• Title/Summary/Keyword: User Attribute

Search Result 364, Processing Time 0.023 seconds

A Secure Attribute-based Authentication Scheme for Cloud Computing (클라우드 컴퓨팅을 위한 안전한 속성기반 인증 기법)

  • Moon, Jongho;Choi, Younsung;Won, Dongho
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.345-350
    • /
    • 2016
  • Cloud computing services have different characteristics from the traditional computing environment such as resource sharing, virtualization, etc. These characteristics of cloud computing environment necessitate specific properties such as user identify, access control, security control property, etc. Recently, Yoo proposed an attribute-based authentication scheme for secure cloud computing. However, Yoo's authentication scheme is vulnerable to customer attack and an adversary can modify the authentication request message. In this paper, we propose a secure and efficient attribute-based authentication scheme for cloud computing based on Yoo's scheme.

An Implementation of NEIS′DB Security Using RBAC based on PMI (PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.31-45
    • /
    • 2004
  • Public Key Infrastructure(PKI) provides a strong authentication. Privilege Management Infrastructure(PMI) as a new technology can provide user's attribute information. The main function of PMI is to give more specified authority and role to user. To authenticate net and role, we have used digital signature. Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. NEIS(National Education Information System) can not always provide satisfied quality of security management. The main idea of the proposed RNEIS(Roll Based NEIS) is that user's role is stored in AC, access control decisions are driven by authentication policy and role. Security manager enables user to refer to the role stored in user's AC, admits access control and suggests DB encryption by digital signature.

A Multi-Attribute Intuitionistic Fuzzy Group Decision Method For Network Selection In Heterogeneous Wireless Networks Using TOPSIS

  • Prakash, Sanjeev;Patel, R.B.;Jain, V.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5229-5252
    • /
    • 2016
  • With proliferation of diverse network access technologies, users demands are also increasing and service providers are offering a Quality of Service (QoS) to satisfy their customers. In roaming, a mobile node (MN) traverses number of available networks in the heterogeneous wireless networks environment and a single operator is not capable to fulfill the demands of user. It is crucial task for MN for selecting a best network from the list of networks at any time anywhere. A MN undergoes a network selection situation frequently when it is becoming away from the home network. Multiple Attribute Group Decision (MAGD) method will be one of the best ways for selecting target network in heterogeneous wireless networks (4G). MAGD network selection process is predominantly dependent on two steps, i.e., attribute weight, decision maker's (DM's) weight and aggregation of opinion of DMs. This paper proposes Multi-Attribute Intuitionistic Fuzzy Group Decision Method (MAIFGDM) using TOPSIS for the selection of the suitable candidate network. It is scalable and is able to handle any number of networks with large set of attributes. This is a method of lower complexity and is useful for real time applications. It gives more accurate result because it uses Intuitionistic Fuzzy Sets (IFS) with an additional parameter intuitionistic fuzzy index or hesitant degree. MAIFGDM is simulated in MATLAB for its evaluation. A comparative study of MAIFDGM is also made with TOPSIS and Fuzzy-TOPSIS in respect to decision delay. It is observed that MAIFDGM have low values of decision time in comparison to TOPSIS and Fuzzy-TOPSIS methods.

A Study on Developing an User Interface for GIS Construction (GIS 구축을 위한 사용자 인터페이스 개발에 관한 연구)

  • 남인길;부기동
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.4
    • /
    • pp.25-31
    • /
    • 1999
  • This paper proposes an easy method to develope user interfaces for the GIS using local server automation In the developing stage of user interface the most important thing is to apply effective windows programming techniques and component software supporting techniques. This study shows an user interface developing method using the local server automation and Visual Basic programming. For a case study, the study constructs its user interface which performs map overlaying, referencing attribute tablet, graph analysis, drawing up of thematic amp.

  • PDF

An Implementation Method of Improved Document DRM for Preventing Information Leakage using RBAC Approach (RBAC을 이용한 정보유출 방지를 위한 보안성이 강화된 문서 DRM 구현)

  • Choi, Young Hyun;Eom, Jung Ho;Chung, Tai Myoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.57-66
    • /
    • 2011
  • We implemented the document DRM applying role based access control(RBAC) mechanism for preventing the information leakage of a document which is transmitted in network environment. It must prevent to access document not related to user role and duty, and must allow operation to document for improving security, considering user role and security level according to a document importance. We improved the security of document DRM by adding to the access control module applying RBAC for satisfying security requirements. Though the user access document, our system allows operation authorizations to document by the user's role & security level and the security attribute of RBAC. Our system prevents indiscriminate access to the documents by user who is not associated with the role, and prevents damage the confidentiality and integrity.

A Study on Developing GIS User Interface using OLE Automation (OLE 자동화를 이용한 GIS의 사용자 인터페이스 개발에 관한 연구)

  • Bu, Ki-Dong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.2 no.1
    • /
    • pp.63-72
    • /
    • 1999
  • This study proposes an easy method to develope user interfaces for the GIS using OLE automation. In the developing stage of user interface, the most important thing is to make the best use of effective windows programming techniques and component software supporting techniques. Using the OLE automation and Visual Basic programming, the study constructs an user interface as case study which performs map overlaying, referencing attribute tables, graph analysis, drawing up of thematic map.

  • PDF

A Web Personalized Recommender System Using Clustering-based CBR (클러스터링 기반 사례기반추론을 이용한 웹 개인화 추천시스템)

  • Hong, Tae-Ho;Lee, Hee-Jung;Suh, Bo-Mil
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.107-121
    • /
    • 2005
  • Recently, many researches on recommendation systems and collaborative filtering have been proceeding in both research and practice. However, although product items may have multi-valued attributes, previous studies did not reflect the multi-valued attributes. To overcome this limitation, this paper proposes new methodology for recommendation system. The proposed methodology uses multi-valued attributes based on clustering technique for items and applies the collaborative filtering to provide accurate recommendations. In the proposed methodology, both user clustering-based CBR and item attribute clustering-based CBR technique have been applied to the collaborative filtering to consider correlation of item to item as well as correlation of user to user. By using multi-valued attribute-based clustering technique for items, characteristics of items are identified clearly. Extensive experiments have been performed with MovieLens data to validate the proposed methodology. The results of the experiment show that the proposed methodology outperforms the benchmarked methodologies: Case Based Reasoning Collaborative Filtering (CBR_CF) and User Clustering Case Based Reasoning Collaborative Filtering (UC_CBR_CF).

  • PDF

Attributes and Expression of STM(Short-term Memorable) Information (STM(Short-term Memorable) Information의 속성 및 정보표현)

  • Han, Ji-Ae;You, Si-Cheon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.201-211
    • /
    • 2010
  • The aim of this study is to investigate the method to enhance user cognition for "STM information(Short-term Memorable Information)" that is relatively accessible to information in a short period of time in information design types. What stands out from this study is the design attributes and expression method of information in a broad perspective. By 4 visualization attributes of function variable; 'Operations', 'Events', 'Methods' and 'Use cases', STM information should be satisfied by the attribute of 'Understandable' and 'Accessibility' from the point of view of visual representation and by the attribute of 'Errorless' and 'Timeliness' from the point of view of user operation. As the expression method of each perspectives, I suggested "Attribution theory", "Cognitive model", "Maximization of Proactivity", "Minimization of surplus information" and "Using dual-code" in the point of view of visual representation, and "Context effect", "Using memory code" and "Two methods of information scanning" in the point of view of user operation. I assured that above-mentioned methods are efficient and cognitive pattern of user for STM information is found out by survey and interview.

Design and Implementation of personalized recommendation system using Case-based Reasoning Technique (사례기반추론 기법을 이용한 개인화된 추천시스템 설계 및 구현)

  • Kim, Young-Ji;Mun, Hyeon-Jeong;Ok, Soo-Ho;Woo, Yong-Tae
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1009-1016
    • /
    • 2002
  • We design and implement a new case-based recommender system using implicit rating information for a digital content site. Our system consists of the User Profile Generation module, the Similarity Evaluation and Recommendation module, and the Personalized Mailing module. In the User Profile Generation Module, we define intra-attribute and inter-attribute weight deriver from own's past interests of a user stored in the access logs to extract individual preferences for a content. A new similarity function is presented in the Similarity Evaluation and Recommendation Module to estimate similarities between new items set and the user profile. The Personalized Mailing Module sends individual recommended mails that are transformed into platform-independent XML document format to users. To verify the efficiency of our system, we have performed experimental comparisons between the proposed model and the collaborative filtering technique by mean absolute error (MAE) and receiver operating characteristic (ROC) values. The results show that the proposed model is more efficient than the traditional collaborative filtering technique.