• Title/Summary/Keyword: Digital Access

Search Result 1,428, Processing Time 0.031 seconds

The Design of a Multimedia Data Management and Monitoring System for using License Agent (라이센스 에이젼트를 이용한 멀티미디어 데이터관리 및 감시 시스템 설계)

  • Cho, Hyun-Seob;Ryu, In-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.1662-1664
    • /
    • 2007
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

Design of Access Control Model for Secure EDI Service (안전한 EDI 서비스를 위한 접근제어 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Journal of Digital Contents Society
    • /
    • v.1 no.1
    • /
    • pp.23-37
    • /
    • 2000
  • EDI is basically the concept of computer-to-computer exchange of messages relating to various types of activities or business areas, such as banking, trade, medicine, publishing, etc. Therefore, security, reliability and special functionality will be implicit requirements of EDI systems. We will design access control model to content security of these requirements. Access controls in information systems are responsible for ensuring that all direct access to the entities occur exclusively according to the access modes and rules fixed by security policies. On this paper, security policies for access control model are presented from the viewpoints of identity-based, rule-based, role-based policy. We give a design of access control model for secure EDI service based on the derived access control rules and operations to enforce the defined security policies. The proposed access control model provides integrity, confidentiality and a flow control of EDI messages.

  • PDF

Hierarchial Encryption System Using Two-Step Phase-Shifting Digital Holography Technology Based on XOR and Scramble Operations (XOR 및 스크램블 연산 기반 2단계 위상 천이 디지털 홀로그래피 기술을 이용한 계층적 암호화 시스템)

  • Kim, Cheolsu
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.8
    • /
    • pp.983-990
    • /
    • 2022
  • In this paper, we implemented a hierarchical encryption system using two-step phase-shifting digital holography(PSDH) technology based on XOR and scramble operations. The proposed encryption system is a system that authenticates access through the issuance of an encryption key for access to individual laboratories, department offices, and universities. In the encryption process, we proposed a double encryption method using XOR and scramble operation with digital technology and two-step phase-shifting digital holography with optical technology. In the two-step PSDH process, an new method of determining the reference wave intensity without measuring it by using random common object image gererated from digital encryption process was also proposed. In the decryption process, the process is performed in the reverse order of encryption process. And only when the various key information used in the encryption process is correct, the encrypted information can be decrypted, so that the user can access the desired place. That is, there is a feature that can hierarchically control the space that can be accessed according to the type of key issued in the proposed encryption system. Through the computer simulation, the feasibility of the proposed hierarchical encryption system was confirmed.

Fuzzy Linguistic Recommender Systems for the Selective Diffusion of Information in Digital Libraries

  • Porcel, Carlos;Ching-Lopez, Alberto;Bernabe-Moreno, Juan;Tejeda-Lorente, Alvaro;Herrera-Viedma, Enrique
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.653-667
    • /
    • 2017
  • The significant advances in information and communication technologies are changing the process of how information is accessed. The internet is a very important source of information and it influences the development of other media. Furthermore, the growth of digital content is a big problem for academic digital libraries, so that similar tools can be applied in this scope to provide users with access to the information. Given the importance of this, we have reviewed and analyzed several proposals that improve the processes of disseminating information in these university digital libraries and that promote access to information of interest. These proposals manage to adapt a user's access to information according to his or her needs and preferences. As seen in the literature one of the techniques with the best results, is the application of recommender systems. These are tools whose objective is to evaluate and filter the vast amount of digital information that is accessible online in order to help users in their processes of accessing information. In particular, we are focused on the analysis of the fuzzy linguistic recommender systems (i.e., recommender systems that use fuzzy linguistic modeling tools to manage the user's preferences and the uncertainty of the system in a qualitative way). Thus, in this work, we analyzed some proposals based on fuzzy linguistic recommender systems to help researchers, students, and teachers access resources of interest and thus, improve and complement the services provided by academic digital libraries.

A PSIP Information Generating System for Produce Digital Access Program (디지털 방송 콘텐츠 제작을 위한 PSIP 정보 생성 시스템)

  • Hwang, Kyung-Min;Kim, Jong-Moon;Bang, Jin-Suk;Cho, Tae-Beom;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.615-618
    • /
    • 2007
  • It has able to express digital video/audio data from analog and to broadcast it via improvement of video/audio compression technology and publishing standard of MPEG-2 System. Nowaday many System Operators are provide regular digital broadcasting program to customer with their own access program. To provide access program, two process needs that are creating broadcasting information and remultiplexing it with video/audio data, and this solution is providing with high-cost system only. For this reason, digital access program bas week point to product. In this paper, we designed and implemented Generating PSIP Information System to product digital access program which generate PSIP information via receiving broadcasting information from user, and map PSIP information directly to video/audio data.

  • PDF

The Impact of Internet Access Charges on Economic Activities : A Cross-country Analysis (인터넷 사용료 수준이 경제활동 수준에 미치는 영향에 대한 다국가 분석)

  • Yoo, Seoung-Hoon;Yang, Chang-Young
    • Journal of Digital Convergence
    • /
    • v.2 no.2
    • /
    • pp.63-76
    • /
    • 2004
  • There is a considerable gap in the level of the Internet access charges among countries because of the history of the Internet use, current status of the Internet infrastructure, the Internet penetration rate, and so on. Low Internet access charge increases the number of the Internet users and the Internet penetration rate, which boosts economic activities. This paper empirically explores the impacts of the internet access charges on economic activities using a cross-country analysis based on data from 76 countries for the year 1998-2001. To this end, several versions of the neoclassical growth models, explicitly including the internet access charges, are estimated with the GDP used for a proxy for economic activities and the level of Internet access charges considered as an input to production. Subject to the appropriate caveats, the results show that the level of the Internet access charges make a significantly negative effect on economic activities. In other words, it is concluded that low Internet access charges of a county increase economic activities and the increased economic activities in turn raise the real income of the county.

  • PDF

Copyright Protection Protocol providing Privacy (프라이버시를 제공하는 저작권 보호 프로토콜)

  • Yoo, Hye-Joung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.57-66
    • /
    • 2008
  • There have been proposed various copyright protection protocols in network-based digital multimedia distribution framework. However, most of conventional copyright protection protocols are focused on the stability of copyright information embedding/extracting and the access control to data suitable for user's authority but overlooked the privacy of copyright owner and user in authentication process of copyright and access information. In this paper, we propose a solution that builds a privacy-preserving proof of copyright ownership of digital contents in conjunction with keyword search scheme. The appeal of our proposal is three-fold: (1) content providers maintain stable copyright ownership in the distribution of digital contents; (2) the proof process of digital contents ownership is very secure in the view of preserving privacy; (3) the proposed protocol is the copyright protection protocol added by indexing process but is balanced privacy and efficiency concerns for its practical use.

Implementation of Korea - Computer Access Assessment System (K-CAAS) for Persons with Physical Disabilities (지체장애인의 컴퓨터 접근 평가 시스템 구현)

  • Yook, Ju-Hye;Kim, Jin-Sul;Oh, Hyun-Jung
    • Journal of Digital Contents Society
    • /
    • v.13 no.3
    • /
    • pp.335-342
    • /
    • 2012
  • The purpose of the study was to develop a computer access assessment system for improving computer access of individuals with physical disabilities for the first time in Korea. Korea-Computer Access Assessment System (K-CAAS) presented in this article tests five user skills of aim, drag, menu, scan, and switch. Skill levels of the five test areas could be set as low, middle, and high according to individuals' characteristics. All tests have their default set in each level, and skill levels can be selected and controlled by the abilities and goals of a user. Tests could be selected for users' training and their results could be traced and shown. Therefore, the K-CAAS is a training program to improve computer access skills as well as an assessing program. It would help users with physical disabilities operate a computer by themselves as improving their computer access skills.

A Study on Elementary School Teachers' Needs for Access Points for Picture Books (초등학교 교사의 그림책 접근점 요구에 관한 연구)

  • Kim, Hyemi;Kim, Soojung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.233-258
    • /
    • 2022
  • The purpose of this study is to identify elementary school teachers' needs for access points when searching for picture books to be used as teaching media, and suggest ways to improve DLS(Digital Library System) in school libraries. To achieve this purpose, the study examined the access points provided by OPAC(Online Public Access Catalog) systems in seven domestic and foreign libraries. In addition, it conducted an online survey with elementary school teachers, and a total of 220 responses were finally analyzed. It was found that the most needed access points were topic, grade/age, content, subject/chapter, and cross-curricula learning topics, etc. Based on the results, this study suggests providing the most needed access points in DLS, developing controlled vocabulary tools, and improving system functions or the interface to enhance accessibility to picture books.

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.