• Title/Summary/Keyword: Right of Access

Search Result 337, Processing Time 0.027 seconds

Guideline for 'Universal Access Right' of Sports Program (스포츠 프로그램의 보편적 접근권 보장을 위한 가이드라인 탐색)

  • Kim, Won-Je;Song, Hae-Ryong;Kim, Jae-Chul;Cho, Hang-Min
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.400-409
    • /
    • 2009
  • The Broadcasting Law amended in January 2007 declared to adopt universal right to view(known more widely as Universal Access Right, UAR), the right to access broadcasting programs on such major sports or other events that are likely to catch the gaze of the public television viewers. Then its implementation rule was issued in February 2008, and under the regulations the Committee of Ensuring Universal Access Right has been established, where detailed action measures and guidelines are currently in the process of preparing. However, it is no question that an effectiveness of the implementation system of Universal Access Right presupposes sufficient amount of discussion and social consensus. At present, the major focus in this issue is on the matters including which type of events is subject to UAR and what criteria are desirable in determining which broadcasting company has priority. In this context, this study aims at identifying implications for policy by examining the precedent cases of Europe, Australia, and other countries, where UAR is enacted and implemented. Further, this study tries to draw up a specific scheme for ensuring universal right to view through conducting a survey on public television viewers. We will include specific guidelines for selecting events of public attention, criteria for selecting broadcasting companies regarding priority, and relevant operating rules regarding relayed broadcasting.

The Efficiency of Evaluation Methodology in Sunshine Access Rights for Apartment Buildings by Computer Simulation (시뮬레이션을 통한 일조평가방법의 효용성에 관한 연구)

  • Chung, Yu Gun;Kim, Yeong Il;Kim, Jeong Tai
    • KIEAE Journal
    • /
    • v.7 no.5
    • /
    • pp.47-52
    • /
    • 2007
  • The high-rise apartment buildings have been constructed in large quantities to provide housing and used to be the popular residential types in Korea. However, it results that a number of problems are provoked such as the deteriorate of comfort and lack of sunshine access. Based on the judicial precedents, the sunshine access right should be guaranteed to enjoy uninterrupted sunlight for more than two hours continually between 9 am. and 3 pm or for more than four hours between 8 am and 4 pm in the winter solstice. The computer simulations are very strong tools to judge that the sunshine access right is infringed or not. This study aims to evaluate the efficiency of two computer simulation programs such as 3Dmax and Lightscape programs broadly used in field areas. For the study, the three dimensional computer models are suggested, and the simulations are performed on the 30 minutes intervals. Also, the simulation results are compared by the results of scaled model experiments.

A study on the Institutional Characteristics of Artisanal Fisheries (입어관행과 관행어업의 제도적 성격에 관한 고찰)

  • 김병호
    • The Journal of Fisheries Business Administration
    • /
    • v.27 no.2
    • /
    • pp.51-63
    • /
    • 1996
  • This study is concerned with the identification of the concepts and characteristics of the traditional access of small scale fishery and traditional small scale fishery based on the classification of fisheries under Fisheries Law, As we called, these fisheries are the small scale of artisanal fisheries. These traditional small scale of artisanal fisheries have been developed throughout the most coastal fisheries but have never been included the institutional fishery system and policy since industrial fisheries have been exploited. By this reason there was no studies to understand and identify these fisheries as fisheries under category of institutional fishery system. Recently by the Fisheries Law, my Person who desires to operate these fisheries, shall report to the provincial governor and then these fisheries were incorporated into the category of fisheries to be reported. But this case of the administrative practices should be not consistent with the classification of fisheries under Fisheries Law. The traditional access of small scale fishery is a derivative concept of fishery categories under the institutional fakery system Because this fishery under institutional fishery system can not be establish the right of fishing by fishery right system technically but the right of fishing is supported by the fishing access system only. Therefore, It is a mistake for the provincial fishery governor to adopt such a policy that the fishing right of the traditional access of small scale fishery which is different from the fishing based right is restricted by the factors of fisheries to be reported. On the other hand the traditional small scale fishery is coincident with the traditional access of small scale fishery and the common fishery under the style of utilization of fishing gear and fishing gear and methods. But this fishery has never been included the fishery categories supported by the government subsidy policies and considerations and has been remained with indifference during the last few decades. Anyhow the fishing right of these fisheries have been assured under the institutional fishery system, any person who desires to operate this fishery should have a fishing right against the public or private uses of fishing ground such as land reclamations and other coastal zone development. A deprivation of the fishing right of this fishery by the conflicts of these public and private uses of fishing ground is not regarded as appropriate according to the social welfare policy. Also it is the administrative expediency to support the fishing right of this fishery under the fisheries lobe reported.

  • PDF

Resource management service model implemented for the Internet of Things services access control (사물인터넷 서비스 접근제어를 위한 리소스 서비스 관리 모델 구현)

  • Kim, Jin-Bo;Kim, Mi-Sun;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.9-16
    • /
    • 2016
  • Many countless services form using the Internet technology of things, in order to provide a variety of services in the current also many institutions, have created a new technology and protocols. In this paper, we design the resource service model for the efficient service provided by the system for controlling access to the Internet services of the things, to implement. The resources of the service that the user tries to access modeled using LCRS (Left Child-Right Sibling) tree, by utilizing the service token resource, it is possible to perform access control to services.

Access Right Assignment Mechanisms for Secure Home Networks

  • Kim, Tiffany Hyun-Jin;Bauer, Lujo;Newsome, James;Perrig, Adrian;Walker, Jesse
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.175-186
    • /
    • 2011
  • The proliferation of advanced technologies has been altering our lifestyle and social interactions-the next frontier is the digital home. Although the future of smart homes is promising, many technical challenges must be addressed to achieve convenience and security. In this paper, we delineate the unique combination of security challenges specifically for access control and consider the challenges of how to simply and securely assign access control policies to visitors for home devices and resources. We present a set of intuitive access control policies and suggest four access control settings based on our in-person interview results. Furthermore, we propose the automated Clairvoyant access right assignment (CARA) mechanism that utilizes home owners' social relationship to automatically deduce to which class a visitor belongs. The combination of CARA and the suggested mapping provides a promising first step for home policy assignment such that nonexpert home owners can let visitors use their home network with confidence. We anticipate that future research can build on our proposed mechanisms to provide confidence to non-expert home owners for letting visitors use their home network.

Ulnar artery access for intracranial mechanical thrombectomy procedure: A salvage option after failed trans-femoral and trans-radial access

  • Muhammad U Manzoor;Abdullah A Alrashed;Ibrahim A Almulhim;Sultan Alqahtani;Fahmi Al Senani
    • Journal of Cerebrovascular and Endovascular Neurosurgery
    • /
    • v.25 no.4
    • /
    • pp.429-433
    • /
    • 2023
  • 84 years old gentle man with past medical history of hypertension and diabetes presented with sudden onset right sided weakness and aphasia for two hours. Initial neurological assessment revealed National Institute of Health Stroke Scale (NIHSS) 17. Computed tomography (CT) scan demonstrated minimal early ischemic changes along left insular cortex with occlusion of left middle cerebral artery (MCA). Based on clinical and imaging findings, decision was made to perform mechanical thrombectomy procedure. Initially, right common femoral artery approach was utilized. However, due to unfavorable type-III bovine arch, left internal carotid artery could not be engaged via this approach. Subsequently, access was switched to right radial artery. Angiogram revealed small caliber radial artery, with larger caliber ulnar artery. Attempt was made to advance the guide catheter through the radial artery, however significant vasospasm was encountered. Subsequently, ulnar artery was accessed and successful thrombolysis in cerebral infarction (TICI) III left MCA reperfusion was achieved with a single pass of mechanical thrombectomy via this approach. Post procedure neurological examination demonstrated significant clinical improvement. Doppler ultrasound 48 hours after the procedure demonstrated patent flow in radial and ulnar arteries with no evidence of dissection.

A Study on the Prison Library for the Protection of Prisoner's and Pre-trial Prisoners' Rights (수용자의 기본권 보장을 위한 교정기관 도서관에 관한 연구)

  • Hong, Myung-Ja
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.4
    • /
    • pp.41-63
    • /
    • 2004
  • This study is an analysis of the prisoners' and the pre-trial prisoners' rights based on the laws and rules, and court cases. Rights included are the right to know and the access to information, the right to legal representation and the right of education, all of them can be protected when the prison libraries are administered In order to protect the prisoners' and pre-trial prisoners' rights, the necessity for the establishment of prison library is discussed and the direction of prison library system is suggested.

  • PDF

SG-RBAC : Role Based Access Control Model for Smart Grid Environment (SG-RBAC : 스마트그리드 환경에 적합한 역할기반접근제어 모델)

  • Lee, Woomyo;Lee, Gunhee;Kim, Sinkyu;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.307-318
    • /
    • 2013
  • Smart grid is composed of variable domains including different systems, and different types of the access control are needed in the multiple domain. Therefore, the access control model suitable for the smart grid environment is required to minimize access control error and deny the unauthorized access. This paper introduce the access control requirements in the smart grid environment and propose the access control model, SG-RBAC, satisfied with the requirements. SG-RBAC model imposes constraints on the access right activation according to the user property, the role property, and the system property. It also imposes constraints on the delegation and the inheritance of access right according to temporal/spatial information and a crisis occurrence.

A Study on Security Architecture for Digital Content Dissemination (디지탈 컨텐츠 배포를 위한 보안 체계에 관한 연구)

  • 김대엽;주학수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.147-155
    • /
    • 2003
  • The diffusion of internet infrastructure and a fast increase of Population to use it is becoming a base of the service that can use various information, data and digital contents which were provided through off-line physically and used. Recently, the. techniques for copy deterrence and copyright protection have been important in e-commerce because various contents in digital form can be duplicated easily. The Access Control(AC) technique that only a user having the qualifications can access and use contents normally has been studied. The Conditional Access System(CAS) used in a satellite broadcasting md Digital Right Management System(DRMS) used for contents service are representative models of current commercialized access control. The CAS and DRM can be considered as an access control technique based on the payment based type(PBT). This paper describe the access control method of payment free type(PFT) suggested in [5] which are independent on the payment structure. And then we suggest a new access control method of payment free type which is more efficient than the previous one.

BACS : An Experimental Study For Access Control System In Public Blockchain (BACS : 퍼블릭 블록체인 접근 통제 시스템에 관한 실험적 연구)

  • Han, Sejin;Lee, Sunjae;Lee, Dohyeon;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.55-60
    • /
    • 2020
  • In this paper, we propose an access control system using cryptography as a method to protect personal data in public blockchain. The proposed system is designed to encrypt data according to the access policy, store it in the blockchain, and decrypt only the person who satisfy the access policy. In order to improve performance and scalability, an encryption mechanism is implemented outside the blockchain. Therefore, data access performance could be preserved while cryptographic operations executed Furthermore it can also improve the scalability by adding new access control modules while preserving the current configuration of blockchain network. The encryption scheme is based on the attribute-based encryption (ABE). However, unlike the traditional ABE, the "retention period", is incorporated into the access structure to ensure the right to be forgotten. In addition, symmetric key cryptograpic algorithms are used for the performance of ABE. We implemented the proposed system in a public blockchain and conducted the performance evaluation.