• Title/Summary/Keyword: 역할계층

Search Result 536, Processing Time 0.039 seconds

A Study on the Contents Management using Internet Value Chain Model (인터넷 가치사슬 모형을 이용한 콘텐츠 관리 방안 연구)

  • Hong, Myung-Hon
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.973-976
    • /
    • 2009
  • 본 논문은 인터넷에서 이뤄지는 콘텐츠의 생성과 유통 활동을 마이클 포터의 가치사슬 모델을 이용하여 2계층 8개 기능으로 설명한다. 2개의 계층은 콘텐츠 생산과 유통 계층, 관리 계층이다. 8개의 기능은 (1) 인터넷관리, (2)콘텐츠 생성, (3)콘텐츠 수집, (4)웹 호스트, (5)인터넷 서비스 제공, (6)검색과 네비게이션, (7)사용자 장치, (8) 인터넷 사용으로 구분한다. 인터넷 가치 사슬 모형의 8개 기능에 대해 (i) 인터넷에서 콘텐츠를 생성 유지 관리하는 활동의 범위와 역할 (ii) 인터넷 가치 사슬의 각 단계에 있는 활동들이 인터넷 상의 소비자 보호에 공헌할 수 있는 가능성의 관점에서 연구를 수행하였다.

  • PDF

Communication Reliability Test of IEEE1212 Based RTU through WCRT Analysis of CAN (CAN 통신 WCRT 분석을 통한 IEEE1212 기반 RTU의 통신 신뢰성 검증)

  • Hwang, Hyo-Seong;Youm, Bok-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2015.07a
    • /
    • pp.1331-1332
    • /
    • 2015
  • 본 논문은 CAN(Controller Area Network) 통신의 WCRT(Worst Case Response Time) 분석을 통해 IEEE1212 기반 RTU(Remote Terminal Unit)의 통신 신뢰성을 검증한다. RTU는 원격지에서 네트워크를 구성하여 각 모듈들로부터 획득한 정보를 서버로 전송하거나 원격지를 제어하는 역할을 한다. 본 논문에서 대상으로 하는 RTU의 네트워크는 물리계층과 데이터링크 계층은 CAN을 사용하고 응용계층은 IEEE1212 기반으로 통신한다. 즉, RTU를 구성하는 모듈은 각각메모리 영역을 가지고 있고, CAN ID에 메모리 주소를 포함하여 해당 영역을 쓰는 구조로 통신을 한다. 첫 번째로 이러한 응용계층을 고려하여 WCRT를 계산하는 방법을 제시하고, 두 번째로 CAN 메시지의 우선 순위를 최적화하는 방법을 고찰한다. 마지막으로 시험 환경을 구축하고 시뮬레이션을 통해 앞에서 선정한 우선순위에 따라 통신 신뢰성을 검증한다.

  • PDF

Improving the Performance of Remote Method Invocation by Measurement of Link State in Mobile Computing Environments (이동 컴퓨팅 환경에서 링크 상태 측정을 통한 원격 메소드 호출의 성능 개선)

  • Kim, Hyeon-Ho;Kang, Dae-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10a
    • /
    • pp.259-262
    • /
    • 2001
  • 휴대용 컴퓨터와 무선통신 기술 발달로 인해 사용자들은 시간과 장소의 구애를 받지 않고 컴퓨팅 환경을 제공받을 수 있게 되었다. 그러나 일반적인 무선 환경에서는 핸드오프나 비트오류 등 단시간 단절이 매우 흔한 일이지만 TCP는 이를 유선상의 혼잡 신호로 인식하여 전송 윈도우의 크기를 줄이고 불필요한 대기시간을 설정하는 등의 혼잡제어 정책을 수행하게 된다. 따라서 이러한 문제를 해결하기 위해 여러 계층에서 시도하는 노력이 있었으나 링크 상태를 파악하여 응용계층에서 자료 전송 여부를 미리 결정할 수 있다면 불필요한 전송을 막을 수 있다. Remote Method Invocation(RMI)는 대화형 응용 프로그램과 서비스를 쉽게 만들 수 있도록 해주는 Java 기반의 하부 구조로써, 응용계층과 전송계층의 중간에 위치하여 사용자의 자료를 전달하는 역할을 하므로 이를 수정하는 것이 가장 바람직하다. 이 논문에서는 무선 상황에 적절하게 적응하는 RMI를 위해 동작과정을 확장하여 구현한다.

  • PDF

A Lattice-Based Role Graph Security Model ensuring Confidentiality and Integrity (비밀성과 무결성을 보장하는 격자개념의 역할그래프 보안 모델)

  • Choi, Eun-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.91-98
    • /
    • 2009
  • In this paper, this model ensures confidentiality and integrity of mandatory access cotrol policy which based on fuzzy function with importance of information. And it solves authorization abuse problem through role graph creation algorithm and flowing policy that security grade is applied. Because this model composes role hierarchy which bind similar role concept to apply to commercial environment, it has expansile advantage by large scale security system as well as is easy that add new role.

A Framework for Developing Distributed Application with Web-Tier Object Modeling (웹계층 오브젝트 모델링을 통한 분산 애플리케이션 개발 프레임웍크)

  • Cheon, Sang-Ho;Kwon, Ki-Hyeon;Choi, Hyung-Jin
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1143-1148
    • /
    • 2004
  • To develop multi-tier model or distributed architecture based distributed application needs to consider various aspects such as division of role between web-designer and software developer, defining entity and its usage, database connection and transaction processing etc. This paper presents DONSL(Data Server of Non SQL-Query) architecture that provides solution to above aspects through web-tier object modeling. This is the architecture that guarantees the transaction processing and performance between web-tier and DBMS through simplified usage of query logic property. This new conceptual framework also solves enterprise site implementation problems simplifying tier, and removing DAO(Data Access Object) and entity.

A Study on the Priorities in the Roles of Community Pharmacists in Aged Society Using AHP (AHP를 이용한 고령사회 약국약사의 역할에 대한 우선순위 연구)

  • Kang, Eunjeong;Jang, Sunmee;Kil, Tae Soo
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.6
    • /
    • pp.402-411
    • /
    • 2019
  • This study aimed to identify priorities in community pharmacist's roles in aged society using Analytic Hierarchy Process. We developed a survey questionnaire for AHP, which consisted of 19 pharmacist's roles selected from the FIP/WHO guidelines. The AHP survey questionnaire was self-administered by 127 pharmacists. The results showed that pharmacists put medication therapy management at the highest priority, preparation, dispense, distribution of medication at the second priority, and efficient healthcare system at the lowest priority. Among the 19 roles, new roles such as monitoring of medication therapy results, team-based health care, and transitions of care obtained relatively high priority.

Study on The RBAC Protocol of Medical Information System (의료정보시스템의 RBAC 프로토콜 연구)

  • Lim, Kyeong Suk;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.77-84
    • /
    • 2016
  • In general RBAC(Role-Based-Access Control) model, senior role has junior role's permissions by virtue of role hierarchy. But although the opposite case is needed partially in medical institutions, such case cannot be performed in medical information systems. This is because inheritances of permissions in role hierarchies are static. In order to tackle this problem, this paper defined a dynamic role assignment, thereby proposed the way for the junior temporarily to be able to perform the permissions of the senior, and showed the applications of medical information systems.

On Multipliers of Lattice Implication Algebras for Hierarchical Convergence Models (계층적 융합모델을 위한 격자함의 대수의 멀티플라이어)

  • Kim, Kyoum-Sun;Jeong, Yoon-Su;Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.5
    • /
    • pp.7-13
    • /
    • 2019
  • Role-based access or attribute-based access control in cloud environment or big data environment need requires a suitable mathematical structure to represent a hierarchical model. This paper define the notion of multipliers and simple multipliers of lattice implication algebras that can implement a hierarchical model of role-based or attribute-based access control, and prove every multiplier is simple multiplier. Also we research the relationship between multipliers and homomorphisms of a lattice implication algebra L, and prove that the lattice [0, u] is isomorphic to a lattice $[u^{\prime},1]$ for each $u{\in}L$ and that L is isomorphic to $[u,1]{\times}[u^{\prime},1]$ as lattice implication algebras for each $u{\in}L$ satisfying $u{\vee}u^{\prime}=1$.

A Study of the relation between class and the welfare attitudes and regulating effects of education (계급·계층이 복지정책에 대한 태도에 미치는 영향과 교육변인의 조절효과 연구)

  • Kim, HeeJa
    • 한국사회정책
    • /
    • v.20 no.2
    • /
    • pp.35-68
    • /
    • 2013
  • Class has been the factor that affects welfare attitudes in western societies. But the results of the studies on affects of class in Korea are not consistent. This Study focuses on the relations between three class variables-income, status in employment, occupation-and the Korean attitudes on welfare policy and examines the regulating effects of education on that. Attitudes on welfare policy consist of 'reinforcement of established welfare programs', 'expansion into new welfare area' and 'universalism in welfare policy.' The result shows that all three class variables, education and age do not affect the attitudes to 'reinforcement of established welfare programs.' Age and class variables affects the attitudes to 'expansion into new welfare area' statistically, but education does not. Education explains largest parts of the attitudes to 'universalism in welfare policy.'

Extended GTRBAC Model for Access Control Enforcement in Ubiquitous Environments (유비쿼티스 환경의 접근제어를 위한 확장된 GTRBAC 모델)

  • Hwang Yu-Dong;Park Dong-Gue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.45-54
    • /
    • 2005
  • The existing access control models have the demerits that do not provide the limit function of using resources by time constraint, the restricted inheritance function as a superior role in role hierarchy, the delicate delegation policy and the limit function of using resources by the location information about a user for the access control in ubiquitous environment. This paper proposes an Extended-GTRBAC model is suited to the access control in ubiquitous environment by applying to sub-role concept of GTRBAC model that the application of resources can be restricted by the period and time and PBDM and considering the location information about a user on temporal constraint. The proposal model can restrict the inheritance of permission in role hierarchy by using sub-role, provide the delicate delegation policy such as user-to-user delegation, role to role delegation, multi-level delegation. multi-step delegation, and apply diverse and delicate access control policy which is suited the characteristic of ubiquitous environment by considering the location information about a user on temporal constraint.

  • PDF