• Title/Summary/Keyword: Permission System

Search Result 277, Processing Time 0.034 seconds

The Subjective Perception and Characteristics of the Middle-aged on Death with Dignity (존엄사에 대한 한국 중년층의 인식유형과 특성)

  • Shin, Sun-Ho;Shin, Won-Shik
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.413-422
    • /
    • 2015
  • This study is to grasp fundamental data to prepare the policy about death with dignity(DwD) by grasping perception type of the middle-aged about DwD. 32 middle-ages test Q-sort with 30 statements which is related to DwD. The result of analysis shows that subjective perception types are permission type, opposition type, and limited permission type. First, 'permission type' indicates that DwD by self-determination of patients should be accepted; it is necessary to patients with extreme pain. Second, 'opposition type' insists that there will be more people dying unfairly; a trend to make light of human life could be in everywhere if DwD is permitted. Third, 'limited permission type' agrees with permitting DwD but insists on preparing specific legal system before that. The subject, DwD, itself seems not to be able to draw a complete agreement from people, but national opinions should be reflected during the process of DwD system.

A Visualization System for Permission Check in Java using Static Analysis (정적분석을 이용한 자바 언어의 권한검사 시각화 시스템)

  • Kim, Yun-Kyung;Chang, Byeong-Mo
    • The KIPS Transactions:PartA
    • /
    • v.13A no.5 s.102
    • /
    • pp.399-404
    • /
    • 2006
  • In Jana 2, to enforce a suity policy of a program, programmer writes permission sets required by the code at the policy file, sets Security Manager on system and executes the program. Then Security Manager checks by stack inspection whether an access request to resource should be granted or denied whenever code tries to access critical resource. In this paper, we develop a visualization tool which helps programmers enforce security policy effectively into programs. This system is based on the static permission check analysis which analyzes permission checks which must succeed or fail at each method. Based on this analysis information, programmer can examine visually how permission checks and their stack inspection are performed. By modifying program or policy file if necessary and examining analysis information repeatedly, programmer can enforce security policy correctly.

A Study of Security Checks for Android Least Privilege - focusing on mobile financial services - (모바일 앱 최소권한 사전검증에 관한 연구 - 금융, 안드로이드 운영체제 중심으로 -)

  • Cho, Byung-chul;Choi, Jin-young
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.91-99
    • /
    • 2016
  • A security system in Android OS adopts sandbox and an permission model. In particular, the permission model operates the confirmation of installation time and all-or-nothing policy. Accordingly, the Android OS requires a user agreement for permission when installing an application, however there is very low level of user awareness for the permission. In this paper, the current status of permission requirement within mobile apps will be discovered, and the key inspection list with an appropriate method, when a mobile service provider autonomously inspects the violation of least privilege around financial companies, and its usefulness will be explored.

The Effect of Sales Permission of Diesel Passenger Cars as a Countermeasure against the Climatic Change Convention (기후변화협약 대응 대책으로 경유 승용차 판매 허용이 가지는 효과)

  • Yoo Eung-Sop;Park Jin-Won;Kim Kyung-Sup
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.4
    • /
    • pp.117-129
    • /
    • 2005
  • The climatic change convention is a matter of grave concern to the whole world. As a countermeasure against the climatic change convention, the Korean Government permits the sale of diesel passenger cars since 2005. In this paper, we analyse the effect of the sales permission of diesel passenger car as the countermeasure. The share, carbon emission, and pollutants emission of each type of passenger cars are analysed using system dynamics. The result is that the carbon emission is decreased by $5.5\%$ but the pollutants emission is increased by $5\%$. If the pollutants emission was dealt successfully with, the sales permission of diesel passenger cars would be a good countermeasure against the climatic change convention.

  • PDF

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.

Design and Implementation of Permission Delegation in Role-Based Access Control Model (권한의 위임을 위한 역할-기반 접근 제어 모델의 설계 및 구현)

  • 나상엽
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.1-10
    • /
    • 2003
  • In the distributed-computing environment, applications or users have to share resources and communicate with each other in order to perform their jobs more efficiently. In this case, it is important to keep resources and information integrity from the unexpected use by the unauthorized user. Therefore, there is a steady increase in need for a reasonable way to authentication and access control of distributed-shared resources. In RBAC, there are role hierarchies in which a higher case role can perform permissions of a lower case role. No vise versa. Actually, however, it is necessary for a lower case role to perform a higher case role's permission, which is not allowed to a lower case role basically. In this paper, we will propose a permission delegation method, which is a permission delegation server, and a permission delegation protocols with the secret key system. As the result of a permission delegation, junior roles can perform senior role's permissions or senior role itself on the exceptional condition in a dedicated interval.

  • PDF

Design and Implementation of a Flexible Application Permission Management Scheme on Android Platform (안드로이드 플랫폼에서 유연한 응용프로그램 권한관리 기법 설계 및 구현)

  • Kim, Ik-Hwan;Kim, Tae-Hyoun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.151-156
    • /
    • 2011
  • Google Android, which is one of the popular smart phone platforms, employs a security model based on application permissions. This model intends to reduce security threats by protecting inappropriate accesses to system resources from applications, but this model has a few problems. First, permission requested by an application cannot be granted selectively. Second, once the permission has been granted it is maintained until the application is uninstalled. Third, applications may acquire powerful permissions through user ID sharing without any notice to users. In order to overcome these limitations, we designed and implemented a flexible application permission management scheme. The goal of our scheme is to enhance security and user convenience while keeping compatibility to original platform. We also verified the operation of our scheme with real applications on Android emulator.

Development of Pre-Specification for BIM-based Automated Building Code Checking (BIM 기반 건축법규 자동검토를 위한 사전정의서 개발)

  • Kim, Inhan;Jang, Jaemoon;Choi, Jungsik
    • Korean Journal of Computational Design and Engineering
    • /
    • v.21 no.1
    • /
    • pp.31-41
    • /
    • 2016
  • Building Information Modeling (BIM) has been adopted in variety domain of construction industry. In this circumstances, interest of BIM model quality has been increased. In many countries, automated building code checking system by Industry Foundation Classes (IFC) has been developed and studied to use web based building permission systems. IFC is international standard of BIM format. However, the data structure of IFC does not include all of objects and properties about national building codes. In this paper, we developed the information specification between IFC data structure and national building code to increase interoperability. First, we drew the criteria from literature review to analyze the building code. And then, we analyzed building code and sorted objects and properties for automated building code checking. After that we made mapping table between the sorted data and IFC specification. Using the mapping table, we developed pre-specification about building codes information that does not exist in IFC specification. And the defined information can be used to develop the BIM modeling guide and national building permission system. The pre-specification support increasing the interoperability between user and automated building code checking system. Increasing thee interoperability makes improvement accuracy and reliability about result of automated building code checking.

Land Law Meaning of the Land Development Permission System (토지개발허가제의 토지법적 의의 -「국토계획법」 제56조를 중심으로-)

  • Lee, Sun-Young;Kim, Sang-Jin
    • Korea Real Estate Review
    • /
    • v.24 no.1
    • /
    • pp.77-90
    • /
    • 2014
  • With the purpose of preventing improper development on the national land, the land development permission system which is performed from 2002 has meaning as a type of limiting the property right, but modification on the details of traditionally understood land ownership is inevitable. Also, releasing the development prohibit on the land not only stop in recovering the freedom for land development, but also can be interpretated as a cause of forming the land development right, therefore the purpose of this study is to develop this into a real right. When we look at the development activity permission as a form of limiting the property right, constitutional problems of basis for that limit and compensation demand can occur. However, that limit can be recovered or relieved through permitting the development activity, therefore the compensation problem can be solved. Due to the development activity permission system, the land development right was separated from the land ownership to be communalized, and now, the land ownership only has condition use right left and don't have the future condition change right in principle, therefore modifying the traditional concept of land ownership is inevitable. By the virtue of the land ownership authority, the land development permission system must have the property to separate the development right as the independent right to be authorized of its legitimacy. Without these properties, the land development permission system cannot satisfy the social necessity of the land development right and its discussion under the category of the land ownership limit theory can't be deviated. In the existing "Civil Law" or in the Land Regulation Law system, there are many difficulties and limits in generalizing the land development right as a real right. Therefore, it is considered that by establishing a social law idea of Framework Act on the Land to characterize the land right theory in the real right theory, the land development permission system or the development right theory should be studied and developed independently and systematically.

Sustainable Utilization and Management Scheme in Wangdol-cho Surrounding Sea Area (동해 왕돌초 어장의 지속적 이용 및 관리 방안)

  • Lee, Kwang-Nam;Myoung, Jung-Goo
    • Ocean and Polar Research
    • /
    • v.25 no.3
    • /
    • pp.331-345
    • /
    • 2003
  • The fishing ground surrounding Wangdol-cho is not only overexploited by the littering of dilapidated fishing net and equipment, but also by fishermen's overfishing, surpassing optimum fisheries resources. In addition, increasing fishing efforts (number of fishing vessel and fishing net, etc) contribute to the deterioration of fishing ground, and it is urgently required that schemes to tackle the problems should be taken. To effectively address the problems as such, this paper aims to propose sustainable utilization and management scheme of fishing ground through classification of fishing ground surrounding Wangdol-cho as one area which is less than 50m deep, measuring $13.66km^2$ and the other, permission fishing area of Gill Net fishery, measuring $347.23km^2$. The analysis shows that, for the water area less than 50m deep, implementation from a short-term perspective includes autonomous management fishery by gill net and trap fishery. For the permission fishing area of Gill Net fishery, implementation includes limit on fishing period, real name system of fishing equipment and limit on fishing equipment. Implementation from a medium and long-term perspective includes limit on scuba diving, designation of underwater sightseeing zone, sea farming, facilities of surveillance, adoption of approval system for the permission fishing area of Gill Net fishery and introduction of report system for fishing.