• Title/Summary/Keyword: Authorization System

Search Result 240, Processing Time 0.026 seconds

RBAC-based Trust Negotiation Model for Grid Security (그리드 보안을 위한 역할 기반의 신뢰 협상 모델)

  • Cho, Hyun-Sug;Lee, Bong-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.455-468
    • /
    • 2008
  • In this paper, we propose FAS model for establishing trust based on digital certificates in Grid security framework. The existing RBAC(Role Based Access Control) model is extended to provide permissions depending on the users‘ roles. The FAS model is designed for a system independent integrated Grid security by detailing and extending the fundamental architecture of user, role, and permission. FAS decides each user’s role, allocates access right, and publishes attribute certificate. FAS is composed of three modules: RDM, PCM, and CCM. The RDM decides roles of the user during trust negotiation process and improves the existing low level Grid security in which every single user maps a single shared local name. Both PCM and CCM confirm the capability of the user based on various policies that can restrict priority of the different user groups and roles. We have analyzed the FAS strategy with the complexity of the policy graph-based strategy. In particular, we focused on the algorithm for constructing the policy graph. As a result, the total running time was significantly reduced.

AAA Mechanism for the Integration between Heterogeneous Network in Wireless Network Roaming Environment (무선 네트워크 로밍 환경에서 이기종 네트워크간 연동을 위한 AAA 메커니즘)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.481-492
    • /
    • 2008
  • With the advancement of the Internet and networks, the combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security vulnerability. Also, form of service that users offer will be service for roaming user. In these service, we must provide fast authentication and security at roaming. Therefore in this paper we proposed roaming and AAA mechanism in heterogeneous network environment. Our system provides secure communication and efficiency.

Development and Validation of Exposure Models for Construction Industry: Tier 1 Model (건설업 유해화학물질 노출 모델의 개발 및 검증: Tier-1 노출 모델)

  • Kim, Seung Won;Jang, Jiyoung;Kim, Gab Bae
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.24 no.2
    • /
    • pp.208-218
    • /
    • 2014
  • Objectives: The major objective of this study was to develop and validate a tier 1 exposure model utilizing worker exposure monitoring data and characteristics of worker activities routinely performed at construction sites, in order to estimate worker exposures without sampling. Methods: The Registration, Evaluation, Authorization and Restriction of Chemicals(REACH) system of the European Union(EU) allows the usage of exposure models for anticipating chemical exposure of manufacturing workers and consumers. Several exposure models have been developed such as Advanced REACH Tools(ART). The ART model is based on structured subjective assessment model. Using the same framework, a tier 1 exposure model has been developed. Worker activities at construction sites have been analyzed and modifying factors have been assigned for each activity. Korean Occupational Safety and Health Agency(KOSHA) accrued work exposure monitoring data for the last 10 years, which were retrieved and converted into exposure scores. A separate set of sampling data were collected to validate the developed exposure model. These algorithm have been realized on Excel spreadsheet for convenience and easy access. Results: The correlation coefficient of the developed model between exposure scores and monitoring data was 0.36, which is smaller than those of EU models(0.6~0.7). One of the main reasons explaining the discrepancy is poor description on worker activities in KOSHA database. Conclusions: The developed tier 1 exposure model can help industrial hygienists judge whether or not air sampling is required or not.

Implications of TMF and QuEST Programs to Global Standardization Activities on Internet QoS in the Era of Digital Convergence (ITU-T와 IETF의 NGN 중심의 디지털 컨버전스 시대의 인터넷 QoS 가치사슬과 관련된 글로벌 표준화 활동)

  • Kim, Do-Hoon
    • Journal of Korean Society for Quality Management
    • /
    • v.35 no.3
    • /
    • pp.37-46
    • /
    • 2007
  • Our society is increasingly dependent on the Internet, and this trend will be accelerating in the ear of All-IP convergence. As the core infrastructure of the All-IP convergence, the next generation Internet should enable end-to-end Quality of Service(e2e QoS). For that purpose, major international standardization institutes such as ITU(International Telecommunication Union) and IETF(Internet Engineering Task Force) are building the concept and architecture of the Next Generation Network(NGN). However, these institutes focus only on technical issues, and leave many business/policy-oriented challenges unresolved. For example, the standards raised by ITU assume that the entire service delivery process for e2e QoS services is perfectly working. But required is a standardized business interface and process for seamless inter-operations across many stakeholders including ISPs(Internet Service Providers), CPs(Content Providers), so on. On the other hand, TMF(TeleManagement Forum) and QuEST(Quality Excellence for Suppliers of Telecommunication) Forum, global consortiums of telecom operators and vendors, present sets of interface rules and process which playa crucial role as de facto standards: for example, NGOSS/eTOM and TL9000 authorization system. However, these standards focus on telephone services, and provide little principle for the next generation Internet. Our study seeks a way to combine these two strains for a successful implementation of NGN. In particular, we find a missing link in the NGN architecture and the elements that could be complemented with the help of NGOSS/eTOM and TL9000. Finally, presented is a strategic direction that our standardization policy should purse in order to reinforce our global leadership for the next generation Internet.

An Effective Query Rewriting Method in Secure XML Access Control (안전한 XML 접근제어에서 효율적인 질의 재작성 기법)

  • An, Dong-Chan;Byun, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.127-137
    • /
    • 2006
  • We propose two phase filtering scheme to develop an efficient mechanism for XML databases to control query-based access. An access control environment for XML documents and some techniques to deal with fine-grained authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query-based access. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form through a query optimization technique, which is guaranteed to have no access violations using tree-aware metadata of XML schemas. The scheme can be applied to any XML database management system and has several advantages such as small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

  • PDF

IoT service and Research for Field of medicine application (IoT 서비스와 의료분야 적용에 관한 연구)

  • Na, Chan-kook;Park, Yune-soo;Kim, Wooseond;Lee, Bok-gi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.453-456
    • /
    • 2016
  • Recently, IoT technologies attract much attenction in medical area. Previous medical IoT had focused mainly on chronological diseases or fitness for particular users. Contrarily, medical use of the IoT technologies is now extended for medical institutes and hospitals to care intensively in-house patients, which requires typically more strict and reliable data delivery and security, authentication and authorization. This study defines scenario of the medical IoT for the intensive care and proposes an architecture of the medical IoT services. We implement a testbed using commerical sensors and Arduino board together with a Web-based platform. Experiment results on the testbed show that our approach can be feasible for the medical system in terms of latency and accuracy in medical data delivery.

  • PDF

Effects of a Discharge Education Program using Computerized Animation Video for Post-operative Colon Cancer Patients (대장암 수술 후 퇴원 환자에게 적용한 컴퓨터 기반 애니메이션 동영상 교육의 효과)

  • Kim, Young Mee;Kim, Min Young;Kwon, Won Kyoung;Kim, Ho Sook;Park, Seung Hyun;Chun, Myoung Sook;Han, Hye Jung
    • The Korean Journal of Rehabilitation Nursing
    • /
    • v.16 no.1
    • /
    • pp.37-46
    • /
    • 2013
  • Purpose: This study was to identify the effects of a nurse-led education program using computerized animation video for post-operative colon cancer patients. Methods: a total of 163 patients and 51 nurses were participated in this study. With a non-equivalent control group post-test design, patients were divided into three groups (77 got traditional education, 46 were applying brochure, 40 were watching video). Twelve-item animation video and brochure about the management after discharge for post-operative colon cancer patients were developed based on patient survey and the items of Korea Healthcare Accreditation. Results: The computerized video watching group had better satisfaction than the others, but there was no significant difference about comprehension. When video was applied, satisfaction, usefulness, application, and perceived patients' comprehension of nurses were all increased. Conclusion: This video education program was developed by nurses and it had a special thing for patient to access the same program even after discharge using the authorization system. It would be helpful for nurses to be more concentrated on the direct care for hospitalized patients as well as for patients to provide self-care at home. This program would be adjusted into more various diseases and settings.

Development of Vending Machine for Electricity Based on Z-Wave Mesh Network (Z-Wave 메쉬 네트워크 기반의 전기 자판기 개발)

  • Kang, Ki-beom;Ahn, Hyun-kwon;Kim, Han-soo;Lee, Seung-hyun;Jwa, Jeong-woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1256-1262
    • /
    • 2016
  • As the population of camping is increased in campsites and auto camp sites, the electrical equipment can safely supply electricity to users in a variety of electricity bill policy is required in the campsite. In this paper, we develop the vending machine for electricity that can control the outdoor electrical outlet from the management server using the Z-Wave WPAN and android mobile application. The developed vending machine for electricity consists of the management server, the controller, the outdoor outlet box, and the mobile application. The management server provides reservation and electricity bill payment to users. The management server controls the electrical outlet box through the controller to safely supply electricity to users. The controller that is a relay device between the management server and the switch controls switches based on Z-Wave mesh network. Outdoor electrical outlet box has 2 meter switches. We receive the relevant authorization to provide commercial electricity services using the outdoor electrical outlet box in the campsite.

A Study of Constructing Knowledge Management for Taiwan's Small and Medium-sized Enterprises by Successful Factors

  • Tien, Shiaw-Wen;Wang, Ming-Lang;Chung, Yi-Chan;Tsai, Chih-Hung;Lee, Si-Yi
    • International Journal of Quality Innovation
    • /
    • v.7 no.1
    • /
    • pp.60-89
    • /
    • 2006
  • In the Knowledge-based Economic Era, all of the enterprises are facing global competitive pressure. The activities of knowledge accessing, codifying, and application will obviously become the main inner function on enterprise operation. Knowledge will be the primary competitive advantage; therefore, he who wants to hold the competitive advantage should do the knowledge management (KM) very well. In this study, we construct the research dimensions and variances by the successful factors of KM, which had been practiced very well by big enterprises inside and outside our country, and which was recommended by the related scholars. In order to approach the differences between big enterprises and small and medium-sized enterprises (SMEs) towards implementing KM, this study takes the way of questionnaire investigation to do empirical analysis and to construct the model of KM by path analysis. The study found out when implementing KM, SMEs should highlight 'leadership,' 'library-architecture,' and 'corporate culture' these three aspects, while 'information technology' and 'performance evaluation' these two aspects show no remarkable influence. It shows that he who wants to construct KM might not too overweight on information technology to build the KM system. Therefore, we suggest when implementing KM, enterprises should reinforce the corporate culture by sharing, organized KM process, learning environment for all employees, and highly authorization by top managers in order to reach the expectant success of KM. The result of this study offers practical thinking directions to reach the expectant success for the policy makers in SMEs, who are accessing to or evaluating to implement KM.

A GIS-Based Mapping to Identify Locations at Risk for Highly Pathogenic Avian Influenza Virus Outbreak in Korea (지리정보시스템 기반의 고병원성 조류인플루엔자 발생 위험지도 구축)

  • Lee, Gyoungju;Pak, Son-Il
    • Journal of Veterinary Clinics
    • /
    • v.34 no.2
    • /
    • pp.146-151
    • /
    • 2017
  • Six major outbreaks of highly pathogenic avian influenza (HPAI) occurred from 2003 to 2016 in Korea. Epidemiological investigations of each outbreak revealed that migratory birds were the primary source of the HPAI virus. During the last five years, the geographic transmission pattern of domestic HPAI seems to have extended from local to nationwide; therefore, it is necessary to identify specific locations in which poultry farms are at elevated risk for HPAI outbreak to enable targeted surveillance and other mitigation strategies. Here, a geographical information system (GIS)-based analysis was used to identify geographic areas at high risk for future HPAI incidents in Korea based on historical outbreak data collected between December 2003 and April 2016. To accomplish this, seven criteria were used to identify areas at high-risk for HPAI occurrence. The first three criteria were based on defined spatial criteria buffering of 200 bird migration sites to some defined extents and the historical incidence of HPAI outbreaks at the buffering sites. The remaining criteria were based on combined attribute information such as number of birds or farms at district levels. Based on the criteria established for this study, the most-likely areas at higher risk for HPAI outbreak were located in Chungcheong, Jeolla, Gyeonggi, and Gyeongnam provinces, which are densely populated poultry regions considered major poultry-production areas that are located along bird migration sites. The proportion of areas at risk for HPAI occurrence ranged from 4.5% to 64.9%. For the worst criteria, all nine provinces, including Jeju Island, were found to be at risk of HPAI. The results of this study indicate that the number of poultry farms at risk for HPAI outbreaks is largely underestimated by current regulatory risk assessment procedures conducted for biosecurity authorization. The HPAI risk map generated in this study will enable easy use of information by policy makers to identify surveillance zones and employ targeted surveillance to reduce the impact of HPAI transmission.