• 제목/요약/키워드: Computer Access

검색결과 3,145건 처리시간 0.029초

Security Improvement of File System Filter Driver in Windows Embedded OS

  • Seong, Yeon Sang;Cho, Chaeho;Jun, Young Pyo;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • 제17권4호
    • /
    • pp.834-850
    • /
    • 2021
  • IT security companies have been releasing file system filter driver security solutions based on the whitelist, which are being used by several enterprises in the relevant industries. However, in February 2019, a whitelist vulnerability was discovered in Microsoft Edge browser, which allows malicious code to be executed unknown to users. If a hacker had inserted a program that executed malicious code into the whitelist, it would have resulted in considerable damage. File system filter driver security solutions based on the whitelist are discretionary access control (DAC) models. Hence, the whitelist is vulnerable because it only considers the target subject to be accessed, without taking into account the access rights of the file target object. In this study, we propose an industrial device security system for Windows to address this vulnerability, which improves the security of the security policy by determining not only the access rights of the subject but also those of the object through the application of the mandatory access control (MAC) policy in the Windows industrial operating system. The access control method does not base the security policy on the whitelist; instead, by investigating the setting of the security policy not only for the subject but also the object, we propose a method that provides improved stability, compared to the conventional whitelist method.

스마트기기를 이용한 컴퓨터 대체접근 마우스 개발 (Development of a Mouse for Alternative Computer Access Using Smart Device)

  • 장운헌;홍원기;김창걸;송병섭
    • 재활복지공학회논문지
    • /
    • 제8권1호
    • /
    • pp.47-55
    • /
    • 2014
  • 컴퓨터 대체접근 기기는 장애로 인해 컴퓨터 사용이 힘든 장애인들이 컴퓨터를 사용할 수 있도록 보조하는 기기이며, 이러한 기기들은 대부분 컴퓨터에 유선으로 연결하거나 S/W 프로그램을 설치하여 사용하게 된다. 대부분의 이러한 기기들은 공간적인 제한이 존재하게 되기 때문에 장애인들에게 다양하고 자유로운 컴퓨터 접근을 보장할 수 없으며 다소 불편함을 감수하게 된다. 본 논문에서는 지체장애인 및 뇌병변장애인이 언제, 어디서든 상지의 소근육 운동만으로 컴퓨터에 접근 가능한 안드로이드 기반의 컴퓨터 대체접근 마우스를 개발하였다. 개발된 마우스는 스마트기기에 사용자가 입력하는 포인트를 인식하여 이를 마우스 커서 위치로 변환하고 이를 스마트기기에 내장된 블루투스 통신을 이용하여 컴퓨터로 전달하게 된다. 또한 사용자의 피로도를 줄여 줄 수 있는 그룹스캐닝 방식을 이용하여 가벼운 터치를 이용해서 원하는 버튼을 선택하도록 함으로써 클릭, 더불클릭 및 드래그 앤 드롭 기능을 사용할 수 있도록 하였다. 개발된 컴퓨터 대체 접근 마우스는 지체 및 뇌병변장애인이 간단한 터치 한번으로 컴퓨터 사용이 가능하고, 휴대성이 좋아 시간적, 공간적 제약 없는 장애인의 컴퓨터에 접근에 이용될 것이다.

  • PDF

A Novel Multiple Access Scheme via Compressed Sensing with Random Data Traffic

  • Mao, Rukun;Li, Husheng
    • Journal of Communications and Networks
    • /
    • 제12권4호
    • /
    • pp.308-316
    • /
    • 2010
  • The problem of compressed sensing (CS) based multiple access is studied under the assumption of random data traffic. In many multiple access systems, i.e., wireless sensor networks (WSNs), data arrival is random due to the bursty data traffic for every transmitter. Following the recently developed CS methodology, the technique of compressing the transmitter identities into data transmissions is proposed, such that it is unnecessary for a transmitter to inform the base station its identity and its request to transmit. The proposed compressed multiple access scheme identifies transmitters and recovers data symbols jointly. Numerical simulations demonstrate that, compared with traditional multiple access approaches like carrier sense multiple access (CSMA), the proposed CS based scheme achieves better expectation and variance of packet delays when the traffic load is not too small.

Reasoning about Multiple Access Control Configurations

  • Dangprasert, Supakit;Permpoontanalarp,Yongyuth
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -3
    • /
    • pp.2047-2050
    • /
    • 2002
  • At present, many applications independently provide access control for their own resources, for example Web, Databases and Operating Systems, etc. Such independent access control systems result in multiple access control configurations each of which deals with the access control in its own application context. Since those multiple configurations are operated in isolation, and maintained by possibly different administrators, they are likely to be incoherent. In this paper, we propose a logical specification to reason about multiple access control configurations. Our specification can be used to detect the incoherence in multiple configurations. Furthermore, it of offers many kinds of policies for multiple configurations that can capture several kinds of requirements for multiple access control systems.

  • PDF

안전한 인터넷 사용을 위한 접근제어 메커니즘 설계 (A Design of Access Control Mechanism for the Secure Use of Internet)

  • 이호;정진욱
    • 한국컴퓨터정보학회논문지
    • /
    • 제5권3호
    • /
    • pp.84-90
    • /
    • 2000
  • 본 논문은 인터넷 환경에서 접근제어 요구 사항의 복잡한 문제를 해결하기 위한 접근제어 메커니즘의 설계 방안을 제시한다. 본 논문에서는 자원의 기밀성, 무결성 및 가용성의 공통적 목적을 달성하기 위한 접근제어 메커니즘을 제안하고, 신분-기반, 규칙-기반 및 직무-기반의 관점에서 각 관련된 정책과 규칙을 정의하였으며, 필요한 접근제어 오퍼레이션들을 구현하였다. 제안된 접근제어 메커니즘은 보안 레이블, 무결성 등급, 직무 및 소유권 등의 다단계 보안 정책을 기반으로 하여 자원에 대한 불법적인 접근을 방어 할 수 있다.

  • PDF

A Role-driven Security and Access Control Model for Secured Business Process Management Systems

  • Won Jae-Kang;Kim Kwang-Hoon
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제14권3호
    • /
    • pp.1-8
    • /
    • 2005
  • This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net(ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domain's and the application domain's. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC(Role-based Access Control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations.

  • PDF

Assessing Efficiency of Handoff Techniques for Acquiring Maximum Throughput into WLAN

  • Mohsin Shaikha;Irfan Tunio;Baqir Zardari;Abdul Aziz;Ahmed Ali;Muhammad Abrar Khan
    • International Journal of Computer Science & Network Security
    • /
    • 제23권4호
    • /
    • pp.172-178
    • /
    • 2023
  • When the mobile device moves from the coverage of one access point to the radio coverage of another access point it needs to maintain its connection with the current access point before it successfully discovers the new access point, this process is known as handoff. During handoff the acceptable delay a voice over IP application can bear is of 50ms whereas the delay on medium access control layer is high enough that goes up to 350-500ms. This research provides a suitable methodology on medium access control layer of the IEEE 802.11 network. The medium access control layer comprises of three phases, namely discovery, reauthentication and re-association. The discovery phase on medium access control layer takes up to 90% of the total handoff latency. The objective is to effectively reduce the delay for discovery phase to ensure a seamless handoff. The research proposes a scheme that reduces the handoff latency effectively by scanning channels prior to the actual handoff process starts and scans only the neighboring access points. Further, the proposed scheme enables the mobile device to scan first the channel on which it is currently operating so that the mobile device has to perform minimum number of channel switches. The results show that the mobile device finds out the new potential access point prior to the handoff execution hence the delay during discovery of a new access point is minimized effectively.

NAC(Network Access Control)을 이용한 컴퓨터 네트워크 보안 플랫폼 구성 (Computer Network Security Platform Configuration with NAC)

  • 노철우;강경태;이지웅;전재현
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2009년도 춘계 종합학술대회 논문집
    • /
    • pp.8-11
    • /
    • 2009
  • 본 논문에서는 Extreme 스위치와 Cisco 라우터를 이용하여 가상의 네트워크를 구현하였으며 PIX 방화벽을 통해 외부 네트워크로부터의 보안을 강화하였고 내부 네트워크에 대한 보안 문제점은 802.1X 기반의 인증방식을 사용한 NAC를 적용시켜 구현함으로써 외부와 내부 네트워크의 통합적인 보안 플랫폼을 구성하였다.

  • PDF

Security Problems and Protection Methods in Remote Control Communication for Mobile Robots Using Wireless IP Network

  • Mizoguchi, Hiroshi;Teshiba, Masashi;Goto, Yoshiyasu;Hidai, Ken-Ichi;Shigehara, Takaomi;Mishima, Taketoshi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1998년도 제13차 학술회의논문집
    • /
    • pp.401-406
    • /
    • 1998
  • If a mobile robot can be controlled remotely via the internet using wireless IP protocol network, it becomes much useful and convenient. However risk of illegal access is also increased. This paper discusses problems of the illegal access and proposes protection methods against the access.

  • PDF

Access Control Models for XML Databases in the Cloud

  • Alfaqir, Shumukh;Hendaoui, Saloua;Alhablani, Fatimah;Alenzi, Wesam
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.89-96
    • /
    • 2022
  • Security is still a great concern to this day, albeit we have come a long way to mitigate its numerous threats. No-SQL databases are rapidly becoming the new database de-facto, as more and more apps are being developed every day. However, No-SQL databases security could be improved. In this paper, we discuss a way to improve the security of XML-based databases with the use of trust labels to be used as an access control model.