• Title/Summary/Keyword: 정보접근

Search Result 11,798, Processing Time 0.048 seconds

A Social Approach as a Metatheory to Understand Everyday Information Practices of the Disadvantaged (사회 취약계층의 일상적 정보행태 연구를 위한 메타이론: 사회적 접근법)

  • Koo, Joung Hwa
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.1
    • /
    • pp.313-336
    • /
    • 2016
  • The study reviews theoretical and empirical research literature in information needs, seeking and uses in order to search for the most pertinent metatheories for studying information practices of the disadvantaged. The study examines the salient features and main theories/models of each cognitive, affective and social approach in the user-centered paradigm through analyzing prior information practices studies. While analyzing the main features of each cognitive, affective and social approach, the study points out the limitation of research using the cognitive and affective approaches to fail to theorize the relationship between individuals and complex and dynamic socio-cultural contexts in information practices. As an alternative, the study suggests using the social approach as a pertinent metatheory for understanding information practices of the disadvantaged who are entangled with myriad social contexts and issues. In order to verify the pertinence, the study examines the advantages of the social approach through analyzing both the main models related to everyday information practices under social constructionism and the main findings from information practices of the disadvantaged.

Extending Role-based Access Control for Privacy Preservation in Academic Affairs System (교무업무시스템에서의 개인정보보호를 위한 역할기반 접근 제어 확장)

  • Kim, Bo-Seon;Hong, Eui-Kyeong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.171-179
    • /
    • 2008
  • RBAC(Role based Access Control) is effective way of managing user's access to information object in enterprise level and e-government system. The concept of RBAC is that the access right to object in a system is not directly assigned o users but assigned by being a member of a role which is defined in a organization. RBAC is utilized for controling access range of privacy but it does not support the personal legal right of control over information and right of limited access to the self. Nor it contains the way of observation of privacy flow that is guided in a legal level. In this paper, extended RBAC model for protecting privacy will be suggested and discussed. Two components of Data Right and Assigning Data Right are added to existed RBAC and the definition of each component is redefined in aspect of privacy preservation. Data Right in extended RBAC represents the access right to privacy data. This component provides the way of control over who can access which privacy and ensures limitation of access quantity of privacy. Based on this extended RBAC, implemented examples are presented and the evaluation is discussed by comparing existed RBAC with extended RBAC.

Development of Authentication Service Model Based Context-Awareness for Accessing Patient's Medical Information (환자 의료정보 접근을 위한 상황인식 기반의 인증서비스 모델 개발)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • With the recent establishment of a ubiquitous-based medical and healthcare environment, the medical information system for obtaining situation information from various sensors is increasing. In the medical information system environment based on context-awareness, the patient situation can be determined as normal or emergency using situational information. In addition, medical staff can easily access patient information after simple user authentication using ID and Password through applications on smart devices. However, these services of authentication and patient information access are staff-oriented systems and do not fully consider the ubiquitous-based healthcare information system environment. In this paper, we present a authentication service model based context-awareness system for providing situational information-driven authentication services to users who access medical information, and implemented proposed system. The authentication service model based context-awareness system is a service that recognizes patient situations through sensors and the authentication and authorization of medical staff proceed differently according to patient situations. It was implemented using wearables, biometric data measurement modules, camera sensors, etc. to configure various situational information measurement environments. If the patient situation was emergency situation, the medical information server sent an emergency message to the smart device of the medical staff, and the medical staff that received the emergency message tried to authenticate using the application of the smart device to access the patient information. Once all authentication was completed, medical staff will be given access to high-level medical information and can even checked patient medical information that could not be seen under normal situation. The authentication service model based context-awareness system not only fully considered the ubiquitous medical information system environment, but also enhanced patient-centered systematic security and access transparency.

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

클라우드 컴퓨팅 환경의 식별 및 접근제어

  • Jang, Eun Young
    • Review of KIISC
    • /
    • v.24 no.6
    • /
    • pp.31-36
    • /
    • 2014
  • 클라우드 컴퓨팅 서비스는 자원 공유와 가상화 기술 및 자원의 서비스화 등 기존 컴퓨팅 환경과 다른 특성으로 인해 클라우드 컴퓨팅 환경에 적합한 식별/접근제어 기술 및 보안 통제 사항이 요구된다. 그러므로 기존 컴퓨팅 자원을 클라우드 컴퓨팅 환경으로 변경하는 서비스 제공자나 클라우드 서비스로 이동하는 서비스 사용자는 특정한 보안 요건을 검토해야 한다. Cloud Security Alliance에서 배포한 Cloud Control Matrix와 ISO/IEC 27001을 비교 분석하여, 클라우드 컴퓨팅 환경에서 특별히 요구되는 식별 및 접근제어의 보안 통제 요건을 확인하였다. 또한, 주요 클라우드 컴퓨팅 서비스인 아마존의 AWS, 구글의 Google Cloud Platform과 VMware의 vCloud 서비스의 식별 및 접근제어 기술을 조사하였다. 이를 기반으로 클라우드 컴퓨팅 환경의 식별 및 접근제어 기술에서 필요한 보안 요건을 확인하였다.

리눅스 보안운영체제를 위한 접근통제 프레임워크

  • Kim Jung-sun;Lee Jae-seo;Lee Seung-yong;Kim Min-soo;Noh Bong-nam
    • Review of KIISC
    • /
    • v.15 no.2
    • /
    • pp.18-27
    • /
    • 2005
  • 기존 운영체제의 접근통제기법은 광범위한 사용자의 요구사항을 충족시키고, 강력한 시스템보안을 제공하기에 불충분하다. 최근의 보안운영체제는 다양한 접근통제기법을 지원하고, 섬세한 보안서비스를 제공할 수 있는 방향으로 연구되어 왔다. 본 논문에서는 현재까지 연구된 보안운영체제에 대한 연구내용과 핵심기술, 개발동향 및 평가기준, 그리고 다양한 접근통제기법을 지원하는 접근통제 프레임워크에 대하여 살펴본다.

A Signature-based Access Method for Efficient Retrieval on Moving Objects′Trajectories in Video Data (비디오 데이터에서 움직임 경로의 효율적인 검색을 위한 시그니쳐-기반 접근 기법)

  • 심춘보;장재우
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.253-255
    • /
    • 2001
  • 본 논문에서는 비디오 데이터가 지니는 움직임 객체의 움직임 경로(Moving Objects'Trajectories)를 이용한 사용자 질의에 대해 효율적인 검색을 위만 새로운 시그니쳐 기반 접근 기법을 제안한다. 제안하는 시그니쳐 기반 접근 기법은 데이터 파일을 직접 접근하기 전에 전체 시그니쳐들을 탐색하여 필터링을 수행하기 때문에, 순차 탐색에 대해 디스크 접근 횟수를 감소시켜 검색 성능을 향상시킨다. 마지막으로 성능 평가를 통해 제안하는 방법이 삽입 시간, 검색 시간, 그리고 부가 저장 공간의 검색 효율(Retrieval Efficiency) 측면에서 성능이 우수함을 보인다.

  • PDF

Case Studies of RIA Function Accessibility (리치 인터넷 애플리케이션 기능의 접근성 사례 조사)

  • Choi, Seong-eun;Kim, Suk-il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.253-256
    • /
    • 2009
  • 이 논문에서는 접근성 있는 리치 인터넷 애플리케이션을 구현하였을 때 우리나라에서 입수 가능한 화면 낭독 프로그램이 이들 리치 인터넷 애플리케이션의 접근성 기능을 충분히 지원하는가를 실험을 통하여 파악하였다. 실험 결과, 미국 Freedom Scientific사의 JAWS for Windows 10.0 한글판이 실험에 사용한 모든 애플리케이션의 접근성 기능을 지원하였다. 그러나 국산 화면 낭독 프로그램은 개발 환경에 따라 접근성 지원 기능이 떨어지고 있음을 확인할 수 있었다.

An Access Control Model for the Dynamic Organization (동적 조직을 위한 접근제어 모델)

  • Won-Bo Shim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1401-1404
    • /
    • 2008
  • 본 논문에서는 기존의 관료제 조직과 다른 동적조직의 특성을 살펴보고 이러한 특성으로 인해 기존의 접근제어 모델들을 동적조직의 접근제어 모델로 사용할 때 문제가 되는 점들을 살펴본다. 이를 바탕으로 동적조직을 위한 개선된 역할기반 접근제어 모델을 제안한다. 제안된 모델은 기존 접근제어 모델들의 문제점을 해결하기 위한 방법들을 제시한다.

Access Control for Satellite Image Integrated Control System using Web Server (웹서버를 이용한 위성영상 통합관리체계 접근제어)

  • 지준웅;장영달;김지홍;황태현;박종현
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2003.04a
    • /
    • pp.409-418
    • /
    • 2003
  • 컴퓨터 기술과 정보통신기술의 발달로 인터넷이 보편화되고, 인터넷을 이용한 정보공유가 활성화되고 있으며, 이와 함께 위성영상정보에 대한 통합시스템 구축사업도 활발히 진행되고 있다. 본 논문에서는 공개키 기반구조(PKI)의 공개키 인증서와 권한인증기반구조(PMI)의 속성 인증서를 이용하여, 인터넷 웹서버 접근통제방안을 제시한다. 또한 웹서버에서의 권한인증을 통하여 분산된 위성영상정보 통합체계의 아카이빙시스템에 대한 효과적인 접근통제방안을 제시한다.

  • PDF