• Title/Summary/Keyword: Property based Access Control

Search Result 37, Processing Time 0.028 seconds

Permission Inheritance Expression with Role Hierarchy of RBAC (역할기반 접근통제에서 역할 계층에 따른 접근권한 상속의 표현)

  • Lee, Sang-Ha;Jo, In-Jun;Cheon, Eun-Hong;Kim, Dong-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2125-2134
    • /
    • 2000
  • RBAC(Role Based Access Control) has the advantage that reflects the real world because it presents a basic access control model based on user's role in organizations or governments. But in RBAC model, the privileges of the senior roles in these hierarchies are inherited from those of the junior roles, so RBAC model has the privileges problem that he senior are given more privileges than they need. That is, it tends to infringe the Principle of Least Privilege. On the other hand, if we give some excessive constraints on the RBAC model without scrupulous care, it may be meaningless property of role hierarchies. Furthermore, such complicated constraints make it more difficult to mange resources and roles in huge enterprise environments. The purpose of this paper is to solve the problems of role hierarchies such as inefficient role managements and abuse of privileges by using newly presented the backward tag pointer path expression in the inheritance of privileges.

  • PDF

Two Attribute-based Broadcast Encryption Algorithms based on the Binary Tree (이진트리 기반의 속성기반 암호전송 알고리즘)

  • Lee, Moon Sik;Kim, HongTae;Hong, Jeoung Dae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.358-363
    • /
    • 2014
  • In this paper, we present two constructions of the attribute-based broadcast encryption(ABBE) algorithm. Attribute-based encryption(ABE) algorithm enables an access control mechanism over encrypted data by specifying access policies among private keys and ciphertexts. ABBE algorithm can be used to construct ABE algorithm with revocation mechanism. Revocation has a useful property that revocation can be done without affecting any non-revoked uers. The main difference between our algorithm and the classical ones derived from the complete subtree paradigm which is apt for military hierarchy. Our algorithm improve the efficiency from the previously best ABBE algorithm, in particular, our algorithm allows one to select or revoke users by sending ciphertext of constant size with respect to the number of attributes and by storing logarithm secret key size of the number of users. Therefore, our algorithm can be an option to applications where computation cost is a top priority and can be applied to military technologies in the near future.

Access Control Protocol for Privacy Guarantee of Patient in Emergency Environment (응급 상황에서 환자의 프라이버시를 보장하는 속성기반 접근 제어 프로토콜)

  • Jeong, Yoon-Su;Han, Kun-Hee;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.279-284
    • /
    • 2014
  • Recently, m-health care is be a problem that the patient's information is easily exposed to third parties in case of emergency situation. This paper propose an attribute-based access control protocol to minimize the exposure to patient privacy using patient information in the emergency environment. Proposed protocol, the patient's sensitive information to a third party do not expose sensitive information to the patient's personal health information, including hospital staff and patients on a random number to generate cryptographic keys to sign hash. In addition, patient information from a third party that is in order to prevent the illegal exploitation of the patient and the hospital staff to maintain synchronization between to prevent the leakage of personal health information.

A Comparison of the Multipath Error Property In Wireless Location of CDMA and OFDM (CDMA 및 OFDM 기반 무선측위의 다중경로오차 특성 비교분석)

  • Bang Hye-Jung;Lee Jang-Gyu;Jee Gyu-In;Kim Jin-Won;Jung Hee;Hyun Moon-Pil
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.10
    • /
    • pp.989-995
    • /
    • 2006
  • This paper shows that the OFDM(Orthogonal Frequency Division Multiplex) system is robust to multipath than CDMA (Code Division Multiple Access) system and it has a strong possibility to be utilized as a supplementing wireless location system for the forthcoming portable internet network. The OFDM system based on IEEE 802.16e is a wireless TDD (Time Division Duplex) OFDMA (Orthogonal Frequency Division Multiple Access) system providing portable internet services in 2.3 GHz frequency band and is scheduled in service in Korea starting in 2006. In this paper, multipath error is calculated using a two-ray model and compared with that of a CDMA system which is following IS-95. The OFDM system shows a maximum multipath error of 3 m while a CDMA system shows a maximum multipath error of 61 m. For this simulation, an early-late technique is used. This technique is usually used to match synchronization of signal in DLL(Delay Lock Loop).

Distributed Medium Access Control for N-Screen Multicast Services in Home Networks

  • Hur, Kyeong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.3
    • /
    • pp.567-572
    • /
    • 2016
  • N-screen is an emerging technology to support multimedia multicasting, content sharing and content mobility. N-screen service providers should obtain the technology that provides the highest quality content seamlessly. Distributed nature of WiMedia distributed-MAC protocol can provide full mobility support, and achieves seamless medium access method in contrast to IEEE 802.15.3. So, in this paper, WiMedia distributed-MAC protocol is adopted and an asynchronous multicast transmission (AMT) technology is proposed to enhance performance of seamless N-screen wireless service based on distributed-MAC. The ACK frame transmissions are not required for multicast transmissions. By using this property in AMT, if a device is a multicast receiver, its reserved time slots can be reserved by the other devices with 1-hop distance. Furthermore, each N-screen device broadcasts and shares the information including an order in asynchronous traffic reservations to reduce conflicts in determining the transmission order of asynchronous N-screen packets. Therefore, AMT scheme expands the number of time slots available and throughputs for multicast and asynchronous traffic reservations when comparing with the distributed-MAC standard system. N-screen communications based on distributed-MAC with the proposed AMT shows a new framework for realizing N-screen wireless service with the full content mobility.

A Secure Attribute-based Authentication Scheme for Cloud Computing (클라우드 컴퓨팅을 위한 안전한 속성기반 인증 기법)

  • Moon, Jongho;Choi, Younsung;Won, Dongho
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.345-350
    • /
    • 2016
  • Cloud computing services have different characteristics from the traditional computing environment such as resource sharing, virtualization, etc. These characteristics of cloud computing environment necessitate specific properties such as user identify, access control, security control property, etc. Recently, Yoo proposed an attribute-based authentication scheme for secure cloud computing. However, Yoo's authentication scheme is vulnerable to customer attack and an adversary can modify the authentication request message. In this paper, we propose a secure and efficient attribute-based authentication scheme for cloud computing based on Yoo's scheme.

The Practical Effectiveness of the Intellectual Property Legislation of the R&D National Projects (디지털환경에서의 지식재산권 관련 R&D사업 규정의 실용성 분석)

  • Yoo, Sa-Rah
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.16 no.1
    • /
    • pp.269-283
    • /
    • 2005
  • Research and Development projects sponsored by the government are one of the main production sectors of academic and research information in domestic area. The access control and information service of R&D outcomes should be considered as a critical factor of nation-wide knowledge-based IS management. This study focused on the practical utilities of three IPR legislations of the government projects and analyzed if they are good enough to support the information service in recent digital network environment. Some suggestions in different perspectives were provided for the improvement of the existed IPR legislation.

  • PDF

Design and Implementation of Dynamic Digital Rights Management System Based on Agent (에이전트 기반의 동적 디지털저작권관리 시스템 설계 및 구현)

  • Lee, Yong-Hyo;Hwang, Dae-Jun
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.613-622
    • /
    • 2001
  • As logistic environment of digital resources is rapidly changing, protection of the intellectual property for digital resources has been recognized as one of important issues. Digital Rights Management (DRM) has taken much interests from ISP, authors and publishers of digital content as an integrated approach to create a reliable environment for access and the use of digital resource. In this paper we proposed a dynamic digital rights management system based on adaptive agent theory (ARPA : Adaptive Resource Protection Agent) to address problems facing contemporary DRM approaches : static rights management problem solving and strengthened monitoring/tracking system. We introduced a dynamic mission control scheme to realize dynamic digital rights management. We incorporated adaptive agent theory to implement on-and off-line tracking and protection. Through the implementation of protype system, the process, the process dynamic digital rights protection will be demonstrated.

  • PDF

Time Constant Control Method for Hopfield Neural Network based Multiuser Detector of Multi-Rate CDMA system (시정수 제어 기법이 적용된 Multi-Rate CDMA 시스템을 위한 Hopfield 신경망 기반 다중 사용자 검출기)

  • 김홍열;장병관;전재춘;황인관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6A
    • /
    • pp.379-385
    • /
    • 2003
  • In this paper, we propose a time constant control method for sieving local minimum problem of the multiuser detector using Hopfield neural network for synchronous multi-rate code division multiple access(CDMA) system in selective fading environments and its performance is compared with that of the parallel interference cancellation(PIC). We also assume that short scrambling codes of 256 chip length are used an uplink, suggest a simple correlation estimation algorithm and circuit complexity reduction method by using cyclostationarity property of short scrambling code.It is verified that multiuser detector using Hopfield neural network more efficiently cancels multiple access interference(MAI) and obtain better bit error rate and near-far resistant than conventional detector.

Design of the Integrated Fire Automation System(IFAS) on based P-Type Fire Control Panel (P형 수신기 기반 통합화재 자동 시스템의 설계)

  • Kim, Hyun-Ju;Park, Jae-Heung;Seo, Yeong-Geon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.133-142
    • /
    • 2010
  • P-type fire control panel, currently in use, has a big hazard that can cause the large scaled human death tolls and property damage in the massive fire because it is difficult to identify in real time the location of fire outbreak and whether search-device are broken down or not. In this paper, I suggest that the integrated fire automation system on based p-type fire control panel should be used, which can detect in real time the signal that occur when whether search-device are broken down or not, and can detect the arisen circumstances information of p-type fire control panel on the fire signal in the far away. The devised systems have designed and embodied the analysis of circumstances information and module that can analyze the circumstances information from the p-type fire control panel and the part of internet access installment which can gather and deliver the circumstances information from the fire prevention facility receiver.