• Title/Summary/Keyword: SSO

Search Result 140, Processing Time 0.037 seconds

Optimum design of steel space structures using social spider optimization algorithm with spider jump technique

  • Aydogdu, Ibrahim;Efe, Perihan;Yetkin, Metin;Akin, Alper
    • Structural Engineering and Mechanics
    • /
    • v.62 no.3
    • /
    • pp.259-272
    • /
    • 2017
  • In this study, recently developed swarm intelligence algorithm called Social Spider Optimization (SSO) approach and its enhanced version of SSO algorithm with spider jump techniques is used to develop a structural optimization technique for steel space structures. The improved version of SSO uses adaptive randomness probability in generating new solutions. The objective function of the design optimization problem is taken as the weight of a steel space structure. Constraints' functions are implemented from American Institute of Steel Construction-Load Resistance factor design (AISC-LRFD) and Ad Hoc Committee report and practice which cover strength, serviceability and geometric requirements. Three steel space structures are optimized using both standard SSO and SSO with spider jump (SSO_SJ) algorithms and the results are compared with those available in the literature in order to investigate the performance of the proposed algorithms.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

A Study on Single Sign-On Authentication Model using Multi Agent (멀티 에이전트를 이용한 Single Sign-On 인증 모델에 관한 연구)

  • 서대희;이임영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.997-1006
    • /
    • 2004
  • The rapid expansion of the Internet has provided users with a diverse range of services. Most Internet users create many different IDs and passwords to subscribe to various Internet services. Thus, the SSO system has been proposed to supplement vulnerable security that may arise from inefficient management system where administrators and users manage a number of ms. The SSO system can provide heightened efficiency and security to users and administrators. Recently commercialized SSO systems integrate a single agent with the broker authentication model. However, this hybrid authentication system cannot resolve problems such as those involving user pre-registration and anonymous users. It likewise cannot provide non-repudiation service between joining objects. Consequently, the hybrid system causes considerable security vulnerability. Since it cannot provide security service for the agent itself, the user's private information and SSO system may have significant security vulnerability. This paper proposed an authentication model that integrates a broker authentication model, out of various authentication models of the SSO system, with a multi-agent system. The proposed method adopts a secure multi-agent system that supplements the security vulnerability of an agent applied to the existing hybrid authentication system. The method proposes an SSO authentication model that satisfies various security requirements not provided by existing broker authentication models and hybrid authentication systems.

Single Sign-on에 적용 가능한 인증 모델에 관한 연구

  • 서대희;이임영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.311-314
    • /
    • 2002
  • 인터넷의 급속한 확산으로 인해 사용자들은 다양한 서비스 제공을 받고 있다. 그러나 사용자들 다양한 어플리케이션 서비스를 받기 위해서 각각 다른 ID와 비밀번호를 기억해야 하는 불편을 감수해야만한다. 이러한 비효율적이면서 보안적으로 많은 취약성을 가지고 있어 제안된 시스템이 SSO이다. SSO는 사용자와 관리자에게 효율성과 보안성을 동시에 높여 줄 수 있는 시스템이지만, 다양해져가는 인터넷 환경 속에서 여전히 문제점을 가지고 있다. 따라서 본 논문에서는 SSO에 적용 가능한 브로커 인증 모델을 제시함으로써 SSO를 실제 구성시 기존 모델이 가지고 있는 보안적인 취약성과 효율성을 높이고자 하였다.

  • PDF

Development of Java Message Service using IDL/SSO (IDL/SSO를 이용한 Java Message Service의 개발)

  • 정명희;문남두;안건태;김현규;이명준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.484-486
    • /
    • 2000
  • JMS(Java Message Service)는 분산된 엔터프라이즈 시스템간의 메시지 생성, 전달, 수신 및 읽기를 위한 자바 기반의 표준 API를 제공한다. 이 API의 구조는 메시징 방식에 따라 Topic을 메시지 서버로 하는 Pulish-Subcribe모델과 Queue를 서버로 기자는 Point-To-Point 모델로 구분된다. IDL/SSO는 병행성(Concurrency), 영속성(Persistency), 필터(filter)등의 기능을 제공하는 공유객체 명세언어 시스템이다. 본 논문에서는 이 IDL/SSO를 이용하여 JMS를 구현하는 방법에 대하여 기술한다.

  • PDF

Measurement of Remediation for Compromised User Account of Web Single Sign-On (SSO) (침해된 웹 SSO 계정 보호를 위한 보안 조치 실험 연구)

  • Nam, Ji-Hyun;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.941-950
    • /
    • 2021
  • Single Sign-On (SSO) service manages user's account passwords from multiple websites so that security in a high level is required. Users who use the SSO service are authenticated through the Identity Provider (IdP) when logging into the website. We present the security requirements that IdP can take in order to minimize the user's risk whose IdP account is compromised. We describe the security threats that arise when the security requirements are not satisfied. Through evaluation, we prove that the attacker's session cannot be canceled even if the user recognizes the attack if the IdP does not satisfy the security requirements.

Development of Spaghetti Sauce with Oyster (굴 스파게티 소스의 개발)

  • Kang, Kyung-Tae;Heu, Min-Soo;Kim, Jin-Soo
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.36 no.1
    • /
    • pp.93-99
    • /
    • 2007
  • The study was carried out to prepare spaghetti sauce with oyster (SSO) and the food components characteristics of the SSO were also compared to those of commercial spaghetti sauces (CSS). The optimal addition ratio of oyster for preparing SSO was 11% based on 100 g of SSO according to the results of organic acid content, Hunter color value, viscosity, and sensory evaluation. The reasonable $F_0$ value for the keeping storage of SSO was about 4 min. The proximate composition of SSO prepared under the optimal processing condition was 71.2% moisture, 2.8% protein, 6.9% crude lipid, and 3.2% crude ash. The results of sensory evaluation suggested that the quality of SSO was superior to that of CSS. However, there was no significant difference (p<0.05) in sensory evaluation on color between CSS and SSO. The total amino acid content (2,532.2 mg/100 g) of SSO was higher than that of CCS (2,305.7 mg/100 g). The contents of calcium and phosphorus of SSO were 25.7 mg/100 g and 48.7 mg/100 g, respectively. The calcium content/phosphorus content showed a suitable ratio for absorbing calcium. The total free amino content and the taste value were 1,040.2 mg/100 g and 151.26, respectively. The major taste-active amino acids were glutamic acid and aspartic acid.

Safflower Seed Oil and Its Active Compound Acacetin Inhibit UVB-Induced Skin Photoaging

  • Jeong, Eun Hee;Yang, Hee;Kim, Jong-Eun;Lee, Ki Won
    • Journal of Microbiology and Biotechnology
    • /
    • v.30 no.10
    • /
    • pp.1567-1573
    • /
    • 2020
  • Ultraviolet (UV) is one of the major factors harmful to skin health. Irradiation with ultraviolet accelerates the decline of skin function, causing the skin to have deep wrinkles, dryness, decreased procollagen production, and degradation of collagen. Novel materials are needed to prevent the aging of the skin by blocking the effects of UV. Safflower seed oil (Charthamus tinctorius L., SSO) contains significantly high levels of unsaturated fatty acids and phytochemicals. SSO has been traditionally used in China, Japan, and Korea to improve skin and hair. Our objective in this study was to determine the effect of SSO and its active compound acacetin on UVB-induced skin photoaging in HaCaT cells and human dermal fibroblasts (HDF). SSO inhibited UVB-induced matrix metalloproteinase-1 (MMP-1) at both protein and mRNA levels in HaCaT cells and HDF. MMP-1 is known to play important roles in collagen degradation and wrinkle formation. Acacetin, a type of flavonoid, is present in SSO. Similar to SSO, acacetin also inhibited UVB-induced MMP-1 protein and mRNA levels in HaCaT cells and HDF. MMP-1 mRNA is primarily regulated by the mitogen-activated kinase (MAPK) signaling pathway. Acacetin regulated the phosphorylation of JNK1/2 and c-jun, but did not inhibit the phosphorylation of ERK1/2, p38 and AKT. Taken together, these results indicate that SSO and its active compound acacetin can prevent UVB-induced MMP-1 expression, which leads to skin photoaging, and may therefore have therapeutic potential as an anti-wrinkle agent to improve skin health.

A Study on Network Security Modeling using Single Sign-On (Single Sign-On을 적용한 네트워크 보안 모델링)

  • 서희석;김희완
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.49-56
    • /
    • 2004
  • With the growing usage of the networks, the users in the Internet uses some kinds of web server. They confused that each web server uses the different user ID and passwords. To solve these problems, SSO (Single Sign-On) solution is introduced. We presents the modeling methods which are efficiently constructed the network management models. We constructed the intrusion detection systems and firewalls using the SSO. This architecture is efficient to manage the network usage and control. SSO solution designed on the small scale Intranet. CA server in the 550 that depends on PKI (Public Key Infrastructure) is used to issue the certificates. SHTTP based on SSL (Secure Socket Layer) is used to protect the data between certificate server and the intranet users.

  • PDF

A Low Power and Low Noise Data Bus Inversion for High Speed Graphics SDRAM (High Speed Graphics SDRAM을 위한 저 전력, 저 노이즈 Data Bus Inversion)

  • Kwack, Seung-Wook;Kwack, Kae-Dal
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.7
    • /
    • pp.1-6
    • /
    • 2009
  • This paper presents new high speed architecture using DBI(Data Bus Inversion) in DRAM. The DBI is one of the general methods in the signaling circuits to decrease the known problems such as SSO and LSI. Many architectures have been proposed to reduce the number of transitions on the data bus. In this paper, the DBI, the Analog Majority Voter (AMV) circuit, the GIO control circuit and the SSO algorithm are newly proposed. The power consumption can he reduced with the help of direct GIO inversion method and the eye diagram of data can be increased to 40ps. Using proposed DBI scheme can produce almost stable SI of DQs against high speed operation. The DBI is fabricated in 90nm CMOS Technology.