• Title/Summary/Keyword: Free Access to Information

Search Result 244, Processing Time 0.025 seconds

Multiple User Authentication based on SecuROS/FreeBSD (SecuROS/FreeBSD 기반 다단계 사용자 인증 시스템)

  • Doo, So-Young;Kim, Jong-Nyeo;Kong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.11-16
    • /
    • 2003
  • This paper implements Multiple User Authentication System to which the system authenticating with password only has been upgraded. The 4-staged authentication including user ID, password, smart card and access control information, etc. is used at the suggested Multiple User Authentication System. The user authentication system that this paper suggests has been developed based on SecuROS/FreeBSD with the function of access control added to FreeBSD kernel. It provides both the function to limit accost range to the system to each user and the function to check that when inputting important information the demand is the one if the system ; thus, the reliability becomes increased. In the SecuROS/FreeBSD system, MAC and RBAC are being used. So, in the case of users accessing to the system, the Information about the policies of MAC and RBAC to which users would access is used in the authentication. At the time, the access to system if permitted only when the access control information that users demanded satisfies all the access control rules which have been defined In the system.

Cyclic Contention Free Access Scheme for IEEE802.15.4 WPAN (IEEE802.15.4 WPAN에서의 Cyclic Contention Free Access 기법)

  • Kwak, Woon-Geun;Lee, Jai-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7B
    • /
    • pp.455-462
    • /
    • 2007
  • The GTS(Guaranteed Time Slot) of IEEE802.15.4 standard, which is the contention free access mechanism, has some problems such as the limited number of deployed devices, the low channel utilization and the service confirm delay. The proposed Cyclic-CFA(Contention Free Access) scheme is a modified polling algorithm that allows a large number of devices to be served Contention Free Access without polling packets. The Cyclic-CFA scheme improves the channel utilization dramatically and also reduces service delay time.

A Study on the Characteristics of Open Access in Korean Scholarly Journals: Focused on KCI Journals (국내 학술지의 오픈액세스 특성에 관한 연구: KCI 등재지를 대상으로)

  • Kim, Gyuhwan;Joung, Kyoung Hee
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.3
    • /
    • pp.251-267
    • /
    • 2017
  • This study aimed to analyze open access features of 1,890 Korean scientific journals registered in the Korea Citation Index (KCI). To this end, this study classified open access features of the target scientific journals into two main aspects, free access and free redistribution. The analysis results indicated that the target scientific journals had strong free access aspects. Based on websites, 67% of the target scientific journals allowed for free access without a login process and based on free database, 48% provided free access. On the other hand, the target scientific journals had weaker free redistribution aspects compared to their free access aspects. Only 14% of them offered the CC (creative commons) license. Another finding was that there were clear differences in open access aspects by academic field. Medicine, pharmacy, natural science, agriculture, fisheries, oceanography, and engineering had stronger open access aspects than humanities, sociology, arts, physical education, and interdisciplinary science. It appears that the difference was caused by the presence or absence of organizations supporting distribution of scientific journals of the fields concerned. To narrow the gap, it is recommended that the open access governance system is established to set up open access policies for Korean scientific journals regardless of academic fields and to support them.

An Access Control using Reputation Information in P2P File Sharing System (P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어)

  • Shin Jung-Hwa;Shin Weon;Rhee Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.493-498
    • /
    • 2005
  • P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.

The Features of Restricted Access to Information at European and East Asian Libraries

  • Makhotina, Natalya;Pshenichnaya, Evgeniya
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.3
    • /
    • pp.31-41
    • /
    • 2021
  • The growing number of threats to society through the uncontrolled distribution of information is forcing library communities in many countries to reconsider their views on free access to collections. Based on the content of numerous documents of international importance, it can be concluded that in any democratic country access to information is one of the most important human rights, along with the right to life, liberty, and security of person. However, the state has the right to restrict citizens' access to information within the framework of existing legislation. Constantly, restrictions on access to information are established in order to protect the ethical foundations of the constitutional order, morality, health, rights, and legitimate interests of others, to ensure the country's defense and state security. It goes without saying that each country has the right to independently decide where the boundaries lie between permitted and prohibited information, including printed information, contained in library collections. This article describes three levels of access restriction: foreign, state, and regional. The authors have analyzed the legal and regulatory documents that govern libraries, as well as the reasons and methods of limitation. A comparative analysis of the restriction of access to information in the countries of Europe and Asia is presented.

A Study on Security Architecture for Digital Content Dissemination (디지탈 컨텐츠 배포를 위한 보안 체계에 관한 연구)

  • 김대엽;주학수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.147-155
    • /
    • 2003
  • The diffusion of internet infrastructure and a fast increase of Population to use it is becoming a base of the service that can use various information, data and digital contents which were provided through off-line physically and used. Recently, the. techniques for copy deterrence and copyright protection have been important in e-commerce because various contents in digital form can be duplicated easily. The Access Control(AC) technique that only a user having the qualifications can access and use contents normally has been studied. The Conditional Access System(CAS) used in a satellite broadcasting md Digital Right Management System(DRMS) used for contents service are representative models of current commercialized access control. The CAS and DRM can be considered as an access control technique based on the payment based type(PBT). This paper describe the access control method of payment free type(PFT) suggested in [5] which are independent on the payment structure. And then we suggest a new access control method of payment free type which is more efficient than the previous one.

eMCCA: An Enhanced Mesh Coordinated Channel Access Mechanism for IEEE 802.11s Wireless Mesh Networks

  • Islam, Md. Shariful;Alam, Muhammad Mahbub;Hong, Choong-Seon;Lee, Sung-Won
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.639-654
    • /
    • 2011
  • In this paper, we present a channel access mechanism, referred to as the enhanced mesh coordinated channel access (eMCCA) mechanism, for IEEE 802.11s-based wireless mesh networks. The current draft of IEEE 802.11s includes an optional medium access control (MAC), denoted as MCCA, which is designed to provide collision-free and guaranteed channel access during reserved periods. However, the MCCA mechanism fails to achieve the desired goal in the presence of contending non-MCCA nodes; this is because non-MCCA nodes are not aware of MCCA reservations and have equal access opportunities during reserved periods. We first present a probabilistic analysis that reveals the extent to which the performance of MCCA may be affected by contending non-MCCA nodes. We then propose eMCCA, which allows MCCA-enabled nodes to enjoy collision-free and guaranteed channel access during reserved periods by means of prioritized and preemptive access mechanisms. Finally, we evaluate the performance of eMCCA through extensive simulations under different network scenarios. The simulation results indicate that eMCCA outperforms other mechanisms in terms of success rate, network throughput, end-to-end delay, packet-loss rate, and mesh coordinated channel access opportunity-utilization.

A Study on the Usability Evaluation of Open Access Repository (오픈액세스 리포지터리의 사용성 평가에 관한 연구)

  • Kwak, Seung-Jin;Shin, Jae-Min
    • Journal of Information Management
    • /
    • v.39 no.4
    • /
    • pp.67-96
    • /
    • 2008
  • The open access repository means the knowledge information repository for the producer and the user to share in order for all users of the world to freely access the information free of charge with no legal, economic and technological barrier. This study analyzes and compares the functions offered by each repository by classifying the repository into the organizational repository (dCollection, DSpace@MIT) and the thematic repository (arXiv, PubMed Central) and evaluates the user-centered usability based on the analyzed data. This study at the current times, so called as the Web 2.0 era in which the free access and sharing of the information is important, can be said to have the meaning that the result from the usability evaluation on the open access repository will be used as the fundamental data for developing the future repository.

Information inequality in commercialization of and information technology (정보 및 정보기술의 상업화에 따른 정보유통의 불균형)

  • 이순재
    • Journal of Korean Library and Information Science Society
    • /
    • v.19
    • /
    • pp.83-113
    • /
    • 1992
  • Information, or the lack of information, is the central concern of many people. And it is now an economic resource and must be paid. An ever increasing gap will grow between information 'have' and 'have not'. The new communications market place is a social phenomenon, and a vital key to examining changing patterns of social and cultural inequality. There are two main arenas of action in this ongoing conflict. Inside the library system itself, a combination of forces is weakening the historic principle of free, socially underwritten access. Outside, great efforts have been exerted in recent years, by private interests, to capture the information stockpiles built up from tax-su n.0, pported outlays on research and development and general governmental activities that produce data. The for-profit a n.0, pplication of the new information technologies threatens the survival of the free access principles. And the commercialization of information is proceeding almost uninterruptedly. It has been extended into areas that historically have been regarded as non-profit-making and endowed with a deep public interest. This study discussed some general issues and what we should do.

  • PDF

Grant-Free Random Access in Multicell Massive MIMO Systems with Mixed-Type Devices: Backoff Mechanism Optimizations under Delay Constraints

  • Yingying, Fang;Qi, Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.185-201
    • /
    • 2023
  • Grant-free random access (GFRA) can reduce the access delay and signaling cost, and satisfy the short transmission packet and strict delay constraints requirement in internet of things (IoT). IoT is a major trend in the future, which is characterized by the variety of applications and devices. However, most existing studies on GFRA only consider a single type of device and omit the effect of access delay. In this paper, we study GFRA in multicell massive multipleinput multiple-output (MIMO) systems where different types of devices with various configurations and requirements co-exist. By introducing the backoff mechanism, each device is randomly activated according to the backoff parameter, and active devices randomly select an orthogonal pilot sequence from a predefined pilot pool. An analytical approximation of the average spectral efficiency for each type of device is derived. Based on it, we obtain the optimal backoff parameter for each type of devices under their delay constraints. It is found that the optimal backoff parameters are closely related to the device number and delay constraint. In general, devices that have larger quantity should have more backoff time before they are allowed to access. However, as the delay constraint become stricter, the required backoff time reduces gradually, and the device with larger quantity may have less backoff time than that with smaller quantity when its delay constraint is extremely strict. When the pilot length is short, the effect of delay constraints mentioned above works more obviously.