• Title/Summary/Keyword: Access control mechanism

Search Result 354, Processing Time 0.023 seconds

Application of Multi-Resolution Modeling in Collaborative Design (협업 설계에서의 다중해상도 모델링 응용)

  • Kim, Tae-Seong;Han, Jung-Hyun
    • The KIPS Transactions:PartA
    • /
    • v.10A no.4
    • /
    • pp.339-346
    • /
    • 2003
  • This paper provides a framework for information assurance within collaborative design, based on a technique we call role-based viewing. Such role-based viewing is achieved through integration of multi-resolution geometry and security models. 3D models are geometrically partitioned, and the partitioning is used to create multi-resolution mesh hierarchies. Extracting a model suitable for access rights for individual designers within a collaborative design environment Is driven by an elaborate access control mechanism. 

Application of Multi-Resolution Modeling in Collaborative Design (협업 설계에서의 다중해상도 모델링 응용)

  • Kim, Taeseong;Han, Junghyun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.9 no.2
    • /
    • pp.1-9
    • /
    • 2003
  • Information assurance(IA) refers to methodologies to protect engineering information by ensuring its availability, confidentiality, integrity, non-repudiation, authentication, access control, etc. In collaborative design, IA techniques are needed to protect intellectual property, establish security privileges and create "need to know" protections on critical features. Aside from 3D watermarking, research on how to provide IA to distributed collaborative engineering teams is largely non-existent. This paper provides a framework for information assurance within collaborative design, based on a technique we call role-based viewing. Such role-based viewing is achieved through integration of multi-resolution geometry and security models. 3D models are geometrically partitioned, and the partitioning is used to create multi-resolution mesh hierarchies. Extracting an appropriately simplified model suitable for access rights for individual designers within a collaborative design environment is driven by an elaborate access control mechanism.

  • PDF

A Reliable Group Key Management Scheme for Broadcast Encryption

  • Hur, Junbeom;Lee, Younho
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.246-260
    • /
    • 2016
  • A major challenge achieving scalable access control for a large number of subscribers in a public broadcast is to distribute key update messages reliably to all stateless receivers. However, in a public broadcast, the rekeying messages can be dropped or compromised during transmission over an insecure broadcast channel, or transmitted to receivers while they were off-line. In this study, we propose a novel group key management scheme. It features a mechanism to allow legitimate receivers to recover the current group key, even if they lose key update messages for long-term sessions. The scheme uses short hint messages and member computation. Performance analysis shows that the proposed scheme has the advantages of scalability and efficient rekeying compared to previous reliable group key distribution schemes. The proposed key management scheme targets a conditional access system in a media broadcast in which there is no feedback channel from receivers to the broadcasting station.

A Proposed Framework for the Automated Authorization Testing of Mobile Applications

  • Alghamdi, Ahmed Mohammed;Almarhabi, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.217-221
    • /
    • 2021
  • Recent studies have indicated that mobile markets harbor applications (apps) that are either malicious or vulnerable, compromising millions of devices. Some studies indicate that 96% of companies' employees have used at least one malicious app. Some app stores do not employ security quality attributes regarding authorization, which is the function of specifying access rights to access control resources. However, well-defined access control policies can prevent mobile apps from being malicious. The problem is that those who oversee app market sites lack the mechanisms necessary to assess mobile app security. Because thousands of apps are constantly being added to or updated on mobile app market sites, these security testing mechanisms must be automated. This paper, therefore, introduces a new mechanism for testing mobile app security, using white-box testing in a way that is compatible with Bring Your Own Device (BYOD) working environments. This framework will benefit end-users, organizations that oversee app markets, and employers who implement the BYOD trend.

Spreading Codes Based Multicast Feedback Scheme for Reliable Multicast Services (신뢰성 있는 멀티캐스트 서비스를 위한 스프레딩 코드 기반 피드백 기법)

  • Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.787-793
    • /
    • 2015
  • In order to support reliable medium access control (MAC) layer multicast services in Broadband Wireless Access (BWA) networks, we here propose spreading codes (Cumulative ACK (CA) code and ARQ Feedback Request (AFR) code) based reliable multicast feedback scheme. The status indications based on the automatic repeat request (ARQ) mechanism are needed in some multicast services. In accordance with various wireless channel environments, we demonstrate the performance excellency of our proposed scheme with respect to required uplink resources compared with the original feedback scheme based on unicast ARQ feedback messages. In addition, we analyze packet error rate (PER) against the various wireless channel environments.

An Admission Control Mechanism to guarantee QoS of Streaming Service in WLAN (WLAN에서 스트리밍 서비스의 QoS를 보장하기 위한 승인 제어 기술)

  • Kang, Seok-Won;Lee, Hyun-Jin;Lee, Kyu-Hwan;Kim, Jae-Hyun;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6B
    • /
    • pp.595-604
    • /
    • 2009
  • The HCCA reserves the channel resources based on the mean data rate in IEEE 802.11e. It may cause either the waste of channel resource or the increase of transmission delay at MAC layer if the frame size is rapidly varied when a compressed mode video codec such as MPEG video is used. To solve these problems, it is developed that the packet scheduler allocates the wireless resource adaptation by according to the packet size. However, it is difficult to perform the admission control because of the difficulty with calculating the available resources. In this paper, we propose a CAC mechanism to solve the problem that may not satisfy the QoS by increasing traffic load in case of using EDCA. Especially, the proposed CAC mechanism calculates the EB of TSs using the traffic information transmitted by the application layer and the number of average transmission according to the wireless channel environment, and then determines the admission of the TS based on the EB. According to the simulation results of the proposed CAC mechanism, it admitted the TSs under the loads which are satisfied within the delay bound. Therefore, the proposed mechanism guarantees QoS of streaming services effectively.

Performance Analysis of An Optimal Access Control Protocol (고속 통신을 위한 최적 액세스제어 프로토콜의 성능 분석)

  • 강문식;이상헌;이상배
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.10
    • /
    • pp.1945-1956
    • /
    • 1994
  • In this paper, a multiaccess network protocol for high-speed communication is proposed, which enables multimedia sevices with integrating the existing networks. We examine the traffic control mechanisms and configurations for the network architecture and compare with various protocols which are suitable to high speed LAN/MAN and propose an adaptive access control mechanism. ATMR has low channel utilization due to window size reset time, and that MetaRing is very sensitive over the change of traffic load. This suggested protocol, however, has quite a good performance for that situation by adding adaptive parameter condition. This mechanism may introduce a model of small-scaled Broadband Integrated Service Network and be used as an internetworking system for the ATM network.

  • PDF

Home Gateway-based Home Network Access Control Mechanism (홈게이트웨이 기반 홈네트워크 접근제어 메커니즘)

  • Kim Geon-Woo;Kim Do-Woo;Lee Jun-Ho;Hwang Jin-Beon;Han Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.733-736
    • /
    • 2006
  • As various mobile technologies, sensor technologies, remote control and network infrastructure are developing and expectations on quality of life are increasing, a lot of researches and developments on home network technologies and services are actively on going. Until now, home network is just beginning, and we are developing home network services necessary to users, incrementing easiness, however we need to research on the safety of home network system guaranteeing the easiness as the services are going actively. So, in this paper, we propose the access control mechanism for protecting the home network system against indoor/outdoor illegal accesses and unauthorized accesses.

  • PDF

A Study the Control of Conditional Access to Pay-TV in Satellite digital Multimedia Broadcasting (위성 DMB에서의 효율적인 유료시청권한 제어에 관한 연구)

  • Kim Hyun-jue;Kim Seung-joo;Won Dong-ho;Han Woo-chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.169-177
    • /
    • 2005
  • The Conditional Access System is a complete system for ensuring that broadcasting services be accessible to only those who are entitled to receive them. Secure key management and efficient delivery mechanism are very important design factors to this system. In this paper, we propose secure and efficient protocols which would be well fitted to a Pay TV system including the satellite DMB. Further. by applying our protocol to the existing conditional access system, we propose a new system that properly enables the control of conditional access to the Pay TV in satellite DMB environment.

  • PDF

Shared-medium Access Control Protocol for the ATM Access Network - Part II : Performance Analysis of the DMR-II Protocol - (ATM 액세스망을 위한 공유매체 접속 제어 프로토콜 - II부 : DMR-II 프로토콜의 성능분석-)

  • 황민태;김장경;이정태
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.3
    • /
    • pp.389-399
    • /
    • 1998
  • The DMR-II shared-medium access control protocol was developed for the ATM access network users to supper the isochronous traffic and the non-isochronous traffic simultaneously under the bandwidth-skating environment. In this paper we analyze the performance of the DMR-II protocol by using both the analytical analysis and the simulation method. Under the ATM access network environment, the performance analysis result shows that the DMR-II protocol maintains the delay variation of the isochronous traffic beyond the threshold value, and satisfies the delay time criteria of the non-isochronous traffic by supporting the priority service. Moreover the result shows high network utilization over 130% due to the destination release mechanism of the DMR-II protocol.

  • PDF