• Title/Summary/Keyword: Access authority

Search Result 243, Processing Time 0.026 seconds

System Integrity Monitoring System using Kernel-based Virtual Machine (커널 기반 가상머신을 이용한 시스템 무결성 모니터링 시스템)

  • Nam, Hyun-Woo;Park, Neung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.157-166
    • /
    • 2011
  • The virtualization layer is executed in higher authority layer than kernel layer and suitable for monitoring operating systems. However, existing virtualization monitoring systems provide simple information about the usage rate of CPU or memory. In this paper, the monitoring system using full virtualization technique is proposed, which can monitor virtual machine's dynamic kernel object as memory, register, GDT, IDT and system call table. To verify the monitoring system, the proposed system was implemented based on KVM(Kernel-based Virtual Machine) with full virtualization that is directly applied to linux kernel without any modification. The proposed system consists of KvmAccess module to access KVM's internal object and API to provide other external modules with monitoring result. In experiments, the CPU utilization for monitoring operations in the proposed monitering system is 0.35% when the system is monitored with 1-second period. The proposed monitoring system has a little performance degradation.

Smartphone NFC based Access Control System (스마트폰 NFC 기반의 출입관리 시스템)

  • Bae, Sang-Jung;Jeon, Soon-Yeong;Lee, Sang-Hwa;Lee, Chan-Ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.596-597
    • /
    • 2016
  • Recently a variety of companies as the growing importance of big data are in the process of research and development for large-scale data collection and management. In addition, a situation that collects all necessary data inside and outside the enterprise to improve the manufacturing environment and the service environment. In this paper, we collect to ingest the mouth-time work for companies within the temple. Also, in conjunction with the NFC tag of the smart phone and employee information stored in the database. Utilizing this determines whether or not the employee attendance and the authority to automatically access to the database or resource within the enterprise. The proposed system is considered to be able to increase the accessibility and efficiency of a database or a resource in the enterprise.

  • PDF

A Study on ACAS for Enhanced Security in Cloud Virtualization Internal Environment (ACAS를 통한 클라우드 가상화 내부 환경 보안성 강화 연구)

  • Park, Tae-Sung;Choi, Do-Hyeon;Do, Kyoung-Hwa;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1355-1362
    • /
    • 2012
  • As the utilization of cloud computing service rapidly increases to meet demands for various forms of service recently, the virtualization technology has made a rapid rise, further leading to some issues related to security, such as safety and reliability. As a system to provide environments what multiple virtual operating systems can be loaded, hypervisors may be a target of various attacks, such as control loss and authority seizure, since all the agents fcan be damaged by a malicious access to the virtualization layer. Therefore, this paper was conducted to investigate the access control for agents and suggest a plan to control malicious accesses to the cloud virtualization internal environment. The suggested technique was verified not to have effect on the performance of the system and environment through an analysis of its performance.

Legal Interpretation on Management Power of Article 7 Section 1 of Security Business Act (경비업법 제7조 제1항 "관리권 범위"에 대한 법적 해석)

  • Lee, Jong-Hwan;Lee, Min-Hyung
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.59-87
    • /
    • 2011
  • Security Business Act of Korea is leaning toward the aspect of regulation, while it provides few provisions about vesting the authority, which causes problems such as legal loopholes to be raised in regard to the rules about authorizing the private security personnel to perform security affairs properly and defining the limit of power. So, it should be done to interpret the law in order to draw the legal basis of empowering as well as to set limits of the authority of security main agent, and Article 7, Section 1, of Security Business Act is the very provision that involves the legal basis. In the scope of 'Management Power', the statutory authority in the first clause of Article 7 of Security Business Act, the security personnel can use force for self-defense, defense of others and property, and prevention of crimes. In addition, the powers of interrogation, access control, and eviction notice are involved in its scope. The private security personnel as the occupation assistant can take precautions and if the infringement on the benefit and protection of the law is imminent or done, he or she can use force within the limits of the passive resistance and the means of defiance on the basis of 'Management Power'. The private security personnel, however, can exercise the force only if the necessary conditions of legal defense, emergency evacuation, and legitimate act of criminal law are fulfilled.

  • PDF

The Philippines Coconut Genomics Initiatives: Updates and Opportunities for Capacity Building and Genomics Research Collaboration

  • Hayde Flandez-Galvez;Darlon V. Lantican;Anand Noel C. Manohar;Maria Luz J. Sison;Roanne R. Gardoce;Barbara L. Caoili;Alma O. Canama-Salinas;Melvin P. Dancel;Romnick A. Latina;Cris Q. Cortaga;Don Serville R. Reynoso;Michelle S. Guerrero;Susan M. Rivera;Ernesto E. Emmanuel;Cristeta Cueto;Consorcia E. Reano;Ramon L. Rivera;Don Emanuel M. Cardona;Edward Cedrick J. Fernandez ;Robert Patrick M. Cabangbang;Maria Salve C. Vasquez;Jomari C. Domingo;Reina Esther S. Caro;Alissa Carol M. Ibarra;Frenzee Kroeizha L. Pammit;Jen Daine L. Nocum;Angelica Kate G. Gumpal;Jesmar Cagayan;Ronilo M. Bajaro;Joseph P. Lagman;Cynthia R. Gulay;Noe Fernandez-Pozo;Susan R. Strickler;Lukas A. Mueller
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.30-30
    • /
    • 2022
  • Philippines is the second world supplier of coconut by-products. As its first major genomics project, the Philippine Genome Center program for Agriculture (PGC-Agriculture) took the challenge to sequence and assemble the whole coconut genome. The project aims to provide advance genetics tools for our collaborating coconut researchers while taking the opportunity to initiate local capacity. Combination of different NGS platforms was explored and the Philippine 'Catigan Green Dwarf' (CATD) variety was selected with the breeders to be the crop's reference genome. A high quality genome assembly of CATD was generated and used to characterize important genes of coconut towards the development of resilient and outstanding varieties especially for added high-value traits. The talk will present the significant results of the project as published in various papers including the first report of whole genome sequence of a dwarf coconut variety. Updates will include the challenges hurdled and specific applications such as gene mining for host insect resistance and screening for least damaged coconuts (thus potentially insect resistant varieties). Genome-wide DNA markers as published and genes related to coconut oil qualitative/quantitative traits will also be presented, including initial molecular/biochemical studies that support nutritional and medicinal claims. A web-based genome database is currently built for ease access and wider utility of these genomics tools. Indeed, a major milestone accomplished by the coconut genomics research team, which was facilitated with the all-out government support and strong collaboration among multidisciplinary experts and partnership with advance research institutes.

  • PDF

The Awareness and the Challenges about Protection and Access Control of Record (기록정보의 안전한 보호와 접근통제에 관한 인식과 과제)

  • Lim, Mi-Hyun;Yim, Jin-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.1
    • /
    • pp.191-219
    • /
    • 2021
  • The development of IT technology that has come to symbolize the fourth industrial revolution, the introduction of online government, and the change in environment has caused radical changes in record management. Most public institutions under the government make use of information systems that are objects of information protection such as electronic document system, document management system, and Onnara system. Further, protection and access control of record information through physical environment and electronic system in a user-centered record management environment is an essential component. Hence, this study studies how professional records management professionals in public institutions recognize safe protection and access management of record information, deriving areas that require improvement and providing a discussion and suggestions to bring about such improvement. This study starts by examining laws and policies on information protection in Korea, analyzing items on access control to compare them with laws and policies, as well as the current situation on records management and derive implications. This study is meaningful in that it aims to substantialize records management by suggesting areas of improvement necessary for the protection and management of record information in public institutions and providing professionals with tangible authority and control.

Context-based Authentication Service for The Mobile Office

  • Yang, Jiyoung;Lee, Hyundong;Rhyoo, Shi-Kook;Chung, Mokdong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.12
    • /
    • pp.1475-1484
    • /
    • 2012
  • Today many companies introduce new mobile office environments evolved from the recent rapid development in mobile device technologies. Most of the recent mobile office systems use a simple authentication scheme such as ID/Password. This method is easy to use, but it does not consider the user's context. Thus it cannot provide appropriate security service required by the user's proper contexts. Therefore, this paper proposes a context based authentication system which applies security level verification and uses fuzzy algorithm based on the importance of access authority control.

User Access Control and Authentication System in VoIP Service Environment (VoIP 서비스 환경에서의 사용자 접근 통제 및 인증시스템)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Han, In-Sung;Ryou, Hwan-Bin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.63-66
    • /
    • 2007
  • 인터넷 상에서 음성데이터를 전달하는 VoIP는 기존의 PSTN망을 대체하는 수단으로 환영받고 있다. 음성데이터를 인터넷 프로토콜 데이터 패킷으로 변환하여 데이터가 일반 IP망에서 전달이 가능하게 해주어 기존 일반 전화망에 비해 요금이 저렴하고 확장성이 뛰어난 특징을 가지고 있다. 이러한 VoIP서비스가 점차 증가함에 따라 보안의 취약점 및 서비스의 질이 저하되는 문제가 발생하고 있다. 이러한 점을 줄이기 위해 본 논문은 기존의 VoIP에 AA(Attribute Authority) Server를 추가하여서 보안성 및 사용자 접근에 차등을 줄 수 있는 인증 시스템을 설계하였다.

  • PDF

NACSIS, Bibliographic Control and Standardization (NACSIS, 서지 제어와 표준화)

  • Naito, Eisuke
    • Journal of the Korean Society for information Management
    • /
    • v.7 no.1
    • /
    • pp.24-39
    • /
    • 1990
  • Many factors play a role in designing the interface for bibliographic data entry system in response to the various needs. Among the major variables to be considered are planning, record format screen design, automatic generation of access points, error chocking, download from bibliographic databases, character codes, card catalog production, and use of authority data. This paper described with examples how these design considerations can be implemented in empirical system.

  • PDF

Interface Design for the Bibliographic Data Entry System (서지 데이터 입력 시스템의 인터페이스 설계에 관한 연구)

  • 최석두
    • Journal of the Korean Society for information Management
    • /
    • v.7 no.1
    • /
    • pp.40-58
    • /
    • 1990
  • Many factors playa role in designing the interface for bibliographic data entry system in response to the various needs. Among the major variables to be considered are planning, record format, screen design, automatic generation of access points, error checking, download from bibliographic databases, character codes, card catalog production, and use of authority data.This paper described with examples how these design considerations can be implemented in empirical system.

  • PDF