• Title/Summary/Keyword: Information access

Search Result 10,186, Processing Time 0.036 seconds

Access Control for D2D Systems in 5G Wireless Networks

  • Kim, Seog-Gyu;Kim, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.103-110
    • /
    • 2021
  • In this paper, we compare two access control mechanisms for D2D(Device-to-Device) systems in 5G wireless networks and propose an effective access control for 5G D2D networks. Currently, there is no specified access control for 5G D2D networks but there can be two access control approaches for 5G D2D networks. One is the UE-to-Network Relay based access control and the other is the Remote UE(User Equipment) based access control. The former is a UE-to-Network Relay carries out the access control check for 5G D2D networks but the latter is a Remote UE performs the access control check for 5G D2D networks. Through simulation and evaluation, we finally propose the Remote UE based access control for D2D systems in 5G wireless networks. The proposed approach minimizes signalling overhead between the UE-to-Network Relay and the Remote UE and more efficiently performs the access control check, when the access control functionalities are different from the UE-to-Network Relay in 5G D2D networks.

A Design of Mandatory Access Control Mechanism for Firewall Systems (침입차단시스템을 위한 강제적 접근통제 기법 설계)

  • Kim, Jae-Sung;Hong, Ki-Yoong;Kim, Hak-Beom;Sim, Joo-Geol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.967-974
    • /
    • 1998
  • Access control scheme of the firewall systems protects the systems from threats by using the conventional discretionary access control mechanism. The discretionary access control mechanism is insufficient to control secure information flow on the multievel network. Thus, it is necessary to provide the mandatory access control mechanism to the firewall systems for the multilevel security environment. In this paper, we present a design scheme of the security mechanisms concerning the sensitivity label and the mandatory access control for securely processing the multilevel information.

  • PDF

A Design of Role-Based Access Control Model (직무기반 접근제어 모델 설계)

  • Lee, Ho;Chung, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.1
    • /
    • pp.60-66
    • /
    • 2001
  • We designed a role-based access control model that can resolve the complicated tasks of control requirements. The designed access control model can control permissions efficiently use of a role-based access control. It guarantees the confidentiality integrity and availa information making use of identity-based and rule-based access controls. It can also centre information flow. Our access control model protects resources from unauthorized accesses b multi-level security policies such as role, security level, integrity level and ownership.

  • PDF

An Implementation Method of Improved Document DRM for Preventing Information Leakage using RBAC Approach (RBAC을 이용한 정보유출 방지를 위한 보안성이 강화된 문서 DRM 구현)

  • Choi, Young Hyun;Eom, Jung Ho;Chung, Tai Myoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.57-66
    • /
    • 2011
  • We implemented the document DRM applying role based access control(RBAC) mechanism for preventing the information leakage of a document which is transmitted in network environment. It must prevent to access document not related to user role and duty, and must allow operation to document for improving security, considering user role and security level according to a document importance. We improved the security of document DRM by adding to the access control module applying RBAC for satisfying security requirements. Though the user access document, our system allows operation authorizations to document by the user's role & security level and the security attribute of RBAC. Our system prevents indiscriminate access to the documents by user who is not associated with the role, and prevents damage the confidentiality and integrity.

Performance Analysis and Power Allocation for NOMA-assisted Cloud Radio Access Network

  • Xu, Fangcheng;Yu, Xiangbin;Xu, Weiye;Cai, Jiali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1174-1192
    • /
    • 2021
  • With the assistance of non-orthogonal multiple access (NOMA), the spectrum efficiency and the number of users in cloud radio access network (CRAN) can be greatly improved. In this paper, the system performance of NOMA-assisted CRAN is investigated. Specially, the outage probability (OP) and ergodic sum rate (ESR), are derived for performance evaluation of the system, respectively. Based on this, by minimizing the OP of the system, a suboptimal power allocation (PA) scheme with closed-form PA coefficients is proposed. Numerical simulations validate the accuracy of the theoretical results, where the derived OP has more accuracy than the existing one. Moreover, the developed PA scheme has superior performance over the conventional fixed PA scheme but has smaller performance loss than the optimal PA scheme using the exhaustive search method.

The COAPI Cats: The Current State of Open Access Repository Movement and Policy Documentations

  • Roy, Bijan K.;Biswas, Subal C.;Mukhopadhyay, Parthasarathi
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.6 no.1
    • /
    • pp.69-84
    • /
    • 2016
  • The paper investigates open access (OA) self archiving policies of different Open Access Repositories (OARs) of COAPI (Coalition of Open Access Policy Institutions) founder members as reported in June 2011 (i.e. a total of 22 members against a total of 46 COPAI members as reported by Open Biomed (http://openbiomed.info/2011/08/coapi-cats/). The paper consulted three databases (OpenDOAR, ROAR and ROARMAP) in order to evaluate twenty-two (22) COAPI-members OARs self archiving policy documentations and highlights of some progress on issues so far. After analyzing policy documentations, key findings have been highlighted and common practices have been suggested in line with global recommendations and best practice guidelines at national and international levels for strengthening national research systems. The paper has implications for administrators, funding agencies, policy makers and professional librarians in devising institute specific self archiving policies for their own organization.

Multi user interference cancellation in satellite to ground uplink system Based on improved WPIC algorithm

  • Qingyang, Guan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5497-5512
    • /
    • 2016
  • An improved optimal weights based on parallel interference cancellation algorithm has been proposed to cancel for interference induced by multi-user access satellite to ground uplink system. Due to differences in elevation relative motion between the user and the satellite, as well as access between users, resulting in multi-user access interference (Multi-user Access Interference, MUI), which significantly degrade system performance when multi-user access. By steepest gradient method, it obtained based on the MMSE criterion, parallel interference cancellation adjust optimal weights to obtain the maximum SINR. Compared to traditional parallel interference cancellation (Parallel Interference Cancellation, PIC) algorithm or serial interference cancellation ( Successive interference Cancellation, SIC), the accuracy of which is not high and too many complex iterations, we establish the multi-user access to the satellite to ground up link system to demonstrate that the improved WPIC algorithm could be provided with high accuracy and relatively low number of iterations.

An Access Control Security Architecture for Secure Operating System supporting Flexible Access Control (유연한 접근통제를 제공하는 보안 운영체제를 위한 접근통제 보안구조)

  • Kim Jung-Sun;Kim Min-Soo;No Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.55-70
    • /
    • 2006
  • In this paper, we propose a new access control security architecture for supporting flexibility in Secure Operating Systems. By adding virtual access control system layer to the proposed security architecture, various access control models such as MAC, DAC, and RBAC can be applied to Secure Operating Systems easily. The proposed security architecture is designed to overcome the problem of Linux system's base access control system. A policy manager can compose various security models flexibly and apply them to Operating Systems dynamically. Also, the proposed architecture is composed of 3 modules such as access control enforcement, access control decision, and security control. And access control models are abstracted to hierarchy structure by virtual access control system. And, we present the notation of policy conflict and its resolution method by applying various access control model.

Access Control as a Service for Information Protection in Semantic Web based Smart Environment

  • Siddiqui, Isma Farah;Lee, Scott Uk-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.9-16
    • /
    • 2016
  • Pervasive computing and Internet of Things (IoT) have recently received considerable interest to deploy solutions for the future Internet. Smart environments are integrated with Semantic Web to provide context-awareness to the processed information. Self-learning techniques have been adopted within smart solutions for efficient retrieval of data but do not process data with privacy parameters for in-place authorization. To overcome this issue, we present a novel approach of deploying access control as a service mechanism within Semantic Web based smart environment by using eXtensible Access Control Markup Language (XACML). The proposed XACML as a Service (XACMLaaS) approach offers fine-grained access control for protecting information within smart environment. In this paper, we have defined mathematical rules for each components of proposed access control service layer. These rules are for implementation of access control using XACML. The proposed approach allows the adaptation of authorization of information at component level and provides scalable solution for authorization policies and rule enforcement within smart environment.

Trends Analysis of Open Access for Foreign and Domestic Scholarly Journals in the Field of Library and Information Science (국내외 문헌정보학 학술지의 오픈 액세스 동향 분석)

  • Yoon, Hee-Yoon;Kim, Sin-Young
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.1
    • /
    • pp.257-276
    • /
    • 2007
  • The major concern of scholarly communication system that consists of libraries, researchers, and publishers is scholarly journals. But there is a huge chasm between the groups that have their own respects and strategies, compensations, and rights about scholarly journals. This difference makes open access movement which has two strategies: Open Access Journal(OAJ) and Open Access Archives (OAA). This paper describes the current status and analyses serious limitations of OAJ and OAA, especially, including the present address in the field of library and information science.

  • PDF