• Title/Summary/Keyword: 통제도

Search Result 7,128, Processing Time 0.028 seconds

An Extended Role-Based Access Control Model with Multi-level Security Control (다단계 보안통제가 가능한 확장된 역할 기반 접근통제 모델)

  • Yim, Hwang-Bin;Park, Dong-Gue
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.90-96
    • /
    • 2002
  • RBAC(Role-Based Access Control) is an access control method based on the user's role and it provides more flexibility on the various computer and network security fields. But, RBAC models consider only users for roles or permissions, so for the purpose of exact access control within real application systems, it is necessary to consider additional subjects and objects. In this paper, we propose an Extended RBAC model, $ERBAC_3$, for access control of multi-level security system by adding users, subjects, objects and roles level to RBAC, which enables multi-level security control. 

Role Based Access Control Model contains Role Hierarchy (역할계층을 포함하는 역할기반 접근통제 모델)

  • 김학범;김석우
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.49-58
    • /
    • 2002
  • RBAC(Role Based Access Control) is an access control method based on the application concept of role instead of DAC(Discretionary Access Control) or MAC(Mandatory Access Control) based on the abstract basic concept. Model provides more flexibility and applicability on the various computer and network security fields than the limited 1functionality of kernel access control orginated from BLP model. In this paper, we propose $ERBAC_0$ (Extended $RBAC_0$ ) model by considering subject's and object's roles and the role hierarchy result from the roles additionally to $RBAC_0$ base model. The proposed $ERBAC_0$ model assigns hierarchically finer role on the base of subject and object level and provides flexible access control services than traditional $RBAC_0$ model.

  • PDF

The Moderating Effect of Self-Esteem on the Association between Academic Stress and Self-Control in Adolescents (청소년의 학업스트레스와 자기통제에 있어 자아존중감의 조절효과)

  • Kim, June-Yung
    • Journal of the Korean Society of Child Welfare
    • /
    • no.40
    • /
    • pp.229-253
    • /
    • 2012
  • The present study examined the capacity of Korean adolescents' self-esteem to buffer against the negative impact of academic stress on self-control. Based on the prevention science perspective, the conceptual framework for this study was developed from the strength model of self-control. Data for the present study were taken from the fourth wave of Korean Youth Panel Study. A sample of 2,169 students in the eleventh grade was analyzed to identify relationships between the study variables. As expected, self-esteem moderated the association between academic stress and self-control. Implications for the study findings are discussed.

Extended Role Based Access Control Model (확장된 역할기반 접근통제 모델)

  • 김학범;홍기융;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.47-56
    • /
    • 1999
  • RBAC(Role Based Access Control) is an access control method based on the user's roles and it provides more flexibility and applicability on the various computer and network security fields than DAC(Discretionary Access Control) or MAC(Mandatory Access Control). In this paper, we newly propose ERBAC$_{0}$(Extended RBAC$_{0}$) model by considering subject's and object's roles additionally to REAC$_{0}$ model which is firstly proposed by Ravi S. Sandhu as a base model. The proposed ERBAC$_{0}$ model provides finer grained access control on the base of subject and object level than RBAC$_{0}$ model.

Relationship between locus of control and treatment compliance in adult orthodontic patients (성인교정환자의 내외통제소재와 치료협조도에 대한 연구)

  • Lee, Shin-Jae
    • The korean journal of orthodontics
    • /
    • v.32 no.2 s.91
    • /
    • pp.71-78
    • /
    • 2002
  • It could be suggested that adult orthodontic patients may have peculiar psychological features as well as different periodontal tissue conditions compared with adolescent patients. The aims of the present investigation were to explore the relationships between psychological characteristics and treatment compliance of patient to orthodontist and assistants (dental hygienists). Two types of locus of control data (I-score, Internal locus of control score ; E-score, External locus of control score) were obtained for 312 adult patients and 765 adolescents and then analyzed in relation to their sex and treatment compliance. In general, orthodontic patients showed higher I-score trends than ordinary persons and adult patients manifested higher I-score than adolescent patients. Unlike adult patients, female adolescent patients showed higher I-score than male adolescent patients. Adult patients with higher E-score and adolescent patients with higher I-score than their counter-part subgroup were classified into more compliant group. Orthodontist performed more generous decision about patients' compliance than assistants. The results of this study also suggest that psychological survey in orthodontic field could comprise useful diagnostic criteria.

Development of Remote Control Station and Unmanned Ground Vehicle using Emergency Operation Technique in Combat Field Situation (전장 환경에서의 비상 운용기법을 활용한 무인지상로봇과 원격통제장치 개발)

  • Lee, Jun-Pyo;Cho, Chul-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.225-233
    • /
    • 2011
  • In this paper, we propose a remote control station based on the awareness of various combat field situation in order for operating multiple unmanned ground vehicles. Our remote control station is capable of sending a variety of messages designed for carrying out the skillful movement for collaborate among unmanned ground vehicles, gathering the information related with combat field situation, and completing the assigned missions which are described by operator in advance. To verify the effectiveness of our proposal, we develop the sophisticated remote control station and conduct a great many remote operating tests for multiple unmanned ground vehicles.

A Gap-acceptance Model Considering Driver's Propensity at Uncontrolled Intersection (운전자 특성 등을 고려한 무통제교차로의 간격수락 모델)

  • Jang, Jeong-Ah;Lee, Jung-Woo;Choi, Kee-Choo
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.6
    • /
    • pp.71-80
    • /
    • 2008
  • Typically uncontrolled intersections are characterized by the absence of signal, stop and yield sign, and by very light traffic volume. In this study, a gap acceptance model for such uncontrolled intersections has been modeled. The motivation is to identify the behavior of drivers so that the traffic flow phenomena can be easily understood. For this, actual traffic survey was accomplished at intersections in Suwon and the data have been fed into modeling process. The logit model was used and the results showed that total delay experienced by drivers, turning right movement, age, sex, and the existence of passenger affected gap acceptance. For example, male drivers, with experiencing longer delay and having passenger(s) with them, accepted shorter gaps. These identified characteristics regarding gap acceptance could be used for facility design and/or safety oriented traffic information dissemination near uncontrolled intersections.

Mechanism of China's Internet Regulation (중국의 인터넷 통제 메커니즘)

  • Kim, Jin Yong
    • Informatization Policy
    • /
    • v.20 no.1
    • /
    • pp.61-84
    • /
    • 2013
  • This article examines how the Chinese government blocks the inflow of undesirable information, focusing on the technical aspect of the control mechanism. Unlike Cuba and North Korea, which regulate the whole Internet, China uses both state-of-the-art technological supervision and labor-intensive physical control due to economic reasons in order to prepare for actors who can threaten the Communist party. The Chinese government will not overlook the inflow of information which can be the link between demonstrations and democratization. This is because stronger protests utilizing information technology will trigger the Chinese government's flexible control based on large scale violation and technology. In this article, we first review the concept of universal internet control involved in internet regulation in nations, and then focus on China's internet censorship and its regulatory control from the '90s to the present. Finally, we analyze how the Chinese government actively controls the internet access by utilizing the relationship dynamics between the central and local governments, depending on protest issue. This thesis will assume that it is difficult for China to become democratized due to its information interception, and search how the government manages the internet.

  • PDF

A study on application plan of access control requirements in ERMS Standard (ERMS 표준에 나타난 접근통제 요건의 적용방안에 관한 연구)

  • Cheon, Kwon-Ju
    • The Korean Journal of Archival Studies
    • /
    • no.18
    • /
    • pp.179-220
    • /
    • 2008
  • Under the physical records management system, both the records and users could be controlled and secured by closing the door of Archives or using permitted records which is used only approved users. According to the electronic records management system and the concept of service on the basis of users, we have to give up the classical manner. As an alternative, we have to consider the electronic access control system. To accomplish this purpose, functional requirements of ERMS that is issued by UK, EU, U.S and Australia must be compared and analyzed. On the basis of U.K ERMS which is more detailed, 'common access control functional requirements' are arranged. As the access control functional requirements is applied in the records classification scheme, we could find out how the access control is executed in ERMS.

Analysis of the effects of self-control and organization-control on information security attitude (자기통제 차원과 조직통제 차원이 정보보안 태도에 미치는 영향 분석)

  • Hu, Sung-ho;Hwang, In-ho
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.49-57
    • /
    • 2021
  • This paper aims to confirm the effect of self-control and organization-control on information security attitude. The research method is composed of a cross-design of locus of control and tightness culture. The measurement variables used in the assessment are information security actual attitude, compliace behavioral attitude, and information security efficacy. As a result, the locus of control had a significant effect on information security actual attitude, information security efficacy, information security efficacy, and it was found that influence of the internal-based condition was greater than the external-based condition. The tightness culture had a significant effect on compliace behavioral attitude, information security efficacy, and it was found that influence of the tight culture-based condition was greater than the loose culture-based condition. In addition, the discussion contatins the implications of information security direction that reflect these research results.