• Title/Summary/Keyword: access server

Search Result 963, Processing Time 0.023 seconds

Tele-test Systems for ASIC Design (ASIC 설계를 위한 원격 테스트 시스템)

  • 윤도현;강성호
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.939-942
    • /
    • 1999
  • In this paper, Tele-Test System for ASIC Design is constructed. It consists of the server, and the clients. The server and clients are implemented by Java. Using Java RMI system, the remote access via information network is implemented. In this Tele-test system, fault simulation, test pattern compaction, test pattern generation, and path-delay fault test generation services are implemented. All service can be peformed parallel by network access.

  • PDF

Distributed Access Privilege Management for Secure Cloud Business (안전한 클라우드 비즈니스를 위한 접근권한 분산관리)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.369-378
    • /
    • 2011
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server. And we construct the model of access privilege management using AONT based XOR threshold Secret Sharing, In addition, our scheme enable to grant weight for access privilege using XOR Share. In chapter 4, we differentiate existing scheme and proposed scheme.

Development of Web-based Power Plant Simulator System (원격 훈련용 발전 시뮬레이터 개발)

  • Byun, Seung-Hyun;Kang, Hae-su;Woo, Joo-Hee;Lee, Jee-Hoon;Kim, Duck-Ho
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.7 no.2
    • /
    • pp.277-283
    • /
    • 2021
  • Power plant simulators have been used for operator training, control verification and engineering verification. In general, simulators can be used in the place where they are installed by only single user group at a time. Considering high cost of simulator development, a lot of available scenarios, the diversity of user level and accessibility based on users' work location, development of simulator system that can be used by multiple user groups regardless of location is required in order to enhance utilization of simulators. In this paper, the simulator system that can be used by multiple user group simultaneously without location limitation is proposed. The simulator system is composed of simulator servers, database servers, HMI servers, a web server, web clients. Simulator server consists of control model, process model that are developed for Circulating Fluidized Bed power plant located overseas. A web server manages user accounts, operation procedures, multiple server access between web client group and simulator server group. In other words, a web server makes a user group select a simulator server at a time. The developed simulator system is integrated after implementing process model, control model, HMI, and web server. Web client systems are installed on local site where power plant is located, while simulator servers, HMI servers, database servers, and a web server are located in KEPCO RI. The developed simulator system is verified by steady-state test, malfunction test and so on via remote access.

Supporting Effective Open Workspaces Based on WebDAV (WebDAV 기반의 효과적인 공개 작업장 지원)

  • Park Hee-Jong;Kim Dong-Ho;Ahn Geon-Tae;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.249-258
    • /
    • 2006
  • WebDAV is an IETF standard protocol, which is an extended version of HTTP 1.1, supporting asynchronous collaborative authoring of various contents on the web. Recently, to precisely control access to the resources on a WebDAY server, the WebDAV Access Control Protocol was published. This protocol helps developers to implement advanced server functionalities in a convenient way by providing various control methods to the resources on the WebDAV server. Based on the WebDAV access control protocol, we developed Open Workspaces, which systematically support exchanging and sharing data for general visitors. An Open Workspace can be supplied as a Download-Only Open Workspace, an Upload-Only Open Workspace, or an Upload-Download Open Workspace. Any registered user can create these workspaces without bothering the system administrator. To support the Open Workspaces, we extended the Slide WebDAV server and the DAVExplorer WebDAV client, which are being used popularly.

Supporting Group Workspaces Based on WebDAV (웹데브 기반의 그룹 작업공간 지원)

  • Kim Dong-Ho;Shin Won-Joon;Park Jin-Ho;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.521-532
    • /
    • 2006
  • WebDAV is an IETF standard protocol which support asynchronous collaborative authoring on the Web. The recently published WebDAV Access Control Protocol provides various methods of controlling the resources on a WebDAV server and their properties, helping high-level group activities to be performed through the WebDAV server. Based on the WebDAV access control protocol, we developed Group Workspaces which support exchanging and/or sharing data among the group members. Any member of a Group Workspace can create and share resources among the members. Also, any member can add, change or delete the resources. To support the Group Workspaces, we developed a client application named GroupExplorer, which solely supports Group Workspaces. We constructed the server for Group Workspaces using Jakarta Slide - a WebDAV server supporting the WebDAV Access Control Protocol.

The Design of IAPP Server for Secure Handoff of wireless LAN Terminal (무선랜 단말의 안전한 핸드오프를 위한 Diameter IAPP서버의 설계)

  • 함영환;정병호;정교일;서창호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12C
    • /
    • pp.1258-1267
    • /
    • 2003
  • As the need for stable and high speed wireless Internet service Brows, the wireless LAN service provider hurries to preempt wireless LAN service market. IAPP(InterAccess Point protocol) is defined to be able to provide a secure handoff mechanism of wireless LAN terminal information between AP(Access Point)s, and the related IEEE standard is IEEE 802.11f. For the secure handoff of wireless LAN terminal, it is necessary to transfer terminal's authentication & accounting information securely from old AP to new AP IEEE 802.11f recommends RADIUS server as IAPP server which authenticates AP and provides information for secure channel between APs. This paper proposes IAPP server using Diameter protocol to overcome the limit of RADIUS sewer, and describes about the interaction between server components and integration method with the current IAPP client system.

Study about remote-access by using TTSSH to OpenSSH Server (TTSSH를 이용한 OpenSSH 서버로의 원격접속에 관한 연구)

  • 강민정;강민수;박연식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.490-493
    • /
    • 2002
  • Many servers that is operated in present earth are UNIX base, is trend that server of LINUX base is increasing steadily recently. When users who have account to this server wish to do remote access, instruction that use most easily is‘telnet’, security does not consist entirely about ID and password that this uses at communication substance as well as login. The interest about latest SSH is rising by the alternative, but SSH has various kinds problem in following telnet's fame. Therefore, We studied about problems and the solution that can happen when window users attempted remote access laying stress on OpenSSH.

  • PDF

Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 프록시 재암호화 기반의 데이터 관리 방식)

  • Song, You-Jin;Do, Jeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.288-299
    • /
    • 2012
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.

MBS-LVM: A High-Performance Logical Volume Manager for Memory Bus-Connected Storages over NUMA Servers

  • Lee, Yongseob;Park, Sungyong
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.151-158
    • /
    • 2019
  • With the recent advances of memory technologies, high-performance non-volatile memories such as non-volatile dual in-line memory module (NVDIMM) have begun to be used as an addition or an alternative to server-side storages. When these memory bus-connected storages (MBSs) are installed over non-uniform memory access (NUMA) servers, the distance between NUMA nodes and MBSs is one of the crucial factors that influence file processing performance, because the access latency of a NUMA system varies depending on its distance from the NUMA nodes. This paper presents the design and implementation of a high-performance logical volume manager for MBSs, called MBS-LVM, when multiple MBSs are scattered over a NUMA server. The MBS-LVM consolidates the address space of each MBS into a single global address space and dynamically utilizes storage spaces such that each thread can access an MBS with the lowest latency possible. We implemented the MBS-LVM in the Linux kernel and evaluated its performance by porting it over the tmpfs, a memory-based file system widely used in Linux. The results of the benchmarking show that the write performance of the tmpfs using MBS-LVM has been improved by up to twenty times against the original tmpfs over a NUMA server with four nodes.

Debug Port Protection Mechanism for Secure Embedded Devices

  • Park, Keun-Young;Yoo, Sang-Guun;Kim, Ju-Ho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.2
    • /
    • pp.240-253
    • /
    • 2012
  • In this paper we propose a protection mechanism for the debug port. While debug ports are useful tools for embedded device development and maintenance, they can also become potential attack tools for device hacking in case their usage is permitted to hackers with malicious intentions. The proposed approach prevents illicit use of debug ports by controlling access through user authentication, where the device generates and issues authentication token only to the server-authenticated users. An authentication token includes user access information which represents the user's permitted level of access and the maximum number of authentications allowed using the token. The device authenticates the user with the token and grants limited access based on the user's access level. The proposed approach improves the degree of overall security by removing the need to expose the device's secret key. Availability is also enhanced by not requiring server connection after the initial token generation and further by supporting flexible token transfer among predefined device groups. Low implementation cost is another benefit of the proposed approach, enabling it to be adopted to a wide range of environments in demand of debug port protection.