• Title/Summary/Keyword: Computer Access and Use

Search Result 657, Processing Time 0.025 seconds

Design and Implementation of Applet for Multi-Users File Access based on Java Card (자바카드기반 다중 사용자 파일접근에 대한 애플릿 설계 및 구현)

  • Shin, Sang-Jun;Song, Young-Sang;Shin, In-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1201-1204
    • /
    • 2005
  • Whereas conveniences deriving from the development of information and telecommunication technology increase, information outflow and illegal data use are also rapidly on the rise. Consequently, many studies to prevent illegal information outflow are currently under way, and the use of Smart Card is in steep jump. Recently, Java Card is diffused fast as an alternative to complement the technical problems of the Smart Card. This paper designed and materialized the system for multi-users authentication and file access control by user through designing a Java Card applet that is used for information protection and in various application fields. For allowing a file access competence, each user's file access competence is processed via drawing up the access condition table in the applet. Therefore, illegal correction, exposure and destruction of information, which become the concerns when multi-users have an access, can be prevented. In addition, its application becomes possible in the system requiring multi-users certifications.

  • PDF

Development of a Mouse for Alternative Computer Access Using Smart Device (스마트기기를 이용한 컴퓨터 대체접근 마우스 개발)

  • Jang, U.H.;Hong, W.K.;Kim, C.G.;Song, B.S.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.8 no.1
    • /
    • pp.47-55
    • /
    • 2014
  • Almost of alternate computer access devices which assist people with disabilities to utilize the computer connected to computer by some cables or installed in as a S/W program. These devices have some spatial limitations to the people with disabilities, it can't guarantee the free and diverse access to the computer. For these reasons, in this paper, an Android-based mouse program for alternative computer access was developed. A people with physical disabilities who has some limitation of hand movements can use it in anywhere and anytime using only the fine motor skill of the upper limbs. The developed device recognizes the user's point touch and transforms it into the location of mouse cursor. The location information transferred to the computer via Bluetooth communication module equipped in smart devices. Also the group scanning method which can reduce the user's fatigue degree was employed and click, double click, drag & drop functions by hand's movements were equipped. The developed device will help the people with disabilities to use computer with brief touch and convenient operation without spatial limitation.

  • PDF

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing

  • Jing Yixin;Kim, Jin-Hyung;Jeong, Dong-Won
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.28-33
    • /
    • 2006
  • The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a light-weight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.

Experience in Practical Implementation of Abstraction Interface for Integrated Cloud Resource Management on Multi-Clouds

  • Kim, Huioon;Kim, Hyounggyu;Chun, Kyungwon;Chung, Youngjoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.18-38
    • /
    • 2017
  • Infrastructure-as-a-Service (IaaS) clouds provide infrastructure as a pool of virtual resources, and the public IaaS clouds, e.g. Amazon Web Service (AWS) and private IaaS cloud toolkits, e.g. OpenStack, CloudStack, etc. provide their own application programming interfaces (APIs) for managing the cloud resources they offer. The heterogeneity of the APIs, however, makes it difficult to access and use the multiple cloud services concurrently and collectively. In this paper, we explore previous efforts to solve this problem and present our own implementation of an integrated cloud API, which can make it possible to access and use multiple clouds collectively in a uniform way. The implemented API provides a RESTful access and hides underlying cloud infrastructures from users or applications. We show the implementation details of the integrated API and performance evaluation of it comparing the proprietary APIs based on our cloud testbed. From the evaluation results, we could conclude that the overhead imposed by our interface is negligibly small and can be successfully used for multi-cloud access.

A Design of Access Control Mechanism for the Secure Use of Internet (안전한 인터넷 사용을 위한 접근제어 메커니즘 설계)

  • Lee, Ho;Jung, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.84-90
    • /
    • 2000
  • This paper presents a design of an access control mechanism that can resolves the complicated problems of access control requirements in internet environment. In this paper, we proposed an access control mechanism which can satisfy the combined goals of confidentiality integrity and availability of any resource. We defined an access control mechanism from the viewpoints of identity-based, rule-based and role-based policy and implemented 6 access control operations. The Proposed access control mechanism can protect resources from unauthorized accesses based on the multi-level security policies of security label, integrity level, role and ownership.

  • PDF

Access Control Models for XML Databases in the Cloud

  • Alfaqir, Shumukh;Hendaoui, Saloua;Alhablani, Fatimah;Alenzi, Wesam
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.89-96
    • /
    • 2022
  • Security is still a great concern to this day, albeit we have come a long way to mitigate its numerous threats. No-SQL databases are rapidly becoming the new database de-facto, as more and more apps are being developed every day. However, No-SQL databases security could be improved. In this paper, we discuss a way to improve the security of XML-based databases with the use of trust labels to be used as an access control model.

Access, Skills and Constraints of Barangay Officials towards the Use of Information and Communications Technology (ICT)

  • Santiago, Cereneo S. Jr.;Ulanday, Ma. Leah P.;Centeno, Zarah Jane R.;Bayla, Ma. Cristina D.
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.2
    • /
    • pp.37-54
    • /
    • 2021
  • The study determined the access, skills and constraints towards the usage of ICT among barangay officials. A complete enumeration technique was used due to the small size of the population. A total of 121 barangay secretaries and barangay treasurers comprised the study respondents. The findings revealed that most of barangay officials have access to personal computer at home and in the office using their own mobile data and office internet connectivity. With the support from the Local Government Unit (LGU), it was found that most of the respondents are advance and proficient in computer usage. As constraints to ICT usage, the study respondents still experienced slow internet bandwidth that makes connection and communication weak along with the low income status. Consequently, it was found that there were no significant differences in terms of skills and constraints among barangay secretaries and barangay treasurers towards using ICT. It can be concluded that study respondents prefer to use office computer to access the information they need due to the convenience and availability of resources. The study respondents were competent enough to handle their job well but listed slow internet and low financial resources may hamper their ICT usage. Research implications were also offered.

Sheetlike Waveguide for 2.4 GHz and 5 GHz Bands

  • Eom, Kun-Sun;Hiroyuki, Arai
    • ETRI Journal
    • /
    • v.32 no.1
    • /
    • pp.112-119
    • /
    • 2010
  • We present a useful design for a free access mat which supports two frequency bands of 2.4 GHz and 5 GHz. The free access mat is a sheet-shaped waveguide which consists of a tightly coupled double-layered microstrip resonator array. It provides easy access for devices in short-range wireless communications. Interference is a common problem with conventional applications which use free space transmission. Our proposed wireless access system uses a subsidiary waveguide, the free access mat. Wireless devices are proximately coupled to the free access mat through which the coupled electromagnetic (EM) wave transmits. The arrival domain of the EM wave of an application is therefore limited to an area close to the free access mat. Wireless devices can be coupled to the free access mat at an arbitrary position without contact. We previously presented a free access mat for a single frequency band. This paper presents a free access mat for the two frequency bands of 2.4 GHz and 5 GHz. The free access mat uses a ring patch resonator array which is easily excited by typical antennas and is resistant to interference. These characteristics are demonstrated by numerical simulation and confirmed by experiment.

A Framework for Development of Correctness Centered e-Learning based Curriculum in Sukkur Region

  • Ahmed Masood Ansari;Mumtaz H. Mahar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.13-16
    • /
    • 2023
  • This study aims to explore the status of e-learning in the public sector institutes of the Sukkur region in Pakistan. A survey was conducted to collect data from students and teachers regarding their awareness, access, and use of e-learning resources. The results showed that although there is a widespread use of the internet and mobile devices for accessing information, there is a lack of awareness and access to e-learning resources. Barriers to accessing e-learning content and a lack of familiarity with e-learning content development technologies were also identified. The study concludes that there is a need for improved e-learning facilities and curriculum in the public sector institutes of the Sukkur region in Pakistan. Recommendations are provided for developing a correctness-centered e-learning based curriculum that is tailored to the specific needs of the students in the region. It is hoped that the findings of this study will inform efforts to improve the teaching and learning process in the region and provide students with greater flexibility and access to study materials.

The Development of HeadZmouse for Computer Access Using Gyroscopic Technology and Macro-Interface for Computer Access (컴퓨터접근을 위한 매크로 인터페이스 및 자이로센서기술을 사용한 헤드마우스의 개발)

  • Rhee, K.M.;Woo, J.S.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.1 no.1
    • /
    • pp.1-6
    • /
    • 2007
  • Applying the gyroscopic technology, HeadZmouse has been developed to simulate left and right mouse click, double click, drag and drop, and even a wheel function for navigating web. This device was designed to work on both PC and Macintosh environments using a USB cable. The first time you use this device, you'll find out how much freedom it offers to someone who can't use his or her hands freely. Rather than being tied to your computer, simple manipulation such as blowing an air (breathing) into a sonic sensor can simulate all the functions which standard mouse has, even including a wheel function. Also, a macro-interface device has been developed. By storing repetitive tasks into a memory, you can carry out repetitive tasks just by clicking a button once.

  • PDF