• Title/Summary/Keyword: Right to Access

Search Result 327, Processing Time 0.037 seconds

The Design of Key Management Module for IPTV Service (IPTV 서비스를 위한 수신 제한 키 관리 시스템 설계)

  • Hwang, Kyung-Min;Kim, Chang-Soo;Kim, Seo-Kyun;Kim, Chul-Won;Park, Ki-Chul;Kim, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.544-547
    • /
    • 2008
  • The Growth of Multimedia Digital Content market is extending to IP network environment. this is realized via IPTV service which provide Triple-Service that is broadcasting, communication, telephone service. Recently on IPTV Settop box has fixed key for control access permission. and this is cause of Wasting resource to operation and management. it can be resolved to apply DRM System which mixed MPEG-21 REL(Rights Expression Language) and XML Signature. In this paper, we designed Permission Management Module for IPTV Service which can control permission to access via MPEG-21 and XML Signature.

  • PDF

Measuring method of personal information leaking risk factor to prevent leak of personal information in SNS (SNS에서 개인정보유출방지를 위한 개인정보 유출위험도 측정 방법)

  • Cheon, Myung-Ho;Choi, Jong-Seok;Shin, Yong-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1199-1206
    • /
    • 2013
  • SNS is relationship based service and its users are increasing rapidly because it can be used in variety forms as penetration rate of Smartphone increased. Accordingly personal information can be exposed easily and spread rapidly in SNS so self-control on information management, right to control open and distribution of own personal information is necessary. This research suggest way of measuring personal information leaking risk factor through personal information leaking possible territory's, based on property value and relationship of personal information in SNS, personal information exposure frequency and access rate. Suggested method expects to used in strengthening self-control on information management right by arousing attention of personal information exposure to SNS users.

Considerations of Countermeasure Tasks in the Fields of Forest and Forestry in Korea through Case Study on "The Nagoya Protocol (Access to Genetic Resources and Benefit Sharing)" ("유전자원의 접근과 이익공유(ABS)" 사례연구를 통한 국내 산림·임업분야 대응과제 고찰)

  • Lee, Gwan Gyu;Kim, Jun Soon;Jung, Haw young
    • Journal of Korean Society of Forest Science
    • /
    • v.100 no.3
    • /
    • pp.522-534
    • /
    • 2011
  • The aim of this study is to draw forth the tasks for establishing the right of native biology in Korea through the case study on 'Access on genetic resources and Benefit Sharing'. For this purpose, this study decided on its research subject by selecting Hoodia, on which ABS treaty was made the most recently, through the examination of the representative ABS precedents on plant species. This study analyzed the process background of ABS on Hoodia, and compared & analyzed the ABS procedures of 'Bonn Guidelines' adopted by the 6th Conference of the Parties of the Convention on Biological Diversity in 2002 and Hoodia case. Together with the ABS major issues in common drawn as a result of this analysis, and "Nagoya Protocol" adopted by the 10th Conference of the Parties of the Convention on Biological Diversity, this study intended to shed a light on the impending tasks which Korea faces at present and its role relationship. The research results are as follows: 1. It is required that species habitats should be divided based on biological classification and its subsequent community should be established with the development of infrastructure such as a community's independent production, management and monitoring of bio-species. 2. There needs to be a designation of ABS National Focal Point for sharing of ABS-related general information, boosting of implementation of the relevant convention. 3. There needs to be the establishment of ABS convention system consequent on legislative, administrative, political procedures, and designation of the Competent National Authorities for the provision of the format of Prior Informed Consent (PIC) and Mutually Agreed Terms (MAT) and their contents assessment and confirmation. 4. There should be the establishment of integrated management system of ABS-related research and development of forest biological resources and its relevant research projects. 5. There should be information development through the distribution of responsibility and role between the ministries and offices concerned according to bio-resources, and there needs to be efforts in aiming for opening a working group of academic-industrial institutions for developing a mutually interchangeable system. 6. It's required that the efficient access between industrial circles and the people should be promoted by setting up ABS support center of biological resources in ministry and office's charge. 7. There should be a selection of a national supervisory organization for securement of the right of a local community and monitoring of ABS convention implementation, and a countermeasure system for preventing outflow of forest bioresources. Conclusively, it's judged that it will be possible to inquire into the countermeasures for the establishment of the native forest biology dominion through such research results.

An Efficient Encryption Scheme Combining PRNG and Permutation for Mobile Multimedia Data (모바일 멀티미디어 데이타를 위한, 의사난수생성기와 순열 기법을 결합한 효율적인 암호화 기법)

  • Han, Jung-Kyu;Cho, Yoo-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.11
    • /
    • pp.581-588
    • /
    • 2007
  • In Digital Right Management, symmetric cipher is used for content encryption to reduce encryption cost, AES, advanced encryption standard is usually used to multimedia encryption under desktop environment because of its reasonable security level and computation cost. But mobile handheld device often uses slow speed processor and operates under battery-powered environment. Therefore it requires low computation cost and low energy consumption. This paper proposes new stream cipher scheme which combines pseudo random number generator(PRNG) and dynamically generated permutations. Proposed scheme activates PRNG and generates original key streams. Then it generates extended key streams by applying permutation to original sequence. These extended key streams are XORed with plaintext and generate ciphertext. Proposed scheme reduces the usage of PRNG. Therefore this scheme is fast and consumes less energy in comparison with normal stream cipher. Especially, this scheme shows great speed up (almost 2 times) than normal stream cipher scheme in random access.

A Study on the Issues and Direction of Virtual Advertising Regulation (가상광고 규제의 문제점 및 방향에 관한 연구)

  • Choi, Min-Wook
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.103-112
    • /
    • 2014
  • The virtual advertising which emerged in new technology environment and new advertising environment has been executed lately. The right regulation of virtual advertising is very important to the growth of it, because virtual advertising is new form of advertising and it can change program contents easily. In addition, it's time for considering the overall supplementation of virtual advertising regulation, based on the results so far achieved. In this sense, this article examined the regulation of virtual advertising which has been executed since 2010. It first examines the characteristics of advertising in digital media convergence environment and the growth and effect of virtual advertising. Then, research problems were suggested. Based on the research problems, it examines the status of virtual advertising regulation for each country. Then, it analyzes and discusses the major issues related to today's virtual advertising regulation. The article concludes with policy recommendations.

Complete atrioventricular block during tunneled cuffed hemodialysis catheter insertion in a patient with pre-existing left bundle branch block

  • Choi, Eun Woo;Jung, Ji Yoon;Su, Jun Huck;Park, Sae Huyn;Cho, Kyu Hyang;Yoon, Kyung Woo;Park, Jong Won;Do, Jun Young;Kang, Seok Hui
    • Journal of Yeungnam Medical Science
    • /
    • v.32 no.2
    • /
    • pp.152-154
    • /
    • 2015
  • Arrhythmias are complications of tunneled cuffed hemodialysis catheter insertion. Most complications associated with arrhythmias occur during guide-wire access, where the guide wire can cause traumatic damage to the conduction system of the heart. Conducting system injury in tunneled cuffed hemodialysis catheter insertion often involves the right bundle, causing right bundle branch block (RBBB). Transient RBBB with sinus rhythm is not usually accompanied by abnormal vital signs. However if patients already have left bundle branch block (LBBB), new onset RBBB can cause complete atrioventricular block (AVB), which can lead to fatal complications requiring invasive treatment. We report on a patient with LBBB who developed complete AVB during hemodialysis catheter insertion.

Disclosure of Digitalized Information by Public Agencies (정보공개의 새로운 지향 - 전자정보공개제도(電子情報公開制度)를 중심으로 -)

  • Kyoung, Keon
    • The Korean Journal of Archival Studies
    • /
    • no.5
    • /
    • pp.111-148
    • /
    • 2002
  • Digitalization of public administration information shall be accelerated more. When information exists both in the form of electronic and paper record, even the disclosure of paper record make it possible the access to public administration information itself, but there may some needs for the disclosure of electronic record in applicant's situation. Similarly, when only electronic record exists, there may be some problem about whether to disclose the record as print-out or as being electronic format itself. Thus, the method and format of disclose are very sensitive issues, and it is very important to clarify who has the competence to decide the method and format of disclosure, applicant or the public agency. In making any record available to an applicant under the EFOIA in America, the public agency shall provide the record in any form or format requested by the applicant, if the record is readily reproducible by the agency in that form or format. And for the convenience of the applicant with sensory disability, the AIA in Canada also permits the right to access to information in an alternative format. It is desirable also in our country that disclosure of information is done by public agencies in the format that applicant wants, as possible. In the meantime, we should consider the costs and technological restrictions corresponding to the change of format of information to the format that applicant specifies. In the case of electronic record, efforts required for searching cause some hard problems. Information disclosure system requires disclosure of record that exists at the demand point, and creation of new record that does not exist at that them is not required on the public agency. For the search of electronic information, we need some code or program. So, if we evaluate that act of coding or programming as creation of new record, demand on disclosure of electronic record becomes impossible, in fact. Therefore, when we include electronic record as the object of information disclosure system, we need to clarify the degree of reasonable efforts for searching the information included in that record, as long as possible, although it is very difficult problem. Also, we should consider the way to make it permitted to demand the disclosure of electronic record by FAX or E-mail. Disclosure of electronic record itself by E-mail is not generalized yet, even in America or Canada. There are many technological and legal problems to solve, before permitting or enforcing the disclosure of electronic record by E-mail. But, it is desirable to expand the method of disclosure to including disclosure by E-mail in possible spheres. Also, as well as disclosure on demands, we need to expand electronic access to information, so far as possible, in the process of information offer.

A Study on the Charge of Using the Internet Network - Focusing on U.S. Internet History and Charter Merger Approval Conditions Litigation - (인터넷 망 이용의 유상성에 대한 고찰 - 미국 인터넷 역사 및 Charter 합병승인조건 소송 중심으로 -)

  • Cho, Dae-Keun
    • Journal of Internet Computing and Services
    • /
    • v.22 no.4
    • /
    • pp.123-134
    • /
    • 2021
  • This paper suggests that the Internet is not free through analysis of U.S. Internet history and lawsuits related to the Charter merger in 2016. Generally speaking, the players in internet connectivity market agree to Non-Disclosure Agreement, when connecting their facilities and networks each other. So, I adopted the case study & analysis as research methodologies due to limitation of collecting the transaction data between them. The former finds that Internet access has never been free in U.S Internet history. As we know, some including Content Providers(CPs) argue that the Internet is a free network and there are many cases to use the internet for free, so they came to conclusion that ISPs have no right to charge the users like CPs. This study refutes these arguments in two ways. One is that using the internet has never been free. From ARPANET, known as the beginning of the U.S. Internet, to the commercialization of backbone, no Internet has been considered or implemented for free since the early Internet network was devised. Also, the U.S government was paying subsidies or institutions were paying fees to secure network operations for the NSFNET backbone. the other is that "free peering" refers to barter transactions between ISPs, not to free access to counterpart internet networks. Second, this study analyze the FCC' executive order of conditioned merger approval and the court's related ruling and verify that using the internet is not free. According to the analysis, this study finds that it's real situation to make paid settlements between ISP-CPs (including OTTs) in the US Internet market at the moment. This study concludes that the Internet has never been free in terms of its technical characteristics, network structure, network operation, and system. Also it proposes how to improve the domestic settlement system between ISPs-CPs in terms of policy and regulation.

Application of Program Theory and Logic Model to Evaluate Immunization Disparity Program for Children under 3 Years

  • Chung, Jee In
    • Health Policy and Management
    • /
    • v.32 no.3
    • /
    • pp.272-281
    • /
    • 2022
  • With the outbreak of coronavirus disease 2019 (COVID-19) pandemic, health policymakers are adopting new policies regarding the issue of immunization disparities, especially for children in low-income communities of color who lack awareness and thereby access to vaccines. The purpose of this paper is to propose an evaluation framework using program theory-based evaluation approach and logic model to analyze and evaluate the immunization disparities in children aged 19-35 months. Data is collected from New York City department of Health and the U.S. Census Bureau for Northern Manhattan Start Right Coalition program which consists of 19,800 children, and the community-provider partnership includes 26 practices and 20 groups. Program theory is used to evaluate this community-based initiative with the logic model which is a visual depiction that illustrations the program theory to all stakeholders. The logic model highlights the resources, activities, outputs, outcomes, and impacts of the program to guide to planners and evaluators and to call attention to the inadequacies or flaws in the operational, implementation and service delivery process of the program in offering a new perspective on the program. This framework adds to the literature on evaluations of immunization disparities in determining whether evaluators can definitively attribute positive immunization outcomes in the community to the program and conclude whether it has potential in expanding or duplicating it to other similar settings, especially in other rural areas of the United States, and abroad, where routine immunization equity gaps are wide due to income, racial and ethnic diversity, and language barrier.

A Study of Built-In-Test Diagnosis Mistakes as a False Alarm Filter Useful Redundant Techniques for Built-in-Test Related System

  • Oh, Hyun Seung;Yoo, Wang Jin
    • Journal of Korean Society for Quality Management
    • /
    • v.21 no.2
    • /
    • pp.1-16
    • /
    • 1993
  • Early generations of products had little to no inherent capability to test themselves. The technologies involved often required only visual inspection and limited probing to troubleshoot the system once it was turned over to maintenance personnel. However, as the complexity of military and commercial systems grew, symptoms of failure became less noticeable to the operator. Therefore, the procedure to access, inspect, repair and replace a component became complicated, the requirements for personnel skill and testing equipment increased. and it took too long of a time to maintain a system. Meanwhile, the need for availability became more mission-critical and maintenance become very expensive. The obvious solution was to design in-system circuits or devices to self-test the primary system, the Built-In-Test(BIT) was born. This approach has continued right on up through present systems and is an integral part of systems now being designed. The object of this paper is to present a state-of-the-art research for filtering out the BIT diagnosis mistakes using Bayesian analysis and develop the algorithm for Redundant systems with BIT to improve BIT diagnosis.

  • PDF