• Title/Summary/Keyword: Permission System

검색결과 277건 처리시간 0.025초

하둡 분산 파일 시스템에서 그룹키 기반 Permission Management 시스템 설계 (A Design of Permission Management System Based on Group Key in Hadoop Distributed File System)

  • 김형주;강정호;유한나;전문석
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제4권4호
    • /
    • pp.141-146
    • /
    • 2015
  • 최근 스마트 기기 및 소셜 네트워크 서비스, 스트리밍 서비스 등 IT 기술의 발달로 인해 데이터가 급증하였다. 이러한 환경에 맞춰 대용량 데이터를 처리할 수 있는 기술도 함께 주목받고 있는데, 가장 대표적인 기술이 하둡이다. 하둡은 오픈 소스 기반으로 리눅스 기반의 범용 컴퓨터에서 실행할 수 있도록 설계되었다. 초기 하둡은 보안이 거의 도입되지 않았으나, 사용자가 늘어남에 따라 보안이 필요한 데이터가 증가하면서 2009년 커버로스와 토큰 시스템을 도입한 새로운 버전이 나왔다. 그러나 이 방식은 하나의 비밀키만을 사용하고, 사용자마다 블록에 대한 접근허가를 지정할 수 없다는 문제점과 재전송 공격 및 위장 공격 등이 가능하다는 취약점을 가지고 있다. 따라서 본 논문에서는 이러한 취약점을 보안하면서 성능을 유지하기 위해 사용자들을 논리적인 그룹으로 묶어서 인증하고, 이를 토큰에 반영하는 그룹키 기반의 프로토콜을 제안하였다. 성능평가 결과 키 생성에 따른 오버헤드가 없고, 비밀키 유출에 대한 취약점을 해결하였음을 확인하였다.

산지전용허가 의사결정지원시스템의 실제 운용가능성에 관한 연구 (A Study on the Applicability of Decision Support System for the Permission of Forest Land-Use Conversion)

  • 최상현;김은진;남주희;우종춘
    • Journal of Forest and Environmental Science
    • /
    • 제30권1호
    • /
    • pp.45-49
    • /
    • 2014
  • This study was tried to find out the applicability of decision support system for forest land use conversion, which developed based on algorithm for forest land-use conversion. Decision support system developed by Ministry of Safety Administration is free from the existing licensed laws omission. And it made the input requirements for each value of the final result so that you can determine whether the permit was available by the laws and regulations related to the algorithm for forest land use conversion. Also, in order to do field surveys, equal sampling interval method is used to extract samples for the operability by comparing and analyzing the actual area. As a result, 88 areas of total 100 areas are able to get permission by the decision support system for forest land use conversion, and it means if there is enough data with sufficient research, it can make the availability permits easily.

폐기물 소각시설 최적가용기법 (BAT) 기준서의 이해와 개선방향 (Understanding and Improvement of Best Available Techniques for Waste Incineration Facility)

  • 신수정;박재홍;박상아;이대균;김대곤
    • 한국대기환경학회지
    • /
    • 제33권6호
    • /
    • pp.533-543
    • /
    • 2017
  • As the public interest in environmental issues increased, the "Act On The Integrated Control Of Pollutant-Discharging Facility" was enacted. Through the integrated environmental pollution prevention act in which 19 industries with large environmental impacts are sequentially applied, pollutants can be managed in a medium-integrated manner and integrated permission of the business unit is possible and BAT can be applied to enable a scientific and proactive environmental management system. In order to facilitate the implementation of integrated environmental pollution prevention act with these advantages, the BAT BREF should be published, modified and revised every 5 years considering the level of scientific development. This study reviewed the issues to be considered in applying BAT and the types of BAT and focused on presenting improvements and development direction when revising and supplementing the standards in the future based on these contents. For this purpose, when revising the standards, it will be necessary to reflect on the domestic situation, to expand the TWG(Technical Working Group) of small-scale workplace experts, and to exchange opinions with business places that have similar processes for each waste type through a systematic total inspection. In addition to these methods, by establishing a resident participation system through information disclosure, it is expected to be used as a guideline for environmental management of business places not subject to integrated permission of less than 3 types as well as those subject to integrated permission.

자율주행 자동차 임시운행 허가를 위한 안전 성능 평가 시나리오 (An evaluation scenario of safety performance for extraordinary service permission of autonomous vehicle)

  • 정용환;이경수;최인성;민경찬
    • 자동차안전학회지
    • /
    • 제7권2호
    • /
    • pp.44-49
    • /
    • 2015
  • This paper presents an evaluation scenario of safety performance for extraordinary service permission of autonomous vehicle driving on a motorway. Based on advanced driver assistance system (ADAS) which is already mass-production, an autonomous vehicle driving on motorway is tested on the public roads and also getting close to mass-production. Before the autonomous vehicle tested, the safety of autonomous driving system should be evaluated based on a proper test scenario. Prior to develop the test scenario, this paper reviews the licensing standards for an autonomous vehicle in California and Nevada, and the international regulations of each ADAS. To develop the scenario, the driving conditions of motorway are categorized into five modes and fundamental evaluation requirements of elements of autonomous driving system are derived. An evaluation scenario, which represents the real driving conditions, has been developed to assess the safety of autonomous vehicle. This scenario has validated by computer simulation using model predictive control (MPC) based autonomous driving algorithm.

Enhanced Role-Based Access Control Administration Tool

  • Yenmunkong, Burin;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.1360-1364
    • /
    • 2004
  • This paper propose an extended model for role-permission assignment based on locations called "Enhanced Role-Based Access Control (ERBAC03)". The proposed model is built upon the well-known RBAC model. Assigning permissions to role is considered too complex activity to accomplish directly. Instead we advocate breaking down this process into a number of steps. The concept of jobs and tasks is specifically introduced to facilitate role-permission assignment into a series of smaller steps. This model is suitable for any large organization that has many branches. Each branch consists of many users who work in difference roles. An administration tool has been developed to assist administrators with the administration of separation of duty requirements. It demonstrates how the specification of static requirements can be done based on "conflicting entities" paradigm. Static separation of duty requirements must be enforced in the administration environment. Finally, we illustrate how the ERBAC03 prototype is used to administer the separation of duty requirements.

  • PDF

Terminal-Assisted Hybrid MAC Protocol for Differentiated QoS Guarantee in TDMA-Based Broadband Access Networks

  • Hong, Seung-Eun;Kang, Chung-Gu;Kwon, O-Hyung
    • ETRI Journal
    • /
    • 제28권3호
    • /
    • pp.311-319
    • /
    • 2006
  • This paper presents a terminal-assisted frame-based packet reservation multiple access (TAF-PRMA) protocol, which optimizes random access control between heterogeneous traffic aiming at more efficient voice/data integrated services in dynamic reservation TDMA-based broadband access networks. In order to achieve a differentiated quality-of-service (QoS) guarantee for individual service plus maximal system resource utilization, TAF-PRMA independently controls the random access parameters such as the lengths of the access regions dedicated to respective service traffic and the corresponding permission probabilities, on a frame-by-frame basis. In addition, we have adopted a terminal-assisted random access mechanism where the voice terminal readjusts a global permission probability from the central controller in order to handle the 'fair access' issue resulting from distributed queuing problems inherent in the access network. Our extensive simulation results indicate that TAF-PRMA achieves significant improvements in terms of voice capacity, delay, and fairness over most of the existing medium access control (MAC) schemes for integrated services.

  • PDF

Proxy based Access Privilige Management for Tracking of Moving Objects

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • 제10권2호
    • /
    • pp.225-232
    • /
    • 2022
  • When we drive a vehicle in an IoT environment, there is a problem in that information of car users is collected without permission. The security measures used in the existing wired network environment cannot solve the security problem of cars running in the Internet of Things environment. Information should only be shared with entities that have been given permission to use it. In this paper, we intend to propose a method to prevent the illegal use of vehicle information. The method we propose is to use attribute-based encryption and dynamic threshold encryption. Real-time processing technology and cooperative technology are required to implement our proposed method. That's why we use fog computing's proxy servers to build smart gateways in cars. Proxy servers can collect information in real time and then process large amounts of computation. The performance of our proposed algorithm and system was verified by simulating it using NS2.

네트워크상의 서비스 거부 공격 감시 시스템 설계 (The Implementation of monitoring system for the attack of network service denial)

  • 최민석;이종민;김용득
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 하계종합학술대회 논문집(5)
    • /
    • pp.43-46
    • /
    • 2002
  • This paper deals with a denial of service is about without permission knocking off service, for example through crashing the whole system. Another definition is that denial of service is seeing to that someone don't get what they paid for. The Network Denial of service Attack Detection System designed and implemented through suggested algorithm can detect attacking from the outside among denial of service attacks. It shown that designed system gives the system administrator the opportunity to detect denial of service attack.

  • PDF

리눅스 운영체제를 위한 보안 시스템 설계 (The Design for Security System of Linux Operating System)

  • 박진석;김순곤
    • 한국정보전자통신기술학회논문지
    • /
    • 제3권4호
    • /
    • pp.35-42
    • /
    • 2010
  • 본 논문은 기존 SELinux를 포함한 리눅스 보안 운영체제와 보안 모듈에 관한 선행 연구 분석을 통해 사용자 식별 인증, 주체 객체의 보안 권한 상속, 참조 모니터와 MAC 등급 처리, DB를 이용한 실시간 감사 추적이 적용된 리눅스 접근제어 보안 모듈을 다음과 같이 제안하였다. 첫째, 사용자 인증 시 접속 허용 IP를 판별하고 보안등급과 범주를 입력하게 하여 불법 침입자가 superuser(root) 권한을 획득하였다 하더라도 시스템 파괴가 불가능 하도록 설계 하였다. 둘째, 주체 및 객체의 보안 속성 상속을 통하여 주체가 보안이 설정된 객체에 접근할 때, 설정되어 있는 주체의 보안 정보와 객체에 설정되어 있는 보안 정보를 비교함으로써 접근 제어가 이루어지도록 하였다. 셋째, 커널상에서 현재 발생하는 모든 사건에 대해 참조모니터의 감사를 진행하며, 악의적인 목적으로 여러 객체에 접근하는 것을 사전에 차단하도록 하였다. 넷째, DB를 이용한 실시간 보안 감사 추적 시스템을 통해 각 행위와 관련된 보안 감사 자료는 보안 관리자에게 실시간으로 제공되기 때문에 긴급 상황이나 문제 발생 시 즉각 대처할 수 있도록 설계하였다.

  • PDF

IPTV 서비스를 위한 수신 제한 키 관리 시스템 설계 (The Design of Key Management Module for IPTV Service)

  • 황경민;김창수;김서균;김철원;박기철;정회경
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 춘계종합학술대회 A
    • /
    • pp.544-547
    • /
    • 2008
  • 영상압축 기술의 발달로 시작된 멀티미디어 시장의 성장은 방송 환경이 아닌 IP 네트워크 환경으로까지 영역이 확대되고 있다. 이는 IPTV 서비스라는 형태로 나타나고 있으며 기존의 방송환경이 아닌 IP 환경에서 방송, 통신, 전화의 트리플 서비스(Triple Service)를 제공한다. 현재 IPTV 서비스에 사용되는 IPTV 셋탑박스(Settop Box)는 수신 제한 기능에 고정된 키를 사용하고 있어 관리와 운용에 자원이 낭비되는 측면이 있다. 이는 MPEG-21의 REL(Right Expression Language)과 XML 전자서명을 활용하여 유동적인 IPTV 셋탑박스 운용이 가능하다. 이에 본 논문에서는 MPEG-21 REL과 XML 전자서명을 사용하여 소비자의 수신 제한 권한이 관리 가능한 IPTV 서비스를 위한 수신 제한 키 관리 시스템을 설계하였다.

  • PDF