• Title/Summary/Keyword: Process Control Documents

Search Result 71, Processing Time 0.046 seconds

Access Control of XML Documents Including Update Operators (갱신 연산을 고려한 XML문서의 접근제어)

  • Lim Chung-Hwan;Park Seog
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.567-584
    • /
    • 2004
  • As XML becomes popular as the way of presenting information on the web, how to secure XML data becomes an important issue. So far study on XML security has focused on security of data communications by using digital sign or encryption technology. But, it now requires not just to communicate secure XML data on communication but also to manage query process to access XML data since XML data becomes more complicated and bigger. We can manage XML data queries by access control technique. Right now current XML data access control only deals with read operation. This approach has no option to process update XML queries. In this paper, we present XML access control model and technique that can support both read and update operations. In this paper, we will propose the operation for XML document update. Also, We will define action type as a new concept to manage authorization information and process update queries. It results in both minimizing access control steps and reducing memory cost. In addition, we can filter queries that have no access rights at the XML data, which it can reduce unnecessary tasks for processing unauthorized query. As a result of the performance evaluation, we show our access control model is proved to be better than other access control model in update query. But it has a little overhead to decide action type in select query.

A STUDY ON THE PROCESS OF LARGE-SCALE REPAIR OF A CONDOMINIUM

  • Seki, Eiji;Akiyama, Tetukazu
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2002.11a
    • /
    • pp.295-300
    • /
    • 2002
  • Since the contents of large-scale repair of a condominium were various, a plan document was not prepared. The owners association of the condominium has given priority to decision-making of price priority over quality. Examination is not performed about the contents of the construction supervision business, which checks whether suitable construction is performed, either. On the other hand, the know-how for builders, such as decision of the process plan under which the repair work lessens influence to the safety and life as much as possible since the place where the resident is living turns into a construction site, and selection of a method of construction, is just going to ask. It is an important subject how the structure of the construction contractor selection, which considered quality, is built. Then, this research focuses on large-scale repair construction of the condominium, and arranges the actual condition of a series of processes from plan document creation to construction supervision. The method of research collects the construction documents of the condominium that carried out Barge-scale repair construction. Next, collection arrangement of the data of construction builder selection is carried out. The method of the construction builder selection of those other than a construction price is examined. The method of quality control of large-scale repair construction is examined.

  • PDF

Role based XML Encryption for Enforcing Access Control Policy (접근제어 정책구현을 위한 역할기반 XML 암호화)

  • Choi Dong-Hee;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.3-15
    • /
    • 2005
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Research area or n security is about Encryption Digital signature, Key management and Access control. until now research on U security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex XML security comes to involve not only network security but also managerial security. Managerial security is guaranteed through access control. But XML Encryption supports simple network security. So it can't support multiple users and multiple access control policies. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can supper multiple authorizations of multiple users with integrating access control. And this can reduce the cost of evaluation process of the existing complicated access authorization with pre-processing.

A Study on Educational Facilities Resource Management System using Smart Devices (스마트 디바이스를 활용한 교육시설물 자원관리 시스템에 관한 연구)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.1013-1014
    • /
    • 2015
  • Regardless of the strict enforcement of prevention education in accordance with the school facility management standard, safety accidents that lead to human and physical damages occur in current educational facilities because of teenagers with very low sense of responsibility and insensitivity toward fire and facility safety. To ensure educational facility safety, technology that will enable a fast work process and easy confirmation of electronic blueprints and related documents about the educational facility through smart devices at the site by various means is needed. This paper proposes a system design linked to the National Education Information System (NEIS) that uses the document conversion function, high efficiency resolution, and Internet of Things (IoT) to inspect and control the educational facility in the event of a safety accident through the Educational Facility Resource Management System (EFRMS) that manages the electronic blueprints, and various educational facility documents through various smart devices.

  • PDF

A Web Based System for Usability Project Planning and Testing (사용성 평가 계획 및 수행을 위한 웹 기반 시스템)

  • Park, Danbee;Hong, Ki-Hyung
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.308-314
    • /
    • 2015
  • Usability has become an important consideration for product development, and as a result, there is a growing need for systems and tools that can support usability test projects. However, few studies so far have developed such systems and tools. During a usability test project, many participants take up different roles, such as project managers, usability testers, and subjects. We implement a web-based usability test system with which a project manager can manage and control all participants and documents throughout the entire usability test process, from the design of a usability test project to the analysis of the test results. A usability test generates many documents, such as subject agreement forms and before/after questionnaires. Since many different subjects can participate in a usability test, consistency during testing with different participants and efficient document management are the keys to success for a usability test. Since all users that participate in usability test projects can access web-based usability test systems through a web browser, regardless of the place where they are, the reliability of the testing results can improve since the tests are conducted in the locations where the target products are meant to be used. In particular, our system is useful for disabled individuals who cannot move.

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF

Development of the Approximate Cost Estimating Model for PSC Box Girder Bridge based on the Breakdown of Standard Work (대표공종 기반의 PSC Box 교량 상부공사 개략공사비 산정모델에 관한 연구)

  • Kim, Sang-Bum;Cho, Ji-Hoon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.2
    • /
    • pp.791-800
    • /
    • 2013
  • Needs for developing a better way of cost estimating process for public construction projects have been widely recognized. Those needs are mainly from the early phases of the project through the construction life cycle due to the its importance to the control process. In contrast to the traditional estimating method based on unit-price references, this research utilized this following process. The first step is analyzing the real cost data from actual cost activities (2000~2010) about the statement of P.S.C(Prestressed Concrete) Box Girder Bridge. The collected data was broken into four categories based on technical construction methods such as I.L.M(Incremental Launching Method), M.S.S(Movable Scaffolding System), F.S.M(Full Staging Method), and F.C.M(Free Cantilever Method). The second, actual design documents including the actual cost estimating documents, drawings and specifications were carefully reviewed to cluster the cost itemized statement from four categories. It was also attempted to seek the proper breakdown of standard works that are responsible for more than 95 percentage in each categories in terms of its cost. The third, this research comes up the index for standard unit materials and unit price of standard work and develops the approximate estimating model applying for the specification(length and breadth of bridges) per square area that the user takes as well as suggests the practical application plan within the original time alloted.

E-Commerce in the Historical Approach to Usage and Practice of International Trade ("무역상무(貿易商務)에의 역사적(歷史的) 어프로치와 무역취인(貿易取引)의 전자화(電子化)")

  • Tsubaki, Koji
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.19
    • /
    • pp.224-242
    • /
    • 2003
  • The author believes that the main task of study in international trade usage and practice is the management of transactional risks involved in international sale of goods. They are foreign exchange risks, transportation risks, credit risk, risk of miscommunication, etc. In most cases, these risks are more serious and enormous than those involved in domestic sales. Historically, the merchant adventurers organized the voyage abroad, secured trade finance, and went around the ocean with their own or consigned cargo until around the $mid-19^{th}$ century. They did business faceto-face at the trade fair or the open port where they maintained the local offices, so-called "Trading House"(商館). Thererfore, the transactional risks might have been one-sided either with the seller or the buyer. The bottomry seemed a typical arrangement for risk sharing among the interested parties to the adventure. In this way, such organizational arrangements coped with or bore the transactional risks. With the advent of ocean liner services and wireless communication across the national border in the $19^{th}$ century, the business of merchant adventurers developed toward the clear division of labor; sales by mercantile agents, and ocean transportation by the steam ship companies. The international banking helped the process to be accelerated. Then, bills of lading backed up by the statute made it possible to conduct documentary sales with a foreign partner in different country. Thus, FOB terms including ocean freight and CIF terms emerged gradually as standard trade terms in which transactional risks were allocated through negotiation between the seller and the buyer located in different countries. Both of them did not have to go abroad with their cargo. Instead, documentation in compliance with the terms of the contract(plus an L/C in some cases) must by 'strictly' fulfilled. In other words, the set of contractual documents must be tendered in advance of the arrival of the goods at port of discharge. Trust or reliance is placed on such contractual paper documents. However, the container transport services introduced as international intermodal transport since the late 1960s frequently caused the earlier arrival of the goods at the destination before the presentation of the set of paper documents, which may take 5 to 10% of the amount of transaction. In addition, the size of the container vessel required the speedy transport documentation before sailing from the port of loading. In these circumstances, computerized processing of transport related documents became essential for inexpensive transaction cost and uninterrupted distribution of the goods. Such computerization does not stop at the phase of transportation but extends to cover the whole process of international trade, transforming the documentary sales into less-paper trade and further into paperless trade, i.e., EDI or E-Commerce. Now we face the other side of the coin, which is data security and paperless transfer of legal rights and obligations. Unfortunately, these issues are not effectively covered by a set of contracts only. Obviously, EDI or E-Commerce is based on the common business process and harmonized system of various data codes as well as the standard message formats. This essential feature of E-Commerce needs effective coordination of different divisions of business and tight control over credit arrangements in addition to the standard contract of sales. In a few word, information does not alway invite "trust". Credit flows from people, or close organizational tie-ups. It is our common understanding that, without well-orchestrated organizational arrangements made by leading companies, E-Commerce does not work well for paperless trade. With such arrangements well in place, participating E-business members do not need to seriously care for credit risk. Finally, it is also clear that E-International Commerce must be linked up with a set of government EDIs such as NACCS, Port EDI, JETRAS, etc, in Japan. Therefore, there is still a long way before us to go for E-Commerce in practice, not on the top of information manager's desk.

  • PDF

A Study on the Korea-U.S. Negotiation Process for AFKN-TV Satellite Broadcasting in 1983

  • Sangkil Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.39-47
    • /
    • 2023
  • The purpose of this study is to examine the progress of negotiations between the two countries regarding the implementation of AFKN's satellite broadcasting on October 4, 1983, as well as the opposition of domestic public opinion, which emerged as an important variable in the negotiation process. Through this, it was intended to lay the foundation for the historical facts necessary to interpret the negotiation process between the two countries over the implementation of AFKN's satellite broadcasting in the context of world history of cultural globalization. As a research method, the historical literature research method was used, focusing on archive documents stored in diplomatic archives. The study revealed that public opinion's movement toward cultural imperialism under domestic political conditions, which had authoritarian control over the media, served as an accidental factor to help carry out the regime's interests of regime protection. Through these findings, this paper interpreted that AFKN-TV's satellite broadcasting, which was implemented under the U.S. Department of Defense plan without the prior consent of the Korean government, clearly shows that Korea has been "semi-forced" into the U.S.-led cultural globalization order.

The High-Reliable Image Authentication Technique using Histogram Compensation (히스토그램 보정을 이용한 고신뢰성 영상 인증 기법)

  • Kim, Hyo-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.7
    • /
    • pp.1088-1094
    • /
    • 2010
  • Image authentication algorithms have to discriminate forged contents in the various critical fields of military, medical services, digital documents. They must ensure perceptual invisibility and fragility against malicious attacks. It is desirable that watermarking algorithms support sufficient insertion capacity and blind feature. And, high reliable algorithms that can eliminate false-positive and false-negative errors are needed in the watermark extraction process. In this paper, we control coefficients of high frequency band in a DCT domain and compensate brightness histogram for high reliability. As a result, we found that the proposed algorithm guarantee various requirements such as perceptual invisibility with high PSNR values, fragility, high reliability and blind feature. In addition, experiment results show that the proposed algorithm can be used steganographic applications by sufficient capacity of watermark.