• Title/Summary/Keyword: access

Search Result 16,494, Processing Time 0.038 seconds

An Automatic AP Connections Scheme using iBeacon (iBeacon을 이용한 AP 자동접속 방안)

  • Nam, ChoonSung;Shin, DongRyeol
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • There are two kinds of wireless network access to a certain place by using smart devices - 1) open (anonymous) - access and 2) user-authorized access. The open-access is a non-authorization connection method which does not need to require Smart device's user authorized information. It means open-access use only user's SSID (Service Set Identifier) information to access the wireless AP devices following public wireless network standard. This access mechanism is not suitable to use all of public wireless networks because users have to get all wireless network information around them. As a result, huge data for smart devices should be one of the most critical overload problems for them. Secondly, the user-authorized access method uses wireless network information (SSID and password) chosen by the users. So, the users have to remember and use the network access information data manually whenever accessing the network. Like open-access, this access method also has the operational and inconvenient problem for the users - manually inputting access information whenever connecting to the network. To overcome this problem in both schemes, we propose two improved wireless network access methods: 1) the implementation of automatic AP connection mechanism using user-authorization and iBeacon messages, and 2) SSID registration form for public wireless networks.

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing

  • Jing Yixin;Kim, Jin-Hyung;Jeong, Dong-Won
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.28-33
    • /
    • 2006
  • The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a light-weight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.

Mobile Communication Network to Access Technologies Utilizing Unlicensed Spectrum Interworking (이동 통신 망과 Unlicensed Spectrum 을 사 용하는 Access 기술과의 연동 방법)

  • Shim, Dong-Hee;Son, Sung-Mu;Kim, Ki-Yeol
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.354-358
    • /
    • 2007
  • This article presents several methods of mobile communication network to access technologies utilizing unlicensed spectrum interworking. Generic Access Network (GAN) technology was already specified in GERAN (GSM EDGE Radio Access Network) and Interworking WLAN (I-WLAN) was standardized for WCDMA system for WLAN user to access WCDMA packet based services through WLAN access point. Voice Call Continuity is not access network dependent technology but is a kind of domain change scheme for voice call from Circuit Switching (CS) network to IP Multimedia Subsystem (IMS) and vice versa.

  • PDF

A Study on the Elements for Open Access Policies of Universities (대학의 오픈액세스 정책 수립시 구성요소에 관한 연구)

  • Joung, Kyoung-Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.2
    • /
    • pp.229-250
    • /
    • 2010
  • Open access policies are very important for the successful open access projects in any institutions. This study aims to propose elements to consider for establishing open access policies of universities. The 3 university institutional repositories' open access policies in Korea and foreign universities' policies registered in the ROARMAP are analyzed. The major categories proposed in the study are materials, time of deposition, depositors, copyright, level of requirement, exemption, usage, options for open access, and support.

  • PDF

A Global Analysis of Open Access Books: A Study Based on Directory of Open Access Books

  • Dhanavandan, Sadagopan
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.6 no.1
    • /
    • pp.85-103
    • /
    • 2016
  • The Directory of Open Access Books (DOAB) provides a searchable index peer-reviewed monographs and edited volumes published under an Open Access business model, with links to the full texts of the publications at the publisher's website or repository. This paper discusses a global analysis of open access books, which are available in the Directory of Open Access Books (DOAB). The data was collected from the open access directory at http://www.doabooks.org/ on $20^{th}$ October 2015. In total 3379 books are listed as available on the directory; the first and second books were published in 1866 and 1867 respectively. After 1962, the publication of books, increased gradually and the greatest number of books more than 300, was published in 2010, 2012, 2013 and 2014. Nearly 47 percent of the books (1584) were published in the English language only.

A study on random access protocol based on reservation access for WDM passive star coupler network (WDM passive star coupler 망에서 예약 방식에 기반한 임의 접근 프로토콜에 관한 연구)

  • 백선욱;최양희;김종상
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.4
    • /
    • pp.893-910
    • /
    • 1996
  • Recently, there ary many researches on local area multichannel network as WDM technology developes. An ideal media access protocol in a multichannel network is one that shows short access delay under low load and high throughput under heavy load. This paper proposed a new media access protocol for WDM passive star coupler network. The proposed one is a random access rpotocol based on reservation. Access delay is short under low load by using random access method, and high throughput is achieved under heavy load by usin greservation access. Analytic model for the performance analysis of the proposed protocol is developed and performance of the proposed protocol is compared with the previous ones. The effect on the performance of the number of the nodes and channels, and the number of transceivers in each node are analyzed.

  • PDF

Design of an Access Router for Internet Access Services in the Integrate Access Node (통합 액세스 노드에서의 인터넷 액세스 라우터 설계)

  • 홍록기;이현태
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.438-442
    • /
    • 1999
  • More and more residential and mobile users are requiring access to the Internet. This paper presents an architecture of the network solution for cost-effective Internet/intranet access between users and Network Service Providers(NSPs). It also presents a functional architecture of Internet access router in the integrated access node system. The proposed Internet access router provides the functionality that users select any of a number of NSPs and mutiple user PPP calls are multiplexed over each secure tunnel between the Internet access router and NSP.

  • PDF

The Design and Performance analysis of a Process Migration Facility in a Distributed System (분산 시스템에서 프로세스 이주 기능의 설계와 성능 평가)

  • 엄태범;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.7
    • /
    • pp.656-665
    • /
    • 1992
  • In this paper, the performance of the various multiple access techniques for the mobile computer network has been studiedi in the consideration of the charactersitics of the mobile cimmunication channel. In the case of the hidden node occurring. It could be seen that the performance of the code division multiple access (CDMA) technique with simultaneous access function is better than that of the other packet access methods such as carrier sendsed multiple access (CDMA), busy tone multiple access (BTMA) and idle signal multiple access (ISMA) in the view of the throughput and mean delay time. Also, it has been shown that the performance of the CDMA method is superior to that of other packet access techniques such as multiple access (CSMA), etc. when the fading effect or impulsive noise exists in the mobile channel, Especially, in the case of the distributed mobile network it has been shown that the receivertransmitter based CDMA method using the characteristics of CDMA effectively has better throughput and less mean delay time than the commontransmitter based CDMA technique.

  • PDF

A Secure Cloud Computing System by Using Encryption and Access Control Model

  • Mahmood, Ghassan Sabeeh;Huang, Dong Jun;Jaleel, Baidaa Abdulrahman
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.538-549
    • /
    • 2019
  • Cloud computing is the concept of providing information technology services on the Internet, such as software, hardware, networking, and storage. These services can be accessed anywhere at any time on a pay-per-use basis. However, storing data on servers is a challenging aspect of cloud computing. This paper utilizes cryptography and access control to ensure the confidentiality, integrity, and proper control of access to sensitive data. We propose a model that can protect data in cloud computing. Our model is designed by using an enhanced RSA encryption algorithm and a combination of role-based access control model with extensible access control markup language (XACML) to facilitate security and allow data access. This paper proposes a model that uses cryptography concepts to store data in cloud computing and allows data access through the access control model with minimum time and cost for encryption and decryption.

A Study on the Cognitive Characteristics and Image Formation Structure of Hotel Access Space (호텔 진입공간의 유형별 인지특성 및 이미지형성구조에 관한 연구)

  • Lee, Jeong-Lim;Cho, Yong-Joon
    • Journal of the Korean housing association
    • /
    • v.20 no.5
    • /
    • pp.9-21
    • /
    • 2009
  • This study classified visual perception types of access space at 17 five-star hotels in Jejudo and examined their cognitive characteristics and image formation structures in an effort to provide basic information important for designing the elevation and the access spaces of a hotel. The results of this study are as follows. Access space image of experimental hotels showed more negative evaluations at both city hotels and resort hotels, viewing angle (upward angle) was also positively evaluated between $10^{\circ}{\sim}12^{\circ}$ and $18^{\circ}$ and central type in arrangement type and detour access and straight access types in access circulation type were positively evaluated. When viewed from an upward angle of $10^{\circ}$ to $12^{\circ}$, the most important factors were as plasticity, decorativeness, and creativity; from $18^{\circ}$ it was such factors as harmony and peculiarity; and at $45^{\circ}$ it was factors like decorativeness and stability. In considering the various access types, the most important factors in a straight access type were peculiarity and harmony; for one-time curved access type it was by decorativeness, creativity, Peculiarity, and stability; and for detour access types it was decorativeness, stability, and peculiarity. Influential of factors affecting image formation and plasticity and harmony factors and the form had more influences on image formation.