• Title/Summary/Keyword: Capability Access Control

Search Result 73, Processing Time 0.026 seconds

Design and Implementation of Unified Network Security System support for Traffic Management (종단간 트래픽 관리를 지원하는 통합 네트워크 보안시스템 설계 및 구현)

  • Hwang, Ho-Young;Kim, Seung-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.267-273
    • /
    • 2011
  • The importance of networking capability is gaining more weight for enterprise business and high-speed Internet access with guaranteed security management is essential to companies. This paper presents a unified network security management solution to support high-speed Internet access, active security management, traffic classification and control. The presented system provides firewall, VPN, intrusion detection, contents filtering, traffic management, QoS management, and history log functions in unified manner implemented in a single appliance device located at the edge of enterprise networks. This will enable cost effective unified network security solution to companies.

A Cost-effective Control Flow Checking using Loop Detection and Prediction (루프 검출 및 예측 방법을 적용한 비용 효율적인 실시간 분기 흐름 검사 기법)

  • Kim Gunbae;Ahn Jin-Ho;Kang Sungho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.12
    • /
    • pp.91-102
    • /
    • 2005
  • Recently, concurrent error detection for the processor becomes important. But it imposes too much overhead to adopt concurrent error detection capability on the system. In this paper, a new approach to resolve the problems of concurrent error detection is proposed. A loop detection scheme is introduced to reduce the repetitive loop iteration and memory access. To reduce the memory overheat an offset to calculate the target address of branching node is proposed. Performance evaluation shows that the new architecture has lower memory overhead and frequency of memory access than previous works. In addition, the new architecture provides the same error coverage and requires nearly constant memory size regardless of the size of the application program. Consequently, the proposed architecture can be used as an cost effective method to detect control flow errors in the commercial on the shelf products.

RBAC for multi-organizational Business Process Management (기업간 비즈니스 프로세스 관리에서의 접근 권한 통제)

  • Bae, Hye-Rim;Hur, Won-Chang
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.151-166
    • /
    • 2007
  • As the number of users who are involved in a business process increases, it becomes imperative to effectively control their privileges of accessing sensitive data and information which are usually easily obtained by BPM system. Traditional RBAC (Role-based Access Control) model was first introduced to provide a logical framework to prevent unauthorized users from obtaining confidential, but in more dynamic environment such as B2B and SCM process, it usually lacks in capability of addressing such issues as configurability, customizability, or scalability of user privileges. In this study, we have proposed a privilege-template based RBAC model that can address such issues effectively. We also provided a design of the RBAC model along with illustrative examples and pseudo codes that can be used for implementing a prototype system.

  • PDF

Emulator for Generating Heterogeneous Interference Signals in the Korean RFID/USN Frequency Band

  • Lee, Sangjoon;Yoon, Hyungoo;Baik, Kyung-Jin;Jang, Byung-Jun
    • Journal of electromagnetic engineering and science
    • /
    • v.18 no.4
    • /
    • pp.254-260
    • /
    • 2018
  • In this study, we suggest an emulator for generating multiple heterogeneous interference signals in the Korean radio frequency identification/ubiquitous sensor network (RFID/USN) frequency band. The proposed emulator uses only one universal software radio peripheral to generate multiple heterogeneous interference signals more economically. Moreover, the physical and media access control parameters can be adjusted in real time using the LabVIEW program, thereby making it possible to create various time-varying interference environments easily. As an example showing the capability of the proposed emulator, multiple interference signals consisting of a frequency-hopping RFID signal and two LoRa signals with different spreading factors were generated. The generated signals were confirmed in both frequency and time domains. From the experimental results, we verified that our emulator could successfully generate multiple heterogeneous interference signals with different frequency and time domain characteristics.

A Study on Token based IoT Access Control using Blockchain (블록체인을 이용한 토큰 기반 IoT 접근제어 연구)

  • Kim, Mi-Sun;Park, Kyung-Woo;Seo, Jae-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.243-245
    • /
    • 2017
  • IoT 환경은 다양한 장치들이 상호 통신을 통해 데이터를 발생하고 이에 대한 서비스를 제공한다. 이를 통해 많은 데이터와 객체 정보들이 네트워크를 통해 노출되어진다. 따라서, 신뢰할 수 있는 정보 접근 제어 서비스가 필요하다. 본 논문은 capability 토큰 기반의 IoT 접근제어 시스템에서 토큰의 생성, 위임, 폐기 과정에서 블록체인을 이용한 분산 트랜잭션 접근제어 모델을 제시한다.

Analysis of Underwater Acoustic Radiation of SWATH vessel using Transfer Function Method (전달함수법을 이용한 SWATH선의 수중 음향 방사 해석)

  • 김재호
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.6 no.2
    • /
    • pp.20-34
    • /
    • 2003
  • The good sea-keeping capability of the SWATH(Small Waterplane Area Twin Hull) ship has been attractive for research or surveillance vessels. Especially, for the naval ships accomplishing the underwater acoustic missions, it is necessary to access and minimize the underwater radiated noise level generated by the ships. Therefore, acoustic signature management and control are very important topics for these vessels. Underwater radiation pattern in the low frequency range is dominated by the tonals from the vibration of onboard machinery. In this work, the radiated noise level generated by the propulsion machine in the submerged hull is predicted using the transfer function technique and the hull transfer function for the submerged hull is determined by analyzing the longitudinal/circumferential stiffened infinitely long cylindrical shell and considering the empirical database of the previous vessels. It is confirmed that the transfer function technique can give useful information for identifying the noise source and estimating its contribution to the total radiatied noise level.

A Study of Resource Service Management Model for IoT Service Access Control (IoT 서비스 접근 제어를 위한 리소스 서비스 관리 모델 연구)

  • Jang, Deresa;Kim, Jin-Bo;Kim, Mi-Sun;Seo, Jae-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.664-667
    • /
    • 2015
  • 사물인터넷(IoT)은 시간과 장소의 제약 없이 모든 사물이 인터넷을 기반으로 정보 교환 및 의사소통을 지원하는 지능형 기술 및 서비스를 의미한다. IoT 기술의 발전과 이를 활용한 서비스 분야는 새로운 융합 서비스 형태로 발전함에 따라 리소스 서비스에 대한 모델 관리 방안 연구가 필요하다. 본 논문에서는 CapSG(Capability Service Gateway)를 이용한 IoT 서비스 접근 제어 플랫폼을 살펴보고, IoT 테스트베드 환경에서 리소스 서비스에 대한 모델 관리 방안을 제시한다.

A Design Information Security Attributes of for Meta-Information System (메타정보체계를 위한 정보보호 속성의 설계)

  • 전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.53-62
    • /
    • 1999
  • The rapid growth of Internet supports a base that share useful information. It needs for mass of information that requires a fast processing capability. It needs a meta0information system. Meta-information system supports fast search service but occurs a problem in case of information security. In this paper we propose a information security attribute that are user access control for meta-information system to solve the problem.

The design of AIN SDF Server about the application of the X.500 for supporting the SCF/SDF in AIN (AIN에서 SCF/SDF 인터페이스에 X.500 적용을 위한 AIN SDF Server 설계)

  • Park, Mun-Seong;O, Ju-Byeong;Jin, Byeong-Un;Kim, Hye-Gyu;Park, Seong-Yeol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.655-666
    • /
    • 1995
  • Advanced Intelligent Network(AIN) and X.500 directory service have similarity in between. X.500 capabilities and the requirements for the Service Control Function(SCF) to Service Data Function(SDF) in AIN. As an interface, SCF can be mapping as a Directory User Agent(DUA) and SDF can be mapping as a Directory System Agent(DSA). Based on the concepts, X.500 directory can be applied to AIN. In this paper we suggest to apply the X.500 DSP to the SDF/SDF interface to perform a distribution function. Also we show that the SCF-SDF/SDF-SDF relationship can be possible under applying X.500 DAP/DSP within the set of Capability Set 1 (CS1),CS2 and CS3. Finally, based on the above contents, we introduce the designed schematic of AIN SDF Server System for a distributed processing in AIN and design the X.500 schema of Universal Personal Telecommunication(UPT) service for supporting AIN SDF Server.

  • PDF

A Study on the Development of PC-based DestTop Ship Maneuvering Simulator for trainning purpose (PC를 이용한 선박조종연습 DESKTOP Simulator개발에 관한 연구)

  • 허용범;윤점동
    • Journal of the Korean Institute of Navigation
    • /
    • v.20 no.2
    • /
    • pp.1-13
    • /
    • 1996
  • Most of the ShipHandling Simulators of full-mission-bridge system need vast area to install and even PC-based maneuvering simulators are often equipped with Steering Wheel or Engine Telegraphe etc. of data input interface, which necessarily makes the user face with excessive financial burden. These have been one of the obstacles for the officers, captains, pilots and students in access to maneuvering simulation whenever they want to try it in advance prior to actual ship maneuvering. Subsequently, all the officers and captains come to have little chances to train themselves until they arualified as a pilot after a long period of time of realship maneuvering practice on board, which means they have to control they have to control their own ship at sea without clear understanding on her maneuverability when they are forced to do it on the way. And these lack of capability for maneuvering have used so often to result in marine casualties of collision with other ships or pier facilities while maneuvering in harbor. To prevent those accidents by means of enhancing their maneuvering ability, PC-based DeskTop Simulator that allows anyong to access readily at anytime is needed and in conformation to such demand this simulator has been developed. The Software this simulator written in Turbo Pascal Ver. 5.0 has adopted MMG mathmatical model theoretically in part and also it was designed to make it possible that all numeric data inputs and outputs with graphic presentation for maneuvering operation be carried out just only with keyboard and monitor console. With the Simulation software, all the officers, captains, pilots and even students who has a proper computer at hand are expected to be able to make an attempt to simulate the maneuvering of their ownship or any other types of them at any port in which they want to do it.

  • PDF