• 제목/요약/키워드: Control Policy

검색결과 3,193건 처리시간 0.03초

유비쿼터스 컴퓨팅 환경을 위한 보안통제가 강화된 접근제어 시스템 설계에 관한 연구 (A Study on Architecture of Access Control System with Enforced Security Control for Ubiquitous Computing Environment)

  • 엄정호;박선호;정태명
    • 정보보호학회논문지
    • /
    • 제18권5호
    • /
    • pp.71-81
    • /
    • 2008
  • 본 논문에서는 유비쿼터스 컴퓨팅 환경 하에 각종 정보시스템에 대한 접근을 효율적으로 제어하고 불법적인 접근을 차단하기 위하여 상황인식 기술 및 직무-역할 기반의 접근제어 시스템(CAT-RACS)을 설계하였다. CAT-RACS은 상황정보에 따른 정책 구성을 수행할 수 있도록 상황-역할 개념과 정보의 기밀성을 유지시키기 위해 보안등급 속성을 추가한 접근제어 모델(CA-TRBAC)을 적용하였다. CA-TRBAC는 사용자의 직무와 역할이 접근제어 조건에 합당할지라도 상황이 접근제어 조건에 부합하지 않거나, 역할과 직무가 접하려는 객체의 보안등급과 일치하지 않거나 하위 등급일 경우에는 접근을 허가하지 않는다. CAT-RACS는 상황인식 보안 매니저를 통해 사용자 인증과 접근제어 등의 보안 서비스를 제공하며, 상황정보 융합 매니저를 통해 상황인식 보안 서비스 제공과 보안정책 구성에 필요한 상황정보를 관리한다. 또한, 보안정책 매니저를 통해 CA-TRBAC 정책, 사용자 인증 정책, 보안 도메인 관리 정책을 관리한다.

A Comparative Analysis of Healthcare-Associated Infection Policy in South Korea and Its Implications in Coronavirus Disease 2019

  • Jeong, Yoolwon;Kim, Kinam
    • 보건행정학회지
    • /
    • 제31권3호
    • /
    • pp.312-327
    • /
    • 2021
  • Background: Infection prevention and control (IPC) to manage healthcare-associated infection (HCAI) has emerged as one of the most significant public health issues in Korea. The purpose of this study is to draw implications in IPC policies by analyzing the context, process, and major actors in policy development and comparatively analyzing IPC policy contents of Korea with three other countries. Additionally, IPC policies were analyzed in the context of coronavirus disease 2019 (COVID-19) to provide implications for future pandemics and HCAI events. Methods: This study incorporates a qualitative approach based on document and content analysis, applying codes and thematic categorization. IPC policy contents are comparatively analyzed by adopting the concept model, developed by the World Health Organization, which consists of core components of IPC structure at the national and facility level. Results: National IPC policies were developed within a complex social and political context, through the involvement of various stakeholders. IPC policies in Korea place a high emphasis on establishing IPC programs and built environments in healthcare facilities, whereas there were potentials for improvement in policies involving patients and promoting a safety culture. IPC policies, which currently focus on general hospitals and certain functions of hospitals, should further be expanded to target all healthcare facilities and functions, to ensure more efficient and sustainable IPC responses in the current and future disease outbreaks. Conclusion: IPC is a complex policy arena and lessons learned from the analysis of existing policies in the context of COVID-19 should provide valuable strategic implications for future policies.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권1호
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

상황 인식 기반의 유비쿼터스 컴퓨팅을 위한 접근 제어 시스템 (An Access Control System for Ubiquitous Computing based on Context Awareness)

  • 이지연;안준선;도경구;창병모
    • 정보처리학회논문지A
    • /
    • 제15A권1호
    • /
    • pp.35-44
    • /
    • 2008
  • 다양한 모바일 기기들이나 무선 네트워크들에 의한 무분별한 자원 접근은 시스템에 문제를 일으킬 수 있으므로 접근 권한 관리는 매우 중요하다. 본 논문에서는 프로그래머가 각 응용 프로그램에 맞는 접근 권한 규칙을 정책 파일로 작성하고 이를 실행시키는 접근 제어 시스템을 구현하였다. 본 논문에서 구현된 접근 제어 시스템인 CACM(Context-awareness Access Control Manager)은 상황 인식 기반의 유비쿼터스 컴퓨팅을 위한 프레임워크인 JCAF을 바탕으로 구현하였다. CACM은 프로그래머가 작성한 정책 파일을 바탕으로 접근을 제어한다. 또한 본 논문에서는 정책 파일을 정적 분석하여 잘못된 정책 파일 규칙 알려주는 지원 시스템을 제공하며 본 시스템을 사용하여 개발된 유비쿼터스 응용 프로그램의 실행을 시뮬레이션 할 수 있는 시뮬레이터와 시뮬레이션 결과를 제공한다.

고정오염원에서 발생하는 SO2 배출량 저감을 위한 효율적인 환경정책수단의 연구 (Research of Efficient Environmental Policy Instruments for the Reduction of SO2-Emissions from Stationary Sources)

  • 이영준
    • 한국환경과학회지
    • /
    • 제13권4호
    • /
    • pp.339-347
    • /
    • 2004
  • This paper asks the question: what choice of environmental policy instruments is efficient to reduce sulfur dioxide from stationary sources\ulcorner: In Korea, command and control has been a common way of controlling $SO_2-emissions.$ When compared to the non-incentive environmental policy instrument such as command and control, economic incentive environmental policy instrument has been the advantage of making polluter himself flexibly deals with in marginal abatement cost to develop environmental technology in the long view. Therefore, the application possibility of the incentive environmental policy instrument was studied in this research to realize the countermeasure for controlling of $SO_2-emissions.$ As a result, enforcement of the countermeasure such as flue gas desulfurizer by command and control would be suitable because power generation is performed by the public or for the public in source of air pollution and thus, economic principle is not applied to the polluter. In the source of industrial pollution, enforcement of fuel tax is found to be suitable for the countermeasure for the use of low sulfur oil in terms of the flexibility of demand for the price in the long tenn. For the permissible air pollution standards applicable to all air pollutant emitting facilities, enforcement of incentive environmental policy such as bubble, off-set, banking policy or tradeable emission penn its would be ideal in long terms according to the regional characteristics and the number and scale of air pollutant emitting facilities.

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing

  • Jing Yixin;Kim, Jin-Hyung;Jeong, Dong-Won
    • Journal of Information Processing Systems
    • /
    • 제2권1호
    • /
    • pp.28-33
    • /
    • 2006
  • The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a light-weight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.

Exploring the Causal Structure of Adolescent Media Addiction and Policy Intervention

  • Hwang, In Young;Park, Jeong Hun
    • International Journal of Contents
    • /
    • 제12권4호
    • /
    • pp.69-75
    • /
    • 2016
  • Adolescent media addiction has emerged as an important social agenda in Korea. However, there has not been enough discussion on the causal structure of media addiction and policy interventions. The objective of this study is to identify and assess the mechanism of the existing and the revised Shutdown policy based on the systems thinking approach. To achieve this purpose, we establish the relationship between media usage, flow, and addiction, and develop a causal loop diagram. Based on the causal loop diagram, we explore the causal structure of two policy scenarios: shutdown policy and deregulation. Our study suggests that policy interventions inducing direct parental control on children's media usage time are ineffective since the time control reduces children's autonomy, which helps alleviate media addiction. Therefore, this study suggests that policy intervention should focus on alleviating addiction itself rather than on controlling media usage time.

다단계 공급체인에서 재고정책들에 대한 시뮬레이션 연구 (A Simulation Study for Inventory Policies in a Multi-Echelon Supply Chain)

  • 김흥남;박양병
    • 한국시뮬레이션학회논문지
    • /
    • 제10권1호
    • /
    • pp.35-50
    • /
    • 2001
  • Managing multi-echelon inventory systems has gained importance over the last decade mainly because integrated control of supply chains consisting of several processing and distribution stages has become feasible through modern information technology. Determination of optimal inventory policy for multi-echelon supply chain is made difficult by the complex interaction between the different levels. In this paper, we investigate performance of five inventory policies (fixed quantity order policy, fixed interval order policy, compromised order policy, lead time-fixed quantity order policy, and mixed order policy) in a multi-echelon supply chain by using a simulation model constructed with AweSim simulation language. The results of the simulation study show that the mixed order policy is the best among five inventory policies in the most test problems except the case when the stockout cost per unit is much higher than the inventory holding and transportation costs per unit.

  • PDF

N-정책과 T-정책이 적용되는 M/G/1 시스템의 분석 (An Analysis of M/G/1 System with N and T-Policy)

  • 허선;이훈규;김종수
    • 대한산업공학회지
    • /
    • 제26권2호
    • /
    • pp.81-87
    • /
    • 2000
  • As for M/G/1 queueing system, we use various control policies, with which we can optimize the system. Up to now the most widely adopted policies are N-Policy, T-Policy, D-Policy, and so on. The existing researches are largely concerned to find an optimal operation condition or to optimize the system under single policy in M/G/1 system. There are, however, few literatures dealing with multiple control policies at once to enhance the flexibility of the model. In this study, we consider M/G/1 system adopting N-Policy and T-Policy simultaneously. If one of two conditions is satisfied, then, the server starts the service. We call this Min(N,T)-Policy. We find the probability distribution of the number of customers and mean waiting time in steady state and derive a cost function. Next, we seek the $N^*$, optimal threshold under various N values. Finally, we reveal the characteristics of cost function.

  • PDF

안전한 접근 경로를 보장하기 위한 접근 제어 (Access Control for Secure Access Path)

  • 김현배
    • 정보교육학회논문지
    • /
    • 제1권2호
    • /
    • pp.57-66
    • /
    • 1997
  • The primary purpose of security mechanisms in a computer systems is to control the access to information. There are two types of access control mechanisms to be used typically. One is discretionary access control(DAC) and another is mandatory access control(MAC). In this study an access control mechanism is introduced for secure access path in security system. The security policy of this access control is that no disclosure of information and no unauthorized modification of information. To make this access control correspond to security policy, we introduce three properties; read, write and create.

  • PDF