• Title/Summary/Keyword: attribute certificate

Search Result 26, Processing Time 0.021 seconds

An Implementation of NEIS′DB Security Using RBAC based on PMI (PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.31-45
    • /
    • 2004
  • Public Key Infrastructure(PKI) provides a strong authentication. Privilege Management Infrastructure(PMI) as a new technology can provide user's attribute information. The main function of PMI is to give more specified authority and role to user. To authenticate net and role, we have used digital signature. Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. NEIS(National Education Information System) can not always provide satisfied quality of security management. The main idea of the proposed RNEIS(Roll Based NEIS) is that user's role is stored in AC, access control decisions are driven by authentication policy and role. Security manager enables user to refer to the role stored in user's AC, admits access control and suggests DB encryption by digital signature.

Design of a effective Authorization Mechanism based on Kerberos (커버로스 기반의 효율적인 허가 메커니즘 설계)

  • Kim, Eun-Hwan;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.287-294
    • /
    • 2003
  • Authentication and authorization are essential functions for the security of distributed network environment. Authorization is determining and to decide whether a user or process is permitted to perform a particular operation. In this paper, we design an authorization mechanism to make a system more effective with Kerberos for authentication mechanism. In the authorization mechanism, Kerberos server operates proxy privilege server. Proxy privilege server manages and permits right of users, servers and services with using proposed algorithm. Also, privilege attribute certificate issued by proxy privilege server is used in delegation. We designed secure kerberos with proposed functions for effective authorization at the same time authentication of Kerberos mechanism.

An efficient access control techniques between different IoT devices in a cloud environment (클라우드 환경에서 서로 다른 IoT 장치간 효율적인 접근제어 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.57-63
    • /
    • 2018
  • IoT devices are used in many areas to perform various roles and functions in a cloud environment. However, a method of access control that can stably control the IoT device has not been proposed yet. In this paper, we propose a hierarchical multi-level property access control scheme that can perform stable access of IoT devices used in a cluster environment. In order to facilitate the access of the IoT device, the proposed method not only provides the ID key (security token) unique to the IoT device by providing the IoT Hub, but also allows the IoT Hub to authenticate the X.509 certificate and the private key, So that the private key of the IoT device can not be seen outside the IoT device. As a result of the performance evaluation, the proposed method improved the authentication accuracy by 10.5% on average and the processing time by 14.3%. The overhead of IoT Hub according to the number of IoT attributes was 9.1% lower than the conventional method.

RBAC-based Trust Negotiation Model for Grid Security (그리드 보안을 위한 역할 기반의 신뢰 협상 모델)

  • Cho, Hyun-Sug;Lee, Bong-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.455-468
    • /
    • 2008
  • In this paper, we propose FAS model for establishing trust based on digital certificates in Grid security framework. The existing RBAC(Role Based Access Control) model is extended to provide permissions depending on the users‘ roles. The FAS model is designed for a system independent integrated Grid security by detailing and extending the fundamental architecture of user, role, and permission. FAS decides each user’s role, allocates access right, and publishes attribute certificate. FAS is composed of three modules: RDM, PCM, and CCM. The RDM decides roles of the user during trust negotiation process and improves the existing low level Grid security in which every single user maps a single shared local name. Both PCM and CCM confirm the capability of the user based on various policies that can restrict priority of the different user groups and roles. We have analyzed the FAS strategy with the complexity of the policy graph-based strategy. In particular, we focused on the algorithm for constructing the policy graph. As a result, the total running time was significantly reduced.

Implementation of RBAC Certification & DB Security Based on PMI for NEIS (NEIS를 위한 PMI 기반의 RBAC 인증과 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.981-992
    • /
    • 2004
  • The established NEIS has a lot of problems in the management of security. It does not realize access control in following authority because it only uses PKI certification in user certification and the use of central concentration DBMS and plain text are increased hacking possibility in NEIS. So, This paper suggests a new NEIS for the secure management of data and authority certification. First, we suggest the approached authority in AC pf PMI and user certification in following the role, RBAC. Second, we realize DB encryption plan by digital signature for the purpose of preventig DB hacking. Third, we suggest SQL counterfeit prevention by one-way hash function and safe data transmission per-formed DB encryption by digital signature.

The Hospital Life of the Patient with Femoral Neck Fracture (대퇴경부 골절 환자의 입원 생활)

  • Kim, Kyung-Ja;Chi, Sung-Ai
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.2 no.1
    • /
    • pp.35-56
    • /
    • 1996
  • Nowerdays, the increase of traffic accidents and old age population make the Femoral Neck Fracture(FNF) patients increase. By the improvement of education and standard of living the patients demand better medical service than before. This study is designed to give practical help for the FNF patients by observing their hospital life and establish practical nursing strategies for the FNF patients. For these purposes the Ethnographic Participant Observation was adopted. By this study is focused on the hospital life patient's view. For this end, the field study adopted orthopedic ward in the C University Hospital with 400 beds in Seoul. The object patients of the study were twelve patients. The patients experienced five stages : Embarrassment, Conflict, Stability, Independent, and Extension Stage. The findings and prepared nursing strategies are stated as follows. First, in the Embarrassment Stage they suffered embarrassment, anxiety, pain, they could not do ordinary things. The patients who accidental fractures had anxiety from unfamiliar tests and from hospitalization itself. They lamented that they could not ordinary things, and do nothing but obeying the hospital, and endure the pain. They recognized the changed environment and resigned themselves to life in the ward. In this stage, full openness by the nurses is needed. Second, the attribute of the Conflict Stage were conflict, fear, curiosity, belief, reflection. When they sign the consentment form, they experience conflicts about the possibility of complication, fear of recovery from anesthesia, curiosity about the operation procedure, post - operation state, reflection on their past life, and promise to care for their family members after discharge and keep their religious life faithfully. And they accepted the operation depending on God, believing in modern medicine, and the surgeon. Asking for their changed informations, they expected positive results from the operation. In this stage, an empathic attitude by the nurses is needed. Third, the attribute of the Stability Stage were relief, gratitude, difficulty with excretion, and pain. When they awoke from anesthesia, they felt relief because of a the end of the operation, but they experienced extreme pain, difficulty of excretion in bed. They accepted the changed environment and expected recovery. In this stage, support by the nurses is needed. Fourth, the attributes of the Independence Stage were freedom, exercise, nurturing, anxiety, and discomfort. When they ambulated and exercised, they experienced freedom. They showed exhibited weakness of the digestive organs and discomfort hospital's space, structure, and facilities, the delay of medical certificate issue the lack of prompt response by the medical agents. They ate nurturious food and felt anxiety on the end of hospital life and returning to their ordinary life. They showed the independence of overcoming their environment by increasing exercise and expected their discharges. In this stage, respect by the nurses is needed for the patients to, overcome their environment and prepare for their independence. Fifth, the attributes of the Extension Stage were pessimism, isolation, dissatisfaction, and pain. Accompanied injury and old age made their ward life extend to over seven weeks. They exhibited weariness, melancholy, skeptisis, general pessimistic feeling, and desperation caused by their isolated life. They experienced the digestive discomfort caused by the prolonged medication and psycological pain caused by long-time hospitalization. As a, result, their dissatisfaction on the human, physical, and systematic environments had been increased. They acquired critical power and sought for something to do spending their time. They expected vaguely about the returning of their ordinary life. In this stage, counseling is needed by the nurse to overcome positively their psychological, social, and physical problems. The process of the FNF patient's ward life starts from the dependent state, when they are hospitalized, and gradually progresses to self-fulfillment in order to keep independent life. As a result, the FNF patients showed "Response in Challenge" or "Adaptation in Conflict" through their experiences of social, physical, and psychological difficulties.

  • PDF