• Title/Summary/Keyword: 융합적 접근

Search Result 1,216, Processing Time 0.025 seconds

Role Based Access Control Model contains Role Hierarchy (역할계층을 포함하는 역할기반 접근통제 모델)

  • 김학범;김석우
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.49-58
    • /
    • 2002
  • RBAC(Role Based Access Control) is an access control method based on the application concept of role instead of DAC(Discretionary Access Control) or MAC(Mandatory Access Control) based on the abstract basic concept. Model provides more flexibility and applicability on the various computer and network security fields than the limited 1functionality of kernel access control orginated from BLP model. In this paper, we propose $ERBAC_0$ (Extended $RBAC_0$ ) model by considering subject's and object's roles and the role hierarchy result from the roles additionally to $RBAC_0$ base model. The proposed $ERBAC_0$ model assigns hierarchically finer role on the base of subject and object level and provides flexible access control services than traditional $RBAC_0$ model.

  • PDF

Prompt Engineering Techniques for Enhancing Emotional Empathy with GPT-3.5: Focusing on the Improvement of Consoling Responses (GPT-3.5를 활용한 정서적 공감 증진을 위한 프롬프트 엔지니어링 기법: 위로 응답의 효과 개선을 중심으로)

  • Gyeong-Min Lee;Jin Lee;Min-Hyoek Na;Jae-Woong Eom;Daehwan Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.873-874
    • /
    • 2024
  • 본 논문은 GPT-3.5 모델을 활용하여 우울증 환자의 일기에 대한 정서적 공감과 위로의 질을 향상 하는 프롬프트 엔지니어링 기법을 제안하고 실험적으로 검증한다. 제안 방법은 GPT-3.5모델에게 감정에 섬세하게 반응하고 적절한 위로의 답변을 생성하는 3가지 접근 방식을 사용한다. 위로 방법 구체적 제시, 페르소나 부여 및 감정 호소 명령서 제시를 통해 감정 일기 응답을 개선한다. 실험 결과, 조언 중심의 기존 답변 대신 감정을 중심으로 공감하는 응답이 생성됨을 확인할 수 있었다. 이는 우울증 환자에 대한 인문학적 접근과 제안 프롬프트 엔지니어링 기법을 통합하여, 인공지능 모델의 정서적 공감 능력을 향상할 수 있다는 것을 실험적으로 검증하였다.

Design of a Role-Based Access Control Model for Web-based Applications (웹 기반 응용을 위한 직무 기반 접근 제어 모델의 설계)

  • Lee, Ho
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.59-66
    • /
    • 2002
  • The access controls are the methods which are generally used in such systems as computer operating systems, workflow systems, information security systems and etc.. In the paper, is proposed a role-based access control model which not only has fundamental security functions such as security, integrity and flow control, but also meets the access control requirements of role-based social organizations. The proposed role-based access control model is designed in order to perform its functions in simple and secure way, largely in the environment of web-based applications.

  • PDF

On Multipliers of Lattice Implication Algebras for Hierarchical Convergence Models (계층적 융합모델을 위한 격자함의 대수의 멀티플라이어)

  • Kim, Kyoum-Sun;Jeong, Yoon-Su;Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.5
    • /
    • pp.7-13
    • /
    • 2019
  • Role-based access or attribute-based access control in cloud environment or big data environment need requires a suitable mathematical structure to represent a hierarchical model. This paper define the notion of multipliers and simple multipliers of lattice implication algebras that can implement a hierarchical model of role-based or attribute-based access control, and prove every multiplier is simple multiplier. Also we research the relationship between multipliers and homomorphisms of a lattice implication algebra L, and prove that the lattice [0, u] is isomorphic to a lattice $[u^{\prime},1]$ for each $u{\in}L$ and that L is isomorphic to $[u,1]{\times}[u^{\prime},1]$ as lattice implication algebras for each $u{\in}L$ satisfying $u{\vee}u^{\prime}=1$.

Oriental and Western Convergence Study and Alimentotherapy Application of Yulmubokyeoljuk (율무복령죽의 동·서 융합적 섭취효능 및 식이요법 활용에 관한 연구)

  • Park, Sung-Hye;Park, Hae-Ryoung
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.385-391
    • /
    • 2017
  • The purpose of this study is to understand the food and nutritional value of based on the oriental Qi-flvor theory and to convergence understanding of dietary effects. In this study, dietary effect of Yulmubokyeoljuk based on oriental theory and analyzed the contents of general composition and minerals. We recognize the value as a food that can be used for therapy of Yulmubokyeoljuk. Phosphorus content was high and high calory foods. In addition, by discharging stagnant water in the spleen, excessive wetness is removed and the function of transportation of the spleen is strengthened. The results of this study suggest that it provided the basis of the characteristics of food and the necessity of convergence approach to dietary efficacy based on the traditional Qi-flvor theory and nutrional composition.

A Study on Zero Trust Technology Trends (제로 트러스트 기술 동향에 관한 연구)

  • Miyeon Kim;DaeGyeom Kim;Jong-Min Jang;Sang-Jun Park;Souhwan Jung;Jungsoo Park
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.15-26
    • /
    • 2023
  • Due to the global COVID-19 pandemic, which has led to a shift towards remote work, the frequency of external access to important internal resources by companies has increased exponentially, exposing them to various security threats. In order to address these access security issues, ZTA (Zero Trust Architecture) has gained attention. ZTA operates on the principle of not trusting external or internal users, and manages access authentication and authorization strictly according to pre-established policies. This paper analyzes the definition of ZTA and key research trends, and summarizes different ZTA solutions for each company.

A Study on improvement for a means of access to electronic financial service (전자금융서비스 접근매체 변화에 따른 법제도 개선방안)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.17-22
    • /
    • 2015
  • As financial deregulation policies implemented by the government, electronic financial service is improved but security concerns are increasing and ultimately weaken trust in the financial service. Electronic financial service becomes more and more dependant on the IT platform and the initiatives of access device is also gradually shift to that platform. As biometric sensor is mounted on the smartphone, structural change in the access device is coming. It must be a positive signs in terms of fintech development, in the other side, it can cause many problems such as weakness of regulation and ambiguity of principals of responsibility. So in this paper, by analysing this problem-the shift of service initiative-on the access device I'll propose the best way to the the legal amendments.

A Study on Security Kernel of Linux System (Linux 시스템의 보안커널에 관한 연구)

  • Han, Myung-Mook;Lee, Jun-Hwan
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.25-31
    • /
    • 2008
  • SELinux, security operating system, is the security system which implements mandatory access control using linux security module on the traditional linux kernel supporting discretionary access control. But intrusion detection and logging are lacked when system intrusions are happened. This study proposes a SELinux security kernel which performs detection of access violation and privilege restriction using dynamic access control. It detects the intrusion using security check when the abnormal access of system is happened, and dynamically changes the system privilege for the intruder through privilege restriction. Finally we prevent reintrusion and explain the result of experiment.

  • PDF

A Study of IT Convergence Technology For Health Exercise (건강운동을 위한 IT 융합기술의 접근 동향)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.15 no.3_2
    • /
    • pp.77-82
    • /
    • 2015
  • IT convergence has been approached from national strategic dimension with an aim to drive forward technology development and industrial advancement in other fields by taking the IT to the next advanced level, and has been the focus of intensive investment of research resources. Against this backdrop, IT convergence has emerged as a cutting-edge convergence industry that helps spur development of new growth engine being pushed forward at inter-ministerial level, as well as help turn the mainstay industries into high value-added industries and create new IT industry. Health-related convergence services have shifted its focus towards the exercise/sports and rehabilitation-oriented entertainment experiential industry away from conventional disease prevention and control-centric treatment/therapy technology industry. Thus, this study was intended to examine the trends of IT convergence technological development related to health exercise and present recommendation on the future course for development of major technologies and advancement of convergence industry, given the importance assigned to IT convergence.

An Entity Attribute-Based Access Control Model in Cloud Environment (클라우드 환경에서 개체 속성 기반 접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.32-39
    • /
    • 2020
  • In the large-scale infrastructure of cloud environment, illegal access rights are frequently caused by sharing applications and devices, so in order to actively respond to such attacks, a strengthened access control system is required to prepare for each situation. We proposed an entity attribute-based access control(EABAC) model based on security level and relation concept. This model has enhanced access control characteristics that give integrity and confidentiality to subjects and objects, and can provide different services to the same role. It has flexibility in authority management by assigning roles and rights to contexts, which are relations and context related to services. In addition, we have shown application cases of this model in multi service environment such as university.