• Title/Summary/Keyword: Information Access

Search Result 10,153, Processing Time 0.044 seconds

A Distributed Medium Access Control Protocol for Cognitive Radio Ad Hoc Networks

  • Joshi, Gyanendra Prasad;Kim, Sung Won;Kim, Changsu;Nam, Seung Yeob
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.331-343
    • /
    • 2015
  • We propose a distributed medium access control protocol for cognitive radio networks to opportunistically utilize multiple channels. Under the proposed protocol, cognitive radio nodes forecast and rank channel availability observing primary users' activities on the channels for a period of time by time series analyzing using smoothing models for seasonal data by Winters' method. The proposed approach protects primary users, mitigates channel access delay, and increases network performance. We analyze the optimal time to sense channels to avoid conflict with the primary users. We simulate and compare the proposed protocol with the existing protocol. The results show that the proposed approach utilizes channels more efficiently.

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.

The implementation of Access Control System using Biometric System (Biometric System(fingerprint Reader)을 이용한 Access Control System 구현에 관한 연구)

  • 김광환;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.439-442
    • /
    • 2003
  • In this paper, a system that implementation of Access Control System Using Biometric System. Biometrics is science which deals with verifying or recognizing using physiological or behavioral characteristic Access Control System uses Biometric system to make an access control system. Biometrics goes under the study of bio-recognition or bio-measurement. It is a technology or study that identifies individuals using one's Biometric character. Access control system is a system used to identify one's entrance and exit, personal management, and security. Access control system can be joined with Biometric system to produce easier use and more sufficient effects. Access control system using Wiegand (Data Format) signal output, can replace earlier RF Card systems and make an access control (security) system. It uses RS-232, Rs-422 or TCP/IP type communication with the computer so an embedded system can be controlled using the software.

  • PDF

The implementation of Access Control System using Biometric System (생체인식 시스템을 이용한 Access Control System 구현에 관한 연구)

  • 김광환;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.494-498
    • /
    • 2004
  • In this paper, a system that implementation of Access Control System Using Biometric System. Biometries is science which deals with verifying or recognizing using physiological or behavioral characteristic Access Control System uses Bionietric system to make an access control system. Biometrics goes under the study of bio-recognition or bio-measurement. It is a technology or study that identifies individuals using one's Biometric character. Access control system is a system used to identify one's entrance and exit, personal management, and security. Access control system can be joined with Biometric system to produce easier use and more sufficient effects. Access control system using Weigand (Data format) signal output, can replace earlier RF Card systems and make an access control (security) system. It uses RS-232, Rs-422 or TCP/IP type communication with the computer so an embedded system can be controlled using the software.

Problems on ownership and access in future librarty (미래도서관에서의 소장(ownership)과 접근(access)의 문제)

  • 양재한
    • Journal of Korean Library and Information Science Society
    • /
    • v.25
    • /
    • pp.19-50
    • /
    • 1996
  • The purpose of this paper is to study on ownership and access in future library. For this purpose, this is criticized about recognition regarding future library of Library and Information Science researchers in Korea. And, this is reviewed the present stages of collection development and a role of future books, future libraries and future librarians in Korea. The result of this study is known unrealistic reality analysis and forecast surrounding future library discourse and at the same time that following Western model is not fit for future library in Korea. This study is proposed resolving of problems to access based on physical collection in future library.

  • PDF

Digital Divide: Elementary school students in Taejon, Korea (디지털 격차 : 대전지역 초등학생을 중심으로)

  • 최종인;오광록;박현아
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2000.11a
    • /
    • pp.5-24
    • /
    • 2000
  • Access to computers and the internet and the ability to effectively use this technology are becoming increasingly important for full participation in Korea′s economic, education, and social life. In recent years, access to computers and internet has exploded. Unfortunately, there is strong evidence of "digital divide"-gap between those individual and communities that have access to these information technology and those who don′t. This research focus on the elementary school students in Taejon, Korea. We found that there is digital divide among children and also different result between access to information technology and use of contents to information technology.

  • PDF

Case Study of Usability Evaluation and Improvement Plan for Open Access Academic Publishing Support Interface (오픈액세스 학술출판 지원 인터페이스 사용성 평가 및 개선안 사례 연구)

  • Lee, Jeong-Mee;Hwang, Hyekyong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.4
    • /
    • pp.47-66
    • /
    • 2021
  • The goal of this study is to find ways to improve the open access publication support service platform through the usability evaluation of the publishing manager interface among the AccessON journal repository interfaces, which is an open access publication support service platform. Various documents and cases related to open access publishing and usability evaluation in order to answer three research questions: collection of user experience responses of interface, extraction of issues and improvement points, and analysis and derivation of suggestions for other open access publication support service platforms. Responses to the experience of using the publishing manager interface were collected through surveys and focus group interviews. Combining this, it was possible to present the results of the usability evaluation of the AccessON journal repository interface through various numerical information. The results of the usability evaluation made it possible to propose issues and improvements to the AccessON journal repository manager interface, and finally, it was possible to derive suggestions for the open access academic publishing support service platform to be developed later.

Implementation of BlueTooth LAN Access Profile Using PPP (PPP를 사용한 BlueTooth LAN접근 프로파일의 구현 방법)

  • 박우현;유인태
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.154-156
    • /
    • 2001
  • 본 논문에서는 현재 무선으로의 전환에서 중요한 기술인 BlueTooth를 사용한 LAN access point에 대하여 연구하여 다른 모든 무선으로의 대안들 보다 블루투스가 우월함을 소개한다. 이를 위하여 블루투스 프로토콜 전체 스택에 대해서 살펴보고 Axis의 Linux LAN Access Profile을 응용하여 Windows로의 이식을 고안하고 이에 필요한 함수들을 제안한다. 또한 Windows로의 이식에 있어서 필요한 기술인 NDIS를 살펴본다. 아울러 Profile을 응용한 LAN Access Profile을 구현한 LAN Access Point를 구현한 후, 결론에서 불루투스 차기버전으로의 이식 문제와 RTOS로의 이식을 고려해본다.

Design and Implementation of Applet for Multi-Users File Access based on Java Card (자바카드기반 다중 사용자 파일접근에 대한 애플릿 설계 및 구현)

  • Shin, Sang-Jun;Song, Young-Sang;Shin, In-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1201-1204
    • /
    • 2005
  • Whereas conveniences deriving from the development of information and telecommunication technology increase, information outflow and illegal data use are also rapidly on the rise. Consequently, many studies to prevent illegal information outflow are currently under way, and the use of Smart Card is in steep jump. Recently, Java Card is diffused fast as an alternative to complement the technical problems of the Smart Card. This paper designed and materialized the system for multi-users authentication and file access control by user through designing a Java Card applet that is used for information protection and in various application fields. For allowing a file access competence, each user's file access competence is processed via drawing up the access condition table in the applet. Therefore, illegal correction, exposure and destruction of information, which become the concerns when multi-users have an access, can be prevented. In addition, its application becomes possible in the system requiring multi-users certifications.

  • PDF

Implementation of Role Based Access Control Model for U-healthcare (유비쿼터스 헬스케어를 위한 역할 기반 접근제어 모델의 구현)

  • Lee, You-Ri;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.6
    • /
    • pp.1256-1264
    • /
    • 2009
  • When unapproved users access to healthcare system and use medical information for other malicious purposes, it could severely threaten important information related to patients' life, because in ubiquitous environment healthcare service makes patient's various examination results, medical records or most information of a patient into data. Therefore, to solve these problems, we design RBAC(Role Based Access Control) for U-healthcare that can access control with location, time and context-awareness information like status information of user and protect patient's privacy. With implementation of the proposed model, we verify effectiveness of the access control model for healthcare in ubiquitous environment.