• Title/Summary/Keyword: Inheritance Hierarchy

Search Result 49, Processing Time 0.026 seconds

An Advanced Permission-Based Delegation Model in RBAC (RBAC을 기반으로 하는 향상된 권한 위임 모델)

  • Kim, Tae-Shik;Chang, Tae-Mu
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.725-732
    • /
    • 2006
  • RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. However, RBAC does not process delegation of permission effectively that occurs frequently in the real world. This paper proposes an Advanced Permission-Based Delegation Model(APBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. APBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.

A Study on the Patterns and Characteristics of Spatial Changes in Unregistered Private House Gardens (문화재 미등록 민가정원의 공간변화 양상 및 특성 연구)

  • Lee, Kyeong-Mi;Bae, Jun-Gyu;Shin, Hyun-Sil
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.40 no.3
    • /
    • pp.67-73
    • /
    • 2022
  • This study tracked the changing process of unregistered private house gardens by using the form at the time of the construction of gardens as the prototype of each garden, investigated the spatial value of the garden, and discussed the historical spatial value of unregistered private house gardens in terms of inheritance and change of traditional gardens. To this end, targeting on unregistered private house gardens in Gangwon-do, which are in danger of preserving their gardens due to the recent increase in the number of designated cultural heritage dismantled, the patterns of unregistered private house gardens, their characteristics and values were identified through the spatial change of the garden, and the following results were derived. First, the unregistered private house gardens were able to inherit and maintain the form of a traditional garden, being located in a clan village. The garden space was divided by the influence of Confucian philosophy, and the components of the garden, tree species and planting methods appeared differently. In other words, the use of garden components according to the status hierarchy appeared. Second, space reduction was continuously confirmed at four target sites. The reduced spaces are garden spaces, and part of the garden was attributed to the state due to the building of new road and environmental improvement project. The reduced spaces are garden spaces, and part of the garden was attributed to the state due to the new road and environmental improvement project. Third, eight old big trees over 100 years old were identified in three of the four target sites, and the garden components such as stone water tanks, quickset doors, and ponds were commonly identified in Korea, China, and Japan during the Joseon Dynasty, inheriting the historicity of the traditional garden.

Applying the AHP approach to evaluate Mobile Commerce Environment (AHP 기법을 이용한 모바일 상거래 환경의 평가)

  • Oh, Gi-Oug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2308-2314
    • /
    • 2006
  • Internet Technology allowed general commerce to have proceeded actively, and now it is sharply evolving into Mobile Commerce. Mobile Commerce came into an inheritance of the Electronic Commerce, thought the feature to be different form is various as well. Many researches that analyzed the feature of Electronic Commerce were carried out but those were processed according to its location and field only. This study extracted and analyzed the factor that considered the several positions for Mobile Commerce so that it can reflect diverse the demands from those related to Mobile Commerce. It sought the new characteristic which is different from the Electronic Commerce, and took account of the successful factor for Mobile Commerce which includes the position in a user, a developer and an operator. In addition AHP (Analytics Hierarchy Process) was used in order to evaluate the subject characteristic applied to each related to through more objective methods. The analysis results identified in this study such as the quality trust and understandability for an information duality might be the one of the chief elements of success in Mobile Commerce which applies at the present.

A Time Constraints Permission Based Delegation Model in RBAC (RBAC을 기반으로 하는 시간제한 권한 위임 모델)

  • Kim, Tae-Shik;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.163-171
    • /
    • 2010
  • RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. Delegation is a mechanism of assigning access rights to a user. RBDM0 and RDM2000 models deal with user-to-user delegation. The unit of delegation in them is a role. However, RBAC does not process delegation of Role or Permission effectively that occurs frequently in the real world. This paper proposes a Time Constraints Permission-Based Delegation Model(TCPBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. TCPBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation with time constraints. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.

A Study on the Optimization of C++ Program Using the Class Hierarchies Slicing (클래스 계층구조 슬라이싱을 이용한 C++프로그램 최적화에 관한 연구)

  • Kim, Un-Yong;Jeong, Gye-Dong;Choe, Yeong-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.6
    • /
    • pp.1542-1555
    • /
    • 1999
  • This paper proposes an algorithm for class hierarchies which can optimize member data and member function. This algorithm considers single/multiple inheritance, static/dynamic binding, overloading/overriding, pure virtual/virtual function, and constructor on the hierarchy of C++ class. We need to eliminate unused function that possesses many component element, because the program uses a limited of function in class hierarchies. Previous works on slicing mainly focused on selecting output data and including the related program statement. It was consists of structured programming language and also centralized on error detection, maintenance, and flexible testing. In this paper, we extend to the object-oriented language, makes a linked-table for objects to raise the efficiency of information management, and proposes necessary algorithm for optimizing system Through this process, we can obtain the simplification of program code and the progress of system performance by eliminating unused member data and member function.

  • PDF

A Formal Approach for the Reorganization of Class Hierarchies for the Extension of Object Oriented Applications (객체지향 어플리케이션의 확장을 위한 클래스 계층 구조의 재구성에 대한 정형기법)

  • Hwang, Suk-Hyung;Kim, Dae-Won;Yang, Hae-Sool
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.589-602
    • /
    • 1999
  • There are some advantages of developing applications based on the object oriented concepts. One os them is that it is possible to reuse the existing designs and products. This paper provides a formal method for the reorganization of class hierarchies for the object extension in the object oriented design phase. In this paper, we introduce classes, and edges to represent the inheritance and aggregation relationship between classes. Based on the graph, we define an order relation(called the object extension) between class hierarchy graphs. And also we present a set of five basic transformations preserving the object extension relation. The set is proven to be correct and complete. The results of this paper help form a theoretical basis for the extension and reorganization object-oriented application systems.

  • PDF

A Study on the Object-Oriented Program Slicing using Module Class Dependency Graph (모듈 클래스 종속 그래프를 이용한 객체지향 프로그램 슬라이싱에 관한 연구)

  • Kim, Un-Yong;Jeong, Gye-Dong;Choe, Yeong-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.7
    • /
    • pp.1805-1816
    • /
    • 1999
  • This paper presents the Module Class Dependency Graph for expressing the dependency relations between classes effectively. The object-oriented language is developed independently at design time, and consists of relationship between classes. Therefore we need to consider these characteristics of independence, and to express effectively the relation of classes which is existed in class hierarchy. In the System Dependence Graph and Class Dependence Graph, the relationship of classes is not expressed. To express the class relationship, we propose the Module Class Dependence Graph, and we verify the effectiveness of this method applying to object constructor, inheritance relationship and dynamic binding. Also, we presents the expressing method of parameter to identify the member data of classes. Using this Module Class Dependency Graph, we can analyze the relationship of module class correctly at design time. This method can be applied to reverse engineering, testing, visualization and other various fields to analyze system.

  • PDF

An Access Control Model for Privacy Protection using Purpose Classification (사용목적 분류를 통한 프라이버시 보호를 위한 접근제어 모델)

  • Na Seok-Hyun;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.39-52
    • /
    • 2006
  • Recently purpose is used by an crucial part to security management when collecting data about privacy. The W3C(World Wide Web Consortium) describes a standard spec to control personal data that is provided by data providers who visit the web site. But they don't say anymore about security management about personal data in transit after data collection. Recently several researches, such as Hippocratic Databases, Purpose Based Access Control and Hippocratic in Databases, are dealing with security management using purpose concept and access control mechanism after data collection a W3C's standard spec about data collection mechanism but they couldn't suggest an efficient mechanism for privacy protection about personal data because they couldn't represent purpose expression and management of purposes sufficiently. In this paper we suggest a mechanism to improve the purpose expression. And then we suggest an accesscontrol mechanism that is under least privilege principle using the purpose classification for privacy protection. We classify purpose into Along purpose structure, Inheritance purpose structure and Stream purpose structure. We suggest different mechanisms to deal with then We use the role hierarchy structure of RBAC(Role-Based Access Control) for flexibility about access control and suggest mechanisms that provide the least privilege for processing the task in case that is satisfying using several features of purpose to get least privilege of a task that is a nit of business process.

A Study on the Topography and the Criteria of Choosing the Location-Allocation of Palaces - Focusing on Gyeongbokgung Palace and Changdeokgung Palace - (조선 궁궐 입지 선정의 기준과 지형에 대한 연구 - 경복궁과 창덕궁을 중심으로 -)

  • Kim, Kyoosoon
    • Korean Journal of Heritage: History & Science
    • /
    • v.52 no.3
    • /
    • pp.130-145
    • /
    • 2019
  • The palaces in South Korea are largely divided into primary palaces (法宮) and secondary palaces (離宮). In the early Joseon period, the primary palace was Gyeongbokgung Palace, and the secondary palace was Changdeokgung Palace. Additionally, there is the concept of imperial palaces (正宮). Gyeongbokgung Palace was the primary palace and the imperial palace. The topography of Gyeongbokgung is based on Mt. Baegak, which is the symbol of royal authority. The location of the palaces was chosen to highlight the king's dignity and authority. The three gates and three courts (三門三朝) were positioned on a straight line based on one axis along the ridge of Mt. Baegak to establish the legitimacy, hierarchy, and unity of the kingship. The secondary palace was built according to the demands of the king and the royal family or the political situation. It was created as a royal living space; thus, creating independent and diverse spaces along multiple axes. The primary palace was chosen to be built on the terrain of Yang, and the secondary palace was chosen to be built on the terrain of Yin; the criteria for laying buildings in the palace areas had to be different. The most important point in the formation of Joseon palaces was that the secret vital energy for the king (王氣) originated from the sacred mountain. Important elements of the palace were the secret vital energy chain of feng shui (風水氣脈) and the forbidden stream (禁川). The secret vital energy chain of feng shui was the gateway to the secret vital energy for the king, and the forbidden stream was a method of preventing the king from leaving the palace grounds. Gyeongbokgung Palace, which is on typical feng shui terrain, faithfully reflects the principles of feng shui. On the other hand, the secondary palace was built on incomplete and irregular feng shui terrain. Feng shui was part of the nature and the geography of the ruling classes in the Joseon Dynasty. By examining their geography, I believe that the perfection of traditional culture inheritance and restoration can be improved.