• Title/Summary/Keyword: Right of Access

Search Result 337, Processing Time 0.024 seconds

Security of OFB mode and 3GPP f8 encryption mode (OFB 모드와 3GPP f8 암호화 모드의 안전성)

  • 신상욱;홍도원;강주성;이옥연
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.55-66
    • /
    • 2001
  • In this paper, we analyze the security of OFB encryption mode which is one of the basic modes of operation for the block cipher and the security of 3GPP f8 encryption mode used to provide the data confidentiality over a radio access link of W-CDMA IMT-2000. We provide the lower bound and the upper bound on security of both modes in random function model and random permutation model, respectively, by means of the left-or-right security notion, and prove the security of both modes using a pseudorandom function and a pseudorandom permutation, respectively.

Design of Capable to Promise Using Lifetime Value (고객생애가치를 이용한 납기확약 모델 구현에 관한 연구)

  • 박재현;양광모;강경식
    • Journal of the Korea Safety Management & Science
    • /
    • v.4 no.2
    • /
    • pp.71-81
    • /
    • 2002
  • Today's environment of enterprise is changing. They have to face customer' demands with the right product, the right service and supply them at the right time. And also cut down logistics and inventory cost and bring up the profit as much as they can. This means the change of putting enterprise first in importance to putting customer first importance. therefore to correspond to customer's demand, shorting lead time is becoming a essential condition. The answer to this changes of environment is supply chain management. In the Supply chain, The ATP function doesn't only give customers to conformation of delivery. It can be used by the core function with ATP rule that can reconcile supplies and demands on the supply chain. Therefore We can be acquire the conformation about on the due date of supplier by using the ATP function of management about real and concurrent access on the supply chain, also decide the affect about product availability due to forecasting or customer's orders through the ATP. In this paper, It consolidates the necessity on a CTP and analyzes data which is concerned of ATP. Under the these environments, defines the ATP rule that can improve the customer value and data flow related the LTV(Life Time Value) and builds on a algorithm.

피구금자에 대한 권리보호적 측면에서의 도서관봉사

  • 홍명자
    • Journal of Korean Library and Information Science Society
    • /
    • v.6
    • /
    • pp.187-211
    • /
    • 1979
  • Persons who are waiting for decision of the court concerning whether they are guilty or not after they are involved in the criminal case and detained in the special institution isolated from society, will desire to de found innocent and acquited or to be slightly punished. Inmates are the suspected persons and the accused persons who are detained in the correctional institution. They have the right to de assisted by lawyes in order to receive the favorable verdict in the court. However, the right of the poor and the ignorant, in reality, cannot be perfectly protected due to the imperfection and defect of the defense counsel system itself and its application. Therefore, as a means to guarantee the so-called access to the court, the fundamental constitutional right, the law libraries are established and the legal information services are provided to the inmates within the correctional institution in the advanced country such as the United States. In addition, the judicial precedent and the various kinds of professional organizations provide the managerial guide-lines for such libraries to enoughly collect materials and to provide the effective information services to the inmates. In order to furnish the management of the correctional institution of Korea with useful information, the legal information services, materials collected, and information service personnel of the law libraries within the correctional institution are minutely examined in this paper.

  • PDF

An Efficient Multi-Layer Encryption Framework with Authentication for EHR in Mobile Crowd Computing

  • kumar, Rethina;Ganapathy, Gopinath;Kang, GeonUk
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.204-210
    • /
    • 2019
  • Mobile Crowd Computing is one of the most efficient and effective way to collect the Electronic health records and they are very intelligent in processing them. Mobile Crowd Computing can handle, analyze and process the huge volumes of Electronic Health Records (EHR) from the high-performance Cloud Environment. Electronic Health Records are very sensitive, so they need to be secured, authenticated and processed efficiently. However, security, privacy and authentication of Electronic health records(EHR) and Patient health records(PHR) in the Mobile Crowd Computing Environment have become a critical issue that restricts many healthcare services from using Crowd Computing services .Our proposed Efficient Multi-layer Encryption Framework(MLEF) applies a set of multiple security Algorithms to provide access control over integrity, confidentiality, privacy and authentication with cost efficient to the Electronic health records(HER)and Patient health records(PHR). Our system provides the efficient way to create an environment that is capable of capturing, storing, searching, sharing, analyzing and authenticating electronic healthcare records efficiently to provide right intervention to the right patient at the right time in the Mobile Crowd Computing Environment.

Remote Healthcare Monitoring System Using Attribute based Encryption (속성기반 암호화를 이용한 원격 헬스케어 모니터링 시스템)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.63-70
    • /
    • 2012
  • To ensure privacy of individual information in remote healthcare service, health data should be protected through a secure technology such as encryption scheme. Only user who delegated decryption right can access to sensitive health data and delegator needs capability for revocating access privilege. Recently, in ubiquitous environment, CP-ABTD(Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes) which extends CP-ABE(Ciphertext-Policy Attribute-Based Encryption) has been proposed for these requirements. In this paper, we construct remote healthcare monitoring system with delegation and revocation capability for attribute in CP-ABTD. Finally, we analyze collusion attack between users in our system.

Access Control of XML Documents Including Update Operators (갱신 연산을 고려한 XML문서의 접근제어)

  • Lim Chung-Hwan;Park Seog
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.567-584
    • /
    • 2004
  • As XML becomes popular as the way of presenting information on the web, how to secure XML data becomes an important issue. So far study on XML security has focused on security of data communications by using digital sign or encryption technology. But, it now requires not just to communicate secure XML data on communication but also to manage query process to access XML data since XML data becomes more complicated and bigger. We can manage XML data queries by access control technique. Right now current XML data access control only deals with read operation. This approach has no option to process update XML queries. In this paper, we present XML access control model and technique that can support both read and update operations. In this paper, we will propose the operation for XML document update. Also, We will define action type as a new concept to manage authorization information and process update queries. It results in both minimizing access control steps and reducing memory cost. In addition, we can filter queries that have no access rights at the XML data, which it can reduce unnecessary tasks for processing unauthorized query. As a result of the performance evaluation, we show our access control model is proved to be better than other access control model in update query. But it has a little overhead to decide action type in select query.

Local animation structural Problem of screening and infringement copy right : in the centering of Chuncheon area (지역 애니메이션 상영 구조 문제와 저작권 침해 : 춘천 지역을 중심으로)

  • Seo, Jeong-Soo;Park, Ki-Bog
    • Cartoon and Animation Studies
    • /
    • s.15
    • /
    • pp.207-220
    • /
    • 2009
  • This paper researched that consumers who lived in the local small cites have a restricted and insufficient problem to screening the animation film comparing with those of capital area and the other broader local cities. And these kinds of problems caused more serious problems like a infringement of copy right as a result. This paper calculated and evaluated that the rate possibilities of criminal infringement copy right in supposing that giving the opportunity screening the all of the first-run movies the most highest criminal group in Chuncheon where the worst benefit area in aspect of screening circumstances. As a result of this research, this paper could suggest that the possibility to reduce the criminal infringement of copy right and the necessity of structural reconstruction throughout rebuilding of animation distribution and consciousness of consumers. Thus this paper try find out the importance of reducing the rate of criminal infringement copy right by recontruction of structrual access of local animation business.

  • PDF

An Access Control using SPKI Certificate in Peer-to-Peer Environment (P2P 환경에서 SPKI 인증서를 이용한 접근 제어)

  • Shin, Jung-Hwa;Lee, Young-Kyung;Lee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.793-798
    • /
    • 2003
  • The P2P service is a technology that can share their information with each other who is able to be connected ith a relating program without passing by a server. Since all personal compiters that linked to the internet under the P2P service can opetate as server or a client, they can provide and share both their information and services through the direct connection. Currently, the P2P service is giving an equal privilege to all users for sharing their resources,.Under this situation, a lot of vulnerability against the various sttacks through the Unternet is possoble, more sophisticated security services are necessary. In this paper, We propose and access control schemae using SPKI(Simple Public Key Infrastructure). The scheme designates and access and acces control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own rights.

e-teaming산업의 현황과 활성화 방안에 관한 연구

  • Kim Eun-Jung;Kim Jong-Weon;Lee Moon-Bong
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2004.05a
    • /
    • pp.275-287
    • /
    • 2004
  • The purpose of the present study was to explore the plan to promote the e-Learning industry. The e-Learning is defined as the method of teaming or educational to access information and knowledge through Internet without time and boundary barriers. To promote e-Learning industry, first, establishing national strategy for e-Learning industry. Second, establishing e-Learning center to solve the problem of contents and technology standard. Third, right understanding of e-Leaning.

  • PDF

An Exploratory Study on the Legislation of the Right for Cultural Welfare (문화복지의 법적 권리화에 대한 탐색적 연구)

  • Hyun, Taik-Soo;Yoon, Dong-Eun;Kim, Kwang-Byung
    • Korean Journal of Social Welfare
    • /
    • v.60 no.4
    • /
    • pp.157-173
    • /
    • 2008
  • Cultural welfare is the cultural activity provided and supported by state, a local autonomous entity, and private organizations to improve the quality of people's life. And as a basic concept as well as a premise of discussion on cultural welfare, cultural right is a social right, a right which can make cultural express, gain access to cultural activities. A statue concerning cultural activities contributed to the promotion of our people's cultural welfare interwoven with cultural right. But laws were made for the purpose of enforcing national policy and supporting regime rather than promoting fundamental human rights, and they became effective and were understood as a mere part of national government, not as perspective of their execution, security of right or realization of them. On the other hand, based on laws concerning social welfare, cultural life means human life consisting of minimum welfare system, and minimum level of life which guarantees least cultural life is becoming an objective standard. This means the standard level of cultural right, and for the handicapped cultural rights are concretely guaranteed as a right in that they will not be discriminated for their approaching to cultural activities. However, laws concerning cultural activities have limitation in that there are ambiguous concept and limitation of cultural life, and there are no concrete and active laws about cultural rights to guarantee cultural life. In a constitution and laws concerning social welfare, cultural welfare must have concrete contents about the range and the level of cultural rights. In order cultural rights to be turned into complete ones which can assert its rights, as seen in the Supreme Court, a court has to try to understand the violation of cultural rights as the violation of legal rights.

  • PDF