• Title/Summary/Keyword: Access type

Search Result 1,045, Processing Time 0.029 seconds

Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme

  • Sadikin, Rifki;Park, Young Ho;Park, Kil Houm
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.1
    • /
    • pp.1-12
    • /
    • 2014
  • An access control system is needed to ensure only authorized users can access a sensitive resource. We propose a secure access control based on a fully secure and fine grained ciphertext-policy attribute-based encryption scheme. The access control for a sensitive resource is ensured by encrypting it with encryption algorithm from the CP-ABE scheme parameterized by an access control policy. Furthermore, the proposed access control supports non-monotone type access control policy. The ciphertext only can be recovered by users whose attributes satisfy the access control policy. We also implement and measure the performance of our proposed access control. The results of experiments show that our proposed secure access control is feasible.

A Study on the Characteristics of Single Housing Block - Focused on Daejeon Metropolitan City - (도시지역 단일동 아파트의 계획특성 분석연구 - 대전광역시 단일동 아파트를 중심으로 -)

  • Kang, In-Ho
    • Journal of the Korean housing association
    • /
    • v.24 no.3
    • /
    • pp.9-18
    • /
    • 2013
  • This paper aims to investigate the design characteristics of a single housing block which is increasing in urban areas. For the analysis, all cases of single block housing in Daejeon metropolitan city were gathered into a database. Main concerns were on the location and the physical characteristics. The results of this study were as follows; 1) single block housing has been increasing both in the new developed areas and the existing urban areas 2) their location has shifted from residential districts to semi-residential and commercial districts. For this reason, the size and density has been increasing 3) the slab block with the hall type and the exterior corridor type were general in residential districts, diverse ones, however, including the point tower type were increasing with unusual circulation types such as central corridor, central core, double corridor, and mixed type in semi-residential and commercial districts 4) there were 5 types of access systems, and especially the street access and the piloti access were increasing, which were related with the high density.

Random Channel Allocation Scheme Based on Split Algorithm in HIPERLAN 2 (HIPERLAN Type 2에서 Split 알고리즘에 기반한 랜덤채널 할당 기법)

  • 황의석;고유창;이승규;윤철식;이형우;조충호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9A
    • /
    • pp.717-727
    • /
    • 2003
  • The HIPERLAN/2(HIgh PERformance Local Area Network Type2) is one of the wireless LAN standards for providing raw data rates of up to 54 Mbps. The MAC protocol of HIPERLAN/2 is based on TDMA/TDD, and resources in one MAC frame can be allocated dynamically by Access Point(AP). The random channel(RCH) is defined for the purpose of giving a mobile terminal the opportunity to request transmission resources in the uplink MAC frames. It is desirable that the number of RCHs is dynamically adapted by the AP depending on the current traffic situation. Allocation of excessive RCHs may waste radio resources and insufficient RCHs compared to traffic loads may result in many collisions in access attempts. We propose an RCH allocation scheme based on split algorithm in HIPERLAN/2. The simulation and analytic results show that the proposed scheme achieves a higher channel throughput, lower access delay and delay jitter than previously proposed RCH allocation schemes.

Coronal microleakage of four temporary restorative materials in Class II-type endodontic access preparations

  • Yun, Sang-Mi;Karanxha, Lorena;Kim, Hee-Jin;Jung, Sung-Ho;Park, Su-Jung;Min, Kyung-San
    • Restorative Dentistry and Endodontics
    • /
    • v.37 no.1
    • /
    • pp.29-33
    • /
    • 2012
  • Objectives: The purpose of this study was to evaluate the microleakage of 4 temporary materials in teeth with Class II-type endodontic access preparations by using a glucose penetration model. Materials and Methods: Glucose reaction test was performed to rule out the presence of any reaction between glucose and temporary material. Class II-type endodontic access preparations were made in extracted human premolars with a single root (n = 10). Each experimental group was restored with Caviton (GC), Spacer (Vericom), IRM (Dentsply-Caulk), or Fuji II(GC). Microleakage of four materials used as temporary restorative materials was evaluated by using a glucose penetration model. Data were analyzed by the one-way analysis of variance followed by a multiplecomparison Tukey test. The interface between materials and tooth were examined under a scanning electron microscope (SEM). Results: There was no significant reaction between glucose and temporary materials used in this study. Microleakage was significantly lower for Caviton and Spacer than for Fuji II and IRM. SEM observation showed more intimate adaptation of tooth-restoration interfaces in Caviton and Spacer than in IRM and Fuji II. Conclusions: Compared to IRM and Fuji II, Caviton and Spacer can be considered better temporary sealing materials in Class II-type endodontic access cavities.

Access Control of XML Documents Including Update Operators (갱신 연산을 고려한 XML문서의 접근제어)

  • Lim Chung-Hwan;Park Seog
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.567-584
    • /
    • 2004
  • As XML becomes popular as the way of presenting information on the web, how to secure XML data becomes an important issue. So far study on XML security has focused on security of data communications by using digital sign or encryption technology. But, it now requires not just to communicate secure XML data on communication but also to manage query process to access XML data since XML data becomes more complicated and bigger. We can manage XML data queries by access control technique. Right now current XML data access control only deals with read operation. This approach has no option to process update XML queries. In this paper, we present XML access control model and technique that can support both read and update operations. In this paper, we will propose the operation for XML document update. Also, We will define action type as a new concept to manage authorization information and process update queries. It results in both minimizing access control steps and reducing memory cost. In addition, we can filter queries that have no access rights at the XML data, which it can reduce unnecessary tasks for processing unauthorized query. As a result of the performance evaluation, we show our access control model is proved to be better than other access control model in update query. But it has a little overhead to decide action type in select query.

Type Drive Analysis of Urban Water Security Factors

  • Gong, Li;Wang, Hong;Jin, Chunling;Lu, Lili;Ma, Menghan
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.784-794
    • /
    • 2020
  • In order to effectively evaluate the urban water security, the study investigates a novel system to assess factors that impact urban water security and builds an urban water poverty evaluation index system. Based on the contribution rates of Resource, Access, Capacity, Use, and Environment, the study adopts the Water Poverty Index (WPI) model to evaluate the water poverty levels of 14 cities in Gansu during 2011-2018 and uses the least variance method to evaluate water poverty space drive types. The case study results show that the water poverty space drive types of 14 cites fall into four categories. The first category is the dual factor dominant type driven by environment and resources, which includes Lanzhou, Qingyang, Jiuquan, and Jiayuguan. The second category is the three-factor dominant type driven by Access, Use, and Capability, which includes Longnan, Linxia, and Gannan. The third category is the four-factor dominant type driven by Resource, Access, Capability, and Environment, which includes Jinchang, Pingliang, Wuwei, Baiyin, and Zhangye. The fourth category is the five-factor dominant type, which includes Tianshui and Dingxi. The driven types impacting the urban water security factors reflected by the WPI and its model are clear and accurate. The divisions of the urban water security level supply a reliable theoretical and numerical basis for an urban water security early warning mechanism.

A Study on the CLR Performance Improvement for VBR Traffic in the Wireless ATM Access Network (무선 ATM 가입자망에서 VBR 트래픽의 CLR 성능개선)

  • 이하철
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.713-720
    • /
    • 2004
  • In this paper we suggest error control scheme to improve CLR performance degradation on wireless ATM access networks which consist of access node and wireless channel. Based on the cell scale and hurst scale, traffic model of wireless ATM access network is analyzed. The CLR equation due to buffer overflow for wireless access node is derived for VBR traffic. the CLR equation due to random bit errors and burst errors for wireless channel is derived. Using the CLR equation for both access node and wireless channel, the CLR equation of wireless ATM access network is derived, and we evaluate the CLR performance on the wireless ATM access networks with conventional SR ARQ scheme and recommended error control scheme, that is, Type I Hybrid ARQ scheme. It is confirmed that CLR performance of the access networks with recommended error control schemes is superior to that of access networks with conventional error control scheme.

  • PDF

On Narrowband Interference Suppression in OFDM-based Systems with CDMA and Weighted-type Fractional Fourier Transform Domain Preprocessing

  • Liang, Yuan;Da, Xinyu;Wang, Shu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5377-5391
    • /
    • 2017
  • In this paper, we propose a new scheme to suppress the narrowband interference (NBI) in OFDM-based systems. The scheme utilizes code division multiple access (CDMA) and weighted-type fractional Fourier transform (WFRFT) domain preprocessing technologies. Through setting the WFRFT order, the scheme can switch into a single carrier (SC) or a multi-carrier (MC) frequency division multiple access block transmission system. The residual NBI can be eliminated to the maximum extent when the WFRFT order is selected properly. Final simulation results show that the proposed system can outperform MC and SC with CDMA and frequency domain preprocessing in terms of the narrowband interference suppression.

A Study on the Application and the Forming Factors of the Outdoor-Space of the Mixed-Use Dwellings -Focused on Si-Ji Housing Development District in Daegu- (복합주택의 외부공간 형성요인과 활용방안에 관한 연구 -대구광역시 시지택지개발지구를 대상으로-)

  • 이재기;권소현;최무혁
    • Journal of the Korean housing association
    • /
    • v.12 no.3
    • /
    • pp.13-20
    • /
    • 2001
  • It seems that outdoor-space has been properly neither planned nor used in the Mixed-Use Dwellings. The purpose of this research is to analyze the present condition and problems of outdoor-space utilization in the Mixed-Use Dwellings to find the application and the correlativity between outdoor-space types and forming factors. The results are as follows; 1) Entire samples of outdoor-space are classified into 6 groups by the road and site jointing type and the building layout type. 2) There are 5 prime factors forming and utilizing outdoor-space, which are the hierarchy of the road, the way of parking area utilization, the types of business in the commercial part, combining type of two uses which are residential and commercial, and the type of access to each part of them. 3) Amongst the factors, the way of parking area utilization, combining type, and the type of access are greatly related to the type of outdoor-space in the Mixed-Use Dwellings.

  • PDF

Design of a Slot Type CDMA Wireless Communication Module on the Celluar Band (Cellular Band의 슬롯형 CDMA 무선통신 모듈 설계)

  • 류태영;차경호;이창식
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.2
    • /
    • pp.89-95
    • /
    • 2004
  • CDMA is the way that more than one users can share the time and frequency at the same time and connect with multiple access in mobile communication. Multiple Access is indispensible for mobile communication because the limited frequency is able to be used by many users in mobile communication. CDMA is also applied to home network, military, business and medical sectors. This paper, presents a users should share limited frequency resource. CDMA module implemented with 8-layer PCB which consists of the Slice-board circuit, keeping Radio frequency characteristics and a slot type connector.

  • PDF