• Title/Summary/Keyword: Application Access Control

Search Result 404, Processing Time 0.03 seconds

Conceptual Design of Networking Node with Real-time Monitoring for QoS Coordination of Tactical-Mesh Traffic (전술메쉬 트래픽 QoS 조율을 위한 네트워킹 노드의 개념 설계 및 실시간 모니터링)

  • Shin, Jun-Sik;Kang, Moonjoong;Park, Juman;Kwon, Daehoon;Kim, JongWon
    • Smart Media Journal
    • /
    • v.8 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • With the advancement of information and communication technology, tactical networks are continuously being converted to All-IP future tactical networks that integrate all application services based on Internet protocol. Futuristic tactical mesh network is built with tactical WAN (wide area network) nodes that are inter-connected by a mesh structure. In order to guarantee QoS (quality of service) of application services, tactical service mesh (TSM) is suggested as an intermediate layer between infrastructure and application layers for futuristic tactical mesh network. The tactical service mesh requires dynamic QoS monitoring and control for intelligent QoS coordination. However, legacy networking nodes used for existing tactical networks are difficult to support these functionality due to inflexible monitoring support. In order to resolve such matter, we propose a tactical mesh WAN node as a hardware/software co-designed networking node in this paper. The tactical mesh WAN node is conceptually designed to have multi-access networking interfaces and virtualized networking switches by leveraging the DANOS whitebox server/switch. In addition, we explain how to apply eBPF-based traffic monitoring to the tactical mesh WAN node and verify the traffic monitoring feasibility for supporting QoS coordination of tactical-mesh traffic.

A Secure Mobile Payment System for Near Field Communication System (NFC를 이용한 안전한 모바일 지급결제 시스템)

  • Lee, Yo-Ram;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.7
    • /
    • pp.3487-3494
    • /
    • 2013
  • Diverse application service such as mobile payment, access control or smart poster have been provided by using smart devices with built-in Near Field Communication technology. Especially, a mobile payment system can provide convenience to its users, but it also can poses including data disclosure while transmitting. There are vulnerabilities while generating session keys used to encrypt data in transaction processes as proposed in KS X 6928, the standard for mobile payment system. Therefore, in this thesis, I analyzed weaknesses of session keys used to encrypt transaction data and proposed a more secure mobile payment system based on NFC to enhance security. The proposed system will provide security functionalities such as key freshness, mutual authentication and key confirmation.

Design of Information Security in Ubiquitous City (u-City에서의 정보보안 설계 방안)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.37-42
    • /
    • 2011
  • In this paper, the design methodology of information security is analyzed to implement the ubiquitous city (u-City). The definition, concept, and main u-services of u-City are presented. The main components, functio ns and offering services of u-City management center are presented, and the laws and network security requirements related to protect the personal information in collecting, processing, and exchanging are also analyzed. Three step security levels of Router/Switch, Firewall/VPN, and IPS are applied where main functions of in terception of abnormal packets($1^{st}$ level), access control for each service($2^{nd}$ level), and real-time network monitoring($3^{rd}$ level) are performed. Finally, application cases are presented to validate the security of personal information in providing the u-City services.

An Instantaneous Integer Ambiguity Resolution for GPS Real-Time Structure Monitoring (GPS 실시간 구조물 모니터링을 위한 반송파 관측데이터 순간미지정수 결정)

  • Lee, Hungkyu
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.1
    • /
    • pp.341-353
    • /
    • 2014
  • In order to deliver a centimeter-level kinematic positioning solution with GPS carrier-phase measurements, it is prerequisite to use correctly resolved integer ambiguities. Based on the mathematical modeling of GPS network with application of its geometrical constraints, this research has investigated an instantaneous ambiguity resolution procedure for the so-called 'integer constrained least-squares' technique which can be effectively implemented in real-time structure monitoring. In this process, algorithms of quality control for the float solutions and hypothesis tests using the constrained baseline for the ambiguity validation are included to enhance reliability of the solutions. The proposed procedure has been implemented by MATLAB, the language of technical computing, and processed field trial data obtained at a cable-stayed bridge to access its real-world applicability. The results are summarized in terms of ambiguity successful rates, impact of the stochastical models, and computation time to demonstrate performance of the instantaneous ambiguity resolution proposed.

A Study about weight grant of Authentication level in USN environment

  • Choi, Bae-Young;Ahn, Byung-Ryul;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.165-168
    • /
    • 2005
  • The objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation facilities and are generally called artifacts. I later realized that this was not so the real problem is actually authentication. Recent results indicate scalability problems for flat ad hoc networks. Sensor network achieves function that handle surrounding information perception through sensor and sensed information to network that is consisted of sensor nodes of large number. Research about new access control techniques and height administration techniques need authentication information persons' certification assurance level classification in sensor network environment which become necessary different view base with authentication information at node for application of AAA technology in USN environment that must do authentication process using information that is collected from various sensor mountings. So, get base authentication information in sensor type and present weight grant model by security strength about authentication information through information who draw. In this paper collected information of sensor nodes model who give weight drawing security reinforcement as authentication information by purpose present be going to. and Must be able to can grasp special quality of each sensor appliances in various side and use this and decide authentication assurance level for value estimation as authentication information elements. Therefore, do to define item that can evaluate Authentication information elements thus and give simple authentication assurance level value accordingly because applying weight. Present model who give authentication assurance level value and weight for quotation according to security strength.

  • PDF

Results of Extracorporeal Membrane Oxygenation (ECMO) Support before Coronary Reperfusion in Cardiogenic Shock with Acute Myocardial Infarction

  • Chung, Eui-Suk;Lim, Cheong;Lee, Hae-Young;Choi, Jin-Ho;Lee, Jeong-Sang;Park, Kay-Hyun
    • Journal of Chest Surgery
    • /
    • v.44 no.4
    • /
    • pp.273-278
    • /
    • 2011
  • Despite aggressive treatment, the mortality rate of cardiogenic shock with acute myocardial infarction (AMI) is high. We performed extracorporeal membrane oxygenation (ECMO) prior to coronary reperfusion, and evaluated the early clinical results and risk factors. Materials and Methods: From May 2006 to November 2009, we reviewed the medical records of 20 patients in cardiogenic shock with AMI (mean age $67.7{\pm}11.7$ yrs, M : F 14 : 6). After initially performing ECMO using the CAPIOX emergency bypass system ($EBS^{(R)}$Terumo, Tokyo, Japan), patients underwent coronary reperfusion (coronary artery bypass grafting, 13; percutaneous coronary intervention, 7). Results: All patients were in a cardiogenic shock state, cardiopulmonary resuscitations (CPR) were performed for fourteen patients (mean CPR time $20.8{\pm}26.0$ min). The mean time from vascular access to the initiation of ECMO was $17.2{\pm}9.4$ min and mean support time was $3.8{\pm}4.0$ days. Fourteen patients were able to be weaned from ECMO and ten patients were discharged (mean admission duration $50.1{\pm}31.6$ days). Patients survived on average $476.6{\pm}374.6$ days of follow-up. Longer CPR and support time, increased cardiac enzyme, lower ejection fraction, lower albumin, and major complications were the risk factors of mortality (p<0.05). Conclusion: The early application of ECMO prior to coronary reperfusion and control of risk factors allowed for good clinical results in cardiogenic shock with AMI.

Implementation and Analysis of IEEE 802.15.4 Compliant Software based on a Vertically Decomposed Task Model (수직 분할 태스크 모델 기반의 IEEE 802.15.4 소프트웨어 구현과 성능평가)

  • Kim, Hie Cheol;Yoo, Seong Eun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.1
    • /
    • pp.53-60
    • /
    • 2014
  • IEEE 802.15.4 is one of the most widely adopted physical layer standards in the area of LR-WPAN(Low-Rate Wireless Personal Area Network). Numerous previous researches have contributed to deep insights on energy efficiency, transmission throughput, and reliability that IEEE 802.15.4 delivers to the LR-WPAN. As a research that is orthogonal and complementary to previous researches, we explore the implementation and practical performance evaluation of IEEE 802.15.4 MAC software. We implement the MAC software from the perspective of the networking stack, exploring the issues raised when the MAC software serves as a functional component in a complete networking stack consisting of MAC, network as well as well as application support layers. The performance is evaluated on a realistic experimental software environment integrated with operating system, networking stack, and applications.

A sutdy on the District Unit Design for CO2 Reduction of Transportation (교통부문 CO2 저감을 위한 지구단위설계 방법에 관한 연구)

  • Jin, Jang-Won;Park, Min-Kwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.3
    • /
    • pp.1370-1376
    • /
    • 2012
  • This study tried to analyze $CO_2$ emission volume as green-house gases by application of land use patterns and transport policies in District Unit Design. It is postulated a Toy network and various scenarios which are combined land use patterns and transport policies for analyzing $CO_2$ gas reduction. As results, this study shows best District Unit Design technique is the policy that develop mid block and introduction of car free zone to inner 2 way streets. Worst design technique is the policy that make hierarchical network and introduction of access control to outer roads that have been known as a best road policy till nowadays. Therefore, we need more carefully introduce design technique for reduction of $CO_2$ in District Unit.

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.

Face Recognition System Technologies for Authentication System - A Survey (인증시스템을 위한 얼굴인식 기술 : 서베이)

  • Hwang, Yooncheol;Mun, Hyung-Jin;Lee, Jae-Wook
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.9-13
    • /
    • 2015
  • With the advance of ICT, the necessity of user authentication to verify the identity of an opponent online not face to face is increasing. The authentication, the basis of the security, is used in various fields. Because ID-based authentication has weaknesses in terms of stability and losses, two or more than two authentication tools are used in the place in which the security is important. Recently, biometric authentication rather than ID, OTP, SMS authentication has been an issue in terms of credibility and efficiency. As the fields applied to current biometric recognition technologies are increasing, the application of the biometric recognition is being used in various fields such as mobile payment system, intelligent CCTV, immigration inspection, and access control. As the biometric recognition, finger print, iris, retina, vein, and face recognition have been studied actively. This study is to inspect the current state of domestic and foreign standardization including understanding of the face recognition and the trend of technology.

  • PDF