• Title/Summary/Keyword: authorization

Search Result 508, Processing Time 0.037 seconds

Privacy Enhanced Security Mechanism for Grid Applications

  • Park, Sang-Bae
    • International Journal of Contents
    • /
    • v.6 no.3
    • /
    • pp.15-18
    • /
    • 2010
  • Grid system is based on the Grid Security Infrastructure (GSI). GSI uses user's proxy to guarantee availability among multi-trust domains. Since grid system has been developed focusing on availability, GSI provides authentication and authorization performed by systems, but there are lacks of privacy consideration. For this reason, some researchers decide to use their own cluster system and do not want to use public grid systems. In this paper, we introduce a new privacy enhanced security mechanism for grid systems. With this mechanism, user can participate in resource allocation and authorization to user's contents more actively. This mechanism does not need to change previous middleware and minimize the computational overheads.

Design of Security Enforcement Engine for Active Nodes (능동 노드를 위한 보안강화엔진 설계)

  • 김옥경;임지영;김여진;나가진;나현정;채기준;나중찬;김영수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.362-364
    • /
    • 2003
  • 본 논문은 액티브 네트워크 환경에서 액티브 노드를 위한 보안강화엔진의 구조와 기능을 설계하였다. 액티브 노드의 자원에 접근 시 발생되는 보안상의 문제점들을 해결하기 위한 보안강화엔진 구조를 제안하고 보안강화엔진 내에 Security, Authentication, Authorization 모듈을 두어 액티브 네트워크 환경에 노출되어있는 악의적인 위협 요소들로부터 액티브 노드들을 보호하고자 하였다. 본 논문에서는 보안강화엔진에서 Security, Authentication, Authorization 모듈의 설계 내용에 대해 기술한다.

  • PDF

An Anonymity-Preserving User Authentication and Authorization Model for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.25-32
    • /
    • 2005
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'Smart space' augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack of proper authentication and authorization techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environments. In this Paper, we propose efficient user authentication and authorization model with anonymity for the privacy-preserving for ubiquitous computing environments. Our model is suitable for distributed environments with the computational constrained devices by using MAC-based anonymous certificate and security association token instead of using Public key encryption technique. And our Proposed Protocol is better than Kerberos system in sense of cryptographic computation processing.

Security Architecture for OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경을 위한 보안 아키텍처)

  • 박대하;김영갑;문창주;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.3
    • /
    • pp.259-272
    • /
    • 2004
  • This paper suggests a new security architecture for facilitating secure OSGi service platform environment. The security architecture includes 1) user authentication mechanism, 2) bundle authentication mechanism, 3) key sharing mechanism, and 4) authorization mechanism. The user authentication mechanism supplies SSO(single sign-on) functions which are useful for safe and easy user authentications. The bundle authentication mechanism utilizes both PKI-based and MAC-based digital signatures for efficiently authenticating service bundles. The key sharing mechanism, which is performed during bootstrapping phase of a service gateway, supplies a safe way for sharing secret keys that are required for authentication mechanisms. Finally, the authorization mechanism suggests distributed authorization among service providers and an operator by establishing their own security policies. The main contributions of the parer are twofold. First, we examine several security requirements of current OSGi specification when its security functions can be applied in real OSGi environments. Second, we describe the ways to resolve the problems by means of designing and implementing concrete security mechanisms.

The Access Control System of Network Management Information Base (망관리 정보베이스 접근 제어 시스템)

  • Kim, Jong-Duk;Lee, Hyung-Hyo;Noh, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1246-1256
    • /
    • 1998
  • MIB(Management Information Base), one of the key components of network management system, is a conceptual repository for the information of the various managed objects. MIB stores and manages all the structural and operational data of each managed resources. Therefore, MIB should be protected properly from inadvertant user access or malicious attacks. International standard ISO/IEC 10164-9 describes several managed object classes for the enforcement of MIB security. Those managed object classes described access control rules for security policy. But the exact authorization procedures using those newly added managed object classes are not presented. In this paper, we divide managed object classes into two groups, explicit and implicit ones, and describe the access authorization procedure in Z specification language. Using Z as a description method for both authorization procedure and GDMO's action part, the behaviour of each managed object class and access authorization procedure is more precisely and formally defined than those of natural language form.

  • PDF

A Study on Policy Design of Secure XML Access Control (안전한 XML 접근 제어의 정책 설계에 관한 연구)

  • Jo, Sun-Moon;Joo, Hyung-Seok;Yoo, Weon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.11
    • /
    • pp.43-51
    • /
    • 2007
  • Access control techniques should be flexible enough to support all protection granularity levels. Since access control policies are very likely to be specified in relation to document types, it is necessary to properly manage a situation in which documents fail to be dealt with by the existing access control policies. The existing access control has not taken information structures and semantics into full account due to the fundamental limitations of HTML. In addition, access control for XML documents allows only read operations, and there exists the problem of slowing down system performance due to the complex authorization evaluation process. In order to resolve this problem, this paper designs a XML Access Control Management System which is capable of making fined-grained access control. And then, in developing an access control system, it describes the subject and object policies of authorization for XML document on which authorization levels should be specified and which access control should be performed.

BLE-OTP Authorization Mechanism for iBeacon Network Security (iBeacon 네트워크 보안을 위한 BLE-OTP 인증 메커니즘)

  • Jung, Hyunhee;Shin, Dongryeol;Cho, Kwangsu;Nam, Choonsung
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.979-989
    • /
    • 2015
  • Machine to Machine (M2M) technology has gained attention due to the fast diffusion of Internet of Things (IoT) technologies and smart devices. Most wireless network experts believe that Bluetooth Low Energy (BLE) Communications technology in an iBeacon network has amazing advantages in terms of providing communication services at a low cost in smartphone applications. Specifically, BLE does not require any pairing process during its communication phases, so it is possible to send a message to any node without incurring additional transmissions costs if they are within the BLE communication range. However, BLE does not require any security verification during communication, so it has weak security. Therefore, a security authorization process would be necessary to obtain customer confidence. To provide security functions for iBeacon, we think that the iBeacon Message Encryption process and a Decryption (Authorization) process should be designed and implemented. We therefore propose the BLE message Authorization Mechanism based on a One Time Password Algorithm (BLE-OTP). The effectiveness of our mechanism is evaluated by conducting a performance test on an attendance system based on BLE-OTP.

Comparison of the Expedited Programs for Innovative Drug Development and Approval among United States, European Union, and Republic of Korea (한국, 미국, 유럽의 혁신적 의약품 개발 및 허가제도 비교 연구)

  • Jiyeon Park;Hyewon Shin;Jangik. I. Lee
    • Korean Journal of Clinical Pharmacy
    • /
    • v.34 no.1
    • /
    • pp.39-61
    • /
    • 2024
  • Background: The Food and Drug Administration (FDA), the European Medicines Agency (EMA), and the Ministry of Food and Drug Safety (MFDS) have been implementing the expedited programs that promote the innovative approval of new medications to be used for serious diseases. The authors comprehensively investigated, analyzed, and compared the regulations and guidelines associated with the expedited programs. Methods: The expedited programs for innovative drug development and approval were searched from the homepages of FDA, EMA and MFDS. The detailed information on the regulations and guidelines associated with the programs was comprehensively extracted from various electronic repositories of each regulatory authority. The information on each program was analyzed, categorized, and compared from the points of benefits, applicability with scientific rationale, application procedure, and maintenance. Results: FDA's programs include Fast Track Designation, Breakthrough Therapy Designation, Priority Review Designation, and Accelerated Approval. EMA's regulation implements PRIority MEdicines (PRIME), Accelerated Assessment, Marketing Authorization under Exceptional Circumstances (MAEC), and Conditional Marketing Authorization (CMA). MFDS has a single Expedited Program. These programs are broadly categorized into those that 1) facilitate early and proactive communication with regulatory authorities, 2) shorten the review time after submitting a marketing application, and 3) temporarily approve a marketing authorization under certain conditions. Conclusion: Each expedited program requires a different level and amount of safety and efficacy evidence to be submitted to each regulatory authority. This article will likely provide the comprehensive information on which program provides scientific and regulatory advantages to be taken for innovative medication development.

Strategies to Improve Use of Medicines (의약품의 적정 사용을 위한 전략)

  • Park, Sylvia
    • Quality Improvement in Health Care
    • /
    • v.12 no.2
    • /
    • pp.93-112
    • /
    • 2006
  • This study reviewed published studies on interventions used by hospitals, health insurance programs, or governments to improve use of medicines in foreign countries. Interventions to improve use of medicines are classified into two categories: 1) information strategies-dissemination of educational materials, group education, one-to-one educational outreach, drug utilization review, and feedback; 2) managerial strategies- formularies, prior authorization, and financial incentives. Dissemination of educational materials, which is a common intervention, was unsuccessful in changing physicians' prescribing behaviors. Problem-based small group education was more likely to change behaviors than didactic large group education. One-to-one educational outreach(academic detailing) was among the most effective strategies used to change prescribing behaviors. Prospective drug utilization review (DUR) program was more successful in improving use of medicines than retrospective DUR program. Feedback intervention has been reported to be ineffective to change behaviors. Formularies are frequently used to control medication use by most health insurance programs. Financial incentives provide physicians economic incentives according to appropriateness of prescribing. However, few published studies have assessed the efficacy of formularies or financial incentives. Prior authorization requires physicians to get authorization from health insurers before prescribing a certain group of drugs which is usually of high costs or risk. There is no magic bullet for quality use of medicines. Multifaceted interventions that help to predispose, enable, and reinforce desired behaviors are more likely to be successful.

  • PDF

Access Control as a Service for Information Protection in Semantic Web based Smart Environment

  • Siddiqui, Isma Farah;Lee, Scott Uk-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.9-16
    • /
    • 2016
  • Pervasive computing and Internet of Things (IoT) have recently received considerable interest to deploy solutions for the future Internet. Smart environments are integrated with Semantic Web to provide context-awareness to the processed information. Self-learning techniques have been adopted within smart solutions for efficient retrieval of data but do not process data with privacy parameters for in-place authorization. To overcome this issue, we present a novel approach of deploying access control as a service mechanism within Semantic Web based smart environment by using eXtensible Access Control Markup Language (XACML). The proposed XACML as a Service (XACMLaaS) approach offers fine-grained access control for protecting information within smart environment. In this paper, we have defined mathematical rules for each components of proposed access control service layer. These rules are for implementation of access control using XACML. The proposed approach allows the adaptation of authorization of information at component level and provides scalable solution for authorization policies and rule enforcement within smart environment.