• Title/Summary/Keyword: Access authority

Search Result 243, Processing Time 0.026 seconds

A Study on a Smart Home Access Control using Lightweight Proof of Work (경량 작업증명시스템을 이용한 스마트 홈 접근제어 연구)

  • Kim, DaeYoub
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.931-941
    • /
    • 2020
  • As natural language processing technology using machine learning develops, a Smart Home Network Service (SHNS) is drawing attention again. However, it is difficult to apply a standardized authentication scheme for SHNS because of the diversity of components and the variability of users. Blockchain is proposed for data authentication in a distributed environment. But there is a limit to applying it to SHNS due to the computational overhead required when implementing a proof-of-work system. In this paper, a lightweight work proof system is proposed. The proposed lightweight proof-of-work system is proposed to manage block generation by controlling the work authority of the device. In addition, this paper proposes an access control scheme for SHNS.

Cache Coherency Schemes for Database Sharing Systems with Primary Copy Authority (주사본 권한을 지원하는 공유 데이터베이스 시스템을 위한 캐쉬 일관성 기법)

  • Kim, Shin-Hee;Cho, Haeng-Rae;Kim, Byeong-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1390-1403
    • /
    • 1998
  • Database sharing system (DSS) refers to a system for high performance transaction processing. In DSS, the processing nodes are locally coupled via a high speed network and share a common database at the disk level. Each node has a local memory, a separate copy of operating system, and a DB'\fS. To reduce the number of disk accesses, the node caches database pages in its local memory buffer. However, since multiple nodes may be simultaneously cached a page, cache consistency must be cnsured so that every node can always access the'latest version of pages. In this paper, we propose efficient cache consistency schemes in DSS, where the database is logically partitioned using primary copy authority to reduce locking overhead, The proposed schemes can improve performance by reducing the disk access overhead and the message overhead due to maintaining cache consistency, Furthermore, they can show good performance when database workloads are varied dynamically.

  • PDF

A study on the construction of records management criteria (기록관리기준 조사 및 작성에 관한 연구)

  • Lee, Mi-young
    • The Korean Journal of Archival Studies
    • /
    • no.15
    • /
    • pp.185-218
    • /
    • 2007
  • With the reform of records management law, the organization should manage a new criteria scheme of record management based on business task and process. The new criteria scheme includes business explanation, preservation period, cause of setting up preservation period and opening information, access authority, keeping records or not. In the past, there were also some regulations and criteria but, records management criteria should be managed systematically and rationally than past in electronic environment. In this study, some previous cases about records management criteria constructing and operating were introduced first. And various characters about records management criteria were reviewed after that, process sample and methodology were proposed for construction of each criteria. If the records management criteria were constructed properly according to goals and objectives of records management and the results were managed through electronic system, the consistency of records management will be kept well and value changes of business and records will be reflected dynamically.

Medical Information Management Scheme of Healthcare Service Patient through 2-way Access Control (2-way 접근제어를 통한 헬스케어 서비스 환자의 의료 정보 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.185-191
    • /
    • 2016
  • Recently, various medical services are provided with the advance of IT. However, there is a problem that a third party would exploit medical information when the information is sent and received through wired or wireless connection. In this paper, a patient information management scheme using group index information for the third party not to illegally exploit a patient's medical information without his consent is proposed. This proposed scheme creates index information in each hierarchical level to be used with access information so that not only medical staff can have access to patient's medical information hierarchically but also it can manage access level in groups. The scheme aims to enable the medical staff to minimize the time spent to analyze the type of disease and to prescribe for it so that they can improve patients' satisfaction. Plus, the scheme aims to improve work efficiency by minimizing the medical staff's workload according to the authority to access patients' medical information.

POSCAL : A Protocol of Service Access Control by Authentication Level (인증 수준에 의한 서비스 접근제어 프로토콜)

  • Yoo, SeongMin;Choi, SeokJin;Park, JunHoo;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1509-1522
    • /
    • 2018
  • The purpose of this study is to support flexible authentication functions in various services using various types of user information. Rather than requiring the same level of authentication for all services, the goal is to identify the level of authentication at the time of user authentication and to increase convenience and efficiency by dynamically granting authority. In this paper, we propose POSCAL (Protocol of Service Control by Authentication Level) protocol which can control service access based on various local authentication information. To verify the function of the authentication framework, we developed the electronic wallet service based on the POSCAL authentication framework and evaluated the implementation function based on the use case scenario. The proposed protocol satisfies user and message authentication, confidentiality of authentication information, integrity of authentication history, non - repudiation of authorization, and access control by service according to security level.

MCL: Query Language for Metadata Registry Access Control (MCL: 메타데이터 레지스트리 접근제어를 위한 질의어)

  • Hwang, Sun-Hong;Kim, Jin-Hyung;Jeong, Dong-Won;Baik, Doo-Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.1
    • /
    • pp.25-33
    • /
    • 2009
  • In various fields, ISO/IEC 11179-based MDR (Metadata Registry) systems have been developed. However, the current systems do not observe the standard, so inconsistency issue between metadata arises. Most of all, there exist several problems because ISO/IEC 11179 provides no standardized access method. SQL/MDR has been suggested to resolve those problems. SQL/MDR supports search operations, but it does not provide operations for vaild building and safe access for MDR. This paper, in the aforementioned issues, suggests MCL(Metadata Control Language) to guarantee safe and easy access control. MCL offers predefined roles and authority of user groups defined in ISO/IEC 11179 Part 6, and users are assigned to a proper user group. With such a way, MCL increases usability and security.

Evaluation of Access Control Function of the Standard Records Management System (표준기록관리시스템 기능 평가 접근관리 기능을 중심으로)

  • Park, Min-Yung
    • The Korean Journal of Archival Studies
    • /
    • no.38
    • /
    • pp.3-35
    • /
    • 2013
  • The physical access or control of records with material entities is relatively easy. However, in the case of electronic records, due to its heightened applicative aspect that allows anyone with the authority to have access over the data, it requires an appropriate standard and stability to ensure the authenticity and integrity of electronic records. This study performed functional evaluation by extracting the minimum critical items from the national functional requirements documents and standards to explore the access control function that play an important role for the standard records management system to maintain quality requirements of electronic records. Based on this checklist, it evaluates whether the standard records management system properly carries out the access control function and investigates the current condition of application to practical records management work. Records managers generally do not use access control function, which may be because they do not feel the necessity, since the application of records management system is not yet actively promoted. In order for the standard records management system to be developed to become a more active system, it requires system improvement as well as considerations for below factors: First, although the necessity of establishing access control conditions is already recognized, it requires a clear stipulation of the regulation. Second, measures must be taken to implement access control in the records management system through document security solution. Third, it requires self-reflection of records manager, who utilizes the records management system. Instead of placing all responsibility on the National Archives, which established the system, professionals must further develop the system through continuous evaluation and improvement. Finally, a general discussion is required to publicize the issue of functional improvement of records management system. Although there is a bulletin board already created for this purpose, its users are extremely limited and it only deals with current problems. A space in online as well as in offline is required to solve the fundamental problems and exchange opinions.

Expanding the Scope of Identifying and Linking of Personal Information in Linked Data: Focusing on the Linked Data of National Library of Korea (링크드 데이터에서 인물 정보의 식별 및 연계 범위 확장에 관한 연구: 국립중앙도서관 링크드 데이터를 중심으로)

  • Lee, Sungsook;Park, Ziyoung;Lee, Hyewon
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.3
    • /
    • pp.7-21
    • /
    • 2017
  • This study analyzed the methods for representing and linking personal information in the linked data of National Library of Korea and provided suggestions for expanding the scope of identifying and linking of the personal information. As a result, the personal information as a subject has been dealt with a concept, where the personal information as a contributor has been linked with a vocabulary of personal name. In addition, there have not been assured of including additional information except existing authority data in the process of building the linked data. Therefore, this study suggested that linking personal information as a subject and personal information as a contributor was essential for the quality of linked data. In addition, we proposed to provide additional information related to the person in linked data for expanding the scope of access points in information discovery.

Log Usage Analysis: What it Discloses about Use, Information Seeking and Trustworthiness

  • Nicholas, David;Clark, David;Jamali, Hamid R.;Watkinson, Anthony
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.4 no.1
    • /
    • pp.23-37
    • /
    • 2014
  • The Trust and Authority in Scholarly Communications in the Light of the Digital Transition research project1) was a study which investigated the behaviours and attitudes of academic researchers as producers and consumers of scholarly information resources in respect to how they determine authority and trustworthiness. The research questions for the study arose out of CIBER's studies of the virtual scholar. This paper focuses on elements of this study, mainly an analysis of a scholarly publisher's usage logs, which was undertaken at the start of the project in order to build an evidence base, which would help calibrate the main methodological tools used by the project: interviews and questionnaire. The specific purpose of the log study was to identify and assess the digital usage behaviours that potentially raise trustworthiness and authority questions. Results from the self-report part of the study were additionally used to explain the logs. The main findings were that: 1) logs provide a good indicator of use and information seeking behaviour, albeit in respect to just a part of the information seeking journey; 2) the 'lite' form of information seeking behaviour observed in the logs is a sign of users trying to make their mind up in the face of a tsunami of information as to what is relevant and to be trusted; 3) Google and Google Scholar are the discovery platforms of choice for academic researchers, which partly points to the fact that they are influenced in what they use and read by ease of access; 4) usage is not a suitable proxy for quality. The paper also provides contextual data from CIBER's previous studies.

A Basic Study on Analysis of Influencing factor of Bus Accidents in Bus Lane Section (버스전용차로 구간 유형별 버스사고영향요인 분석 기초연구)

  • Park, Jun-Tae;Kim, Hyun-Jin;Kim, Jung-Yeol;Jang, Il-Jun;Lim, Joon-Bum
    • Journal of the Korean Society of Safety
    • /
    • v.27 no.3
    • /
    • pp.153-160
    • /
    • 2012
  • Various social problems such as traffic congestion, car accidents and environmental problems(air pollution, noises etc.) have been happening in the Seoul metropolitan area that has the car oriented traffic system providing cars continuously. Along with this, the financial burden caused by current oil price anxiety made paradigm shift from caroriented to public transportation-oriented. Its typical example is an arterial branch bus system changing(bus lane through the center of main road) started in Seoul in July, 2004. But study on safety analysis of bus lane and characteristic of accidents are not sufficient enough to now. The bus lanes are expanded to provide roads for better traffic operation and accidents between buses and pedestrians or ordinary vehicles are considered main problems. This study divided each bus route of median bus lane(bus-only lane through the center of main roads) and bus lane at roadside by intersection and collected and analysed data about influence variables of bus accidents chosen in each section. We constructed a logistic model using collected data. As a result, bus lane at roadside are used by both buses and other kinds of vehicles differently from median bus lane and showed such characteristic in accident influence. Therefore access management to factors causing conflict and improvement of operation management are required. In case of median bus lane, the more buses moving general vehicle lane and traffic volume of section were, the more accidents happened. In case that stop line of center lane is not backward, view blocking of vehicles turning left caused accidents.