• Title/Summary/Keyword: Internet access

Search Result 2,614, Processing Time 0.023 seconds

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.

Throughput Analysis in Vehicular Wi-Fi Networks (Wi-Fi 기반 차량 네트워크에서의 인터넷 처리율 분석)

  • Kim, Won-Jung;Kim, Young-Hyun;Youn, Joo-Sang;Pack, Sang-Heon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.1
    • /
    • pp.45-50
    • /
    • 2011
  • Due to advances in wireless communications and portable terminals, any-time, any-where, and any-device Internet access is possible. In particular, Internet access in moving vehicles is an emerging and challenging issue. Even though a variety studies have been conduced for vehicular networks, little attention is paid to vehicular Wi-Fi networks where a Wi-Fi access point (AP) is installed at the vehicle and the AP is connected to an external base station (BS). In this paper, we conduct a measurement study on the uplink and downlink throughput for Internet access in vehicular Wi-Fi networks. We consider diverse network environments: high-speed train, car, and subway. Measurement results demonstrate that current Internet access in vehicular Wi-Fi networks are not satisfactory for interactive multimedia applications. Therefore, in-depth study on resource management in vehicular Wi-Fi networks is strongly required.

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

Implementation of HSDPA-to-WiFi Access Point -HSDPA CPE (HSDPA-to-WiFi Access Point 구현 -HSDPA CPE)

  • Park, Chun-Kwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.5
    • /
    • pp.167-172
    • /
    • 2010
  • This paper is to implement HSDPA-CPE that can provides WiFi terminal with wireless Internet service through the connection to HSDPA wireless network. This system aims to support HSDPA interface in upstream, and WiFi and 100Mbps Ethernet interface in downstream. So, this system can provide multiple Internet customers with wireless Internet service by using WiFi terminal in subway, car, ship, and so on, and WiFi terminals that be registered in HSDPA service can be connected to Internet.

Revenue Management Model for Internet Access Service (인터넷 접속서비스 사업의 수익관리모형에 관한 연구)

  • 윤문길;이필환
    • Korean Management Science Review
    • /
    • v.19 no.1
    • /
    • pp.143-162
    • /
    • 2002
  • The concept of revenue management have been used widely In the hotel and all transportation industries, and considered as a good system for managing a perishable asset. Recently, its' application area is being increasingly expanded to service industries such as the travel, the railway, the Internet and the sport industries. Internet business can be classified into several groups according to the characteristics of the individual business. One of groups is Internet Access Servoce business which connects each users to the internet. In this paper, since internet Access Services (IAS) business has a similar property to the service Industry, we will apply a revenue management concept to It. With some modification of existing model developed by Subramanian et.al. for airlines, we suggest the revenue management model being applied to IAS business. Computational experiment shows that the Increase of the revenue Is up to 7% by appluing our model. It means our model has a potential to manage IAS business effectively.

A Study on the Measurement of Service Quality in High-Speed Internet Access Service: Scale Development and Effect Analysis (초고속인터넷서비스 서비스 품질 측정에 관한 연구: 척도개발 및 효과분석)

  • 조호현;홍성태
    • Journal of Korean Society for Quality Management
    • /
    • v.30 no.2
    • /
    • pp.160-180
    • /
    • 2002
  • This is an exploratory research to examine the high-speed Internet access service's quality There are relatively scanty studies on telecommunication service quality such as the high-speed Internet access service. It has long been considered that service qualify are composed of process quality and outcome quality. Conducting an empirical research, we proposed that traditional outcome quality should be segmented with technical quality and outcome quality. Outcome quality is related to meeting consumer's needs to seek terminal value. In this paper, we explore to diagnose the well-known SERVQUAL's applicability to telecommunication industry and suggest some strategic and practical implications.

A Medium Access Control Protocol for Stable Internet Services on IS-2000 Network (IS-2000망에서 안정적 인터넷 서비스를 위한 매체접근제어 프로토콜)

  • 조성현;박성한
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.193-196
    • /
    • 2000
  • A new medium access control protocol is proposed to support stable wireless Internet services. Using the characteristics of the uplink Internet traffic and a Voice-Packet multi-session mode, the proposed protocol transmits the uplink Internet traffic via the voice traffic channel of silent duration in a multi-session mode. Out simulation results show that the proposed protocol guarantees stable wireless Internet services under heavy loads.

  • PDF

Design of Intrusion Detection System Using the Circuit Patrol to protect against information leakage through Mobile access (모바일 접근에 의한 정보 누출을 막기 위한 Circuit Patrol 침입탐지 시스템 설계)

  • 장덕성
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.46-52
    • /
    • 2002
  • Trend of wire internet has been transferred to wireless internet gradually due to the spread of mobile phone which made Possible Mobility and portability which wire internet could not afford. Not only front line of business part can access business information but also people can use government information for their daily life without limit of place. The frequent report of larceny and misuse of information has been issued to social sector that the need for IDS considering wire wireless internet. In this paper to design IDS to protect information first, searched wire internet intrusion type, intrusion detection method, and wireless intrusion type. In this paper, first, separate abnormal access at the point of system landing and detect intrusion attack with disguise through mobile wireless internet. Due to the intruder can access system normally with disguise, Circuit Patrol model has been suggested to monitor from intrusion attack.

  • PDF

Design and Implementation of User authentication and Roaming Schemes in public WLAN environments (WLAN 서비스에서 사용자 인증과 로밍방식의 설계)

  • Kim, Dong-Ok;Kang, Dong-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.208-210
    • /
    • 2009
  • Currently, Wireless LAN(WLAN) service is widely deployed to provide high speed wireless Internet access through the mobile stations such as notebook and PDA. To provide enhanced security and user access control in the public WLAN area, WLAN access points should have the capability of IEEE 802.1x-based user authentication and authorization functionality. In this paper, we provide a brief understanding of IEEE 802.1x standards and related protocols like EAPOL(Extended Authentication Protocol Over LAN), EAP, RADIUS and describe how the IEEE 802.1x is designed and implemented in our embedded linux-based WLAN AP which is named i-WiNG. (Intelligent Wireless Internet Gateway). For the network security and user authenti -cation purposes, a supplicant who wants to access Internet should be authorized to access the AP port using the EAPOL.

  • PDF

Resource management service model implemented for the Internet of Things services access control (사물인터넷 서비스 접근제어를 위한 리소스 서비스 관리 모델 구현)

  • Kim, Jin-Bo;Kim, Mi-Sun;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.9-16
    • /
    • 2016
  • Many countless services form using the Internet technology of things, in order to provide a variety of services in the current also many institutions, have created a new technology and protocols. In this paper, we design the resource service model for the efficient service provided by the system for controlling access to the Internet services of the things, to implement. The resources of the service that the user tries to access modeled using LCRS (Left Child-Right Sibling) tree, by utilizing the service token resource, it is possible to perform access control to services.