• Title/Summary/Keyword: Web Access Control

Search Result 236, Processing Time 0.026 seconds

Development of Remote Control System based on CNC Cutting Machine for Gradual Construction of Smart Factory Environment (점진적 스마트 팩토리 환경 구축을 위한 CNC 절단 장비 기반 원격 제어 시스템 개발)

  • Jung, Jinhwa;An, Donghyeok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.297-304
    • /
    • 2019
  • The technological advances such as communication, sensor, and artificial intelligence lead smart factory construction. Smart factory aims at efficient process control by utilizing data from the existing automation process and intelligence technology such as machine learning. As a result of constructing smart factory, productivity increases, but costs increase. Therefore, small companies try to make a step-by-step transition from existing process to smart factory. In this paper, we have proposed a remote control system that support data collection, monitoring, and control for manufacturing equipment to support the construction of CNC cutting machine based small-scale smart factory. We have proposed the structure and design of the proposed system and efficient sensing data transmission scheme. To check the feasibility, the system was implemented for CNC cutting machine and functionality verification was performed. For performance evaluation, the web page access time was measured. The results means that the implemented system is available level.

A UPnP Proxy System for the Remote Control of Home Appliances (댁내 장치의 원격 제어를 위한 UPnP 프록시 시스템)

  • 김동희;임경식;이화영;안준철;조충래;박광로
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.4
    • /
    • pp.337-350
    • /
    • 2004
  • Because of a security problem and not enough IPv4 address space, the home network has been made up of private network, and it has been separated from Internet. This fact prevents people in Internet from controlling and monitoring home appliances. So, this paper designs and Implements the UPnP Proxy System which offers functions for users to control and monitor home appliances. When users are in the outside of the home network, they do not know which devices were connected in the home network because the advertisement messages of UPnP devices would not be delivered to the outside of the home network. Also, users cannot access devices directly, and their control messages are not delivered into the home network. So, this paper designs and implements the UPnP Proxy System to solve these problems. The merit of the system is that users can control and monitor home appliances in realtime using presentation web documents with the HTTP push technology.

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

A Study on Considerations in KCR4 through Changes of Cataloging Rules from AACR2 to RDA (AACR2에서 RDA로 목록규칙 변화에 따른 KCR4의 고려사항에 관한 연구)

  • Lee, Mi-Hwa
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.1
    • /
    • pp.23-42
    • /
    • 2011
  • This study is to compare the descriptive cataloging rules between AACR2 and RDA, and then to find a direction of future cataloging and KCR 4. RDA is new cataloging rules that embody the International Cataloging Principles(2009), FRBR and FRAD. It is a structure of bibliographic control of all kinds of resources, and the rules can be flexibly applicable in the international cataloging community. It is critical to embody RDA in KCR 4 because RDA is likely to affect the future cataloging through its collocation function and relation function to construct semantic web of OPAC. This study analyzed the descriptive rules of work, expression, and manifestation based on RDA draft(2008) of JSC for Development of RDA. It analyzed the changes in the cataloging rules from AACR2 to RDA in such descriptive areas as title, type of resources, statement of responsibility, edition, publication, physical description and series in the manifestation level, and the preferred access points in both expression and work levels. The findings of this study will provide implications in revising KCR4.

Secure Searchable Encryption with User-Revocability in Multi-User Settings (다자간 환경에서 사용자 탈퇴가 가능한 프라이버시 보호 키워드 검색 기법)

  • Kim, Dong-Min;Chun, Ji-Young;Noh, Geon-Tae;Jeong, Ik-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.3-14
    • /
    • 2011
  • In recent days, people used to store and share the data with other users through the web storage services. It is more convenient for using the data, but it raise problems such as access control of stored data and privacy exposure to untrusted server. Searchable encryption is used to share the data securely in multi-user setting. Especially in the multi-user setting, the revoked users should not be able to search the data and access the stored data. That is, it should be considered the security from revoked users. However in the existing schemes, the revoked users can decrypt the shared data by passive attack. Proposed scheme is the secure searchable encryption that resolves the problem and guarantees the security for revoked users.

Design of IoT Gateway based Event-Driven Architecture for Intelligent Buildings. (IoT 게이트웨이 기반 지능형 건물의 이벤트 중심 아키텍쳐 설계)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.256-259
    • /
    • 2016
  • The growth of mobile devices in Internet of Things (IoT) leads to a number of intelligent buildings related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The home server receives the command, then controls for instance the light system. The gateway based RESTful technology responsible for handling clients' requests attests an internet latency in case a large number of clients' requests submit toward the gateway increases. In this paper, we propose the design tasks of the IoT gateway for handling concurrency events. In the procedure of designing tasks, concurrency is best understood by employing multiple levels of abstraction. The way that is eminently to accomplish concurrency is to build an object-oriented environment with support for messages passing between concurrent objects. We also investigate the performance of event-driven architecture for building IoT gateway using node.js on one side and communication protocol based message-oriented middleware known as XMPP to handle communications of intelligent building control devices connected to the gateway through a centralized hub. The Node.JS is 40% faster than the traditional web server side features thread-based approach. The use of Node.js server-side handles a large number of clients' requests, then therefore, reduces delay in performing predefined actions automatically in intelligent building IoT environment.

  • PDF

A Development of Web-based Integrated Security Management System for Firewalls (웹 기반의 방화벽 통합 보안 관리 시스템 개발)

  • Lee, Dong-Young;Kim, Dong-Soo;Hong, Seung-Sun;Chung, Tai-Myoung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3171-3181
    • /
    • 2000
  • With a remarkable growth and expansionof Internet, the security issues emerged from intrusions and attacks such as computer viruses, dental of servives and backings to destroy intormation have been considered as serious threats for Internet and the provate networks. To protect networks from those attacks, many nendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However managing those systems individually requres too much work and high cost. Thus, integrated security managemanet and eatabliashment of consistent security policy for various security products has become more important. In this paper, we propose integrated security manabement system called WISMSF(Web based Integrated Security Management System for Fireswalls) to monitor and contro various kinds of firewalls WISMSF consists of three components-clients, integrated engine, and agents. It supports the transparent management functions of security products, easy ways of defining security policies, and simple expansion of managed ranges.

  • PDF

Anonymous Qualification Verifying Method on Web Environment (웹 환경에서 익명성을 제공하는 자격증명 방법)

  • Lee, Yun-Kyung;Hwang, Jung-Yeon;Chung, Byung-Ho;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.181-195
    • /
    • 2011
  • There's a controversy about an invasion of privacy which includes a leakage of private information and linking of user's behavior on internet. Although many solutions for this problem are proposed, we think anonymous authentication, authorization, and payment mechanism is the best solution for this problem. In this paper, we propose an effective anonymity-based method that achieves not only authentication but also authorization. Our proposed method uses anonymous qualification certificate and group signature method as an underlying primitive, and combines anonymous authentication and qualification information. An eligible user is legitimately issued a group member key pair through key issuing process and issued some qualification certificates anonymously, and then, he can take the safe and convenience web service which supplies anonymous authentication and authorization. The qualification certificate can be expanded according to application environment and it can be used as payment token.

Developing Web-based Virtual Geological Field Trip by Using Flash Panorama and Exploring the Ways of Utilization: A Case of Jeju Island in Korea (플래시 파노라마를 활용한 웹-기반 가상야외지질답사 개발 및 활용 방안 탐색: 제주도 화산 지형을 중심으로)

  • Kim, Gun-Woo;Lee, Ki-Young
    • Journal of the Korean earth science society
    • /
    • v.32 no.2
    • /
    • pp.212-224
    • /
    • 2011
  • In school science class, actual geological field trips tend to be restricted due to a number of problems including travel distance, cost, safety, and so on. Therefore, alternative way should be sought to provide students with the benefits of actual field trip. The purpose of this study is to develop web-based virtual field trip (VFT) about Jeju island in Korea by using flash panorama, and to explore a variety of ways to utilize the VFT. The characteristics of Jeju VFT are as follows: it provides virtual space for secondary school students to learn about volcanic topography and geology; students can access contents in a non-sequential order by virtue of web-based system, and students can control learning pace according to their ability; it is possible to investigate the same field site repeatedly, not limited by time and space; it presents differentiated worksheets for different school grade; it provides diverse complementary web contents, e. g., closeup features, thin sections, inquiry questions, and explanations of outcrops. We proposed several ways with instructional models to utilize Jeju VFT in science class and extra-school curricular as well.

A Development of the Unified Object-Oriented Analysis and Design Methodology for Security-Critical Web Applications Based on Relational Database (웹 응용시스템 개발을 위한 보안을 고려한 통합 분석.설계 방법론 개발)

  • Woo, Jung-Woong;Kim, Dong-Seob;Joo, Kyung-Soo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.243-247
    • /
    • 2013
  • 응용시스템 개발 과정에 있어서 중요하고 핵심을 이루는 작업은 분석과 설계 작업이며 아울러 대부분의 응용시스템은 데이터베이스 기반으로 구축된다. 또한, 응용시스템들은 외부 공격에 쉽게 노출되기 때문에 보안과 관련된 처리 과정 역시 중요하다. 하지만 이러한 보안은 대부분 개발 마지막 과정에서 고려하기 때문에 보안에 취약한 응용시스템들이 개발될 가능성이 매우 높다. 따라서 개발 초기에 보안을 반영한 분석 및 설계 과정이 매우 중요하다. Java EE는 웹 응용시스템을 위한 보안 방안을 제공하고 아울러 관계형 데이터베이스도 보안을 위하여 역할기반 접근제어를 지원하고 있지만 관계형 데이터베이스 및 Java EE의 역할기반 접근제어를 활용하는, 요구사항 수집부터 구현까지 개발 단계 전체에 걸친 일관된 개발방법론은 전무한 실정이다. 따라서 본 논문에서는 보안 요구사항을 요구사항 수집부터 분석 및 설계 그리고 마지막 구현 단계까지 반영하여 Java EE 기반의 웹 응용시스템을 개발하기 위한, 보안을 고려한 일관된 통합 분석.설계 방법론을 제안한다.

  • PDF