• Title/Summary/Keyword: Delegation System

Search Result 78, Processing Time 0.022 seconds

Design and Implementation of Remote Procedure Call Resource Service System based on the XML Considering the Request Delegation between the Servers (서버 간 요청 위임을 고려한 XML 기반 RPC 자원 서비스 시스템 설계 및 구현)

  • 김정희;곽호영
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.6
    • /
    • pp.1100-1110
    • /
    • 2003
  • Design and implementation of remote procedure cail (RPC) resource service system based on the XML considering the request delegation between the servers are described for the resource application and efficient processing of distributed environment. For this purpose, the request information about several server, which would be used by client, is encoded into XML document based on XML-DOM and transferred to server. Server classifies the client requests using objects which can deal with the XMLL-DOM. For the request delegation between the servers, server saves the request result of client in XMLL-DOM structure without replying it immediately, and makes the client request delegated to another server in XML-DOM's request information. In addition, the resource repository are managed for resource transparency of distributed environment. As a result, resource application and processing efficiency are improved by reduction of response time caused by integration of RPC and XML-RPC services and request delegation between the servers. Extension of asynchronous and average blocking time of client were reduced and information of resource which can be used by client was offered.

  • PDF

Candidate Selection Methods, Standing Committee and Structure of the Social Security Acts: Compare Korea and Germany (의회의원후보공천방식, 의회상임위원회제도 그리고 사회보장법 구조: 한국과 독일 비교)

  • Lee, Shinyong
    • 한국사회정책
    • /
    • v.20 no.3
    • /
    • pp.9-46
    • /
    • 2013
  • The degree of delegation related to the social security acts is involved in the candidate selection methods and the standing committee system. The social security acts with a small amount of delegation have an affinity with the bottom-up selection methods and the standing committee to guarantee long term in office. In Germany, the bottom-up selection method which guarantees the right of party members to nominate candidates and the standing committee to guarantee long term in office have an affinity with the Social Acts with less delegation. But the social security acts with a large number of delegation have an affinity with the top-down selection methods and the standing committee not to guarantee long term in office. In Korea, the top-down selection method in which the central headquarter of the party dominates the selection process, and the standing committee whose members are to be selected every two years have an affinity with the Social Security Acts with the excessive delegation.

Remote Healthcare Monitoring System Using Attribute based Encryption (속성기반 암호화를 이용한 원격 헬스케어 모니터링 시스템)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.63-70
    • /
    • 2012
  • To ensure privacy of individual information in remote healthcare service, health data should be protected through a secure technology such as encryption scheme. Only user who delegated decryption right can access to sensitive health data and delegator needs capability for revocating access privilege. Recently, in ubiquitous environment, CP-ABTD(Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes) which extends CP-ABE(Ciphertext-Policy Attribute-Based Encryption) has been proposed for these requirements. In this paper, we construct remote healthcare monitoring system with delegation and revocation capability for attribute in CP-ABTD. Finally, we analyze collusion attack between users in our system.

Design and Implementation of Permission Delegation in Role-Based Access Control Model (권한의 위임을 위한 역할-기반 접근 제어 모델의 설계 및 구현)

  • 나상엽
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.1-10
    • /
    • 2003
  • In the distributed-computing environment, applications or users have to share resources and communicate with each other in order to perform their jobs more efficiently. In this case, it is important to keep resources and information integrity from the unexpected use by the unauthorized user. Therefore, there is a steady increase in need for a reasonable way to authentication and access control of distributed-shared resources. In RBAC, there are role hierarchies in which a higher case role can perform permissions of a lower case role. No vise versa. Actually, however, it is necessary for a lower case role to perform a higher case role's permission, which is not allowed to a lower case role basically. In this paper, we will propose a permission delegation method, which is a permission delegation server, and a permission delegation protocols with the secret key system. As the result of a permission delegation, junior roles can perform senior role's permissions or senior role itself on the exceptional condition in a dedicated interval.

  • PDF

Incentive Structures in the Compensation for Public Expropriation (공공수용 보상에 관한 유인체계 분석)

  • Lee, Hojun
    • KDI Journal of Economic Policy
    • /
    • v.33 no.3
    • /
    • pp.121-161
    • /
    • 2011
  • We study incentive structures of public developers and land owners in the process of public expropriations using a sequential game model. In the model, we show that there is an incentive for the public developer to give more compensation than just compensation that are defined by law. Also the model shows that there is an incentive for the land owners to revolt strategically against the public expropriation. Then an ideal authority delegation model is introduced to resolve the problems, where an independent appraiser determines the compensation for the expropriation. In the real world, improving the independence of appraisal process is critical to make the system closer to the ideal authority delegation model. So this paper concludes by making a few policy suggestions to improve the current appraisal system.

  • PDF

Design and Implementation of eduroam Authentication-Delegation System (eduroam 사용자 대리인증 시스템의 설계 및 구현)

  • Lee, KyoungMin;Jo, Jinyong;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1730-1740
    • /
    • 2016
  • This paper introduces a guest identity provider system for eduroam which is a global Wi-Fi service targeting users enrolled in higher education and research institutions. Developed eduroam AND (AutheNtication Delegation) system enables users to create their eduroam user accounts and to access eduroam regardless of their locations. Users with no organizational eduroam account therefore can freely access eduroam using the system. A federated authentication model is implemented in the system, and thus the system has merits of having high accessibility, indirectly verifying users and organizations possible, saving management overhead. Status monitoring is essential because authentication request and response messages are routed by eduroam network. eduroam AND performs active monitoring to check service availability and visualizes the results, which increases operational and management efficiency. We leveraged open-source libraries to implement eduroam AND and run the system on KREONET (Korea REsearch Open NETwork). Lastly, we present implementation details and qualitively evaluate the system.

Design and Implementation of Admission Control System in Smart Space (스마트 공간을 위한 참여 제어 시스템의 설계 및 구현)

  • Yang Jong-Phil;Shim Mi-Sun;Shin Weon;Rhee Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.3
    • /
    • pp.342-352
    • /
    • 2006
  • Nowadays, Computing environment is changing to ubiquitous. In such ubiquitous computing environments, entities expect to access resources and services at any time from anywhere. Therefore, tile wily how to establish trust relationship among previously unknown devices or resources is needed under such environments. In this paper, we firstly review a model to delegate the trust to communicating entities in ubiquitous environment and its security problems(e.g., malicious right-delegation and revocation of right-delegation). Then, we design a new model for secure delegation over communication entities which is based on two-party signature scheme, and implement it.

  • PDF

Patient Information Transfer System Using OAuth 2.0 Delegation Token (OAuth 2.0 위임 Token을 이용한 환자정보 전달 시스템)

  • Park, Jungsoo;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1103-1113
    • /
    • 2020
  • Hospitals store and manage personal and health information through the electronic medical record (EMR). However, vulnerabilities and threats are increasing with the provision of various services for information sharing in hospitals. Therefore, in this paper, we propose a model to prevent personal information leakage due to the transmission of patient information in EMR. A method for granting permission to securely receive and transmit patient information from hospitals where patient medical records are stored is proposed using OAuth authorization tokens. A protocol was proposed to enable secure information delivery by applying and delivering the record access restrictions desired by the patient to the OAuth Token. OAuth Delegation Token can be delivered by writing the authority, scope, and time of destruction to view patient information.This prevents the illegal collection of patient information and prevents the leakage of personal information that may occur during the delivery process.

A Study on the Improvement for Problems of ICT-related laws system in Korea

  • Lee, Hie-Houn
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.7-12
    • /
    • 2019
  • Korea's laws regarding ICT must follow the Void for vagueness doctrine, the Principle of forbidden general delegation, the Principle of justification of system and the Principle of balancing test in the Constitution. The Act for the Promotion and Convergence and so on of Information and Communication in the Future should be improved as follows. It is desirable to improve the part where the principle of system justification of the Constitution is problematic in relation to existing laws. It is desirable to improve the ICT's policies on industry and convergence technologies so that they are well balanced between promotion and regulation of ICT's industries. It is desirable to improve the information service policy and legislative makeup relationship between various government agencies related to ICT. It is therefore desirable to improve the institutional complement to the post-regulatory framework for the protection of users of ICT in the future. It is desirable to create a device to replace the functions of the Information Service Budget Council in the special law of ICT.

The Effects of Job Characteristics and Empowerment on Job satisfaction of ERP System Users of Small/Medium Businesses (중소기업의 ERP시스템 사용자의 직무특성과 임파워먼트가 직무만족에 미치는 영향)

  • Kim, Dae-Sik;Yi, Seon-Gyu
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.119-128
    • /
    • 2017
  • This study analyzed the effects of job characteristics and empowerment on job satisfaction of ERP system users of small/medium manufacturing & service businesses. In the results of analysis, the detailed factors of job characteristics such as efficiency, authority delegation, and complexity were significant influence factors on ERP users' job satisfaction while the factors of empowerment such as task impact, self-determination, and task meaning had positive effects on users' job satisfaction. However, competence did not have positive effects on job satisfaction. The results of this study showed that most of the ERP system users of small/medium businesses were satisfied with their own jobs.