• Title/Summary/Keyword: Context based Dynamic Security

Search Result 14, Processing Time 0.024 seconds

Context-based Dynamic Access Control Model for u-healthcare and its Application (u-헬스케어를 위한 상황기반 동적접근 제어 모델 및 응용)

  • Jeong, Chang-Won;Kim, Dong-Ho;Joo, Su-Chong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.493-506
    • /
    • 2008
  • In this paper we suggest dynamic access control model based on context satisfied with requirement of u-healthcare environment through researching the role based access control model. For the dynamic security domain management, we used a distributed object group framework and context information for dynamic access control used the constructed database. We defined decision rule by knowledge reduction in decision making table, and applied this rule in our model as a rough set theory. We showed the executed results of context based dynamic security service through u-healthcare application which is based on distributed object group framework. As a result, our dynamic access control model provides an appropriate security service according to security domain, more flexible access control in u-healthcare environment.

Context Conflicts of Role-Based Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경의 역할 기반 접근제어에서 발생하는 상황 충돌)

  • Nam Seung-Jwa;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.37-52
    • /
    • 2005
  • Traditional access control models like role-based access control model are insufficient in security needs in ubiquitous computing environment because they take no thought of access control based on user's context or environment condition. In these days, although researches on context-aware access control using user's context or environment conditions based on role-based access control are emerged, they are on the primary stage. We present context definitions md an access control model to provide more flexible and dynamic context-aware access control based on role-based access control. Specially, we describe the conflict problems occurred in the middle of making an access decision. After classifying the conflict problems, we show some resolutions to solve them. In conclusion, we will lay the foundations of the development of security policy and model assuring right user of right object(or resource) and application service through pre-defined context and context classification in ubiquitous computing environments. Beyond the simplicity of access to objects by authorized users, we assure that user can access to the object, resource, or service anywhere and anytime according to right context.

Why Dynamic Security for the Internet of Things?

  • Hashemi, Seyyed Yasser;Aliee, Fereidoon Shams
    • Journal of Computing Science and Engineering
    • /
    • v.12 no.1
    • /
    • pp.12-23
    • /
    • 2018
  • The Internet of Things (IoT) ecosystem potentially includes heterogeneous devices with different processing mechanisms as well as very complicated network and communication models. Thus, analysis of data associated with adverse conditions is much more complicated. Moreover, mobile things in the IoT lead to dynamic alteration of environments and developments of a dynamic and ultra-large-scale (ULS) environment. Also, IoT and the services provided by that are mostly based on devices with limited resources or things that may not be capable of hosting conventional controls. Finally, the dynamic and heterogeneous and ULS environment of the IoT will lead to the emergence of new security requirements. The conventional preventive and diagnostic security controls cannot sufficiently protect it against increasing complication of threats. The counteractions provided by these methods are mostly dependent on insufficient static data that cannot sufficiently protect systems against sophisticated and dynamically evolved attacks. Accordingly, this paper investigates the current security approaches employed in the IoT architectures. Moreover, we define the dynamic security based on dynamic event analysis, dynamic engineering of new security requirements, context awareness and adaptability, clarify the need for employment of new security mechanism, and delineate further works that need to be conducted to achieve a secure IoT.

A CASA-Based Dynamic Access Control Scheme for Ubiquitous Environments (유비쿼터스 환경을 위한 CASA 기반의 동적 접근 제어 기법)

  • Kim, Kyoung-Ja;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.205-211
    • /
    • 2008
  • Conventional context-aware service models permit the access of resources only by user authentication, but the ubiquitous environments where the context information around users is changing frequently require the resource access control according to the rapid changes. This paper proposes a scheme to control access permission of resource dynamically as context information of user changes. Our access control model is based on traditional CASA (Context-Aware Security Architecture), but can restrict the access of the user already has been authorized. With the real-time checking of context information, our scheme gives different access controls according to changes in environmental information, and provides more secure services than conventional context-aware models.

  • PDF

A Study on the U-learning Service Application Based on the Context Awareness (상황인지기반 U-Learning 응용서비스)

  • Lee, Kee-O;Lee, Hyun-Chang;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.81-89
    • /
    • 2008
  • This paper introduces u-learning service model based on context awareness. Also, it concentrates on agent-based WPAN technology, OSGi based middleware design, and the application mechanism such as context manager/profile manager provided by agents/server. Especially, we'll introduce the meta structure and its management algorithm, which can be updated with learning experience dynamically. So, we can provide learner with personalized profile and dynamic context for seamless learning service. The OSGi middleware is applied to our meta structure as a conceptual infrastructure.

  • PDF

User Dynamic Access Control for Privacy Protection in Smart Home (스마트 홈에서 프라이버시 보호를 위한 사용자 동적 접근제어)

  • Cho, Do-eun;Kim, Si-jung
    • Journal of Platform Technology
    • /
    • v.6 no.3
    • /
    • pp.17-22
    • /
    • 2018
  • Smart home is a technology for monitoring and controlling all the information about a house by integrating various home applications like cooling, heating, lighting, kitchen and security systems into a network. Although home appliances have become more convenient to use due to the development of smart home technology, they are also more vulnerable to information security hazards. Unauthorized visitors may have access to any of home appliance to arbitrarily control it or acquire information. This causes serious privacy and security problems, which should be solved to further smart home technology. This present paper proposed a dynamic user access control system for privacy protection in smart homes. The proposed system defines the role of a user of smart home services by automatically identifying the status information of the user and dynamically controls the access range for the service. In this way, the privacy of a user can be protected and the inter-smart device service is effectively provided. Consequently, the proposed dynamic user access control for smart home will improve the security service for protecting privacy in smart home devices.

Construction of Multi-agent-based Distributed Framework for Application Services of u-Hospital Information Systems (u-병원 정보 시스템의 응용 서비스를 위한 멀티에이전트 기반 분산 프레임워크 구축)

  • Jeong, Chang-Won;Shin, Chang-Sun;Joo, Su-Chong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.861-865
    • /
    • 2009
  • As the hospital environment has been increasingly changed into a ubiquitous environment, the application services for the hospital environment are also faced with new requirements. In particular, the emergence of various mobile devices and the introduction of a wireless sensor network technology have accelerated the realization of the u-healthcare. The multi-agent paradigm has been introduced for satisfying both the integration of information and the various application scenarios established from various environments. This paper describes the software structure and u-applications for u-hospital information system based on ubiquitous environments. And it suggested the construction of a multi agent based distributed framework for supporting u-hospital information system. The suggested framework includes the JADE and distributed object group framework. And it implemented u-application services for supporting doctors and nurses, which provides the patient's health information and ward environment information. Especially, it is using a dynamic security mechanism on the security situation, which has not been emphasized in existing researches, and this paper shows the results for each user through the GUI.

Digitalization and Diversification of Modern Educational Space (Ukrainian case)

  • Oksana, Bohomaz;Inna, Koreneva;Valentyn, Lihus;Yanina, Kambalova;Shevchuk, Victoria;Hanna, Tolchieva
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.11-18
    • /
    • 2022
  • Linking Ukraine's education system with the trends of global digitalization is mandatory to ensure the sustainable, long-term development of the country, as well as to increase the sustainability of the education system and the economy as a whole during the crisis period. Now the main problems of the education system in Ukraine are manifested in a complex context caused by Russian armed aggression. In the context of war, problems include differences in adaptation to online learning among educational institutions, limited access to education for vulnerable groups in the zone of active hostilities, the lack of digital educational resources suitable for online learning, and the lack of basic digital skills and competencies among students and teachers necessary to properly conduct online classes. Some of the problems of online learning were solved in the pandemic, but in the context of war Ukrainian society needs a new vision of education and continuous efforts of all social structures in the public and private environment. In the context of war, concerted action is needed to keep education on track and restore it in active zones, adapting to the needs of a dynamic society and an increasingly digitized economy. Among the urgent needs of the education system are a change in the teaching-learning paradigm, which is based on content presentation, memorization, and reproduction, and the adoption of a new, hybrid educational model that will encourage the development of necessary skills and abilities for students and learners in a digitized society and enable citizens close to war zones to learn.

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

Chemical signalling within the rumen microbiome

  • Katie Lawther;Fernanda Godoy Santos;Linda B Oyama;Sharon A Huws
    • Animal Bioscience
    • /
    • v.37 no.2_spc
    • /
    • pp.337-345
    • /
    • 2024
  • Ruminants possess a specialized four-compartment forestomach, consisting of the reticulum, rumen, omasum, and abomasum. The rumen, the primary fermentative chamber, harbours a dynamic ecosystem comprising bacteria, protozoa, fungi, archaea, and bacteriophages. These microorganisms engage in diverse ecological interactions within the rumen microbiome, primarily benefiting the host animal by deriving energy from plant material breakdown. These interactions encompass symbiosis, such as mutualism and commensalism, as well as parasitism, predation, and competition. These ecological interactions are dependent on many factors, including the production of diverse molecules, such as those involved in quorum sensing (QS). QS is a density-dependent signalling mechanism involving the release of autoinducer (AIs) compounds, when cell density increases AIs bind to receptors causing the altered expression of certain genes. These AIs are classified as mainly being N-acyl-homoserine lactones (AHL; commonly used by Gram-negative bacteria) or autoinducer-2 based systems (AI-2; used by Gram-positive and Gram-negative bacteria); although other less common AI systems exist. Most of our understanding of QS at a gene-level comes from pure culture in vitro studies using bacterial pathogens, with much being unknown on a commensal bacterial and ecosystem level, especially in the context of the rumen microbiome. A small number of studies have explored QS in the rumen using 'omic' technologies, revealing a prevalence of AI-2 QS systems among rumen bacteria. Nevertheless, the implications of these signalling systems on gene regulation, rumen ecology, and ruminant characteristics are largely uncharted territory. Metatranscriptome data tracking the colonization of perennial ryegrass by rumen microbes suggest that these chemicals may influence transitions in bacterial diversity during colonization. The likelihood of undiscovered chemicals within the rumen microbial arsenal is high, with the identified chemicals representing only the tip of the iceberg. A comprehensive grasp of rumen microbial chemical signalling is crucial for addressing the challenges of food security and climate targets.