• Title/Summary/Keyword: 상속인

Search Result 360, Processing Time 0.023 seconds

A Recommendation Method of Similar Clothes on Intelligent Fashion Coordination System (지능형 패션 코디네이션 시스템에서 유사의류 추천방법)

  • Kim, Jung-In
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.5
    • /
    • pp.688-698
    • /
    • 2009
  • The market for Internet fashion/coordination shopping malls has been enormously increased year by year. However, online shoppers feel inconvenient because most of Internet shopping malls still rely on item classifications by category and do not provide the functionality in terms of which shoppers can find clothes they want. In an effort to build a fashion/coordination system for women's dress adopting the Heuristic-based method, one of the Context-based methods, we present a method for defining characteristics of a woman's dress as attributes and their inheritance relations, which can be input by a product manager. We also compare and analyze various methods for recommending the most similar clothes.

  • PDF

Permission Inheritance Expression with Role Hierarchy of RBAC (역할기반 접근통제에서 역할 계층에 따른 접근권한 상속의 표현)

  • Lee, Sang-Ha;Jo, In-Jun;Cheon, Eun-Hong;Kim, Dong-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2125-2134
    • /
    • 2000
  • RBAC(Role Based Access Control) has the advantage that reflects the real world because it presents a basic access control model based on user's role in organizations or governments. But in RBAC model, the privileges of the senior roles in these hierarchies are inherited from those of the junior roles, so RBAC model has the privileges problem that he senior are given more privileges than they need. That is, it tends to infringe the Principle of Least Privilege. On the other hand, if we give some excessive constraints on the RBAC model without scrupulous care, it may be meaningless property of role hierarchies. Furthermore, such complicated constraints make it more difficult to mange resources and roles in huge enterprise environments. The purpose of this paper is to solve the problems of role hierarchies such as inefficient role managements and abuse of privileges by using newly presented the backward tag pointer path expression in the inheritance of privileges.

  • PDF

Fuzzy based Thesaurus Construction Supporting Component Retrieval (컴포넌트 검색을 지원하는 퍼지 기반 시소러스 구축)

  • Kim, Gui-Jung;Han, Jung-Soo;Song, Young-Jae
    • The KIPS Transactions:PartD
    • /
    • v.10D no.5
    • /
    • pp.753-762
    • /
    • 2003
  • Many Methodologies have proposed for component retrieval. Among them, thesaurus concept has introduced for similar component retrieval. This paper classified classes by concept according to inheritance relation for efficient retrieval of component, and applied fuzzy logic to thesaurus method and constructed object-oriented thesaurus. Proposed method could express category between concepts automatically, and calculate fuzzy degree between classes by comparing matching and mismatching degree to each class and category and construct thesaurus. Component retrieval is that using classes of component, candidate components are retrieved according to priority order using fuzzy similarity. Also, we improved retrieval performance by thesaurus greatly, setting critical of most suitable through simulation.

Consciousness of Filial Piety and Family Values in College Students (대학생의 효에 대한 인식과 가족가치관에 영향을 미치는 변인)

  • Bae, Moon-Jo;Park, Se-Jeong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.5
    • /
    • pp.275-285
    • /
    • 2013
  • The purpose of this study was to investigate the differences of gender on consciousness of filial piety in undergraduates. The researched were 155 male and 176 female students in Daegu. The major findings of this study were as follows. : First, there were significant differences in the consciousness of filial piety according to student's gender. there were significant differences in the reason of filial piety according to student's gender. there were significant differences in the family values according to student's gender. Finally, the variables influencing college students' family values were gender, awareness of emotion supporting, financial supporting, physical supporting, and attachment with their parents.

The Development of the Prototype for Electronic Journal (전자저널 개발모형에 관한 연구)

  • 정준민
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.3
    • /
    • pp.203-218
    • /
    • 2001
  • The prototype of electronic journal is proposed on the notion of functional properties of internet or web. Additionally, the methodology for the friendly relationship between print oriented journal and electronic one is also suggested. The electronic journal is consisted of 6 menus, administration area, community service, what\`s up & current papers. category service, searching and extend retrieval service. And the electronic journal is designed not only on the succession of the attributes of printed journal, but also on tole emphasis of its electrical properties. But at the end of document, it is mentioned that in the near future all the information service related media or mechanisms will be synthesized and uniquely evolved on the succession of those properties.

  • PDF

A Study on Information Security policy for VoIP Service in Next Generation Networks (차세대 네트워크 환경에서의 인터넷전화 서비스를 위한 정보보호 대책 연구)

  • Sung, Kyung;Kim, Seok-Hun
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.28-33
    • /
    • 2008
  • VoIP provided voice service using Internet is receiving footlights when it escapes an initial curiosity. VoIP interest became larger, because it can transfer existing phone service and deliver voice data through internet technology. Is inheriting as it is threats of IP base because a VoIP technology provides audiocommunication service taking advantage of an existing IP technology, and have new threats that happen from new know-hows for VoIP service offer. In this paper, presented about problem and consideration and countermeasure of examines about security threat of VoIP service, and applies security.

  • PDF

An Advanced Permission-Based Delegation Model in RBAC (RBAC을 기반으로 하는 향상된 권한 위임 모델)

  • Kim, Tae-Shik;Chang, Tae-Mu
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.725-732
    • /
    • 2006
  • RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. However, RBAC does not process delegation of permission effectively that occurs frequently in the real world. This paper proposes an Advanced Permission-Based Delegation Model(APBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. APBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.

Policy and Mechanism for Safe Function-level Dynamic Kernel Update (함수 단위 동적 커널 업데이트를 위한 보안 정책 및 기법의 설계)

  • Park, Hyun-Chan;Yoo, Chuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.8
    • /
    • pp.808-812
    • /
    • 2008
  • In recent years, the software vulnerability becomes an important problem to the safety in operating system kernel. Many organizations endeavor to publish patches soon after discovery of vulnerability. In spite of the effort, end-system administrators hesitate to apply the patches to their system. The reasons of hesitation are the reboot disruption and the distrust of patches. To solve this problem we propose a dynamic update system for non-updatable kernel, named DUNK. The DUNK provides: 1) a dynamic update mechanism at function-level granularity to overcome the reboot disruption and 2) a safety verification mechanism to overcome the distrust problem, named MAFIA. In this paper, we describe the design of DUNK and detailed algorithm of MAFIA.

Retesting Method of Classes in Associated Relation using Message Path (메시지 경로를 이용한 클래스 연합관계에서의 수정 테스트 방법)

  • Bang Jung-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.49-56
    • /
    • 2005
  • Reuse of software is the process of developing software system which does not develop all modules newly but construct system by using existing software modules. Object oriented concept introduces dynamic binding and polymorphism, which increases number of executable Paths. In this case static analysis of source code is not useful to find executable path. These concepts occur new Problems in retesting. Tradition testing method can not cover complex relations such as inheritance, message Passing and instance of and can not apply on object oriented retesting. we propose the method to reduce the number of methods and classes to be retested in associated class relation.

  • PDF

A Study on the Interoperability between heterogeneous Component Platform (이형 분산 컴포넌트 플랫폼간 상호 운영성 보장에 대한 연구)

  • 장연세
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.40-45
    • /
    • 2002
  • There has been several meaning full efforts to save costs and expand the life-time of a system in changeful If circumstance. It was a module-based architecture that empower productivity at structured programming. It couldn't grow nor evolve, but could raise only calling frequency of module. But OOP or OO-method overcome limit of structured programing by class inheritance and/or overloading and/or over-riding. A component centric architecture, what is mixture of distributed systems, like CORBA. COM+ or EJB/J2EE with OOP. can support not only high reusability or expansion of life-time but also Plug-&-Play between component. In now day. It is not problem of component building but problem of interoperability between heterogeneous CBD Platform. At this study, the enhanced referential component architecture will be suggested.

  • PDF