• Title/Summary/Keyword: Application Access Control

Search Result 404, Processing Time 0.026 seconds

Design and Implementation of a Transparent Security Infrastructure using Filter and Transformer (필터와 트랜스포머를 이용한 투명한 보안기반의 설계 및 구현)

  • Kim, Yong-Min;Lee, Do-Heon;Noh, Bong-Nam;Choi, Rak-Man;Ine, So-Ran
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.975-983
    • /
    • 1998
  • In these days, information communication systems are based on both open distributed computing technologies and object-oriented techniques like inheritance, encapsulation and object reuse to support various system configuration and application. As information systems are interconnected through unsecure networks, the need for the secure information exchange is more critical than before. In this paper, we have designed and implemented a transparent CORBA-basce Security infrastructure with authentication, security context association, access control and security information management to support a secure applications in distributed object environment. SESAME Ver. 4 was adopted as an external security service to manage user privilege attributes and to distribute keys for data encryption, decryption and integrity. Using filter and transformer with an interface to Object Request Broker, it provides a transparent security service to applications. The filter objects are special classes that allow additional parameters to be inserted into messages before they are sent and removed just after they are received. The transformer objects are special classes that allow direct access to the byte stream of every messages for encryption and decryption before it is sent and just after it is received. This study is to implement the access control interceptor(ACI) and the secure invocation interceptor(SII) of secure ORB defined in CORBA using filter and transformer.

  • PDF

The implementation of the Remote Control and Measurement Systems using CDMA Modem (CDMA 모뎀을 이용한 원격 제어 및 계측 시스템 구현)

  • Lee, Myung-Eui
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.351-359
    • /
    • 2012
  • This paper deals with the design and development of the remote control and measurement systems using CDMA(Code Division Multiple Access) data modem. We propose a bi-directional data communication link without the public IP address in CDMA modem device by the TCP/IP packet and SMS(Short Message Service) communication. The remote control and measurement systems are implemented by a Telit WM-800 modem as DCE(Data Communication Equipment), and Atmel AT89C51 microcontroller as DTE(Data Terminal Equipment). The user application software for the control and measurement system user, and the firmware software of device drivers for peripherals such as a digital input/output device, AD/DAC(Analog to Digital/Digital to Analog Converter), LCD, and temperature/humidity sensor are written in Microsoft C and Keil C language respectively for further various applications. The experimental result of the proposed control and measurement systems implemented in this paper is evaluated via real-time experiments, which works well as designed.

Development of requirements for information security management system (ISO 27001) with CPTED in account (셉테드(CPTED)를 고려한 정보보안 관리시스템(ISO 27001)의 요구사항 개발)

  • Lim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.19-24
    • /
    • 2021
  • The purpose of this study was to add CPTED to the information security area. The control items of ISO 27001 (11 types) and the application principles of CPTED (6 types) were mapped. And the relevance between the items was verified through the FGI meeting through 12 security experts. As a result of the survey, the control items with a relevance of at least 60% on average are security policy, physical and environmental security, accident management, and conformity. As a result, the comprehensive policy was shared with CPTED's items as a whole. The specialized control items are security organization, asset management, personnel security, operation management, access control, system maintenance, and continuity management. However, specialized control items were mapped with each item of CPTED. Therefore, information security certification and septed are related. As a result, environmental security can be added to the three major areas of security: administrative security, technical security, and physical security.

Apply evolved grey-prediction scheme to structural building dynamic analysis

  • Z.Y. Chen;Yahui Meng;Ruei-Yuan Wang;Timothy Chen
    • Structural Engineering and Mechanics
    • /
    • v.90 no.1
    • /
    • pp.19-26
    • /
    • 2024
  • In recent years, an increasing number of experimental studies have shown that the practical application of mature active control systems requires consideration of robustness criteria in the design process, including the reduction of tracking errors, operational resistance to external disturbances, and measurement noise, as well as robustness and stability. Good uncertainty prediction is thus proposed to solve problems caused by poor parameter selection and to remove the effects of dynamic coupling between degrees of freedom (DOF) in nonlinear systems. To overcome the stability problem, this study develops an advanced adaptive predictive fuzzy controller, which not only solves the programming problem of determining system stability but also uses the law of linear matrix inequality (LMI) to modify the fuzzy problem. The following parameters are used to manipulate the fuzzy controller of the robotic system to improve its control performance. The simulations for system uncertainty in the controller design emphasized the use of acceleration feedback for practical reasons. The simulation results also show that the proposed H∞ controller has excellent performance and reliability, and the effectiveness of the LMI-based method is also recognized. Therefore, this dynamic control method is suitable for seismic protection of civil buildings. The objectives of this document are access to adequate, safe, and affordable housing and basic services, promotion of inclusive and sustainable urbanization, implementation of sustainable disaster-resilient construction, sustainable planning, and sustainable management of human settlements. Simulation results of linear and non-linear structures demonstrate the ability of this method to identify structures and their changes due to damage. Therefore, with the continuous development of artificial intelligence and fuzzy theory, it seems that this goal will be achieved in the near future.

Trace-Back Viterbi Decoder with Sequential State Transition Control (순서적 역방향 상태천이 제어에 의한 역추적 비터비 디코더)

  • 정차근
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.11
    • /
    • pp.51-62
    • /
    • 2003
  • This paper presents a novel survivor memeory management and decoding techniques with sequential backward state transition control in the trace back Viterbi decoder. The Viterbi algorithm is an maximum likelihood decoding scheme to estimate the likelihood of encoder state for channel error detection and correction. This scheme is applied to a broad range of digital communication such as intersymbol interference removing and channel equalization. In order to achieve the area-efficiency VLSI chip design with high throughput in the Viterbi decoder in which recursive operation is implied, more research is required to obtain a simple systematic parallel ACS architecture and surviver memory management. As a method of solution to the problem, this paper addresses a progressive decoding algorithm with sequential backward state transition control in the trace back Viterbi decoder. Compared to the conventional trace back decoding techniques, the required total memory can be greatly reduced in the proposed method. Furthermore, the proposed method can be implemented with a simple pipelined structure with systolic array type architecture. The implementation of the peripheral logic circuit for the control of memory access is not required, and memory access bandwidth can be reduced Therefore, the proposed method has characteristics of high area-efficiency and low power consumption with high throughput. Finally, the examples of decoding results for the received data with channel noise and application result are provided to evaluate the efficiency of the proposed method.

CHANGES IN μ-TBS TO PULP CHAMBER DENTIN AFTER THE APPLICATION OF NAOCL & REVERSAL EFFECT BY USING SODIUM ASCORBATE (NaOCl의 적용 후 치수강 상아질에 대한 결합강도의 변화와 Sodium Ascorbate에 의한 환원 효과)

  • Kwon, Su-Mi;Kim, Tae-Gun;Yu, Mi-Kyung;Lee, Kwang-Won
    • Restorative Dentistry and Endodontics
    • /
    • v.34 no.6
    • /
    • pp.515-525
    • /
    • 2009
  • Clinical suggestion for the limitation of application time of NaOCl solution is needed to avoid large reductions in resin-dentin bond strength. The aim of this study was to measure the change of ${\mu}$-tensile bond strength after the various application time of 5.25% NaOCl solution to pulp chamber dentin in endodontic access cavity, and to evaluate the effect of 10% sodium ascorbate application for 10 min on bond strength after the treatment of 5.25% NaOCl solution. In this experiment, there were no statistical differences(p > 0.05) in bond strengths between upper chamber dentin and lower chamber dentin. NaOCl-treated group for 20 min did not show any significant decrease(p > 0.05) in bond strength than non-treated control group. In contrast to that, bond strengths of NaOCl-treated groups for 40 & 80 min were significantly lower(p < 0.05) than that of non-treated control group. 10% sodium ascorbate retreated group for 10 min after 5.25% NaOCl application for 40 min to chamber dentin showed the recovery of bond strength significantly. However, the bond strength of sodium ascorbate retreated group after 5.25% NaOCl application for 80 min was still significantly lower(p < 0.05) compared to the non-treated control group, which means the reductions in resin-dentin bond strength were not fully reversed. On the contrary, sodium ascorbate retreated group after 5.25% NaOCl application for 5 min showed significantly higher(p < 0.05) bond strength compared to the control group, which demonstrates its superior recovery effect. In SEM exminations of specimens retreated with 10% sodium ascorbate after NaOCl application for 40 & 80 min showed that resin tags were formed clearly and densely, but weakly in density and homogeneity of individual resin tag compared to the control specimen.

Response Technique for the Vulnerability of Broadcast Intent Security in Android (안드로이드 브로드캐스트 인텐트의 보안 취약성 대응기법)

  • Lim, Jae-Wan;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.61-67
    • /
    • 2012
  • Accordingly the number of smart-phone-based malicious codes is also increasing and their techniques for malicio us purpose are getting more clever and evolved. Among them, the malicious codes related to Android take the major portion and it can be estimated that they are based on open source so that the access to the system is easy. Intent is a technique to support the communication between application's components by transmitting message subjects in Android. Intent provides convenience to developers, but it can be utilized as security vulnerability that allows the developer with a malicious purpose to control the system as intended. The vulnerability of intent security is that personal information can be accessed using discretionally its proper function given to application and smart phone's functions can be maliciously controlled. This paper improves with the Intent security vulnerability caused by the smart phone users' discretional use of custom kernel. Lastly, it verifies the malicious behaviors in the process of installing an application and suggests a technique to watch the Intent security vulnerability in realtime after its installation.

Design of Dynamic Route Control Gateway for High-Speed Data Communication over Public Networks (공중망에서의 고속 데이터통신을 위한 동적경로제어 게이트웨이 설계)

  • 허재두;강석근;주언경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4B
    • /
    • pp.593-603
    • /
    • 2000
  • In this paper, a dynamic route control scheme to increase speed of data communication over public network is presented. And a new structure of gateway which is suitable for the public network environments is proposed and analyzed. For dynamic allocation of transmission routing resources of the gateway and improvement of call processing ratio of the system, virtual queue is used. As results, route utilization ratio of the proposed scheme can be improved up to 60% as compared to the conventional fixed route control scheme. For the case of limited number of routes, it provides high speed data communication while maintaining delay time as low as possible. In addition, as the allocation period at call access node can be varied with the traffic in the proposed scheme, various traffics can be applied easily. Thus, it can be expected that the presented dynamic route control gateway may be suitable for application in high speed data communication over public network.

  • PDF

Skin Sensitization Study of Bee Venom (Apis mellifera L.) in Guinea Pigs

  • Han, Sang-Mi;Lee, Gwang-Gill;Park, Kyun-Kyu
    • Toxicological Research
    • /
    • v.28 no.1
    • /
    • pp.1-4
    • /
    • 2012
  • Bee venom (Apis mellifera L., BV) has been used as a cosmetic ingredient for antiaging, anti-inflammatory and antibacterial functions. The aim of this study was to access the skin sensitization of BV, a Buehler test was conducted fifty healthy male Hartley guinea pigs with three groups; Group G1 (BV-sensitization group, 20 animals), group G2 (the positive control-sensitization group, 20 animals), and group G3 (the ethyl alcohol-sensitization group, 10 animals). The exposure on the left flank for induction was repeated three times at intervals of one week. Two weeks after the last induction, the challenge was performed on the right flank. No treatment-related clinical signs or body weight changes were observed during the study period. The average skin reaction evaluated by erythema and edema on the challenge sites and sensitization rate in the BV-sensitization group at 30 hours were 0.0 and 0%, respectively, which are substantially low compared with in positive control group (average skin reaction: 0.55, sensitization rate: 40%) and identical with in vehicle control group, representing a weak sensitizing potential. The average skin reaction and sensitization rate observed at 54 hours were 0.0 and 0% in the BV-sensitization group, respectively, and 0.25 and 20% in the positive control group, respectively. It was concluded that BV classified to Grade I, induced no sensitization when tested in guinea pigs and may provide a developmental basis for a cosmetic ingredient or external application for topical uses.

A Study on Online Fraud and Abusing Detection Technology Using Web-Based Device Fingerprinting (웹 기반 디바이스 핑거프린팅을 이용한 온라인사기 및 어뷰징 탐지기술에 관한 연구)

  • Jang, Seok-eun;Park, Soon-tai;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1179-1195
    • /
    • 2018
  • Recently, a variety of attacks on web services have been occurring through a multiple access environment such as PC, tablet, and smartphone. These attacks are causing various subsequent damages such as online fraud transactions, takeovers and theft of accounts, fraudulent logins, and information leakage through web service vulnerabilities. Creating a new fake account for Fraud attacks, hijacking accounts, and bypassing IP while using other usernames or email addresses is a relatively easy attack method, but it is not easy to detect and block these attacks. In this paper, we have studied a method to detect online fraud transaction and obsession by identifying and managing devices accessing web service using web-based device fingerprinting. In particular, it has been proposed to identify devices and to manage them by scoring process. In order to secure the validity of the proposed scheme, we analyzed the application cases and proved that they can effectively defend against various attacks because they actively cope with online fraud and obtain visibility of user accounts.