• 제목/요약/키워드: Open Authorization

검색결과 20건 처리시간 0.023초

Open Authorization에서의 안전한 사용자 권한 인증 방법에 관한 연구 (Secure User Authority Authentication Method in the Open Authorization)

  • 채철주;이준환;조한진
    • 디지털융복합연구
    • /
    • 제12권8호
    • /
    • pp.289-294
    • /
    • 2014
  • 최근 다양한 웹 서비스와 어플리케이션들이 사용자에게 제공되고 있다. 이러한 서비스들은 인증된 사용자에 한해서 서비스를 제공하기 때문에 사용자는 매번 서비스 별로 인증을 수행해야 하는 불편함을 겪고 있다. 이러한 불편함을 해결하기 위해 3rd Party 어플리케이션이 웹 서비스에 대하여 제한된 접근 권한을 얻을 수 있게 해주는 OAuth(Open Authorization) 프로토콜이 등장하게 되었다. 이러한 OAuth 프로토콜은 사용자에게 편리하고 유연한 서비스를 제공하지만 권한 획득에 대한 보안 취약점을 가지고 있다. 그러므로 본 논문에서는 OAuth 2.0 프로토콜에서 발생할 수 있는 보안 취약점을 분석하고 이러한 보안 취약점을 보완한 방안을 제시한다.

iBeacon을 이용한 AP 자동접속 방안 (An Automatic AP Connections Scheme using iBeacon)

  • 남춘성;신동렬
    • 인터넷정보학회논문지
    • /
    • 제18권2호
    • /
    • pp.1-11
    • /
    • 2017
  • 스마트 디바이스를 이용하여 특정 공간에서 미리 설정된 무선랜에 접속하는 방법은 개방형 방식과 사용자 인증 방식으로 나뉠 수 있다. 개방형 방식은 무선랜 접속을 위한 인증이 없이 접속하는 방법이다. 스마트 디바이스 사용자가 자신이 사용하려는 무선랜에 대한 정보를 SSID(Service Set IDentifier)를 통해 공공 무선랜 표기 형식에 따라 제공받아야 하지만, 모든 개방형 무선랜이 이러한 방식을 수동으로 입력하는 방식에는 무리가 있다. 반면에 사용자 인증 방식은 SSID와 PW(PassWord) 설정을 통해 사용자에게 무선랜 접속을 제공하는 방식이다. 따라서 SSID를 통해 공공 무선랜 표기 형식을 따를 수는 있지만, AP 접속을 위해서는 일일이 사용자가 수동으로 패스워드 입력을 통해 AP에 접속해야만 한다. 따라서 본 논문에서는 사용자 인증방식과 공공 무선랜 표기형식을 iBeacon 메시지 수신을 통해 자동적으로 AP에 접속할 수 있는 방안을 제안한다.

ENTERPRISE WIDE CENTRALIZED APPLICATION LEVEL ACCESS CONTROL USING XACML

  • Shaikh, Riaz A.;Rajput, Saeed;Zaidi, S.M.H.;Sharif, Kashif
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2005년도 e-Biz World Conference 2005
    • /
    • pp.62-67
    • /
    • 2005
  • In traditional approach, enterprise-wide consistent security policy enforcement for applications is very difficult task. Therefore, industry is now moving towards new unified enterprise application security concept that consist of centralized authentication and authorization mechanism. The eXtensible Access Control Markup Language (XACML); an XML-based standard defined by OASIS, is most suitable choice which can support centralized, role based, context aware access control mechanism. It is designed to provide universal standard for writing authorization policies and access control request/response language for managing access to the resources. This paper includes a brief overview on XACML and discusses its benefits, limitations and a data flow process. We propose a new generic access control architecture that supports enterprise wide centralized application level access control mechanism using XACML. The other benefits which can be achieved through this architecture are, reduce adnministration cost and complexity, support of heterogeneous computing platforms, centralized monitoring system, automatic fail over, scalability and availability, open standard based solution and secure communication.

  • PDF

OAuth 2.0 프로토콜에서 E-mail을 이용한 사용자 권한 인증 (The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access)

  • 채철주;최광남;최기석;예용희;신용주
    • 인터넷정보학회논문지
    • /
    • 제16권1호
    • /
    • pp.21-28
    • /
    • 2015
  • 최근 다양한 웹 서비스와 어플리케이션들이 사용자에게 제공되고 있다. 이러한 서비스들은 인증된 사용자에 한해서 서비스를 제공하기 때문에 사용자는 매번 서비스 별로 인증을 수행해야 하는 불편함을 겪고 있다. 이러한 불편함을 해결하기 위해 $3^{rd}$ Party 어플리케이션이 웹 서비스에 대하여 제한된 접근 권한을 얻을 수 있게 해주는 OAuth(Open Authorization) 프로토콜이 등장하게 되었다. 이러한 OAuth 프로토콜은 사용자에게 편리하고 유연한 서비스를 제공한다. 그러나 OAuth 2.0 프로토콜에서는 재전송 공격, 피싱 공격, 위장 공격 취약점이 발생할 수 있다. 그러므로 본 논문에서는 OAuth 2.0 프로토콜의 보안성 향상을 위하여 E-mail인증을 통해 Resource Owner를 인증 후 Access Token 발급을 할 수 있는 방법을 제안한다.

다중 채널 기반 오픈 API 보안 프로토콜에 관한 연구 (A Study on Open API Security Protocol based on Multi-Channel)

  • 김상근
    • 융합정보논문지
    • /
    • 제10권11호
    • /
    • pp.40-46
    • /
    • 2020
  • 금융권 공동 오픈 플랫폼 구축·서비스에 따라 스타트업 생태계에 안전한 보안 기술이 요구되고 있다. 금융권 표준 오픈 API는 상호인증 과정의 핵심 API 인증키 보호를 위해, 결제 관련 핀테크 기업이 추가 보안 기술을 개발/적용하는 것을 권고하고 있다. 본 연구는 다중 채널을 사용하는 강화된 API 보안 프로토콜을 제안한다. 기존 오픈 API 관련 연구의 문제점과 취약점을 추가 분석하고, 이기종 플랫폼의 호환성을 고려하여 설계되었다. 기존 보안 프로토콜의 단일 채널에 추가 보안 채널을 분리하여 은닉하는 방법을 적용했다. 성능 분석 결과 다중 채널의 통신 세션 양방향 안전성과 강화된 인증키의 중간자 공격 안전성을 확인하였으며, 다중 세션에서 지연시간의 연산 성능(1초 이하)을 확인하였다.

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제9권5호
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

가정전문간호사 교육프로그램 인정기준 및 표준 교육과정 개발 (The Development of Certificates Criteria and Curriculum in Home Healthcare Nurse Specialist Program)

  • 신경림;주수경;김혜영;김분한;양숙자
    • 대한간호학회지
    • /
    • 제33권3호
    • /
    • pp.395-404
    • /
    • 2003
  • Purpose: To make a contribution to raising the quality of nursing and home healthcare services through reviewing the present state of home healthcare nurse specialist training institutions and education programs and creating concrete measures to establish high-quality education courses. Method: International comparative study of accreditation criteria and curriculum in home healthcare nurse specialist program. Result: The Authorization Standards of home healthcare nurse training institutions consists of 8 items, 23 evaluation criteria and 72 evaluation indexes. Proposal to develop a specialist training program: Curriculum. Modify and complement a present homecare nurse education program. Curriculum I. Designate two forms of certification. The first certification has been granted the authority to serve as a manager and open a home healthcare agency to nurses having masters degrees and clinical experience for five years. The second certification is allowed to perform general home healthcare after having completed a short term training course. Currculum 2. To meet increasing demands, granting a certification to perform home healthcare to registered nurses having clinical experience of more than three years. Conclusion: These results can be utilized in the home healthcare educational program for raising the quality of nurses and home healthcare services.

Software Defined Networking and Network Function Virtualization for improved data privacy using the emergent blockchain in banking systems

  • ALRUWAILI, Anfal;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.111-118
    • /
    • 2021
  • Banking systems are sensitive to data privacy since users' data, if not well protected, may be used to perform fake transactions. Blockchains, public and private, are frequently used in such systems thanks to their efficiency and high security. Public blockchains fail to fully protect users' data, despite their power in the accuracy of the transactions. The private blockchain is better used to protect the privacy of the sensitive data. They are not open and they apply authorization to login into the blockchain. However, they have a lower security compared to public blockchain. We propose in this paper a hybrid public-private architecture that profits from network virtualization. The main novelty of this proposal is the use of network virtualization that helps to reduce the complexity and efficiency of the computations. Simulations have been conducted to evaluate the performance of the proposed solution. Findings prove the efficiency of the scheme in reducing complexity and enhancing data privacy by guarantee high security. The contribution conducted by this proposal is that the results are verified by the centralized controller that ensures a correct validation of the resulted blockchains. In addition, computation complexity is to be reduced by profiting from the cooperation performed by the virtual agents.

WTO 상소기구의 위기와 개혁방안에 대한 연구 (A Study on the Crises and Reforms of World Trade Organization Appellate Body )

  • 곽동철
    • 무역학회지
    • /
    • 제45권2호
    • /
    • pp.177-189
    • /
    • 2020
  • The dispute settlement mechanism of the World Trade Organization (WTO) is in great peril. The Appellate Body has ceased to function last December as the United States has blocked the appointment of new Appellate Body members since 2017. The focus of this study is on the examination of US's discontent on the Appellate Body and various efforts to reform the Appellate Body. In a recent report, the US Trade Representative raises its concerns on the Appellate Body including 90 days mandatory deadline, transitional rules for outgoing Appellate Body members, scope of appeal, advisory opinions, precedent, recommendation, and overreach without offering any viable solutions. Some of WTO members and experts proposed several Appellate Body reform measures but agreement between WTO members is unlikely in a foreseeable future. Alternative dispute settlement mechanisms should be seriously considered such as interim appeal arbitration arrangements, separate dispute settlement mechanisms for trade remedies, unilateral retaliatory measures without WTO authorization. Rules-based multilateral dispute settlement system is imperative to small open economies like Korea. The Korean government should actively participate in Appellate Body reform discussions with other WTO members to keep the WTO dispute settlement system from collapsing.

수재해 정보관리 및 서비스를 위한 공간, 비공간 정보 자료 개념 설계 (A Conceptual Design of Spatial and Non-spatial Information for Water Hazard Information Management and Service)

  • 이정주;김동영;정영훈;황의호;채효석
    • 한국농공학회논문집
    • /
    • 제58권2호
    • /
    • pp.21-29
    • /
    • 2016
  • This study conducted a basic design of system and interface which provide both of spatial and non-spatial data for water hazard information management. This helps to decide directions of the future integrated water hazard information platform and possible technical examinations of the web-based system for the realization of the prototype. For user friendly system, this study did a survey to investigate the data format, service environment, image processing level and visualization type that users prefer. Also, authorization range was set up by type of the user group. In the water hazard information platform, the data and analysis algorithm were classified by the fields. Furthermore, the platform was consisted with six block systems according to the function and the interface and designed to flexibly mount or modify the additional functions. For a basic design of the data exchange method and protocols, a prototype was constructed by using the spatial information web service technology. The portal service system to visualize and provide spatial data was designed by the WMS/WFS type of OGC standard interface and the FTP/HTTP interface type through open source GIS software for server environment.