package and administration tool.

  • PDF

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6057-6078
    • /
    • 2018
  • Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

A Technique for Improving the Performance of Cache Memories

  • Cho, Doosan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.104-108
    • /
    • 2021
  • In order to improve performance in IoT, edge computing system, a memory is usually configured in a hierarchical structure. Based on the distance from CPU, the access speed slows down in the order of registers, cache memory, main memory, and storage. Similar to the change in performance, energy consumption also increases as the distance from the CPU increases. Therefore, it is important to develop a technique that places frequently used data to the upper memory as much as possible to improve performance and energy consumption. However, the technique should solve the problem of cache performance degradation caused by lack of spatial locality that occurs when the data access stride is large. This study proposes a technique to selectively place data with large data access stride to a software-controlled cache. By using the proposed technique, data spatial locality can be improved by reducing the data access interval, and consequently, the cache performance can be improved.

A Method for Access Control on Uncertain Context (불확정 상황정보 상에서의 접근제어 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.215-223
    • /
    • 2010
  • New information technologies make it easy to access and acquire information in various ways. However, It also enable powerful and various threat to system security. The prominent database technology challenging these threats is access control. Currently, to keep pace with the new paradigms, new extended access control methods are challenged. We study access control with uncertain context. With respect to access control, it is possible that there is a discrepancy between the syntactic phrase in security policies and that in queries, called semantic gap problem. In our semantic access control, we extract semantic implications from context tree and introduce the measure factor to calculate the degree of the discrepancy, which is used to control the exceed privileges.

An Implementation of Ranging Simulator Based on ITU-T G.983.1 (G.983.1 기반의 Ranging 시뮬레이터의 구현)

  • Hong, Jae-Geun;Woo, Man-Sik;Chung, Woo;Kim, Jin-Hee;Koh, Sang-Ho;Yoo, Gun-Il
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.248-251
    • /
    • 2000
  • The ATM-PON is regarded as an effective access network because the system transmits the various user's information through the passive optical splitter in a single platform. The ranging technology is to place all ONUs at the same distance virtually in order to form ATM-PON based on the Time Division Multiplexing (TDM). In This paper, We show the steps about ranging protocol based on ITU-T G.983.1 and ranging procedure modeling. Also, We implement the simulator that considers various environments to verify the time specifications of G.983.1. By using the simulator, We find out the wasted bandwidth which influences active ONUs during the ranging procedure.

  • PDF

An Extended Role-Based Access Control Model with Multi-level Security Control (다단계 보안통제가 가능한 확장된 역할 기반 접근통제 모델)

  • Yim, Hwang-Bin;Park, Dong-Gue
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.90-96
    • /
    • 2002
  • RBAC(Role-Based Access Control) is an access control method based on the user's role and it provides more flexibility on the various computer and network security fields. But, RBAC models consider only users for roles or permissions, so for the purpose of exact access control within real application systems, it is necessary to consider additional subjects and objects. In this paper, we propose an Extended RBAC model, $ERBAC_3$, for access control of multi-level security system by adding users, subjects, objects and roles level to RBAC, which enables multi-level security control. 

Trends Analysis of Open Access for Foreign and Domestic Scholarly Journals in the Field of Library and Information Science (국내외 문헌정보학 학술지의 오픈 액세스 동향 분석)

  • Yoon, Hee-Yoon;Kim, Sin-Young
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.1
    • /
    • pp.257-276
    • /
    • 2007
  • The major concern of scholarly communication system that consists of libraries, researchers, and publishers is scholarly journals. But there is a huge chasm between the groups that have their own respects and strategies, compensations, and rights about scholarly journals. This difference makes open access movement which has two strategies: Open Access Journal(OAJ) and Open Access Archives (OAA). This paper describes the current status and analyses serious limitations of OAJ and OAA, especially, including the present address in the field of library and information science.

  • PDF