• Title/Summary/Keyword: Web Access Control

Search Result 236, Processing Time 0.03 seconds

Remote Control of a Robot Through the Internet (인터넷을 통한 로봇의 원격 제어)

  • 이동주;양태규
    • The Journal of Information Technology
    • /
    • v.4 no.1
    • /
    • pp.9-22
    • /
    • 2001
  • In this paper, We control remote robot using web browser. This system used independent four PC and each PC is used to operator PC, database server, web server and robot control PC. Remote control can escape the operator from constraint the time and workspace. If operator inputting control data in web browse then the control data is saved the data base server. The robot control PC is inputted control data from database at access intervals of 1ms. Also, if the control data is changed then robot is operated. It made simple robot using step-motor and the robot is operated by web browser. Finally, Robot system is exactly operated using control data and certificate of possibility the remote robot control using web browser.

  • PDF

An Access Control Model for Privacy Protection using Purpose Classification (사용목적 분류를 통한 프라이버시 보호를 위한 접근제어 모델)

  • Na Seok-Hyun;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.39-52
    • /
    • 2006
  • Recently purpose is used by an crucial part to security management when collecting data about privacy. The W3C(World Wide Web Consortium) describes a standard spec to control personal data that is provided by data providers who visit the web site. But they don't say anymore about security management about personal data in transit after data collection. Recently several researches, such as Hippocratic Databases, Purpose Based Access Control and Hippocratic in Databases, are dealing with security management using purpose concept and access control mechanism after data collection a W3C's standard spec about data collection mechanism but they couldn't suggest an efficient mechanism for privacy protection about personal data because they couldn't represent purpose expression and management of purposes sufficiently. In this paper we suggest a mechanism to improve the purpose expression. And then we suggest an accesscontrol mechanism that is under least privilege principle using the purpose classification for privacy protection. We classify purpose into Along purpose structure, Inheritance purpose structure and Stream purpose structure. We suggest different mechanisms to deal with then We use the role hierarchy structure of RBAC(Role-Based Access Control) for flexibility about access control and suggest mechanisms that provide the least privilege for processing the task in case that is satisfying using several features of purpose to get least privilege of a task that is a nit of business process.

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.

Web based control modules Using LonWorks/Ethernet Server for Control a large Scale Renewable Energy System in Building (빌딩용 신.재생에너지시스템 제어를 위한 LonWorks기반 원격 제어모듈 개발)

  • Hong, Wonl-Pyo
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.1706-1711
    • /
    • 2008
  • This paper proposes a new Web based-control concept & design method and implementation of LonWorks network system for a large scale renewable energy energy control and monitoring system in building. The Experimental LonWorks network system using LonWorks/Ethernet(Web) server is designed and fabricated. This article addresses issues in architecture of LonWorks/Ethernet sever, embedded processors architecture for converting LonTalks protocol to Modbus protocol and software, and Internet technologies. It is also verified that the multi-induction motor control and monitoring system using LonWorks/Ethernet server have available, interoperable, reliable performance characteristics from the experimental results, Especially, The seamless integration of TCP/IP networks with control networks allows access to any control point from anywhere. Thus, the results provide a available technical data for remote distributed control system of industrial and buildings field.

  • PDF

Access Control of Digital Content Package by Using XML Encryption (XML 암호화를 이용한 디지털 콘텐츠 패키지의 접근 제어)

  • Cho, Kwang-Moon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.291-295
    • /
    • 2004
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Until now research on XML security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex however XML security comes to involve not only network security but also managerial security. But XML encryption support simple network security. So it cannot support multiple users and multiple access control policy. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can support multiple authorization of multiple users with integrating access control. And this can reduce the cost of the existing complicated access evaluation process of access control by using pre-processing.

  • PDF

Development and Evaluation of a Web-based Education Program for Nursing Students on Control of Vancomycin-resistant Enterococcus Infection (간호학생을 위한 웹기반 VRE 감염관리 교육프로그램의 개발 및 효과)

  • Gong, Ju;Kang, Ji-Yeon
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.19 no.1
    • /
    • pp.122-133
    • /
    • 2012
  • Purpose: The purpose of this study was to develop a web-based education program on control vancomycin-resistant enterococci (VRE) infections and to identify the effects of the program on knowledge and performance of nursing students. Methods: The web-based VRE infection control education program was developed by using the network-based instructional systems design model. The nursing students in the experimental group could access this web-based education program at any time, and as many times as they wanted, during the clinical training period. Effects were evaluated by assessing knowledge and performance of VRE infection control measures during the clinical training period. Results: The contents of the education program included diagnosis, transmission, and treatment of VRE, contact precautions, hand washing, personal protective equipment, environment management, and quizzes. The lecture portion was filmed in a virtual screen studio using flash animation, video, and sound effects, and it was uploaded on an internet site. The knowledge and performance scores of the experimental group after using the education program were significantly higher than those of the control group. Conclusion: The results suggest that the web-based VRE infection control education program is an effective educational method to enhance knowledge and performance of VRE infection control measures.

RFID Access Control Using Extended Usage Control Model (확장된 사용 제어 모델을 이용한 RFID 접근 제어)

  • Shin, Woo-Chul;Yoo, Sang-Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.127-144
    • /
    • 2007
  • This paper describes an Security Manager that integrally manages the Information Service related to RFID middleware, Object Name Service, and Web Service for upper level applications. In order to provide the access control of distributed RFID objects, Single-Sign-On has been implemented by extending existing UCON (Usage Control) model and SAML (Security Assertion Markup Language) assertions. The security technology of distributed RFID systems can be included in middleware and protect RFID information. In the future, it can be also applied to ubiquitous sensor networks.

  • PDF

Design and Implementation of Server-Based Web Reader kWebAnywhere (서버 기반 웹 리더 kWebAnywhere의 설계 및 구현)

  • Yun, Young-Sun
    • Phonetics and Speech Sciences
    • /
    • v.5 no.4
    • /
    • pp.217-225
    • /
    • 2013
  • This paper describes the design and implementation of the kWebAnywhere system based on WebAnywhere, which assists people with severely diminished eye sight and the blind people to access Internet information through Web interfaces. The WebAnywhere is a server-based web reader which reads aloud the web contents using TTS(text-to-speech) technology on the Internet without installing any software on the client's system. The system can be used in general web browsers using a built-in audio function, for blind users who are unable to afford to use a screen reader and for web developers to design web accessibility. However, the WebAnywhere is limited to supporting only a single language and cannot be applied to Korean web contents directly. Thus, in this paper, we modified the WebAnywhere to serve multiple language contents written in both English and Korean texts. The modified WebAnywhere system is called kWebAnywhere to differentiate it with the original system. The kWebAnywhere system is modified to support the Korean TTS system, VoiceText$^{TM}$, and to include user interface to control the parameters of the TTS system. Because the VoiceText$^{TM}$ system does not support the Festival API used in the WebAnywhere, we developed the Festival Wrapper to transform the VoiceText$^{TM}$'s private APIs to the Festival APIs in order to communicate with the WebAnywhere engine. We expect that the developed system can help people with severely diminished eye sight and the blind people to access the internet contents easily.

A Study of Development of Diagnostic System for Web Application Vulnerabilities focused on Injection Flaws (Injection Flaws를 중심으로 한 웹 애플리케이션 취약점 진단시스템 개발)

  • Kim, Jeom-Goo;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.99-106
    • /
    • 2012
  • Today, the typical web hacking attacks are cross-site scripting(XSS) attacks, injection vulnerabilities, malicious file execution and insecure direct object reference included. Web hacking security systems, access control solutions, access only to the web service and flow inside but do not control the packet. So you have been illegally modified to pass the packet even if the packet is considered as a unnormal packet. The defense system is to fail to appropriate controls. Therefore, in order to ensure a successful web services diagnostic system development is necessary. Web application diagnostic system is real and urgent need and alternative. The diagnostic system development process mu st be carried out step of established diagnostic systems, diagnostic scoping web system vulnerabilities, web application, analysis, security vulnerability assessment and selecting items. And diagnostic system as required by the web system environment using tools, programming languages, interfaces, parameters must be set.

A Slot Concession Scheme for Fairness Control of DQDB in Web Environment (웹 환경에서 분산-큐 이중-버스의 공정성 제어를 위한 슬롯양보 방식)

  • 김재수;김정홍;황하응
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.133-140
    • /
    • 2002
  • Distributed-queue Dual-Bus (DQDB) shows an unfair behavior in bandwidth allocation due to the nature of unidirectional bus architecture. The study on fairness control method for DQDB has been performed under specific load types such as equal Probability load. symmetric load and asymmetric load type. A client-server load type is more practical traffic pattern than specific load type in Web environments. In this paper, we propose an effective fairness control method to distribute DQDB network bandwidth fairly to all stations under Web environments. The proposed method directly calculates an access limit from the bandwidth demand pattern. Based on an access limit, it controls the allocation of bandwidth by yielding empty slots in clients to servers. And we were certain that it outperforms other mechanisms from simulation results.

  • PDF