• Title/Summary/Keyword: access-management

Search Result 3,352, Processing Time 0.031 seconds

Access Management Using Knowledge Based Multi Factor Authentication In Information Security

  • Iftikhar, Umar;Asrar, Kashif;Waqas, Maria;Ali, Syed Abbas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.119-124
    • /
    • 2021
  • Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company's information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.

Temperature Measurement and Intelligent Access Management System Service Platform Advancement Research using AI Facial Recognition Technology (AI 얼굴정보처리기술을 활용한 체온측정 및 지능형 출입관리 시스템 서비스플랫폼 고도화 연구)

  • Kim, Byung-Wan
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.7
    • /
    • pp.249-257
    • /
    • 2021
  • Recently, interest and demand for facial information processing technology that can provide non-face-to-face identity authentication and access management service using smart devices, which is an essential environmental improvement for multi-use facilities, is increasing as a way to prevent the spread of infectious diseases worldwide and to cope with social measures. This study defines a multi-use facility classification system and applied service field to establish a continuous access control system, and measures to improve the usability of the service platform considering scalability through a dual access control system and personal/measurement information type analysis, and accordingly We would like to propose a service roadmap. In addition, it aims to improve the physical access management system service platform, which is a multi-use facility application service that requires one-time and multiple-use authentication according to usage. It is expected that the methodology of this study can be applied as a service platform of a logical access control system type in the future.

Multimedia Ad Hoc Wireless LAMs with Distributed Channel Allocation Based on OFDM-CDMA (OFDM-CDMA에 기반을 둔 분산 채널 할당 구조를 갖는 멀티미디어 Ad Hoc 무선 LAM에 관한 연구)

  • Yang, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.965-972
    • /
    • 2005
  • We propose a new resource management scheme, Distributed Channel Allocation Protocol (DCAP), for multimedia Ad Hoc Wireless LANs (AWLANS). This scheme implements a Qualify-of-Service (QoS) providing distributed resource management on the Orthogonal Frequency Division Multiplexing-Code Division Multiple Access (OFDM-CDMA) channel architecture. According to the performance evaluation results for MPEG traffic sources, DCAP can be a good choice of resource management scheme for AWLANs supporting multimedia services on the Broadband Wireless Access(BWA)-type physical layer.

A Case Study on Metadata Management for User Access to Data Warehouse - Suggestions about metadata management using K-bank case - (사용자의 데이터 웨어하우스 접근과 활용을 위한 메타데이터 관리 사례 - K 은행 사례를 통한 메타데이터 관리의 시사점 -)

  • Kim, Gi-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.225-233
    • /
    • 2007
  • This paper uses the taxonomy of 3 metadata schema(extraction metadata, warehouse, metadata, and user access metadata) to investigate how to manage metadata and what metadata to manage in data warehouse. In particular, this paper focuses on two kinds of metadata(warehouse metadata and user access metadata) and studies a case about metadata management in a real business world

  • PDF

Authenticated IGMP for Controlling Access to Multicast Distribution Tree (멀티캐스트 분배트리 접근제어를 위한 Authenticated IGMP)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.3-17
    • /
    • 2007
  • Receiver access control scheme is proposed to protect multicast distribution tree from DoS(Denial-of Service) attack induced by unauthorized use of IGMP(Internet group management protocol), by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP(Content Provider), NSP(Network Service Provider), and group members.

Management of the Access Control for a WebDAV-based Collaborative System (웹데브 기반 협업시스템에서의 접근 제어 관리)

  • Kim, Seong-Hune;Lee, Hong-Chang;Lee, Myung-Joon;Park, Yang-Su
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.167-181
    • /
    • 2010
  • WebDAV is an IETF standard protocol which supports asynchronous collaborative authoring on the Web. The WebDAV Access Control Protocol provides various methods of controlling the resources on a WebDAV server and their properties, helping high-level group activities to be performed through the WebDAV server. In this paper, to provide high level collaboration, we introduce a technique for managing access control over WebDAV resources through the WebDAV Access Control Protocol and describe the development of an access control manager for the CoSlide Collaborative system based on the technique. To provide users with the access control features in an easily understandable manner, the developed technique presents the privileges for performing WebDAV methods instead of the standard privileges in the WebDAV Access Control Protocol. In addition, we present the facility for detecting conflicts between new access privileges on resources and old access privileges on them. We applied the method-based access control management technique to the CoSlide collaborative system. The developed access control manager enables us to create group workspaces with flexible access control strategies for group members and resources.

A Study on the Electronic Access and Use of Thesis Information (학위논문정보의 전자적 접근 및 이용에 관한 연구)

  • Kim, Ja-Young
    • Knowledge Management Research
    • /
    • v.1 no.1
    • /
    • pp.109-126
    • /
    • 2000
  • Thesis is very valuable primary and secondary infomation resource in that it contains systematic research methods, comprehensive and detailed data, and creative research results in specific areas. But thesis has been neglected in many libraries and information centers due to the problems of accessibility and obtainabiliy problems as one of a Grey Literature. As information technology and networks have been developing rapidly, the digitalization of thesis full-text and the possibility of online access arc also increasing. In this study, value and the characteristics of thesis is firstly reviewed. Secondly, by analyzing the current digitalization state of some domestic and foreign universities and institutions, some principles for the effective electronic transmission and effective management of thesis are suggested as one of knowledge management. Furthermore useful information is suggested for the users in terms of the online access and obtainability.

  • PDF

Effects of Regional Health Insurance on Access to Ambulatory Care (지역의료보험의 실시에 따른 의료이용변화 분석 : 소득계층별 의료필요충족도를 중심으로)

  • 배상수
    • Health Policy and Management
    • /
    • v.2 no.1
    • /
    • pp.167-203
    • /
    • 1992
  • The effects of regional health insurance on access to ambulatory care are examined in this paper. Access is measured as use-disability ratios. The data are collected in a household interview survey at Hwachon county before and after the introduction of regional health insurance. Before the introduction of regional health insurance, low-income class has less contacts with physicians than high-income class. This disparity in accessibility among economic classes is reduced with the health insurance coverage, but not removed, even after adjusting for health need.

  • PDF

Channel Access Control Method for the CDMA Packet Service System (CDMA 패킷 서비스 시스템에서 채널 엑세스 제어 기법 연구)

  • 이강원
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.3
    • /
    • pp.169-184
    • /
    • 2003
  • In the IS-95 packet service system, the radio channels are generally classified into the dedicated and the common traffic channels. In this paper, a common traffic channel access method is proposed for the COMA packet service system to enhance the radio resource utilization while guaranteeing QoS to the users. The proposed method is based on the permission probability for the common traffic channel user. To derive permission probability, optimization models are developed for two different QoS constraints. Approximation methods are also developed.

Subject Access to OPACs in Korea (우리나라 온라인열람목록의 주제접근 방법)

  • 장혜란
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 1997.08a
    • /
    • pp.109-112
    • /
    • 1997
  • To understand and analyze the variety of the subject access methods of OPACs, telephone interviews were administered to the computerized libraries in Seoul. Data was collected during 4 days in Feb. 1997, and 155 libraries were responded. It was found that 105 libraries are operating OPACs. Among the 105 libraries, almost of all provide classification number and title keyword access, however, only half of them provide subject name access. 18 libraries allow linking/browsing facility between classification number and subject name/keyword. The language of the subject name to oriental books is mainly Korean and that to the Western books is mainly English. LCSH is the major authority list used. 36 libraries, 2/3 of them are special libraries, subject name is assigned by librarian without control. Based on the results, problems and suggestions to enhance subject access capability are presented.

  • PDF