• Title/Summary/Keyword: Enhanced Security

Search Result 595, Processing Time 0.028 seconds

Enhanced Role-Based Access Control Administration Tool

  • Yenmunkong, Burin;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1360-1364
    • /
    • 2004
  • This paper propose an extended model for role-permission assignment based on locations called "Enhanced Role-Based Access Control (ERBAC03)". The proposed model is built upon the well-known RBAC model. Assigning permissions to role is considered too complex activity to accomplish directly. Instead we advocate breaking down this process into a number of steps. The concept of jobs and tasks is specifically introduced to facilitate role-permission assignment into a series of smaller steps. This model is suitable for any large organization that has many branches. Each branch consists of many users who work in difference roles. An administration tool has been developed to assist administrators with the administration of separation of duty requirements. It demonstrates how the specification of static requirements can be done based on "conflicting entities" paradigm. Static separation of duty requirements must be enforced in the administration environment. Finally, we illustrate how the ERBAC03 prototype is used to administer the separation of duty requirements.

  • PDF

An Efficient Soft Handoff Scheme Using Enhanced Resource Resonation Technique in Wireless MIPv6 Networks

  • Park, Tae-Hyun;Park, Ho-Ryong;Chun, Sang-Hun;Kwak, Kyung-Sup
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.571-574
    • /
    • 2002
  • In a recent wireless network environments, dynamic host configuration protocol (BHCP) service is used to assign IP addresses to mobile terminals. In IPv6 networks, it is necessary to introduce the concept of handoff to support a seamless service to mobile terminals. In a general soft handoff technique used by code-division multiple acces (CDMA) communication systems, the powers received to base station are simply compared to determine which base station will handle the signal to and from each mobile termins. However, in IPv6 network, to transmit data-oriented services, it is necessary to support an enhanced soft handoff technique with more security and quality of service. In this paper, we propose a scheme to reduce a signaling process of handoff in IPv6 network. Also, we propose a technique to reduce wasted reservation resources and to guarantee quality of service (QoS) using DHCP.

  • PDF

Analysis of Randomness Characteristics of Hardware Noise Generator (하드웨어 잡음발생기의 랜덤 특성 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.263-267
    • /
    • 2011
  • This paper analyzed randomness characteristics of output data in generator based on hardware noise source. Also it is enhanced security randomness in the output stream of generator, which is applied on Laplacian filter. First it reviews criteria of randomness verification of output stream of hardware noise generator, and presents the enhanced results of output stream of generator, which is applied on Laplacian filter.

Machine to Machine Commerce(M2M Commerce) in the New Era of Network Convergence

  • Gauba, Mike
    • Information and Communications Magazine
    • /
    • v.20 no.11
    • /
    • pp.1550-1559
    • /
    • 2003
  • The convergence of fixed and wireless networks in data communication is providing the necessary driver for M2M commerce to take-off. The opportunities provided by M2M Commerce areonly limited by imagination. Automotive Fleet and Freight, Tolling, Water and Power Metering, Supply Chain Management including Asset Management, Remote Monitoring and Diagnostics, Energy Management and Access Control and Security are among the many M2M applications that are currently getting rolled out. ARC Group expects the worldwide solutions market to be worth in excess of US$ 100 billion by 2007. In addition, operator revenues worldwide from the transport of Telematics data alone will rise from US$ 3.5 billion in 2002 to US$ 78 billion by 2007. This paper discusses some of the lifestyle and business opportunities provided by M2M Commerce in the new ear of network convergence. It also provides some case studies to demonstrate the benefits of M2M Commerce across the supply chain. The key focus of the paper is on achieving enhanced lifestyle, cost reduction, improved profitability and enhanced customer relationship management through M2M Commerce.

Numerical simulation and experimental study of quasi-periodic large-scale vortex structures in rod bundle lattices

  • Yi Liao;Songyang Ma;Hongguang Xiao;Wenzhen Chen;Kehan Ouyang;Zehua Guo;Lele Song
    • Nuclear Engineering and Technology
    • /
    • v.56 no.2
    • /
    • pp.410-418
    • /
    • 2024
  • Study of flow behavior within rod bundles has been an active topic. Surface modification technologies are important parts of the design of the fourth generation reactor, which can increase the strength of the secondary flow within the rod bundle lattices. Quasi-periodic large-scale vortex structure (QLVS) is introduced by arranging micro ribs on the surface of rod bundles, which enhanced the scale of the secondary flow between the rod bundle lattices. Using computational fluid dynamics (CFD) and water experiments, the flow field distribution and drag coefficient of the rod-bundle lattices are studied. The secondary flow between the micro-ribbed rod-bundle lattice is significantly enhanced compared to the standard rod-bundle lattice. The numerical simulation results agree well with the experimental results.

Voltage Stability Prediction on Power System Network via Enhanced Hybrid Particle Swarm Artificial Neural Network

  • Lim, Zi-Jie;Mustafa, Mohd Wazir;Jamian, Jasrul Jamani
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.877-887
    • /
    • 2015
  • Rapid development of cities with constant increasing load and deregulation in electricity market had forced the transmission lines to operate near their threshold capacity and can easily lead to voltage instability and caused system breakdown. To prevent such catastrophe from happening, accurate readings of voltage stability condition is required so that preventive equipment and operators can execute security procedures to restore system condition to normal. This paper introduced Enhanced Hybrid Particle Swarm Optimization algorithm to estimate the voltage stability condition which utilized Fast Voltage Stability Index (FVSI) to indicate how far or close is the power system network to the collapse point when the reactive load in the system increases because reactive load gives the highest impact to the stability of the system as it varies. Particle Swarm Optimization (PSO) had been combined with the ANN to form the Enhanced Hybrid PSO-ANN (EHPSO-ANN) algorithm that worked accurately as a prediction algorithm. The proposed algorithm reduced serious local minima convergence of ANN but also maintaining the fast convergence speed of PSO. The results show that the hybrid algorithm has greater prediction accuracy than those comparing algorithms. High generalization ability was found in the proposed algorithm.

Enhanced Defence Architecture Through Combining Honeypot and Neural IDS (Honeypot과 신경망 IDS를 연동한 진보된 보안 아키텍쳐 설계)

  • 조성환;문종섭
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.161-165
    • /
    • 2002
  • 최근 증가하고 있는 인터넷 및 기타 네트워크 시스템에 대한 위협은 그 공격의 목적과 기법, 피해의 종류가 늘어남에 따라 효과적인 대응책으로 단순한 기술적 접근 이외에 법률 및 심리, 사회 공학적 접근의 결합적인 대처방안이 강구되어야 할 것이다. 이를 효과적으로 보조할 수 있는 시스템이 Honeypot이다. 하지만 Honeypot 자체는 공격의 위협을 그 즉시 막는데는 별다른 능력이 없기 때문에 Honeypot 시스템의 의도대로 공격자가 속지 않거나 Honeypot의 정보가 다른 보안 도구와 보안 정책 갱신에 이용되기 이전의 공격에 대해서는 취약점을 가지고 있다. 이에 따라 본 논문에서는 기존의 Honeypot이 설치된 시스템의 효과적 활용을 위해 신경망 이론에 기반한 침입 탐지 모듈을 연동하며 이를 통해 초기 공격에 대한 Honeypot 시스템 보호, Honeypot 시스템이 활성화 된 다음의 상호 연동 효과 및 향후 과제 등을 기술한다. 또한 이에 대한 보다 확실한 접근을 위해 Honeypot 시스템을 통해 DDoS를 방어하도록 제안되었던 시스템의 취약점과 이를 효과적으로 해결할 수 있는 방법을 제안한다.

  • PDF

Trends in Data Privacy Protection Technologies with Enhanced Utilization (활용성 강화 데이터 프라이버시 보호 기술 동향)

  • Kim, J.Y.;Jho, N.S.;Chang, K.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.88-96
    • /
    • 2020
  • As the usability and value of personal information increase, the importance of privacy protection has increased. In Korea, the scope of the use of pseudonymized personal information has increased because of revisions to the law. In the past, security technologies were used to safely store and manage personal information, but now, security technologies focused on usability are needed to safely use personal information. In this paper, we look at issues related to the de-identification and re-identification of personal information. Moreover, we examine the standards and techniques related to the de-identification of personal information.

Performance Analysis of WPA(Wi-Fi Protected Access Technology) in Wired and Wireless Network (유무선 네트워크 상에서 WPA 성능 분석)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.281-284
    • /
    • 2005
  • WPA is a security service that greatly increases data protection and access control on WLANs. WPA uses TKIP that is secure algorithm of 802.11i and 802.1X/EAP authentication. It provides enhanced secure ability with the dynamic security key to correct WEP's weaknesses. In this paper, we obtain measured data transmission time that by how to create secure key of WPA in the wired and wireless network. The result shows that the delay of data transmission time was not long even if used WPA.

  • PDF

Enhanced Reversible data hiding scheme

  • Sachnev, V.;Kim, Dong-Hoi;Kim, Hyoung-Joong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.127-133
    • /
    • 2007
  • We propose new reversible watermarking method for images. Being reversibility, original image and watermarked message should be recovered exactly. We propose different technique for hiding data to pairs. We use new type of histogram (pair histogram), which shows frequencies of each pair in image. We use histogram shift method for data embedding to pairs. We also propose improved version of method which allow hiding data with good performance for high capacities. This algorithm has better result compare to Tian's difference expansion method based on the Haar wavelet decomposition. For proposed algorithm capacity is higher under same PSNR.

  • PDF