• Title/Summary/Keyword: API access control

Search Result 26, Processing Time 0.026 seconds

A Role-Based Access Control System API Supporting External Authority Interface

  • Ma, Jin;Kim, Hyunah;Park, Minjae
    • Journal of Internet Computing and Services
    • /
    • v.19 no.2
    • /
    • pp.27-32
    • /
    • 2018
  • In industries that are operating various enterprise systems, new systems are integrated and operated in accordance with each period. In particular, when a new system is to be integrated, one of the major considerations is the single sign-on part for integrating and operating the authentication. To implement this authority system using role-based access control method, an extension method for access control method is needed. Therefore, in this paper, we design an extended role-based access control model for interworking with legacy authority system and provide its APIs. The extended role-based access control model is a model in which external authority information, which holds authority information in the authority information, is added. And we describe operations that the REST Web APIs are based on these models. In this paper, the method is described in the back-end APIs and can be implemented as an operation of an extended role-based access control system based on the method.

A Design and Implementation of Java Library for Multiple Access Control Models (다중 접근제어 모델을 위한 Java 라이브러리의 설계 및 구현)

  • Oh, Se-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1394-1401
    • /
    • 2007
  • Secure access control is a hot issue of large-scale organizations or information systems, because they have numerous users and information objects. In many cases, system developers should implement an access control module as a part of application. This way induces difficult modification of the module and repeated implementation for new applications. In this paper we implement a Java API library for access control to support system developers who use Java. They can easily build up access control module using our library. Our library supports typical access control models, and it can offer new types of access control. Furthermore, it is able to run multiple access control models at the same time.

  • PDF

An Implementation of Hierarchical RBAC(Role Based Access Control) API using Database (데이터베이스를 이용한 RBAC(역할기반 접근제어) 서버 API 구현)

  • Kim Jin Sik;Kim Min Young;Lee Sang-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.199-201
    • /
    • 2005
  • RBAC(Role Based Access Control) 이란 특정 사용자가 어떤 대상에 특정 행동을 하는 데에 있어서 그 사용자가 가진 역할 (Role) 에 의해 접근 가능유무를 판정하게 하는 방법이다. 그 RBAC 에 역할간의 계층관계를 추가한 것이 계층적 RBAC (Hierarchicai RBAC)이다. 본 논문에서는 그런 다른 어플리케이션에 쉽게 추가 되거나 아니면 독자적으로 인증 기능을 가지는 계층적 RBAC 서버에 사용될 수 있는 API 와 그와 관련된 응용 어플리케이션을 자바와 데이터베이스를 이용하여 설계 및 구현하였다.

  • PDF

An Access Control System for Ubiquitous Computing based on Context Awareness (상황 인식 기반의 유비쿼터스 컴퓨팅을 위한 접근 제어 시스템)

  • Lee, Ji-Yeon;Ahn, Joon-Seon;Doh, Kyung-Goo;Chang, Byeong-Mo
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.35-44
    • /
    • 2008
  • It is important to manage access control for secure ubiquitous applications. In this paper, we present an access-control system for executing policy file which includes access control rules. We implemented Context-aware Access Control Manager(CACM) based on Java Context-Awareness Framework(JCAF) which provides infrastructure and API for creating context-aware applications. CACM controls accesses to method call based on the access control rules in the policy file. We also implemented a support tool to help programmers modify incorrect access control rules using static analysis information, and a simulator for simulating ubiquitous applications. We describe simulation results for several ubiquitous applications.

A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns (SSL VPN기반의 행위.순서패턴을 활용한 접근제어에 관한 연구)

  • Jang, Eun-Gyeom;Cho, Min-Hee;Park, Young-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.125-136
    • /
    • 2013
  • In this paper, we proposed SSL VPN-based network access control technology which can verify user authentication and integrity of user terminal. Using this technology, user can carry out a safety test to check security services such as security patch and virus vaccine for user authentication and user terminal, during the VPN-based access to an internal network. Moreover, this system protects a system from external security threats, by detecting malicious codes, based on behavioral patterns from user terminal's window API information, and comparing the similarity of sequential patterns to improve the reliability of detection.

A Converged Profile and Authentication Control Scheme for Supporting Converged Media Service (융합 미디어 서비스 제공을 위한 통합 프로파일 및 인증제어 기술 연구)

  • Lee, Hyun-Woo;Kim, Kwi-Hoon;Ryu, Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.503-516
    • /
    • 2010
  • In this paper, we propose the converged profile and authentication scheme for supporting converged media services of broadcasting & communications convergence in fixed mobile convergence networks. The proposed scheme supports the management of access, service, mobility and IPTV profiles on subscriber and a function of open API(Application Program Interface) for providing the subscriber profile for the third party service provider with the PUSH/PULL method. The open API is based on a web service and a REST(Representational State Transfer) and provides various services for the third party service provider with ease. In addition, the proposed scheme supports a function of SSO(Single Sign-on). After user succeeded in establishing an access connection, user can sustain the same authentication state with this function although connected access network is changed or IMS(IP Multimedia Subsystem) service network is attached. We evaluate and analyze the performance of the proposed scheme through the implementation of CUPS(Converged User Profile Server) system test-bed.

A JAVA Client/Server Development for CAN-Based Remote Controls (CAN 기반의 원격제어 시스템을 위한 JAVA Client/Server 개발)

  • 정민식;박진우;이장명;이만형
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.324-324
    • /
    • 2000
  • This paper presents a CAN-based control system, which supports tole-operations over the Internet. As a result, CAN-based control systems are opened up for remote control, monitoring and maintenance using WWW-technology. Most of the system is written in JAVA because it is small, powerful package and can easily be reused in the whole system on different platforms and implemented in embedded system. The effectiveness of proposed method is demonstrated through the experiments using a CAN-based manipulator, which allow remote access for Web-based Java clients.

  • PDF

API Server Transport Layer Security Packets Real-Time Decryption and Visualization System in Kubernetes (쿠버네티스 API server의 Transport Layer Security 패킷 실시간 복호화 및 시각화 시스템)

  • Kim, Tae-Hyun;Kim, Tae-Young;Choi, Me-Hee;Jin, Sunggeun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.3
    • /
    • pp.99-105
    • /
    • 2021
  • The cloud computing evolution has brought us increasing necessity to manage virtual resources. For this reason, Kubernetes has developed to realize autonomous resource management in a large scale. It provides cloud computing infrastructure to handle cluster creations and deletions in a secure virtual computing environment. In the paper, we provide a monitoring scheme in which users can observe securely encrypted protocols while each Kubernetes component exchanges their packets. Eventually, users can utilize the proposed scheme for debugging as well as monitoring.

Design and Implementation of Smart City Data Marketplace based on oneM2M Standard IoT Platform (oneM2M 표준 IoT 플랫폼 기반 스마트시티 데이터 마켓플레이스 설계 및 구현)

  • Jeong, SeungMyeong;Kim, Seong-yun;Lee, In-Song
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.157-166
    • /
    • 2019
  • oneM2M has been adopted to national and global smart city platforms leveraging its benefits, oneM2M platform assures interoperability to devices and services with standard APIs. Existing access control mechanisms in the standard should be extended to easily distribute smart city data. Compared to the as-is standard, this paper proposes a new access control method with minimum human interventions during data distribution between data sellers and buyers. The proposal has been implemented as the new data marketplace APIs to oneM2M platform and used for data marketplace portal interworking. This also has been demonstrated with smart city PoC service.

Open Policy Agent based Multilateral Microservice Access Control Policy (개방형 정책 에이전트 기반 다자간 마이크로서비스 접근제어 정책)

  • Gu Min Kim;Song Heon Jeong;Kyung Baek Kim
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.60-71
    • /
    • 2023
  • A microservice architecture that accommodates the heterogeneity of various development environments and enables flexible maintenance can secure business agility to manage services in line with rapidly changing requirements. Due to the nature of MSA, where communication between microservices within a service is frequent, the boundary security that has been used in the past is not sufficient in terms of security, and a Zerotrust system is required. In addition, as the size of microservices increases, definition of access control policies according to the API format of each service is required, and difficulties in policy management increase, such as unnecessary governance overhead in the process of redistributing services. In this paper, we propose a microservice architecture that centrally manages policies by separating access control decision and enforcement with a general-purpose policy engine called OPA (Open Policy Agent) for collective and flexible policy management in Zerotrust security-applied environments.