• Title/Summary/Keyword: Right of Access

Search Result 336, Processing Time 0.325 seconds

Percutaneous femoral access: Stuck guide wire, decannulation difficulty due to unravelling and knotting

  • Bhanu Pratap Singh Chauhan;Binita Dholakia;Ashfaque Khan;Chirag Hirani;Satheesh Kumar;Dibya Jyoti Mahakul;Abhishek Katyal;Wajid Nazir;Daljit Singh
    • Journal of Cerebrovascular and Endovascular Neurosurgery
    • /
    • v.26 no.2
    • /
    • pp.223-226
    • /
    • 2024
  • Percutaneous techniques for femoral arterial access are increasingly being performed due to advances in endovascular cerebral procedures, as they provide a less morbid and minimally invasive approach than open procedures. Common complications associated with this peripheral puncture include hematoma, bleeding, pseudoaneurysm, arteriovenous fistula, retroperitoneal bleeding, inadvertent venous puncture, dissection, etc. The retrograde femoral access is currently the most frequently used arterial access as it is technically straightforward, allows for the use of larger size sheaths and catheters, allows repeated attempts, etc. Although being technically less challenging, grave complications can occur due to hardware failure. Here, we present a case of unruptured posterior inferior cerebellar artery (PICA) aneurysm, who underwent uneventful diagnostic cerebral digital substraction angiography (DSA) via right femoral artery route on first attempt, but on second attempt for therapeutic intervention, landed up with stuck guide wire and faced decannulation difficulty due to unravelling of guide wire and multiple knot formation, which was finally removed after multiple attempts at pulling and improvised manoeuvres. Such cannulation and decannulation difficulties have been reported multiple times for central venous access, but extremely rarely for femoral routes, making this case a rarity and worth reporting.

A GDPR based Approach to Enhancing Blockchain Privacy (GDPR에 기반한 블록체인 프라이버시 강화 방안)

  • Han, Sejin;Kim, Suntae;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.33-38
    • /
    • 2019
  • In this paper, we propose a new blockchain technology that could comply with GDPR. The proposed model can prevent illegal access by controlling access to the personal information according to a access policy. For example, it can control access to the information on a role-basis and information validation period. The core mechanism of the proposed model is to encrypt the personal information with public key which is associated with users attributes policy, and then decrypt it with a private key and users attributes based on a Attribute-based Encryption scheme. It can reduce a trusted third-part risk by replacing it with a number of nodes selected from the blockchain. And also the private key is generated in the form of one-time token to improve key management efficiency. We proved the feasibility by simulating the proposed model using the chaincode of the Hyperledger Fabric and evaluate the security.

Distributed Access Privilege Management for Secure Cloud Business (안전한 클라우드 비즈니스를 위한 접근권한 분산관리)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.369-378
    • /
    • 2011
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server. And we construct the model of access privilege management using AONT based XOR threshold Secret Sharing, In addition, our scheme enable to grant weight for access privilege using XOR Share. In chapter 4, we differentiate existing scheme and proposed scheme.

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • v.8 no.3
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.

To Neutralize the Security Systems, Infringement Actions by the Administrator on the Computer Networks (시스템 보안을 무력화 시키는 전산관리자의 시스템 침해 행위 연구)

  • Roo, kyong-ha;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.165-168
    • /
    • 2012
  • In this paper, to remind ourselves that exist in the world what kind of security system is also difficult to defend a system with computerized access system representative of infringement that, Computerized personnel act of infringement cases, and thus the extent of the damage and the severity Revisited, Furthermore, technical measures beyond the limits of the technical security measures in line computerized rights management representative and for infringement prevention measures in Human Resource Management through its own alternative to find.

  • PDF

The Design of a Multimedia Data Management and Monitoring System for using License Agent (라이센스 에이젼트를 이용한 멀티미디어 데이터관리 및 감시 시스템 설계)

  • Cho, Hyun-Seob;Ryu, In-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.1662-1664
    • /
    • 2007
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

Settlement Solution by ADR on Dispute in Intellectual Property Right

  • Lee, Jae Sung
    • Journal of Arbitration Studies
    • /
    • v.29 no.3
    • /
    • pp.121-140
    • /
    • 2019
  • First, the purpose of this research is to review the Online Dispute Resolution (ODR) regulations in Korea to resolve disputes which can arise in international e-commerce in the near future. Second, this research tries to look for alternative solutions to dispute resolutions according to these regulations. Third, this research pursues to enhance the effectiveness of business deals by providing efficient and satisfactory dispute resolution methods for e-commerce business. Furthermore, this study evaluates the definition of global e-commerce by comparing Online Dispute Resolution (ODR) with Alternative Dispute Resolution (ADR). Through analyzing the domestic ODR system and ADR system, this research could boost the employment of settlements in small-sized disputes through easy and convenient consumer access to both ODR and ADR procedures. The enhancement of the competitiveness of Korean companies in the global market is estimated to take place as a result. This research is estimated to provide benefits to our businesses both domestically and internationally by using ODR regulations and ADR methods. Moreover, this research is anticipated to verify usefulness in terms of consumer protection by advancing consumers' access to dispute solution authorities locally and abroad.

Design of Model of Evidence System using the Single Cryptology and Network IP Tracking (1회용 암호와 네트워크 IP Tracking을 이용한 인증시스템의 설계)

  • Chae, Byeung-Soo;Tcha, Hong-Jun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.2 no.2
    • /
    • pp.87-95
    • /
    • 2009
  • This research attempted to build up a system of security and identification for storage devices in a communication network. This identification Network System will configure security of information encoded and any computer data-medium by control of the access right of the user.

  • PDF

A Study on the Medical tourism customized service platform for clinic

  • Ahn, Yoon-Ju
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.238-242
    • /
    • 2021
  • Through diversification of 4th industries and transportation and globalization, tourism was developed for medical purposes, not limited to touring tourist attractions. The trend of medical tourism in Korea is shifting from large and medium-sized hospitals to professional medical services in one area of small hospitals rather than professional medical services. However, small hospitals lack medical coordinators and interpretation services, and tourists who visit Korea for treatment lack information on small hospitals. Therefore, a platform is needed to match small hospitals with medical tourists. In this study, using Platform as a Service (Paas) in cloud computing, clinic administrators can access the app to introduce information about their hospitals with simple manipulations. Tourists also want to propose a customized platform to select the right area for them to check information about small-scale hospitals and choose the treatment and tourist attractions they wants. In this study, using Platform as a Service (Paas) in cloud computing, clinic administrators can access the app to introduce information about their hospitals with simple manipulations.

Safety of a Totally Implantable Central Venous Port System with Percutaneous Subclavian Vein Access

  • Keum, Dong-Yoon;Kim, Jae-Bum;Chae, Min-Cheol
    • Journal of Chest Surgery
    • /
    • v.46 no.3
    • /
    • pp.202-207
    • /
    • 2013
  • Background: The role of totally implantable central venous port (TICVP) system is increasing. Implantation performed by radiologist with ultrasound-guided access of vein and fluoroscope-guided positioning of catheter is widely accepted nowadays. In this article, we summarized our experience of TICVP system by surgeon and present the success and complication rate of this surgical method. Materials and Methods: Between March 2009 and December 2010, 245 ports were implanted in 242 patients by surgeon. These procedures were performed with one small skin incision and subcutaneous puncture of subclavian vein. Patient's profiles, indications of port system, early and delayed complications, and implanted period were evaluated. Results: There were 82 men and 160 women with mean age of 55.74. Port system was implanted on right chest in 203, and left chest in 42 patients. There was no intraoperative complication. Early complications occurred in 11 patients (4.49%) including malposition of catheter tip in 6, malfunction of catheter in 3, and port site infection in 2. Late complication occurred in 12 patients (4.90%). Conclusion: Surgical insertion of TICVP system with percutaneous subclavian venous access is safe procedures with lower complications. Careful insertion of system and skilled management would decrease complication incidence.