• Title/Summary/Keyword: Role Based Access Control

Search Result 272, Processing Time 0.023 seconds

Design of the ERBAC for Role Delegations (역할 위임을 위한 ERBAC 설계)

  • Oh, Sug-Kyun;Kim, Seong-Ryeol
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1155-1160
    • /
    • 2003
  • This paper applies RBAC policy for solving on the security problems when it will be operated several business on the distributed environments and designed Extended RBAC (ERBAC) model that it is possible to manage security systems on the distributed environments. The designed ERBAC model is based on RBAC96 model due to Sandu et al and added role delegations. Therefor, the designed ERBAC model have the advantage of the following . it can be processed of business without interrupts and implemented server system without modifying its source code, high migration, easy and simple of secure managing.

Role Hierarchy Access Control Model Using Permission Inheritance (접근권한의 상속성을 이용한 역할계층 접근통제 모델)

  • Yang Seong-Hoon;Oh Jung-Hyun;Lee Kyoung Hyo;Im Do-Yoen;Oh Byeong-Kyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.94-96
    • /
    • 2005
  • 기존의 역할기반 접근통제(RBAC: Role Based Access Control) 모델은 역할(R), 사용자(U), 접근권한 할당(A), 접근권한의 상속성의 관계에 의해 접근통제를 실행할 때. 하위역할에 할당된 사용자의 모든 접근권한은 상위역할에 할당된 사용자의 접근권한에 상속됨으로서 권한의 집중으로 인하여 최소권한 정책을 위배하고, 권한의 남용문제가 발생한다. 본 논문에서는 기존의 RBAC 모델에서 제기되는 문제를 해결하기 위하여 역할에 보안등급(허용등급, 허용범위)을 이용하여 접근권한의 상속성을 제한하고, 속(보안등급, 부분순서)의 이론을 적용하여 접근권한의 흐름을 통제할 수 있는 역할계층 접근통제 모델을 제안하였다. 제안한 모델은 역할의 특정영역을 지정함으로서 부분적인 역할계층을 구성할 수 있기 때문에 새로운 역할을 추가하거나 제거를 용이하게 할 수 있고, 역할의 계층구조를 간편하게 갱신할 수 있게 항으로서 다단계 보안시스템에서도 효과적으로 접근통제를 할 수 있을 뿐 아니라 대규모 보안시스템으로 확장할 수 있는 장점을 갖는다.

  • PDF

The Mouse & Keyboard Control Application based on Smart Phone (스마트 폰 기반의 마우스와 키보드 제어 어플리케이션)

  • Lim, Yang Mi
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.396-403
    • /
    • 2017
  • In recent years, the use of touch screens has expanded, and devices such as remote controllers have been developed in various ways to control and access contents at long range. The wireless-based touch screen is used in classroom, seminar room, and remote video conversation in addition to the TV remote control. The purpose of the study is to design a smart phone-based intuitive interface that can perform the role of a wireless mouse and a wireless keyboard at range using Bluetooth and to develop an application that integrates functions of a mouse and a keyboard. Firstly, touch interaction model for controlling software such as PowerPoint by connecting to a general PC on a smart phone has been studied. The most simple touch operation interface is used to reproduce the function of existing devices and design more simply. The studies of the extension of interfaces with various functions are important, but development of optimized interfaces for users will become more important in the future. In this sense, this study is valuable.

Remote Resource Control System based on Web Environment (웹 환경을 기반으로 한 원격 자원제어 시스템)

  • Lee, Gi-Jun;Jeong, Guk-Yeong;Jeong, Chae-Yeong
    • The KIPS Transactions:PartA
    • /
    • v.8A no.2
    • /
    • pp.91-98
    • /
    • 2001
  • TCP/IP based remote system using internet presented the method to access and control all the types of resources connected to network system over time and space. In this paper, We studied a resource control method through a mutual communication of a system association composed of service user, provider, and manager of the network system for the web based remote control system. The service users require the resources, and its providers are a variety of devices and digital electronic products which can provide the services in a network system. The service manager who operates the whole system performs the role to interconnect its users with its providers. Through an experiment, an implemented system confirmed flexibility, stability, and extensibility of the method presented in this paper.

  • PDF

A Study on Group-Role Based Access Control System for the Integrated Access Control in Muti-Applicational Computing Environment (다중 응용 환경에서 통합 접근통제가 가능한 그룹-역할기반 접근통제 시스템에 관한 연구)

  • 권태형;남길현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.622-624
    • /
    • 2001
  • 역할기반 접근통제(RBAC)는 사용자의 역할에 기반을 둔 접근통제 방법으로 Ravi S. Sandhu가 제안한 기본 모델 이후로 다양한 모델들이 제안되어졌다. 하지만, 이 모델들은 다중 응용 환경에 적합한 통합접근통제 시스템 설계에 실제 적용하기 위해서는 보완되어야 할점이 많다. 본 논문에서는 이 모델들의 주요 구성요소를 근간으로 하여 그룹-역할기반접근통제 시스템을 제안하고자 한다. 제안된 시스템은 사용자와 역할지정에 그룹 계층을 사용하고, 조직내의 직위와 직능을 바탕으로 역할 계층을 만들며, 만들어진 역할 계층을 통한 허가의 상속을 허용한다. 또한, 시스템이 가진 접근통제 데이터베이스를 세가지 부분으로 나누어 관리하게 함으로써, 조직의 접근통제 정책의 투명성을 보장한다.

  • PDF

Improving the Reliability by Straight Channel of As2Se3-based Resistive Random Access Memory (As2Se3 기반 Resistive Random Access Memory의 채널 직선화를 통한 신뢰성 향상)

  • Nam, Ki-Hyun;Kim, Chung-Hyeok
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.29 no.6
    • /
    • pp.327-331
    • /
    • 2016
  • Resistive random access memory (ReRAM) of metallic conduction channel mechanism is based on the electrochemical control of metal in solid electrolyte thin film. Amorphous chalcogenide materials have the solid electrolyte characteristic and optical reactivity at the same time. The optical reactivity has been used to improve the memory switching characteristics of the amorphous $As_2Se_3$-based ReRAM. This study focuses on the formation of holographic lattices patterns in the amorphous $As_2Se_3$ thin film for straight conductive channel. The optical parameters of amorphous $As_2Se_3$ thin film which is a refractive index and extinction coefficient was taken by n&k thin film analyzer. He-Cd laser (wavelength: 325 nm) was selected based on these basic optical parameters. The straighten conduction channel was formed by holographic lithography method using He-Cd laser.$ Ag^+$ ions that photo-diffused periodically by holographic lithography method will be the role of straight channel patterns. The fabricated ReRAM operated more less voltage and indicated better reliability.

An Object-Oriented Analysis and Design Methodology for Secure Database Design -focused on Role Based Access Control- (안전한 데이터베이스 설계를 위한 객체지향 분석·설계 방법론 -역할기반 접근제어를 중심으로-)

  • Joo, Kyung-Soo;Woo, Jung-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.6
    • /
    • pp.63-70
    • /
    • 2013
  • In accordance with the advancement of IT, application systems with various and complex functions are being required. Such application systems are typically built based on database in order to manage data efficiently. But most object-oriented analysis design methodologies for developing web application systems have not been providing interconnections with the database. Since the requirements regarding the security issues increased, the importance of security has become emphasized. However, since the security is usually considered at the last step of development, it is difficult to apply the security during the whole process of system development, from the requirement analysis to implementation. Therefore, this paper suggests an object-oriented analysis and design methodology for secure database design from the requirement analysis to implementation. This object-oriented analysis and design methodology for secure database design offers correlations with database that most existing object-oriented analysis and design methodologies could not provide. It also uses UMLsec, the modeling language, to apply security into database design. In addition, in order to implement security, RBAC (Role Based Access Control) of relational database is used.

RBAC for multi-organizational Business Process Management (기업간 비즈니스 프로세스 관리에서의 접근 권한 통제)

  • Bae, Hye-Rim;Hur, Won-Chang
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.151-166
    • /
    • 2007
  • As the number of users who are involved in a business process increases, it becomes imperative to effectively control their privileges of accessing sensitive data and information which are usually easily obtained by BPM system. Traditional RBAC (Role-based Access Control) model was first introduced to provide a logical framework to prevent unauthorized users from obtaining confidential, but in more dynamic environment such as B2B and SCM process, it usually lacks in capability of addressing such issues as configurability, customizability, or scalability of user privileges. In this study, we have proposed a privilege-template based RBAC model that can address such issues effectively. We also provided a design of the RBAC model along with illustrative examples and pseudo codes that can be used for implementing a prototype system.

  • PDF

Design of Gateway for In-vehicle Sensor Network

  • Kim, Tae-Hwan;Lee, Seung-Il;Hong, Won-Kee
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.73-76
    • /
    • 2005
  • The advanced information and communication technology gives vehicles another role of the third digital space, merging a physical space with a virtual space in a ubiquitous society. In the ubiquitous environment, the vehicle becomes a sensor node, which has a computing and communication capability in the digital space of wired and wireless network. An intelligent vehicle information system with a remote control and diagnosis is one of the future vehicle systems that we can expect in the ubiquitous environment. However, for the intelligent vehicle system, many issues such as vehicle mobility, in-vehicle communication, service platform and network convergence should be resolved. In this paper, an in-vehicle gateway is presented for an intelligent vehicle information system to make an access to heterogeneous networks. It gives an access to the server systems on the internet via CDMA-based hierarchical module architecture. Some experiments was made to find out how long it takes to communicate between a vehicle's intelligent information system and an external server in the various environment. The results show that the average response time amounts to 776ms at fixec place, 707ms at rural area and 910ms at urban area.

  • PDF

Adaptive Cross-Layer Packet Scheduling Method for Multimedia Services in Wireless Personal Area Networks

  • Kim Sung-Won;Kim Byung-Seo
    • Journal of Communications and Networks
    • /
    • v.8 no.3
    • /
    • pp.297-305
    • /
    • 2006
  • High-rate wireless personal area network (HR-WPAN) has been standardized by the IEEE 802.15.3 task group (TG). To support multimedia services, the IEEE 802.15.3 TG adopts a time-slotted medium access control (MAC) protocol controlled by a central device. In the time division multiple access (TDMA)-based wireless packet networks, the packet scheduling algorithm plays a key role in quality of service (QoS) provisioning for multimedia services. In this paper, we propose an adaptive cross-layer packet scheduling method for the TDMA-based HR-WPAN. Physical channel conditions, MAC protocol, link layer status, random traffic arrival, and QoS requirement are taken into consideration by the proposed packet scheduling method. Performance evaluations are carried out through extensive simulations and significant performance enhancements are observed. Furthermore, the performance of the proposed scheme remains stable regardless of the variable system parameters such as the number of devices (DEVs) and delay bound.