• Title/Summary/Keyword: Access and evaluation

Search Result 1,116, Processing Time 0.022 seconds

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

Study on Dynamic Trust-based Access Control in Online Social Network Environment (소셜 네트워크 환경에서 동적 신뢰 중심의 접근 제어 모델에 관한 연구)

  • Baek, Seungsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1025-1035
    • /
    • 2013
  • There has been an explosive increase in the population of OSN(online social network) for 10 years. OSN provides users with many opportunities to have communication among friends, families and goes so far as to make relationships among unknown people having similar belief or interest. However, OSN also produced adverse effects such as privacy breaches, leaking uncontrolled information or disseminating false information. Access control models such as MAC, DAC, RBAC are applied to the OSN to control those problems but those models in OSN are not fit in dynamic OSN environment because user's acts in OSN are unpredictable and static access control imposes burden on users to change access control rules one by one. This paper proposes the dynamic trust-based access control to solve the problems of traditional static access control in OSN.

Design and Implementation of LGPFID System (수산시책 평가시스템 설계 및 구현)

  • 어윤양;황현숙;김갑수
    • The Journal of Fisheries Business Administration
    • /
    • v.32 no.1
    • /
    • pp.81-97
    • /
    • 2001
  • The main objective of this research is to identify the evaluation criteria of the local governments' projects for the fisheries industry development (LGPFID) and to develop the evaluation software prototype applicable to LGPFID. This research does not try to develop the whole evaluation processes and programs for LGPFID, but just to outline the approach to managing LGPFID. The evaluation processes and programs developed in this study is based on the group decision support systems(GDSS), which is a collaborative, system-oriented, and objective system useful in evaluating LGPFID. Specifically the goals of the programs are to : (1) enhance the quality of evaluation process for LGPFID; (2) provide the local government decision makers' and interest groups' access to comprehensive evaluation information; (3) support private-public collaboration in government's decision making. We used analytic hierarchy process model as a group decision making model and programmed the application software prototype with Visual Basic language.

  • PDF

Extending Role-based Access Control for Privacy Preservation in Academic Affairs System (교무업무시스템에서의 개인정보보호를 위한 역할기반 접근 제어 확장)

  • Kim, Bo-Seon;Hong, Eui-Kyeong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.171-179
    • /
    • 2008
  • RBAC(Role based Access Control) is effective way of managing user's access to information object in enterprise level and e-government system. The concept of RBAC is that the access right to object in a system is not directly assigned o users but assigned by being a member of a role which is defined in a organization. RBAC is utilized for controling access range of privacy but it does not support the personal legal right of control over information and right of limited access to the self. Nor it contains the way of observation of privacy flow that is guided in a legal level. In this paper, extended RBAC model for protecting privacy will be suggested and discussed. Two components of Data Right and Assigning Data Right are added to existed RBAC and the definition of each component is redefined in aspect of privacy preservation. Data Right in extended RBAC represents the access right to privacy data. This component provides the way of control over who can access which privacy and ensures limitation of access quantity of privacy. Based on this extended RBAC, implemented examples are presented and the evaluation is discussed by comparing existed RBAC with extended RBAC.

A Study on Evaluation Method and Matching Process Model for Interior Design Firms (실내디자인업체 평가 및 선정 프로세스 모델에 관한 연구)

  • 정선영;이현수;최용의;김인한
    • Korean Institute of Interior Design Journal
    • /
    • no.25
    • /
    • pp.280-289
    • /
    • 2000
  • The purpose of this study is to suggest a evaluation method and matching process model which derives suitable design firm for a client. Unlike the existing evaluation method, the suggested evaluation method and matching process for interior design firm allows a client specify his own needs. The evaluation methods utilizes designers experience record, past performance and customers post occupancy evaluation to derive design firms meeting clients requirements. With this method and matching process model, customers could access the design firms more efficiently and the design firms suitable for the clients needs could be suggested.

  • PDF

Proactive: Comprehensive Access to Job Information

  • Lee, Danielle;Brusilovsky, Peter
    • Journal of Information Processing Systems
    • /
    • v.8 no.4
    • /
    • pp.721-738
    • /
    • 2012
  • The Internet has become an increasingly important source for finding the right employees, so more and more companies post their job openings on the Web. The large amount and dynamic nature of career recruiting information causes information overload problems for job seekers. To assist Internet users in searching for the right job, a range of research and commercial systems were developed over the past 10 years. Surprisingly, the majority of existing job search systems support just one, rarely two ways of information access. In contrast, our work focused on exploring a value of comprehensive access to job information in a single system (i.e., a system which supports multiple ways). We designed Proactive, a recommendation system providing comprehensive and personalized information access. To assist the varied needs of users, Proactive has four information retrieval methods - a navigable list of jobs, keyword-based search, implicit preference-based recommendations, and explicit preference-based recommendations. This paper introduces the Proactive and reports the results of a study focusing on the experimental evaluation of these methods. The goal of the study was to assess whether all of the methods are necessary for users to find relevant jobs and to what extent different methods can meet different users' information requirements.

A Study on the Evaluation Factors of Websites that Offer Clothing and Ornament Related Information (의류관련정보를 제공하는 웹사이트 평가요인에 관한 연구)

  • 박길순;류신아
    • Journal of the Korean Society of Costume
    • /
    • v.52 no.7
    • /
    • pp.71-85
    • /
    • 2002
  • The purpose of this study is (1) to research on the diverse evaluation criteria suggested in the existing literatures, selected the contents of the evaluation according to the evaluation factors, and examined whether they are appropriate for the evaluation of websites that offer Clothing and Ornament related information through reliability analysis - all to set the evaluation criteria for the websites that acquire data. In addition. (2) contents of evaluation which are deemed important by the users and developers were compared and recommended as the detailed evaluation contents according to evaluation factors. The results of this study were as follows. 1. The evaluation factors for the fashion websites that provide Clothing and Ornament related information were selected as follows: contents of the information(11 contents of evaluation), ease of use(12), screen design(10), accessibility(9), sensitive enjoyment(4), scope of information use(3), purpose(1), and target user(1). As result of reliability analysis. Cronbach's a contents of the information (0.76), ease of use (0.77), screen design (0.85), accessibility (0.81), sensitive enjoyment (0.71), and scope of information use (0.52). 2. When the level of importance for the detailed evaluation contents was examined from the user and developer point of view, recency of information. rapid speed for the websites access. fast loading of webtext and fast transmission speed topped the list as first, second and third places.

Tag-based Evaluation Model for Economic Feasibility Analysis of Mobile RFID System in Ubiquitous Space (유비쿼터스 공간 구축을 위한 모바일 RFID 시스템의 경제성 평가에 대한 연구 : 태그 기반평가모델을 중심으로)

  • Lee, Kyoung-Jun;Choi, Hyung-Kwang;Jun, Jung-Ho
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.189-202
    • /
    • 2011
  • It is important issue how to evaluate the economic feasibility of computing factors in the real world when we build ubiquitous spaces. In this paper, we propose a simple model that can evaluate the economic feasibility of mobile RFID-based ubiquitous computing system which enables seamless communication between offline and online via embedded computing factors in the real world. To achieve this, we explore the meaning of mobile RFID system, the difference between our research and extant researches concerning the evaluation of economic feasibility in RFID system, and propose the so-called 'Tag-based Evaluation Model' (TEM) which is an evaluation model to access the economic feasibility of mobile RFID systems. We also analyze the TEM via simulation cases based on proposed model and discuss the future of TEM.

Implementation of the Authorization Model for the Database Server of BADA-III system (바다-III 시스템의 데이타베이스 서버를 위한 권한부여 모델의 구현)

  • Kim, Young-Kyun;Cho, Ok-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.41-56
    • /
    • 1996
  • Database servers that are used to provide multimedia information services in World Wide Web(WWW) environment have to support the access control mechanism that allows authorized users to access the constructed databases. In this paper, we define an authorization model as well as authorization policies to enforce the proper access control on databases in the BADA-III object-oriented database server and propose an access evaluation algorithm. Also we implement this model and the algorithm in the BADA-III database server. Considering the service environment of the WWW, we expect that database service providers can simply and effectively protect their data using the proposed model.

A Tabu Search Algorithm for Network Design Problem in Wireless Mesh Networks (무선 메쉬 네트워크에서 네트워크 설계 문제를 위한 타부 서치 알고리즘)

  • Jang, Kil-woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.778-785
    • /
    • 2020
  • Wireless mesh networks consist of mesh clients, mesh routers and mesh access points. The mesh router connects wireless network services to the mesh client, and the mesh access point connects to the backbone network using a wired link and provides Internet access to the mesh client. In this paper, a limited number of mesh routers and mesh access points are used to propose optimization algorithms for network design for wireless mesh networks. The optimization algorithm in this paper has been applied with a sub-subscription algorithm, which is one of the meta-heuristic methods, and is designed to minimize the transmission delay for the placement of mesh routers and mesh access points, and produce optimal results within a reasonable time. The proposed algorithm was evaluated in terms of transmission delay and time to perform the algorithm for the placement of mesh routers and mesh access points, and the performance evaluation results showed superior performance compared to the previous meta-heuristic methods.