• Title/Summary/Keyword: Inside Access Model

Search Result 26, Processing Time 0.023 seconds

Implementation of Remote Management Service using Access Control on OSGi Computing Environment (OSGi 컴퓨팅 환경에서 접근 제어를 이용한 원격 관리 서비스 구현)

  • Choi, Kyu-Sang;Jung, Heoun-Mam;Lee, Se-Hoon;Beak, Yong-Tae
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.109-115
    • /
    • 2006
  • In this paper, we proposed service security model and remote management service on OSGi computing environment. The model is used to make access control decisions like permission-based security inside the java2 platform. In model, policies are defined using a flat text file and include bundles. It method granted flexibility and extendability of access control of bundles and services. Also, we proposed service architecture efficiently for remote management service.

  • PDF

Study on Zero Trust Architecture for File Security (데이터 보안을 위한 제로 트러스트 아키텍처에 대한 연구)

  • Han, Sung-Hwa;Han, Joo-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.443-444
    • /
    • 2021
  • Security threats to information services are increasingly being developed, and the frequency and damage caused by security threats are also increasing. In particular, security threats occurring inside the organization are increasing significantly, and the size of the damage is also large. A zero trust model has been proposed as a way to improve such a security environment. In the zero trust model, a subject who has access to information resources is regarded as a malicious attacker. Subjects can access information resources after verification through identification and authentication processes. However, the initially proposed zero trust model basically focuses on the network and does not consider the security environment for systems or data. In this study, we proposed a zero trust-based access control mechanism that extends the existing zero trust model to the file system. As a result of the study, it was confirmed that the proposed file access control mechanism can be applied to implement the zero trust model.

  • PDF

헬스케어시스템을 위한 역할 기반의 신뢰협상 모델

  • Jo, Hyeon-Suk;Lee, Hyeong
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2007.05a
    • /
    • pp.84-102
    • /
    • 2007
  • Security is crucial for the successful deployment of large distributed systems. Many of these systems provide services to people across different administrative domains. The traditional identity-based access control mechanisms are un scalable and difficult to manage. Unlike the closed systems, open systems provide services to people from different security domains. Healthcare systems need to be highly available in order for the patients to get a timely treatment. The health care information should be available to authorized users both inside the administrative domain and outside the domain, such as pharmacies and insurance companies. In this paper, we first analyzed the necessities and advantages of importing attribute-based trust-management models into open distributed systems. Then we reviewed traditional access-control models and presented the basic elements of the new trust-management model.

  • PDF

Investigation and Testing of Location Systems Using WiFi in Indoor Environments

  • Retscher, Guenther;Mok, Esmond
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.83-88
    • /
    • 2006
  • Many applications in the area of location-based services and personal navigation require nowadays the location determination of a user not only in outdoor environment but also indoor. To locate a person or object in a building, systems that use either infrared, ultrasonic or radio signals, and visible light for optical tracking have been developed. The use of WiFi for location determination has the advantage that no transmitters or receivers have to be installed in the building like in the case of infrared and ultrasonic based location systems. WiFi positioning technology adopts IEEE802.11x standard, by observing the radio signals from access points installed inside a building. These access points can be found nowadays in our daily environment, e.g. in many office buildings, public spaces and in urban areas. The principle of operation of location determination using WiFi signals is based on the measurement of the signal strengths to the surrounding available access points at a mobile terminal (e.g. PDA, notebook PC). An estimate of the location of the terminal is then obtained on the basis of these measurements and a signal propagation model inside the building. The signal propagation model can be obtained using simulations or with prior calibration measurements at known locations in an offline phase. The most common location determination approach is based on signal propagation patterns, namely WiFi fingerprinting. In this paper the underlying technology is briefly reviewed followed by an investigation of two WiFi positioning systems. Testing of the system is performed in two localization test beds, one at the Vienna University of Technology and the second at the Hong Kong Polytechnic University. First test showed that the trajectory of a moving user could be obtained with a standard deviation of about ${\pm}$ 3 m.

  • PDF

Developing Virtual Tour Content for the Inside and Outside of a Building using Drones and Matterport

  • Tchomdji, Luther Oberlin Kwekam;Park, Soo-jin;Kim, Rihwan
    • International Journal of Contents
    • /
    • v.18 no.3
    • /
    • pp.74-84
    • /
    • 2022
  • The global impact of the Covid-19 pandemic on education has resulted in the near-complete closure of schools, early childhood education and care (ECEC) facilities, universities, and colleges. To help the educational system with social distancing during this pandemic, in this paper the creation of a simple 3D virtual tour will be of a great contribution. This web cyber tour will be program with JavaScript programming language. The development of this web cyber tour is to help the students and staffs to have access to the university infrastructure at a faraway distance during this difficult moment of the pandemic. The drone and matterport are the two devices used in the realization of this website tour. As a result, Users will be able to view a 3D model of the university building (drone) as well as a real-time tour of its inside (matterport) before uploading the model for real-time display by the help of this website tour. Since the users can enjoy the 3D model of the university infrastructure with all angles at a far distance through the website, it will solve the problem of Covid-19 infection in the university. It will also provide students who cannot be present on-site, with detailed information about the campus.

A Study on the Agenda Setting Process of Teacher's Certification System in China (중국 교사자격제도의 의제설정 과정 분석)

  • Li, Yu-Yan;Jang, Seon-Hee;Chung, Jae-Young
    • Korean Journal of Comparative Education
    • /
    • v.28 no.4
    • /
    • pp.249-272
    • /
    • 2018
  • The purpose of this study is to analyze which group led the process of agenda setting of teacher's certification system in China from 1978 to 2018 using the Cobb & Elder's theoretical model. The period of about 40 years from 1978 to 2018 is divided into the introduction period of teacher's certification period (1978~1992), transition period (1993~1998), and stabilization stage (1999~2018). The agenda setting process was analyzed. As a result, the group that led the process of agenda setting of the Chinese teacher's certification system varied according to the period. The introduction period of teacher's certification system was analyzed as 'Inside Access Model' led by policy makers and government, and the transition period was confirmed as 'Mobilization Model' led by Chinese government and Ministry of Education. The stabilization period was analyzed as 'Outside Initiative Model' led by various groups such as mass media, researchers, and government. It was found that the process of agenda setting of teacher's certification system had been changing toward democratization according to the degree of development of Chinese society, and the quality control of teacher certifications had been strengthened.

A WTLSW Protocol and a Proxy Model to Ensure End-to-End Security for Mobile Devices with Limited Resources (제한된 자원의 무선 단말기를 위한 종단간 보안을 제공하는 WTLSW 프로토콜 및 프록시 모델)

  • Lee, Heon-Guil
    • Journal of Industrial Technology
    • /
    • v.29 no.B
    • /
    • pp.33-39
    • /
    • 2009
  • The need for end-to-end security has been increased with the widespread use of mobile devices in wireless internet access applications such as mobile commerce. The WAP1.x has an end-to-end security problem that the message transmitted between the mobile device and the Web server is decrypted inside the gateway within a short time. To overcome this problem, several protocols including WAP2.0 has been proposed. These protocols require that the heavy modules such as TLS or data compression modules should be installed on the mobile device with limited resources. This paper proposes a new WTLSW(WTLS-TLS at Web server) protocol and a new WAP2.0 proxy model in order to ensure end-to-end security between the mobile device and the Web server and to be appropriate for mobile devices with limited resources.

  • PDF

Application of Quality Cost Model ln Quality Improvement Area (품질개선분야에서의 품질코스트모델의 적용)

  • Chung, Young-Bae;Kim, Yon-Soo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.3
    • /
    • pp.71-78
    • /
    • 2011
  • This parer proposes application of quality costing system in quality improvement area. Cost of quality in quality improvement area provides a valuable of both providing the need for improvement and giving a starting point for project. WQCMS(Web-based Q-Cost Management System) have ability to collect and analyze quality data generated from various different departments in the inside or outside of the enterprise without any limitations, if end-users are able to access wide area network. It provides the capability to integrate quality information from database and to generate various easy analysis reports to management's needs using built-in analysis tool modules with real-time. Web-based quality cost management system to measure the performance of quality improvement activities in the business firms. This paper proposes standard model for quality cost process in quality improvement area.

A computational framework for drop time assessment of a control element assembly under fuel assembly deformations with fluid-structure interaction and frictional contact

  • Dae-Guen Lim;Gil-Yong Lee;Nam-Gyu Park;Yong-Hwa Park
    • Nuclear Engineering and Technology
    • /
    • v.56 no.8
    • /
    • pp.3450-3462
    • /
    • 2024
  • This paper presents a computational framework for drop time assessment of a control element assembly (CEA) under fuel assembly (FA) deformations. The proposed framework consists of three key components: 1) finite element modeling of CEA, 2) fluid-structure interaction to compute drag force, and 3) modeling of frictional contact between CEA and FA. Specially, to accommodate the large motion of CEA, beam elements based on absolute nodal coordinate formulation (ANCF) are adopted. The continuity equation is utilized to calculate the drag force, considering flow changes in the cross-sectional area during the CEA drop. Lastly, beam-inside-beam frictional contact model is employed to capture practical contact conditions between CEA and FA. The proposed framework is validated through experiments under two scenarios: free falls of CEA within FA, encompassing undeformed and deformed scenarios. The experimental validation of the framework demonstrated that the drop time of CEA can be accurately predicted under the complex coupling effects of fluid and frictional contact. The drop times of the S-shaped deformation case is longer than those of the C-shaped deformation case, affirming the time delay due to frictional force. The validation confirms the potential applicability to access the safety and reliability of nuclear power plants under extreme conditions.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.