• Title/Summary/Keyword: Access authority

Search Result 243, Processing Time 0.022 seconds

A Study on Ontology Architecture for FRSAD Model (온톨로지 구조로 표현된 FRSAD 모형에 관한 연구)

  • Lee, Hye-Won
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.1
    • /
    • pp.5-26
    • /
    • 2012
  • Mapping FRSAD and other ontology models intends to suggest a higher knowledge level that is independent of any information implementation system or specific context, and to endeavor to focus on the semantics, knowledge structures, subject access, and interoperability. Providing an application of FRSAD model to information environment and representing and sharing the information within the library sector and beyond, there needs encoding scheme for knowledge representation. This study suggested an OWL based ontology architecture for FRSAD model and demonstrated the pilot FRSAD ontology model using Prot$\acute{e}$g$\acute{e}$ software.

A Study for PKI Based Home Network System Authentication and Access Control Protocol (PKI 기반 홈 네트워크 시스템 인증 및 접근제어 프로토콜에 관한 연구)

  • Lee, Young-Gu;Kim, Jung-Jae;Kim, Hyun-Chul;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.592-598
    • /
    • 2010
  • A home network system is made up of subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. So, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this paper designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

A Study on Protection and Disclosure of Presidential Records (대통령기록의 보호와 공개를 둘러싼 쟁점과 제도적 과제)

  • Kim, You-Seung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.2
    • /
    • pp.7-30
    • /
    • 2013
  • The study aims at providing alternative strategies for ongoing issues concerning presidential records. It reviews a history of legislation about presidential records management and discusses issues on protection and disclosure of access-restricted presidential records. Four major issues-presidential records' category, management authority, designated representative, and production control-are argued. As a result, this study proposes solutions to guarantee the independence of presidential records management agency and to innovate a presidential records management process.

PKI/PMI based Access Control System on IPTV (IPTV에서 PKI/PMI기반의 권한 제어시스템)

  • Shuai, Wang;Jo, In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.781-784
    • /
    • 2009
  • IPTV, which is convergence of Communication and Broadcasting, has improved quickly recently. This service can provide high quality and various services to their customers, such as choosing channels freely, VOD and many kinds of Interactive service. As the technology of IPTV rapid development, more and more people worry about its disadvantages during the spread and apply, for instance, the illegal application, illegal copy, access authority abuse and the danger of the IPTV contents. This paper will provide the solution to solve these problems, through the Public Key Certificate of PKI(Public Key Infrastructure) and the Attribute Certificate of PMI(Privilege Management Infrastructure).

  • PDF

Design and Implementation of Secure DRM System for Contents Streaming (컨텐츠 스트리밍을 위한 안전한 DRM 시스템 설계 및 구현)

  • 이진흥;김태정;박지환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.177-186
    • /
    • 2003
  • DRM(Digital Rights Management) is a technology that manages secure distributions and copyrights of digital contents on the Internet. It is general giving the rights to use the encrypted contents that are downloaded by a simple authorization process in the existing DRM system. Once this is done you are allowed to access. In this paper, we use RTP(Real-time Transport Protocol) for end-to-end real-time data transmission. And the system is designed to make it Possible to Protect copyrights and to distribute contents with safety through periodic authentication. We implemented DRM system to stand this basis. The proposed system vests only authorized users with authority to access the license. Hence it prevents contents to be distributed and copied illegally on networks.

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.

Roles of Cancer Registries in Enhancing Oncology Drug Access in the Asia-Pacific Region

  • Soon, Swee-Sung;Lim, Hwee-Yong;Lopes, Gilberto;Ahn, Jeonghoon;Hu, Min;Ibrahim, Hishamshah Mohd;Jha, Anand;Ko, Bor-Sheng;Lee, Pak Wai;MacDonell, Diana;Sirachainan, Ekaphop;Wee, Hwee-Lin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.4
    • /
    • pp.2159-2165
    • /
    • 2013
  • Cancer registries help to establish and maintain cancer incidence reporting system, serve as a resource for investigation of cancer and its causes, and provide information for planning and evaluation of preventive and control programs. However, their wider role in directly enhancing oncology drug access has not been fully explored. We examined the value of cancer registries in oncology drug access in the Asia-Pacific region on three levels: (1) specific registry variable types; (2) macroscopic strategies on the national level; and (3) a regional cancer registry network. Using literature search and proceedings from an expert forum, this paper covers recent cancer registry developments in eight economies in the Asia-Pacific region - Australia, China, Hong Kong, Malaysia, Singapore, South Korea, Taiwan, and Thailand - and the ways they can contribute to oncology drug access. Specific registry variables relating to demographics, tumor characteristics, initial treatment plans, prognostic markers, risk factors, and mortality help to anticipate drug needs, identify high-priority research area and design access programs. On a national level, linking registry data with clinical, drug safety, financial, or drug utilization databases allows analyses of associations between utilization and outcomes. Concurrent efforts should also be channeled into developing and implementing data integrity and stewardship policies, and providing clear avenues to make data available. Less mature registry systems can employ modeling techniques and ad-hoc surveys while increasing coverage. Beyond local settings, a cancer registry network for the Asia-Pacific region would offer cross-learning and research opportunities that can exert leverage through the experiences and capabilities of a highly diverse region.

Design of Security Service Model in Dynamic Cloud Environment (동적 클라우드 환경에 적합한 보안 서비스 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.2
    • /
    • pp.35-41
    • /
    • 2012
  • The rapid development of cloud computing and mobile internet service changes to an mobile cloud service environment that can serve and pay computing source that users want anywhere and anytime. But when user misses mobile device, the respond to any threat like user's personal information exposal is insufficient. This paper proposes cloud service access control model to provide secure service for mobile cloud users to other level users. The proposed role-based model performs access authority when performs user certification to adapt various access security policy. Also, the proposed model uses user's attribute information and processes before user certification therefore it lowers communication overhead and service delay. As a result, packet certification delay time is increased 3.7% and throughput of certification server is increased 10.5%.

  • PDF

Design of Patient Authentication Model in u-healthcare Environment using Coalition ID (연합 ID를 이용한 u-헬스케어 환경의 환자 인증 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.305-310
    • /
    • 2013
  • To provide medical services to patients who have a terminal illness, recent hospital patients to monitor the state of the device attached to the body, the body insertion device is. U-Healthcare Environment and hospital officials indiscriminately exploited by the patient's vital information, however, could threaten the patient's life problems are appearing. In this paper, depending on the level of authority, hospital officials, Union of ID-based authentication model is proposed to use a patient's vital information. Union proposed model identify different authentication system is used in hospitals that exist in various forms in a number of ID information, health / medical information sharing between hospitals without exposure to unnecessary personal information, you can be assured of the anonymity. In particular, with easy access to patient information, hospital officials about the malicious act to protect patient information to access level for the rights granted by third parties to prevent easy access.

The Present Situation and Preventive Measure of the Fire in the Cattle Shelter -Based on Jeonbuk Province- (축사 화재의 현황과 그 방지 대책 -전라북도를 중심으로-)

  • Jeng, Gi-Sung
    • Fire Science and Engineering
    • /
    • v.21 no.4
    • /
    • pp.81-87
    • /
    • 2007
  • The cattle shelters have been badly damaged by the recently large fires. so the reconstruction of the damaged shelter is very difficult. In the light of the seriousness of the fire like that, the preventive plan for the cattle shed should be thoroughly established. The preventive measure which the fire department performs presently is limited to the stopping the fire before it starts. More than anything else, The men who operate and manage the cattle shelters must know what to do. The written plan will assist them. To begin with, The fire authority should clearly specify how cattle should be protected from any outbreak of fire. Clear access to each fire shed is very important to protect the cattle safely. The manager of the cattle shelter should get ready for the fire defense equipment. Most fires of the cattle shelters are due to electricity faults. These renovations should be performed and checked immediately. Therefore, The manager should be ready assist fire chief or the professional organization to prevent the electricity fire. Fire Safety education should be planned for the owner and staff so all should know what is expected in case of a fire. The Fire Department will check the access road, the equipment available and an announced fire drills should take place every year in the cattle shelter. The Fire Department should check the access road, equipment for preventing fires and staff training each year.