• Title/Summary/Keyword: privilege Management

Search Result 65, Processing Time 0.019 seconds

Blockchain Technology and Utilization Schemes in Tactical Communication Network

  • Yoo, In-Deok;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.49-55
    • /
    • 2018
  • In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.

A Study on National Control Policy for the Use of Encryption Technologies by an Accused Person (피의자 개인의 암호이용 통제정책에 대한 연구)

  • Baek, Seung-Jo;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.271-288
    • /
    • 2010
  • In this paper, we study the dysfunctions of cryptography as dual-use goods and national domestic encryption control policies like key recovery system and decryption order. And we examine risks of the breach of the peoples' constitutional rights like the right to privacy in these policies and analyze these policies by applying the principle of the ban on the over-restriction. Finally, we propose the direction and requirements of our national domestic encryption control policy that maintains the balance of peoples' constitutional rights and investigatory powers.

Benefits and Challenges of Modular Integrated Construction in Hong Kong: A Literature Review.

  • Abdelmageed, Sherif;Abdelkhalek, Sherif;Zayed, Tarek
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.278-288
    • /
    • 2020
  • Modular Integrated Construction (MiC) has gained quite momentum as it provides solutions for several problems in the construction sector, particularly in Hong Kong. MiC is converting the building into modules and erecting them easily on site providing various benefits, such as cost and time savings, better quality, lower risk, higher sustainability, less injuries and accidents, etc. The MiC is considered the best alternative to traditional construction approaches in solving the huge housing demand problem in many cities all over the world due to the time-saving privilege. The utilization of MiC is facing a lot of challenges, which are considered obstacles to the wide acceptance of this technique in the construction industry in Hong Kong. This, in turn, has led the interests of the research community to investigate its benefits and challenges aiming at addressing several solutions to harness the benefits of this technique and to tackle these challenges. The present research aims to review the main concept of MiC and to determine the benefits and the challenges of implementing MiC in construction industry. The findings of this research highlight the advantages and limitations of incorporating MiC technique in Hong Kong, which will help the stakeholders to effectively utilize this technique in the construction industry.

  • PDF

Presidential Archives Management in Crisis - An Archival Approach to the Solutions - (위기에 처한 대통령기록물관리, 문제의 인식과 해결을 위한 접근 방식)

  • Lee, Sang-Min
    • The Korean Journal of Archival Studies
    • /
    • no.18
    • /
    • pp.281-315
    • /
    • 2008
  • This paper reviews recent records issues surrounding former president Roh Moo-Hyun's private possession of the copies of the presidential records in Korea. While the former president transferred his records to the National Archives of Korea, he copied his electronic presidential records and kept them in his house after the term. His retention of the "records copies" arouse critical records issues and criminal charges. In this paper, I examined the definition of presidential records and legal status of records copies, authenticity of electronic copies of public records in public and private records systems, nature and scope of presidential privilege of access to his records, and most importantly, political neutrality of national archives. I examined these issues comparing with foreign experience, especially that of the United States which has the Presidential Records Act like Korea. All issues are examined in the professional spirit of archives principles and archives ethics. Legal status of the electronic copies of presidential records is not firmly established and the criminal charge seems groundless. However, it is against public archives principles and ethics that private former president privately possesses and manages private information and national security information held in the electronic copies of the presidential records. Presidential Records Act of Korea provides an effective tool to protect the presidential records for 15 years and it should be respected. It is time to consolidate the public records management institutions in Korea, not to disintegrate them.

A Multi-Agent Scheme Considering User's Mobility RFID based on Knowledge Management System (사용자의 이동성을 고려한 멀티 에이전트 방식의 RFID 기반 지식 관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.99-108
    • /
    • 2010
  • The Wireless Ad Hoc network is discussed as a core technology for ubiquitous computing, and the smart tag technology is currently being actively discussed as a part of the sensor network. Thus, considering its security may advance the realization of ubiquitous computing. RFID (Radio Frequency Identification) technology using the smart tag technology as a part of the sensor network is currently in the limelight. In particular, when RFID is applied to a knowledge management system managing various data, data mobility and management convenience are ensured and automated knowledge service can be provided to users. Accordingly, this paper to proposed a secure scheme for mobility knowledge management systems using multi-agents differentiated from the existing knowledge management systems. Specifically, the proposed scheme designates user's authentication and privilege information in multi-agents and provides effective knowledge service through grouping based on user information. Moreover, even user's movement, the proposed scheme ensures service availability and provides continuous information through communication with multi-agent systems.

Development and Operation of Integrated Technical Information System(ITIS) for an Aircraft Development (항공기 통합기술정보시스템(ITIS) 개발 및 운용)

  • Chung, Joon-Young;Lee, Joon-Woo;Kim, Cheon-Young
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.2
    • /
    • pp.75-83
    • /
    • 2006
  • The Aircraft Development Department operated a Technical Document Management System that was effectively managed using a database management system for the management of the technical information created by a research and development phase of an aircraft and managed a technical information of a research and development varied by the project on a lot of the aircraft development program. While managing the user management and technical information project, it caused some problems on the workflow of the Work Memo and a search of some technical information, etc. As result, we developed the web-based Integrated Technical Information System(ITIS) which be able to totally manage the Technical Document Management System varied by program. According to the construction and operation of this system, we can access by program using user account and privilege and dramatically increased the productivity of a research and development because of performing the workflow of the Work Memo and some search of technical information by the integrated screen of the ITIS.

  • PDF

A Post-Management System of Digital Assets on Social network Services (소셜 네트워크 서비스에 게시된 디지털 자산의 사후 관리 시스템)

  • Moon, Wonsuk;Kim, Seoksoo
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.209-214
    • /
    • 2015
  • Social network services such as Facebook and Flickr is a very useful service that was the foundation of the Internet. If a state in which the Internet is connected, music, photos, and us to be able to share it freely post such as documents. However, even when the digital information posted in such social network services the user has died, and have been published, it is also used for people who do not intend the bad purposes some problems can occur. Facebook is trying to apply the findings Jed R. Brubaker of UC Irvine University in order to solve this problem. However, in Korea, such efforts, not much appears for now. Therefore, we proposed a method that can be managed by delegated Facebook, safely a Delegator digital information posted on social networking services such as Flickr. Our proposed system, as compared with Jed R. Brubaker and Jeong-Kyung Moon is executed previous studies, we studied a method proposed by the appropriate compensates points shortage is passed through the future research. And I consider to have been proposed a method to safely use posted digital assets in a social network service.

A Virtualization Management Convergence Access Control Model for Cloud Computing Environments (클라우드 컴퓨팅 환경에서 가상화 관리 융합접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.69-75
    • /
    • 2018
  • The purpose of access control is to prevent computing resources from illegal behavior such as leakage, modification, and destruction by unauthorized users. As the cloud computing environment is expanded to resource sharing services using virtualization technology, a new security model and access control technique are required to provide dynamic and secure cloud-based computing services. The virtualization management convergence access control model provides a flexible user authorization function by applying the dynamic privilege assignment function to the role based access control mechanism. In addition, by applying access control mechanism based on security level and rules, we solve the conflict problem in virtual machine system and guarantee the safeness of physical resources. This model will help to build a secure and efficient cloud-based virtualization management system and will be expanded to a mechanism that reflects the multi-level characteristics.

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

An Implementation of NEIS′DB Security Using RBAC based on PMI (PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.31-45
    • /
    • 2004
  • Public Key Infrastructure(PKI) provides a strong authentication. Privilege Management Infrastructure(PMI) as a new technology can provide user's attribute information. The main function of PMI is to give more specified authority and role to user. To authenticate net and role, we have used digital signature. Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. NEIS(National Education Information System) can not always provide satisfied quality of security management. The main idea of the proposed RNEIS(Roll Based NEIS) is that user's role is stored in AC, access control decisions are driven by authentication policy and role. Security manager enables user to refer to the role stored in user's AC, admits access control and suggests DB encryption by digital signature.