• Title/Summary/Keyword: Application Access Control

Search Result 404, Processing Time 0.027 seconds

A Study of Security Authentication for Cloud Computing Based on Smart Phone (스마트폰 기반의 클라우드 컴퓨팅 보안 인증 연구)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1027-1035
    • /
    • 2012
  • Recently, the smart phone including web and mobile service based on the reliability and extendability of cloud computing is receiving huge attention. However, most of current cloud services provide just an application service for synchronizing data between mobile entity and server. Business model developed by communication companies have problems with interoperability. This paper proposes a new service security authentication model to efficiently manage smart phone users using different business models between smartphones and to keep the reliability and extendability of cloud computing. Proposed model authenticates for smart phone users to stay with in the unified communication with smart phone user's identity and access control to effectively use the current cloud computing system.

Application of HACCP principles to MAR-based drinking water supply system (MAR기반 음용수 공급 시스템에의 HACCP 원리 적용)

  • Ji, Hyon Wook;Lee, Sang-Il
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.30 no.5
    • /
    • pp.533-543
    • /
    • 2016
  • Supplying clean and safe water to people is facing both quantitative and qualitative challenges. Due to climate change, access to freshwater becomes increasingly difficult, while pollution from various sources decreases the public trust in water quality. Managed aquifer recharge (MAR) which stores and uses surface water in aquifer is receiving attention as a new technology to secure freshwater. Recently, there is a global expansion in the attempt to combine general purification plants and hazard analysis and critical control point (HACCP) which manages all the process from raw material to consumer for food safety. This research is about an attempt to apply HACCP to the drinking water supply process using MAR to secure both quantity and quality of drinking water. The study site is a MAR plant being constructed in the downstream area of the Nakdong River Basin, South Korea. The incorporation of HACCP with MAR-based water supply system is expected to enhance the safety and reliability of drinking water.

Queuing Analysis of IEEE 802.15.4 GTS Scheme for Bursty Traffic (Bursty Traffic을 위한 IEEE 802.15.4 GTS 기법의 대기 해석)

  • Le, Nam-Tuan;Choi, Sun-Woong;Jang, Yeong-Min
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.2
    • /
    • pp.87-91
    • /
    • 2010
  • The IEEE 802.15.4 and IEEE 802.15.7 standard are the typical of low rate wireless and Visible Light Wireless personal area networks. Its Medium Access Control protocol can support the QoS traffic flows for real-time application through guaranteed time slots (GTS) in beacon mode. However, how to achieve a best allocation scheme is not solved clearly. The current analytical models of IEEE 802.15.4 MAC reported in the literature have been mainly developed under the assumption of saturated traffic or non-bursty unsaturated traffic conditions. These assumptions don't capture the characteristics of bursty multimedia traffic. In this paper, we propose a new analytical model for GTS allocation with burst Markov modulated ON-OFF arrival traffic.

Design of a Safe-driving Assistant System based on the IEEE WAVE (IEEE WAVE 기반 안전운전 지원 시스템의 설계)

  • Ko, Jae-Cheol;Lee, Hyuk-Joon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.1
    • /
    • pp.55-68
    • /
    • 2010
  • IEEE WAVE is going through the final standardization process as the wireless access technology which provides drivers in high-speed vehicles with safety-related information and commercial services This paper presents an application-layer protocol for safe driving assistant service and a service system emulator based on this protocol. The safe driving assistant system includes a construction zone information service and a vehicle crash notification service, an emergency vehicle notification service, a probing service and a dilemma zone decision assistant service. Emulator System design for verifying functions of system, The emulator consists of an emulator server that models the movement of all vehicles and road states and a number of clients that models functional units for OBUs, RSUs, and a traffic control center).

Optimal MIFARE Classic Attack Flow on Actual Environment (실제 환경에 최적화된 MIFARE Classic 공격 절차)

  • Ahn, Hyunjin;Lee, Yerim;Lee, Su-Jin;Han, Dong-Guk
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2240-2250
    • /
    • 2016
  • MIFARE Classic is the most popular contactless smart card, which is primarily used in the management of access control and public transport payment systems. It has several security features such as the proprietary stream cipher Crypto 1, a challenge-response mutual authentication protocol, and a random number generator. Unfortunately, multiple studies have reported structural flaws in its security features. Furthermore, various attack methods that target genuine MIFARE Classic cards or readers have been proposed to crack the card. From a practical perspective, these attacks can be partitioned according to the attacker's ability. However, this measure is insufficient to determine the optimal attack flow due to the refined random number generator. Most card-only attack methods assume a predicted or fixed random number, whereas several commercial cards use unpredictable and unfixable random numbers. In this paper, we propose optimal MIFARE Classic attack procedures with regards to the type of random number generator, as well as an adversary's ability. In addition, we show actual attack results from our portable experimental setup, which is comprised of a commercially developed attack device, a smartphone, and our own application retrieving secret data and sector key.

An Improvement Study on National Fire Safety Code of Sprinkler System for Hydraulic Calculation Application (수리계산 적용을 위한 스프링클러설비의 화재안전기준 개선방안 연구)

  • Lee, Keun-Oh;Kang, Joo-Hyeong
    • Journal of the Korean Society of Safety
    • /
    • v.22 no.1 s.79
    • /
    • pp.7-12
    • /
    • 2007
  • There are two kinds of design process for sprinkler system. one is pipe schedule system and the other is hydraulically designed system. We have inefficient results when we design by hydraulically designed system because the design process for sprinkler system is restricted by domestic fire code. Therefore, it is essential to do an introduction of hydraulically designed system which is based on engineering for enhancing reliability and efficiency of sprinkler system. This study presents points at issue by comparing and studying design standards of sprinkler system from Korea, Japan and NFPA, and presents improvement plans of national fire safety code of sprinkler system by processing, comparing and analyzing designs according to piping schedule and hydraulically designed system about domestic objects. Installation standards of sprinkler system have to be applied not by object buildings but by hazard classification. It is hard to design an efficient sprinkler system for fire control when water supply requirement of sprinkler systems allocated according to a size of a building because the same purpose but other buildings may request more water requirement or less. We should sublate the pipe schedule system from national fire safety code and need to introduce the hydraulically designed system. The pipe schedule system presents easy access because it is based on the forecasted engineering calculations but it is applied to only small buildings like NFPA due to its low reliability.

A Transdisciplinary Approach for Water Pollution Control: Case Studies on Application of Natural Systems

  • Polprasert, Chongrak;Liamlaem, Warunsak
    • Environmental Engineering Research
    • /
    • v.19 no.3
    • /
    • pp.185-195
    • /
    • 2014
  • Despite the enormous technical and economic efforts to improve environmental conditions, currently about 40% of the global population (or 2 billion people) are still lack access to safe water supply and adequate sanitation facilities. Pollution problems and transmission of water- related diseases will continue to proliferate. The rapid population growth and industrialization will lead to a reduction of arable land, thus exacerbating the food shortage problems and threatening environmental sustainability. Natural systems in this context are a transdisciplinary approach which employs the activities of microbes, soil and/or plants in waste stabilisation and resource recovery without the aid of mechanical or energy-intensive equipments. Examples of these natural systems are: waste stabilisation ponds, aquatic weed ponds, constructed wetlands and land treatment processes. Although they require relatively large land areas, the natural systems could achieve a high degree of waste stabilisation and at the same time, yield potentials for waste recycling through the production of algal protein, fish, crops, and plant biomass. Because of the complex interactions occurring in the natural systems, the existing design procedures are based mainly on empirical or field experience approaches. An integrated kinetic model encompassing the activities of both suspended and biofilm bacteria and some important engineering parameters has been developed which could predict the organic matter degradation in the natural systems satisfactorily.

A Study on the Indicators Establishment for Crime Prevention Through Environmental Design(CPTED) in School Facilities (학교시설의 범죄예방환경설계(CPTED)를 위한 지표정립에 관한 연구)

  • Jeong, Ji-Hye;Ryu, Soo-hoon
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.26 no.4
    • /
    • pp.11-18
    • /
    • 2019
  • School Crime Prevention Throgh Environmental Design (CPTED) is in the process of building a design guide through a lot of research. However, it is common practice to conduct consulting through existing cases and utilize internal self-evaluation through similar projects, as the self-evaluation criteria are not open to public or unlike other certifications. Therefore, the purpose of this study is to contribute to the development of a more quantitative and objective practical manual by analyzing the evaluation elements of school crime prevention environment design provided by guidelines and guidelines of various organizations and local autonomous bodies involved in school design. As a result of quantifying the school facilities CPTED indicators so far and incorporating the current guidelines, 'Surveillance and access control' of 'Entrance space and parking space' is found to be main. If the various indicators presented above are applied in consideration of the specificity of the school facilities in the application of the school CPTED technique, in addition to the CPTED for physically preventing offenses committed by outsiders, it can be expected to prevent violence among students or social crimes in school education.

A Multi-Scale Parallel Convolutional Neural Network Based Intelligent Human Identification Using Face Information

  • Li, Chen;Liang, Mengti;Song, Wei;Xiao, Ke
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1494-1507
    • /
    • 2018
  • Intelligent human identification using face information has been the research hotspot ranging from Internet of Things (IoT) application, intelligent self-service bank, intelligent surveillance to public safety and intelligent access control. Since 2D face images are usually captured from a long distance in an unconstrained environment, to fully exploit this advantage and make human recognition appropriate for wider intelligent applications with higher security and convenience, the key difficulties here include gray scale change caused by illumination variance, occlusion caused by glasses, hair or scarf, self-occlusion and deformation caused by pose or expression variation. To conquer these, many solutions have been proposed. However, most of them only improve recognition performance under one influence factor, which still cannot meet the real face recognition scenario. In this paper we propose a multi-scale parallel convolutional neural network architecture to extract deep robust facial features with high discriminative ability. Abundant experiments are conducted on CMU-PIE, extended FERET and AR database. And the experiment results show that the proposed algorithm exhibits excellent discriminative ability compared with other existing algorithms.

A Study on IoT Devices Vulnerability and Security (IoT 디바이스 보안위협 및 대응방안 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.9-17
    • /
    • 2021
  • Numerous IoT devices are connected to a wireless network environment to collect and transmit data without time and space limitations, but many security vulnerabilities are exposed in these process. But IoT security is not easy to create feasible security standards and device authentication due to differences in the approach or implementation of devices and networks. However, it is clear that the improvement and application of the standard framework for enhancing the security level of the device is the starting point to help the most successful security effect. In this study, we investigate the confidentiality, integrity, availability, and access control implementation plans for IoT devices (which are the basic goals of information security), and standardized security evaluation criteria for IoT devices, and study ways to improve them.