• Title/Summary/Keyword: Internet access

Search Result 2,612, Processing Time 0.034 seconds

Trend and Improvement for Privacy Protection of Future Internet (미래 인터넷 기술의 Privacy 보호 기술 동향 및 개선)

  • Kim, DaeYoub
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.405-413
    • /
    • 2016
  • To solve various problems of the Internet as well as to enhance network performance, various future Internet architectures utilize cached data in network nodes or in proxy servers. Named-data networking (NDN), one of future Internet architectures, implements in-network data caching functionality, and then responds itself to request messages. However, it can cause users' privacy invasion that the publisher of data can not engage in the sharing/using process of the data anymore after the data was cached in-network. So NDN implements both encryption-based access control and group access control. But, since such access control schemes need to exchange additional messages in order to search for a proper access control list and keys, it causes inefficiency. This paper surveys the access control schemes of NDN, and then proposes an improved scheme.

WiFi Access User Authentication in Broadband Wireless Access Network (광대역 무선 엑세스 망에서 WiFi 액세스 사용자 인증)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.28 no.B
    • /
    • pp.33-37
    • /
    • 2008
  • Recently, there have been intensive researches on the wireless Internet access through WiFi WLAN using WiRro network as backhaul link in the Internet service providing business area. However, in the wireless Internet access method, we need to solve the compatibility problem for different user authentications between licensed WiBro network and unlicensed WiFi network for billing and user management. In this paper, we propose an authentication method for WiFi users by BWAN operators through WiNNERs which is RS connecting the two networks, and discuss the effectiveness of the method.

  • PDF

D-channel Packet Access Line Capacity Analysis of the AO/DI Internet Service (AO/DI 인터넷 서비스의 D채널 패킷 액세스 회선 용량 분석)

  • Lee, Kang-Won;Kook, Kwang-Ho;Jeong, kwang-Jae;Kim, Tae-Il
    • IE interfaces
    • /
    • v.13 no.4
    • /
    • pp.709-716
    • /
    • 2000
  • In this paper, We analyze a capacity dimensioning and performance of the access line to the X.25 packet network when the AO/DI internet service is connected via D-channel. We show the forecasting methodology of the traffic demand of the D-channel internet services when the TDX-1OA switching system accommodates the target number of subscriber. Based on the traffic demand forecast, the required capacity of the access line is suggested to prevent bottleneck problem in the access line to the X.25 packet network.

  • PDF

Deployment of Standard Subdivisions Topics in Directory Classification Scheme (디렉토리 분류체계의 표준구분 관련 항목 전개)

  • Kim, Sung-Won
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.3
    • /
    • pp.357-375
    • /
    • 2008
  • With the rapid distribution and active usage of the Internet, information search and retrieval through Internet has become a primary form of information access. This ubiquity of information access through Internet means the increased significance of search performance offered by Internet portals, since the optimization of search performance by portal has strong implication for the effective access of information through Internet in general. In this context, this paper investigates the classification scheme used in the directory service of internet portals, which provides selected and organized access to Internet information. First, the author analyzes the deployment of directory classification of standard subdivision topics used in traditional library classification system, with emphasis on the table composed of the form and approach, which are applicable to diverse subject areas. Then, based on this analysis, he proposed a method of applying certain subdivisions of the standard subdivision to directory service of Internet portals.

Access Control to Objects and their Description in the Future Network of Information

  • Renault, Eric;Ahmad, Ahmad;Abid, Mohamed
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.359-374
    • /
    • 2010
  • The Future Internet that includes Real World Objects and the Internet of Things together with the more classic web pages will move communications from a nodecentric organization to an information-centric network allowing new a paradigm to take place. The 4WARD project initiated some works on the Future Internet. One of them is the creation of a Network of Information designed to enable more powerful semantic searches. In this paper, we propose a security solution for a model of information based on a semantic description and search of objects. The proposed solution takes into account both the access and the management of both objects and their descriptions.

Design and Implementation of The Capability Token based Access Control System in the Internet of Things (IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현)

  • Lee, Bum-Ki;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.439-448
    • /
    • 2015
  • IoT (Internet of Things) propels current networked communities into a advanced hyper-connected society/world where uniquely identifiable embedded computing devices are associated with the existing internet infrastructure. Therefore, the IoT services go beyond mere M2M (Machine-to-Machine communications) and should be able to empower users with more flexible communication capabilities over protocols, domains, and applications. In addition, The access control in IoT need a differentiated methods from the traditional access control to increase a security and dependability. In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments. In the proposed system, Authorities are symbolized into concepts of the capability tokens, and the access control systems manage the tokens, creation, (re)delegation and revocation. The proposed system is expected to decrease the process time of access control by using capability tokens.

User Dissatisfaction on the High-Speed Internet Service Quality (초고속인터넷 서비스품질에 대한 이용자 불만도 조사연구)

  • 조성빈;유한주
    • Korean Management Science Review
    • /
    • v.19 no.2
    • /
    • pp.169-178
    • /
    • 2002
  • The growth of Internet usage even accelerated by the spread of high-speed Internet access network such as ADSI is affecting our socioeconomic activities and culture in a great way. Korea is recently reported to be the number one high-speed Internet network subscription per 100 people in the world. In a way to reflect this situation, we collect a moderate size of sample proportional to the population of each region across country and investigate what factors might explain the level of user's dissatisfaction with respect to Internet service they have been receiving. The results indicate that the set of gender, age, Internet usage, service kinds, incoming e-mails, and e-shopping is significantly influencing user's dissatisfaction, in that dissatisfaction is measured in 11 perspectives. In particular, user's age, gender, and e-shopping experiences are considered to be mostly explainable.

Factors Influencing Internet Addiction Proneness in Higher Grade Students at an Elementary School (초등학교 고학년 학생의 인터넷 중독정도에 영향을 미치는 요인)

  • Lee, Jung-Ae;Yoo, In-Young
    • Journal of Korean Public Health Nursing
    • /
    • v.26 no.3
    • /
    • pp.547-560
    • /
    • 2012
  • Purpose: The purpose of this study was to investigate factors influencing internet addiction proneness and condition of internet use in higher grade students at an elementary school. Method: The subjects consisted of 234 sixth grade students at an elementary school in Gyeonggido. SPSS/Win18.0 was used for analysis of data. Results: Among the subjects, 51.3% had used the internet for more than three years, 89.3% used the internet in their home, and 38.5% used the internet for games. In internet addition proneness, 3.1% were potential risk users and 1.3% were high risk users. Internet addiction proneness differed significantly according to gender, period of internet use, internet access location, and purpose of internet use. Internet addiction proneness showed negative correlation with protective factors and positive correlation with risk factors. The factors affecting the internet addiction proneness were degree of internet use, peer protective factor(support from peer), personal protective factor(self-control), internet access location, and family risk factor(negative communication). These factors accounted for 32.9% of internet addiction proneness. Conclusion: Strategies are needed for improvement of the relationship with the peer group and family communication and to encourage self-control for prevention of internet addiction in elementary school students in community mental health service.

Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing

  • Yin, Hongjian;Zhang, Leyou;Cui, Yilei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2768-2780
    • /
    • 2019
  • Ciphertext-policy attribute-based encryption (CP-ABE) is one of the practical technologies to share data over cloud since it can protect data confidentiality and support fine-grained access control on the encrypted data. However, most of the previous schemes only focus on data confidentiality without considering data receiver privacy preserving. Recently, Li et al.(in TIIS, 10(7), 2016.7) proposed a CP-ABE with hidden access policy and testing, where they declare their scheme achieves privacy preserving for the encryptor and decryptor, and also has high decryption efficiency. Unfortunately, in this paper, we show that their scheme fails to achieve hidden access policy at first. It means that any adversary can obtain access policy information by a simple decisional Diffie-Hellman test (DDH-test) attack. Then we give a method to overcome this shortcoming. Security and performance analyses show that the proposed scheme not only achieves the privacy protection for users, but also has higher efficiency than the original one.

An Efficient Packet Forwarding Method for Internet an IP-based Wireless Access Network (IP 기반 무선 인터넷 접속망에서의 효율적인 패킷 전달 방법)

  • 노병희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4B
    • /
    • pp.281-290
    • /
    • 2002
  • In this paper, we propose an efficient packet forwarding method for an IP-based wireless Internet access network. Packets are forwarded along with a flow, that is a kind of connection-oriented connection and established before delivering packets. For this purpose, we also propose a flow resolution method and a modified IPv6 header for delivering packet in the wireless Internet access network. In addition, the method to support the mobility of mobile stations is explained, and the implementation issues are discussed. In order to estimate the performance of the proposed method, we analyzed the delay time to deliver packets in the wireless Internet access network. The numerical results show that the proposed method is very efficient, in the view point of delay.