• Title/Summary/Keyword: Inter integrity

Search Result 48, Processing Time 0.051 seconds

The Model of Conflict Detection between Permission Assignment Constraints in Role-Based Access Control (RBAC 에서 권한 할당 제약사항들 간의 충돌 탐지 모델)

  • Im Hyun-Soo;Cho Eun-Ae;Moon Chang-Joo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.51-55
    • /
    • 2005
  • Assuring integrity of permission assignment (PA) constraints is a difficult task in role-based access control (RBAC) because of the large number of constraints, users, roles and permissions in a large enterprise environment. We provide solutions for this problem using the conflict concept. This paper introduces the conflict model in order to understand the conflicts easily and to detect conflicts effectively. The conflict model is classified as a permission-permission model and a role-permission model. This paper defines two type conflicts using the conflict model. The first type is an inter-PA-constraints (IPAC) conflict that takes place between PA constraints. The other type is a PA-PAC conflict that takes place between a PA and a PA constraint (PAC) Also, the conditions of conflict occurrence are formally specified and proved. We can assure integrity on permission assignment by checking conflicts before PA and PA constraints are applied.

  • PDF

Inter-story pounding between multistory reinforced concrete structures

  • Karayannis, Chris G.;Favvata, Maria J.
    • Structural Engineering and Mechanics
    • /
    • v.20 no.5
    • /
    • pp.505-526
    • /
    • 2005
  • The influence of the inter-story structural pounding on the seismic behaviour of adjacent multistory reinforced concrete structures with unequal total heights and different story heights is investigated. Although inter-story pounding is a common case in practice, it has not been studied before in the literature as far as the authors are aware. Fifty two pounding cases, each one for two different seismic excitations, are examined. From the results it can be deduced that: (i) The most important issue in the inter-story pounding is the local effect on the external column of the tall building that suffers the impact from the upper floor slab of the adjacent shorter structure. (ii) The ductility demands for this column are increased comparing with the ones without the pounding effect. In the cases that the two buildings are in contact these demands appear to be critical since they are higher than the available ductility values. In the cases that there is a small distance between the interacting buildings the ductility demands of this column are also higher than the ones of the same column without the pounding effect but they appear to be lower than the available ductility values. (iii) It has to be stressed that in all the examined cases the developed shear forces of this column exceeded the shear strength. Thus, it can be concluded that in inter-story pounding cases the column that suffers the impact is always in a critical condition due to shear action and, furthermore, in the cases that the two structures are in contact from the beginning this column appears to be critical due to high ductility demands as well. The consequences of the impact can be very severe for the integrity of the column and may be a primary cause for the initiation of the collapse of the structure. This means that special measures have to be taken in the design process first for the critically increased shear demands and secondly for the high ductility demands.

A Study on Metadata Ontology Design for Record Management Based on IPAM Model (IPAM 모형을 적용한 기록관리 메타데이터 온톨로지 설계)

  • Park, Heejin;Park, Oknam
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.15 no.4
    • /
    • pp.99-123
    • /
    • 2015
  • The study aims to present authenticity ontology required for capturing information about digital record's identity and integrity over the course of the lifecycle. To this end, we analyzed the functional requirements, domain model, and sample properties of the IPAM (InterPARES Authenticity Metadata), Based on IPAM, we proposed an ontology for authenticity of digital records with sample records. The suggested ontology modeling can be utilized as the basis for establishing an authenticity information creation and management tool for digital records.

Study on Development of Inter-acceptability Requirements of System Safety (시스템안전의 상호수용에 대한 요구사항 도출 연구)

  • Shin, Duc-Ko;Kim, Gon-Yop;Oh, Seh-Chan;Yoon, Yong-Ki
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.707-710
    • /
    • 2011
  • System safety is defined as the state where the hazard risks due to internal system, interface, operation and maintenance are controlled as acceptable levels. It is represented and evaluated either with the risk level of each risk factor with the consideration of operation environments or with Safety Integrity Level (SIL) which is the system functional safety without considering application environments. The assessment results are issued in forms of certificates and they are reused in many cases. However, the conditions and restrictions for different application environments vary in each case, therefore, additional evaluation on the preconditions of assessment in comparison with the actual application environment must be carried out. For the area of train control, TR 50506-1 has been established based on the IEC 62425 (international standard for safety of train control system by RSSB) and EN 50129 (Europe standard) for the further assessment. In this paper, the analysis on TR 5056-1 has been conducted in depth. The purpose of the study is to determine the requirements for inter-acceptability including scope, procedures, principles, examination and suitability. The results can be utilized for the system safety maintenance when new devices or components are introduced in conventional systems.

  • PDF

A Global Concurrency Control Algorithm based on Relaxed Control Criterion in distributed Multidatabase Systems (분산 다중 데이터베이스 시스템에서 완화된 제어 기준을 기반으로 한 전역 동시성 제어 알고리즘)

  • Sin, Dong-Cheon;Kim, Jin-Bae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.2889-2899
    • /
    • 1999
  • To maintain the traditional notion of global serializability in multidatabase systems has been recognized as one of difficult problems due to the autonomy of participating local database systems. In this paper, we propose a global concurrency control algorithm based on the relaxed concurrency control criterion in distributed MDBs, which can be applied to applications in which the database integration has no effect on the integrity constraints. In the proposed algorithm, the process to determine whether a global transaction can be executed or not consists of intra-validation phase and inter-validation phase.

  • PDF

Application of Web Service Technology to Project Evaluation Management (웹서비스 기술의 프로젝트 평가관리시스템에의 응용)

  • ;dhgust,d
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.27 no.1
    • /
    • pp.57-63
    • /
    • 2004
  • Evaluating a project is one of the key activities in managing projects, and thus it should be implemented as a part of the entire project management system. However, currently deployed systems suffer from deficiencies such as the lack of supporting distributed environment and integrity problems. Web service technology, which enables applications to work inter-operatively under a distributed computing environment, is said to solve such problems. In this paper, the web service technology is applied to evaluation management systems. The process of evaluation is designed based on the web service, data is modeled and a pilot system is implemented to test the feasibility of the technology to the domain of project evaluation.

The People Navigator : A New Collaboration Chatting Application (The People Navigator: 새로운 협동 Chatting 애플리케이션)

  • 유상진;장영택;윤성로
    • Korean Management Science Review
    • /
    • v.18 no.1
    • /
    • pp.79-88
    • /
    • 2001
  • We often feel the necessity to communicate with members involved in a project to remote discuss business activities, needs for the fast file transfer, and check the existence of members to talk with. There are some commercial applications in these problems. However, in addition to those existing functions, this study focuses especially on adding couple of functions such as automatic responding function, in which a sender of a message automatically knows if a receiver checks the message. Its application is that a project leader sends an important message and later on can check at his desk the fact that who have checked their messages. The prototype application, build in this study, will check the correctness of every sub-function, and then the interface of inter-sub-functions, finally the integrity of the entire system, so that important information will not be lost among members of a project in the real world situation.

  • PDF

Design of Expanded IVEF Protocol for Integrity (IVEF 무결성을 위한 확장된 IVEF 프로토콜 설계)

  • Kim, Juyoung;Lee, Byunggil;Chung, Byungho;Shin, Sang Uk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.708-709
    • /
    • 2015
  • 최근 선박의 연안 선박의 안전사고가 증가함에 따라 기존 항만 중심으로 운영되고 있던 해상교통관제센터의 관제 범위가 연안까지 확대되고 있다. 이에 따라 해상교통관제센타(Vessel Traffic Service Center, VTS) 간에 데이터 교환의 필요성도 증가하고 있다. 국제항로표지협회 IALA(International Association of Lighthouse Authorities, IALA)는 이러한 필요성을 인지하고 해상교통관제센터간 데이터 교환 프로토콜인 IVEF(Inter-VTS Exchange Format)를 제정하였다. 그러나 IVEF 프로토콜 특성상 외부 해상교통관제센터간 데이터가 전송됨으로 데이터 변조등의 위험성이 있다. 하지만 IVEF 프로토콜은 보안 관련 요소들이 미미한 실정이다. 본 논문에서는 IVEF 데이터의 무결성을 보장하는 방법을 제안한다.

Fusion of Blockchain-IoT network to improve supply chain traceability using Ethermint Smart chain: A Review

  • George, Geethu Mary;Jayashree, LS
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3694-3722
    • /
    • 2022
  • In today's globalized world, there is no transparency in exchanging data and information between producers and consumers. However, these tasks experience many challenges, such as administrative barriers, confidential data leakage, and extensive time delays. To overcome these challenges, we propose a decentralized, secured, and verified smart chain framework using Ethereum Smart Contract which employs Inter Planetary File Systems (IPFS) and MongoDB as storage systems to automate the process and exchange information into blocks using the Tendermint algorithm. The proposed work promotes complete traceability of the product, ensures data integrity and transparency in addition to providing security to their personal information using the Lelantos mode of shipping. The Tendermint algorithm helps to speed up the process of validating and authenticating the transaction quickly. More so in this time of pandemic, it is easier to meet the needs of customers through the Ethermint Smart Chain, which increases customer satisfaction, thus boosting their confidence. Moreover, Smart contracts help to exploit more international transaction services and provide an instant block time finality of around 5 sec using Ethermint. The paper concludes with a description of product storage and distribution adopting the Ethermint technique. The proposed system was executed based on the Ethereum-Tendermint Smart chain. Experiments were conducted on variable block sizes and the number of transactions. The experimental results indicate that the proposed system seems to perform better than existing blockchain-based systems. Two configuration files were used, the first one was to describe the storage part, including its topology. The second one was a modified file to include the test rounds that Caliper should execute, including the running time and the workload content. Our findings indicate this is a promising technology for food supply chain storage and distribution.

Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility

  • Li, Zhigang;Shi, Yan;Chen, Shanzhi;Zhao, Jingwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.872-885
    • /
    • 2015
  • The rapid increase of smart mobile devices and mobile applications has led to explosive growth of data traffic in cellular network. Offloading data traffic becomes one of the most urgent technical problems. Recent work has proposed to exploit opportunistic communications to offload cellular traffic for mobile data dissemination services, especially for accepting large delayed data. The basic idea is to deliver the data to only part of subscribers (called target-nodes) via the cellular network, and allow target-nodes to disseminate the data through opportunistic communications. Human mobility shows temporal and spatial characteristics and predictability, which can be used as effective guidance efficient opportunistic communication. Therefore, based on the regularity of human mobility we propose NodeRank algorithm which uses the encounter characteristics between nodes to choose target nodes. Different from the existing work which only using encounter frequency, NodeRank algorithm combined the contact time and inter-contact time meanwhile to ensure integrity and availability of message delivery. The simulation results based on real-world mobility traces show the performance advantages of NodeRank in offloading efficiency and network redundant copies.