• Title/Summary/Keyword: Access control tool

Search Result 77, Processing Time 0.021 seconds

Virtual Topology Control System for Evaluating Semi-infrastructured Wireless Community Networks (준-인프라 기반 무선 커뮤니티 네트워크 시험을 위한 가상 토폴로지 제어 시스템)

  • Kang, Nam-Hi;Kim, Young-Han
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.275-281
    • /
    • 2012
  • Community network is a communication environment where heterogeneous devices can access and communicate with each other at any time and at any space to share information. To do so, mobile devices are required to be self-configured even in absence of communication infrastructures. Semi-infrastructured wireless ad-hoc network is a promising solution to meet with such a requirement. This paper proposes the VTC(virtual topology coordinator) system as an evaluation tool for examining network protocols that are intended to be deployed in the semi-infrastructured ad-hoc networks. VTC emulates multi-hops wireless network topology virtually using a mechanism of selective receiving MAC frame in a small area, where only a single hop communication is available. VTC system cannot consider all properties introduced in real wireless network, but do more wireless properties than verification through simulation.

Lexical Access in the Bilinguals and the Category-specific Semantic System (이중언어의 어휘접근과 범주 특수적 의미체계)

  • Lee, Seung-Bok;Jung, Hyo-Sun;Jo, Seong-Woo
    • Korean Journal of Cognitive Science
    • /
    • v.21 no.4
    • /
    • pp.505-534
    • /
    • 2010
  • The purpose of this study was aimed to compare the lexical access and representation of semantic system in the bilinguals. The participants(late Korean-English bilinguals) performed the word-picture matching task. The task was to decide whether the pictures presented after the words(basic-level categories) represent the Korean(L1) or English(L2) words' meaning or not. The stimuli were consisted of common object belonged to four different categories(animal, part of body, clothes, tool). To control the translation strategies, the SOA(stimulus onset asynchrony) were manipulated as 650ms(Exp. 1) and 200ms(Exp. 2). In both experiment, the RTs were faster in L1 condition. The decision time of the part of body categories were shorter than the animal in L1 condition. In L2 condition, clothes were responded faster than the tools. The differences of the lexical access time implied that the bilingual semantic system seemed to be structured by more sub-level categories than the super-level, living or non-living things, and the ways to access the bilingual lexicon might be differentiated according to the languages.

  • PDF

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

Access Control Mechanism for Secure CoAP Applications Based on DTLS (DTLS 기반의 안전한 CoAP 응용을 위한 접근제어 메커니즘)

  • Jeong, Yeon-seong;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1307-1315
    • /
    • 2017
  • While the PSK mode of the DTLS is the most efficient in terms of the performance, it is not easy to pre-distribute and manage the symmetric key pairs as the number of sensor devices increases. On the other hand, both the RPK and certificate modes offer a convenient key management tool, but they do not guarantee a good computational performance. In this paper, the end-to-end security protocol suitable for the constrained devices is proposed, based on both the ECQV certificate and the PSK mode. Namely, the initial DTLS handshake is performed using the ECQV certificate, and the subsequent DTLS handshakes with the other CoAP servers in the same group are performed using the PSK mode for the purpose of reducing the overall computational load. Furthermore, a fine-grained access control for the CoAP client can be enforced to allow access to the limited number of CoAP servers.

Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management

  • S. Poorani;R. Anitha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3182-3203
    • /
    • 2023
  • With the growing adoption of cloud-based technologies, maintaining the privacy and security of cloud data has become a pressing issue. Privacy-preserving encryption schemes are a promising approach for achieving cloud data security, but they require careful design and implementation to be effective. The integrated approach to cloud data security that we suggest in this work uses CogniGate: the orchestrated permissions protocol, index trees, blockchain key management, and unique Opacus encryption. Opacus encryption is a novel homomorphic encryption scheme that enables computation on encrypted data, making it a powerful tool for cloud data security. CogniGate Protocol enables more flexibility and control over access to cloud data by allowing for fine-grained limitations on access depending on user parameters. Index trees provide an efficient data structure for storing and retrieving encrypted data, while blockchain key management ensures the secure and decentralized storage of encryption keys. Performance evaluation focuses on key aspects, including computation cost for the data owner, computation cost for data sharers, the average time cost of index construction, query consumption for data providers, and time cost in key generation. The results highlight that the integrated approach safeguards cloud data while preserving privacy, maintaining usability, and demonstrating high performance. In addition, we explore the role of differential privacy in our integrated approach, showing how it can be used to further enhance privacy protection without compromising performance. We also discuss the key management challenges associated with our approach and propose a novel blockchain-based key management system that leverages smart contracts and consensus mechanisms to ensure the secure and decentralized storage of encryption keys.

Remote Dynamic Control of AMl Robot Using Network (네트워크를 이용한 AM1 로봇의 원격 동적 제어)

  • 김성일;배길호;김원일;한성현
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2001.04a
    • /
    • pp.229-233
    • /
    • 2001
  • In this paper, we propose a remote controller for robot manipulator using local area network(LAN) and internet. To do this, we develope a server-client system as used in the network field. The client system is in any computer in remote place for the user to log-in the server and manage the remote factory. the server system is a computer which controls the manipulator and waits for a access from client. The server system consists of several control algorithms which is needed to drive the manipulator and networking system to transfer images that shows states of the work place, and to receive a Tmp data to run the manipulator. The client system consists of 3D(dimension) graphic user interface for teaching and off-line task like simulation, external hardware interface which makes it easier for the user to teach. Using this server-client system, the user who is on remote place can edit the work schedule of manipulator, then run the machine after it is transferred and monitor the results of the task.

  • PDF

Development of a CNC Machine using a Parallel Mechanism (병렬기구 공작기계의 프로그램 개발)

  • 박근우
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2000.04a
    • /
    • pp.679-684
    • /
    • 2000
  • This paper presents the development of system and program for a Parallel-Typed CNC Machine. The system consists of parallel manipulator, PC (Personal Computer), DMC (DSP Motion Controller), and machining tools. In order to control the manipulator, the program, which is implemented in "c/c++" language, involves inverse/direct kinematics, velocity mapping, Jacobian and etc. A controller computes the kinematic formulation in real-time and generates and motion by the DMC. A monitor, which has access to program and sensory information, displays the status of manipulator.nipulator.

  • PDF

A Study on Feedback Control and Development of chaotic Analysis Simulator for Chaotic Nonlinear Dynamic Systems (Chaotic 비선형 동역학 시스템의 Chaotic 현상 분석 시뮬레이터의 개발과 궤환제어에 관한 연구)

  • Kim, Jeong-D.;Jung, Do-Young
    • Proceedings of the KIEE Conference
    • /
    • 1996.11a
    • /
    • pp.407-410
    • /
    • 1996
  • In this Paper, we propose the feedback method having neural network to control the chaotic signals to periodic signals. This controller has very simple structure, it is immune to small parameter variations, the precise access to system parameters is not required and it is possible to follow ones of its inherent periodic orbits or the desired orbits without error, The controller consist of linear feedback gain and neural network. The learning of neural network is achieved by error-backpropagation algorithm. To prove and analyze the proposed method, we construct a software tool using c-language.

  • PDF

Effects of a Web-Based Korean Triage and Acuity Scale Learning Program on Triage Self-Efficacy and Triage Performance Ability for Nurses in Emergency Department (웹기반 한국형 중증도 분류 체계 학습프로그램이 응급실간호사의 중증도 분류에 대한 자기효능감 및 수행능력에 미치는 효과)

  • Kim, Hyo-Jin;Kang, Hee-Young
    • Journal of Korean Academy of Nursing
    • /
    • v.49 no.2
    • /
    • pp.171-180
    • /
    • 2019
  • Purpose: The Korean Triage and Acuity Scale (KTAS) is a tool used to classify the severity and urgency of emergency department (ED) patients, focusing on their symptoms. In consideration of the importance of the KTAS, a web-based learning program has emerged as a new mode of education; it enables ED triage nurses to access it anytime and anywhere, and according to their own learning abilities. This study aimed to develop a web-based KTAS learning program and evaluate its effects on self-efficacy and triage performance ability in ED nurses. Methods: A quasi-experimental design with a non-equivalent control group pretest-posttest was used. The conceptual framework was Bandura's self-efficacy theory. There were 30 participants in the experimental group and 29 in the control group. The experimental group attended an orientation and 4 sessions of a web-based KTAS learning program. The learning program lasted 280 minutes over five weeks, consisting of 40 minutes of orientation and four 60-minute sessions. Results: The scores of self-efficacy, triage performance ability in KTAS level, and chief complaints significantly increased in the experimental group compared to the control group. In addition, the numbers of under-triage in KTAS significantly decreased in the experimental group in comparison to the control group. Conclusion: The results suggest that the learning program was effective in improving ED nurses' level of self-efficacy and triage performance ability (KTAS level and KTAS chief complaint). Accordingly, the web-based KTAS learning program can be applied as an education intervention to improve ED nurses' triage skill.