• Title/Summary/Keyword: Authorization System

Search Result 240, Processing Time 0.029 seconds

Security Enforcement based on Cooperative Architecture in Active network (액티브 네트워크에서의 협업적 구조를 통한 보안 강화)

  • Oh, Ha-Young;Chae, Ki-Joon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.223-225
    • /
    • 2005
  • 기존의 패킷 교환 네트워크는 해킹과 같은 보안 공격에 많은 취약점을 가지고 있다. 침입차단시스템 (Firewall system)과 침입탐지 시스템 (Intrusion Detection system)같은 보안 시스템이 개발되고 있지만 DOS나 Probe등을 비롯한 다양한 공격에 대해 적극적으로 대처 할 수 없다. 결과 DARPA를 비롯한 여러 기관에서 전송중인 액티브 패킷이 라우터에서 관리자의 정책을 담고 있는 코드를 실행할 수 있고 그 코드의 실행결과에 따라 라우터의 상태를 변경할 수 있는 액티브 네트워크 전반적인 구조를 제안하였다. 하지만 액티브 네트워크에서 중요한 것은 기존 네트워크와 달리 액티브 패킷이 액티브 노드의 자원에 접근함으로써 발생하게 되는 네트워크 보안이다. 따라서 액티브 노드의 NodeOs단에 Crypto engine, Integrity Engine, Authentication Engine, Authorization Engine등을 비롯한 액티브 노드 인증 및 액티브 패킷/코드 인증 보안 모듈을 둠으로써 액티브 노드 간 서로 안전한 협업적 관리를 통해 보안을 강화한다.

  • PDF

Improved Path Authorization of Diameter Base Protocol (Diameter Base Protocol의 향상된 경로 권한검증 기법)

  • Yu, Hui-Jong;Kim, Hyun-Gon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1141-1144
    • /
    • 2004
  • Diameter Base 프로토콜은 Diameter 노드라면 반드시 지원해야 하는 기본 프로토콜이다. 현재 Diameter Base 프로토콜은 IETF RFC 3588로 표준화되었으나 여전히 논의되어야 할 문제점이 존재하며 IETF WG Mailing List에서 이에 관한 논의가 진행되고 있다. 경로 권한 검증 문제는 이미 IETF WG Mailing List에서 일부 언급되었으나 충분한 논의가 이루어지지 못한 상태이다. 따라서 RFC 3588 내에서 정의한 내용들에 서로 모순되고 비효율적인 기능들이 존재한다. 본 논문에서는 RFC에 새롭게 추가된 기능인 경로 권한 검증 기능의 문제점에 대해 분석하여 표준에 벗어나지 않으며 보다 효율적으로 개선된 방안을 제시한다.

  • PDF

Effect of Social Service Quality on Service Satisfaction and Service Repurchase - Focusing on Social Service Investment Project-

  • Jang, Chun-Ok
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.213-218
    • /
    • 2021
  • In order to improve the quality of social services, developed countries overseas have introduced authorization or permit system to primary filtering when entering the market that provides social services. However, in Korea, a quality evaluation system for social service quality management has been introduced and implemented, but no significant effect has been achieved so far. Therefore, the purpose of this study is to investigate the relationship between service quality, service satisfaction, and repurchase intention, which are important variables to measure social service quality improvement, and to use it for service quality management. As a result of this study, service quality, service satisfaction, and repurchase intention are important factors for service quality improvement. It is necessary to secure a service provider of and continuous user selection and service quality management are also important.

Mobility Management Scheme based on User Mobility QoS and Security-Effective Network in Heterogeneous Mobile Networks (이종의 모바일 네트워크에서 사용자 이동성 QoS와 보안효과적인 네트워크 기반의 이동성관리 기법)

  • Lee, Hyeungwoo;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.87-97
    • /
    • 2015
  • To support the efficient mobility MIPv6v, FMIPv6, HMIPv6 and host-based mobility management protocols have been developed. AAAC (Authentication, Authorization, Accounting and Charging) system is applied in this paper analyzed the the existing IPv6 PMIPv6, FPMIPv6 network security effective and IPv6 MMP (Mobile Management Protocol) Features and performance analysis is performed. And IPv6 MMP seamless transfer performance in terms of packet loss probability, will be analyzed. That can be efficiently used as a method for the integration of QoS and mobility so that you can manage and control the resources presented QoSB usage. Results of evaluation results showed a better overall fast handover structure of mobility management techniques. PMIPv6 and FPMIPv6 in many respects the most efficient structure that can be specifically, a fast handover of the structure of the network-based mobility management scheme showed the best results.

Elementary textbook adoption process and teacher decisions (초등학교 수학 교과용 도서 선정과 관련한 교사들의 의사결정 탐색)

  • Han, Chaereen;Lim, Woong
    • The Mathematical Education
    • /
    • v.61 no.2
    • /
    • pp.221-237
    • /
    • 2022
  • This study investigated teachers' decision-making and related factors in the elementary textbook adoption process. Our participants include 296 elementary teachers who took part in the mathematics textbook (grades 3 and 4) adoption committees in his/her schools. Our study used the decision-making model of Shavelson and Stern (1981) for analyzing teacher beliefs and attitudes concerning choices and priorities, judgments, evaluation methods, and key factors to reviewing and selecting a mathematics textbook. Our discussion includes teacher beliefs and intentions and the way they come into conflict with determinant factors that influence the decision-making of textbook adoption. Findings also reveal the unique nature of elementary school teaching as generalists in contrast with secondary teachers as specialists, playing a significant role in the adoption process. Lastly, the study discusses the entanglements of textbook reform and explains the discrepancy between textbook authorization/approval policies versus the plight of little change (and innovation) in mathematics textbooks.

Image Encryption and Decryption Using SA Algorithm and Optical Correlator System (SA 알고리듬과 광 상관 시스템을 이용한 영상 암호화 및 복호화)

  • 김철수;조창섭
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.3
    • /
    • pp.349-356
    • /
    • 2004
  • In this paper, a practical image security system using SA algorithm and 4-f optical correlator system is proposed. The encrypted image and key image with binary phase components are generated using an iterative SA algorithm. a decrypted image is found through the correlation of the encrypted and key images using 4-f optical correlator system. The encrypted and key images are consisted of binary phase components. So, it is easy to implement the optical security system using the proposed technique. And if we fix the encrypted image in the optical security system and change the key images, we get different images, so it is possible to apply to the distinguished authorization system using different key images. Computer simulations show that despite the binary phase components of the two images(encrypted and key image), decrypted images are generated.

  • PDF

Information Security Research for Smartwork System (Smartwork System을 위한 정보보호연구)

  • Cheon, Jae-Hong;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.323-325
    • /
    • 2016
  • Computing loud arrival times were, important data Clouding and, without being limited to the device, may process the information. Recently, work environment and improved access to Cloud and Mobile, this decision has been made to take effect immediately. However, when such important decisions of the government, the security is required. In this paper, we study the network access and control in IoT, Cloud, Bigdata, Smartwork System applied to Mobile. Study the authentication, authorization, and security for each security level Level of Service to connect to the DB information. Research of this paper will be used as the basis for the information processing and decision-making system design and construction of public institutions and agencies as important information for the protection Smartwork System.

  • PDF

The Comparative Study on Post-Marketing Surveillance System for Pharmaceuticals (의약품의 시판후 조사제도 비교연구)

  • Kim, In-Beom;Kim, Hong-Jin;Sohn, Uy-Dong
    • YAKHAK HOEJI
    • /
    • v.50 no.3
    • /
    • pp.145-153
    • /
    • 2006
  • The adverse events which do not appear in the approval process tend to occur more frequently at the early stage of the use. Therefore new drugs, drugs with different active substances or routes of administration, or drugs with explicitly different efficacy added are particularly chosen for re-examination, and go through a study, which is conducted on 600 to 3,000 subjects over 4 to 6 years. Since the re-examination system was implemented in January 1995, 880 drug products have been designated as the subject of re-examination and among them 194 drugs have been completed their re-examination as of until March 2005. Post Marketing Surveillance to insure drug safety should be correlated with re-examination of new drug, re-evaluation of drug, and adverse event monitoring system. And the first labeling change should reflect all information collected for a defined period of time after the marketing authorization is granted. Furthermore centralized management through spontaneous reporting system of adverse event for whole period of time would be the most desirable type of system.

A Study on Network Reliability Analysis for Information Security (정보 보호를 위한 네트워크 신뢰성 분석에 관한 연구)

  • Yu, Hyoung-Seok;Park, Hong-Keun;Ryu, In-Ho;Kim, Hyoung-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3935-3941
    • /
    • 2010
  • With the advent of high-speed communications networks, many authentication and access control systems are being introduced to combat network security issues like system hacking. But the fact is that the security systems for protecting information used in these networks are themselves weak. In response to the mounting demands of existing users, there is a clear need for a new authentication system that provides both safety and reliability. This research presents an authentication method with excellent access authorization (explicit and implicit authentication) and safety performance, demonstrated through its use in online networks.

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF