• Title/Summary/Keyword: Access authority

Search Result 242, Processing Time 0.028 seconds

A Study on Direction of Authority Control by Surveying the Authority Control in University Libraries (대학도서관 전거제어 현황분석을 통한 전거제어 방안 모색)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.3
    • /
    • pp.5-26
    • /
    • 2012
  • This study is to find the new method for authority control in Korea by surveying status of authority control in university libraries and by analyzing international conceptual model of authority control and VIAF. 2 kinds of survey were done: one is for libraries having authority records and the other is for libraries not having authority records. In survey result, libraries that have authority records want to sustain their own forms of authorized access points and libraries that have no authority records want the rules related to authority and the national cooperative authority control system to be constructed. Based on ICP 2009, FRAD conceptual model, VIAF and this survey result, new authority control is to respect the diversity of forms of the authorized access points. New authority control is to permit authority records that reflect provision for linguistic or cultural environments of each library, confirming to the national cataloging code. Therefore, authorized access points will be displayed according to user preferred forms. For this new authority control, it is needed to make national authority rule, to build the authority records according to library's own rules, and to construct the cooperative authority control system. Also for user preferred authority control, it is needed to describe detailed elements for authority control and relation data between authorized access points, between authorized access points and variant forms. This study could contribute to suggest new authority control that could accept all kinds of authorized access points preferred by nation, libraries, and users.

A Role-Based Access Control System API Supporting External Authority Interface

  • Ma, Jin;Kim, Hyunah;Park, Minjae
    • Journal of Internet Computing and Services
    • /
    • v.19 no.2
    • /
    • pp.27-32
    • /
    • 2018
  • In industries that are operating various enterprise systems, new systems are integrated and operated in accordance with each period. In particular, when a new system is to be integrated, one of the major considerations is the single sign-on part for integrating and operating the authentication. To implement this authority system using role-based access control method, an extension method for access control method is needed. Therefore, in this paper, we design an extended role-based access control model for interworking with legacy authority system and provide its APIs. The extended role-based access control model is a model in which external authority information, which holds authority information in the authority information, is added. And we describe operations that the REST Web APIs are based on these models. In this paper, the method is described in the back-end APIs and can be implemented as an operation of an extended role-based access control system based on the method.

A Study on the Construction of Work and Expression Authority Records (저작 및 표현형 전거레코드 구축방안에 관한 연구)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.3
    • /
    • pp.71-94
    • /
    • 2016
  • This study was to suggest the construction of work and expression authority records for FRBRization. ICP, FRBR/FRAD and RDA as the content rules were referred as the framework for the construction of work and expression authority records. LC RDA authority records examples, JSC of RDA authority examples, and VIAF work and expression authority records were analyzed as case studies. 5 findings were suggested. First, authority records consist of name, work, and expression authority records which are inter-related. Second, the construction of authorized access points was suggested according to 5 work types. Third, the consideration in describing work attributes as separate element and as part of an authorized access point, and other distinguishing characteristic of the work were suggested. Fourth, the consideration in describing expression attributes as separate element and as part of an authorized access point, and other distinguishing characteristic of the expression were suggested. Fifth, 5XX was suggested for linking between work and expression. This study would contribute to revise KCR4.

Design of U-Healthcare Access Authority Control Model Using Context Constrain RBAC Model (상황제한 RBAC 모델을 이용한 U-헬스케어 접근권한 제어모델 설계)

  • Kim, Chang-Bok;Kim, Nam-Il;Park, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.233-242
    • /
    • 2009
  • The security of medical information need continued research about steady and flexible security model because of privacy of patient's as well as directly relation in the patient's life. In particular, u-healthcare environment is need flexible and detailed access control by variety changes of context. Control model analyzed relation of resource and authority, and analyzed authority about all accessible resource from access point using K2BASE. The context-based access control model can change flexibly authority change and role, and can obtain resource of authority granted and meaningly connected resource. As a result, this thesis can apply flexible and adaptive access control model at u-healthcare domain which context change various.

  • PDF

A Study on the Non-Authority Control System (무전거시스템에 관한 연구)

  • Choi Suk-Doo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.25
    • /
    • pp.233-264
    • /
    • 1993
  • The authorized form is called the heading must be unique and consistent. Without both uniqueness and cosistency, retrieval from the bibliographic database will not be optimal and in some cases may even be impossible. But the authority control is extremely expensive, because it is labour-intensive and dependent on professional investigation and judgement. In fact, it is by far the most expensive function in all of bibliographic control. The processes used to determine the form of access points. maintain. use. and evaluate very accurate authority records reduce the efficiency to generate or merge bibliographic items without modification from any national level bibliographic utilities as well as individual library. In this paper non-authority control system was suggested to solve the disadvantages of authority work. The apparent advantages of the non-authority control system are it is easy to determine the heading, input the bibliographic data. integrate the access points into an existing file, and generate and merge bibliographic data without modification. In addition, non-authority control system can be transmitted into online information retrieval system conducted with a mixture of controlled vocabularies and natural language.

  • PDF

Suggestions on the Revision of Korean Cataloging Rules for Personal Name Authority Records and Authorized Access Point (개인명 전거제어 및 전거형 접근점 작성을 위한 한국목록규칙 개정 방안)

  • Rho, Jee-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.2
    • /
    • pp.201-229
    • /
    • 2016
  • The purpose of this study is to make a suggestion on the Korean cataloging rules (KCR) for personal name access points. KCR4 revised in 2003 has been criticized in the absence of related rules. To the end, this study investigates (1) the objectives and functions of personal name access points in the changing bibliographic universe, (2) the detailed rules for persons in RDA and new NCR, and (3) the cases of personal name access points in LC(Library of Congress), NDL(National Diet Library in Japan) authority records. (4) Based on theses, suggested are rules and examples for recording attributes and the authorized access points of persons in KCR to be revised. The data were collected from literature review, the case study, and the interviews with catalogers.

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

Implementation of Voice Awareness Security Sytems (음성인식 보안 시스템의 구현)

  • Lee, Moon-Goo
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.799-800
    • /
    • 2006
  • This thesis implemented security systems of voice awareness which is higher accessible than existing security system using biological authentication system and is inexpensive in module of security device, and has an advantage in usability. Proposed the security systems of voice awareness implemented algorithm for characteristic extraction of inputted speaker's voice signal verification, and also implemented database of access control that is founded on extractible output. And a security system of voice awareness has a function of an authority of access control to system.

  • PDF

A Study on the Effects of the FRAD Model on the Related Standards (IFLA FRAD 모형이 관련 표준에 미친 영향 연구)

  • Ahn, Young-Hee;Lee, Sung-Sook
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.1
    • /
    • pp.279-303
    • /
    • 2009
  • This study aims to clearly understand 'Functional Requisite of Authority Data(FRAD)' being studied by IFLA focused on aspect of change from FRAR. In addition, it has established relationship between FRAD and concerned rules by analyzing effect of FRAD on RDA and MARC21 and reviewed cataloguing rules, format and situations of major authority DB implementations concerned about domestic authority controls in reflection of IFLA's activities for authority control. Based on the analysis, it has looked into considerations for domestic authority controls standards such as access control methods, expansion of application scope, introduction of new approaches such as entity-relationship model, reinforcement of roles for national bibliographic agency. These study results would be utilized as basic data for authority control.

A Study on Dynamic Role-based Service Allocation for Service Oriented Architecture System (서비스 지향 아키텍처 시스템을 위한 동적 역할 기반 서비스 할당에 관한 연구)

  • Park, Yong B.;Kwon, Ye Jin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.1
    • /
    • pp.12-20
    • /
    • 2018
  • Recently, web-based service software has been used as to combine various information or to share information according to the needs of users and the convergence of specialized fields and individual dependent systems. According to the necessity of the user, the proper service environment and the selective service environment according to the purpose and the needs of the user have been studied in a variety of specialized and combined professional research fields and industries. Software based on cloud systems and web services is being used as a tool for appropriate group and user groups and roles. A service system combined dynamically needs a module to manage a user through internal logic and grant a service access authentication. Therefore, it has been considered various approaches that a user who accesses the system is given a service access authority for a certain period of time. Also, when the deadline is over, the authority that you are given to access system will go through the process of expire the right. In this paper, we define the roles of users who access web services, manage user rights according to each role, and provide appropriate service resources to users according to their rights and session information. We analyzed the procedure of constructing the algorithm for the service according to the procedure of each user accessing the web service, granting the service resource and constructing a new role.