• 제목/요약/키워드: Right to Access

검색결과 324건 처리시간 0.034초

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • 제8권3호
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.

A Study on the Medical tourism customized service platform for clinic

  • Ahn, Yoon-Ju
    • International Journal of Advanced Culture Technology
    • /
    • 제9권3호
    • /
    • pp.238-242
    • /
    • 2021
  • Through diversification of 4th industries and transportation and globalization, tourism was developed for medical purposes, not limited to touring tourist attractions. The trend of medical tourism in Korea is shifting from large and medium-sized hospitals to professional medical services in one area of small hospitals rather than professional medical services. However, small hospitals lack medical coordinators and interpretation services, and tourists who visit Korea for treatment lack information on small hospitals. Therefore, a platform is needed to match small hospitals with medical tourists. In this study, using Platform as a Service (Paas) in cloud computing, clinic administrators can access the app to introduce information about their hospitals with simple manipulations. Tourists also want to propose a customized platform to select the right area for them to check information about small-scale hospitals and choose the treatment and tourist attractions they wants. In this study, using Platform as a Service (Paas) in cloud computing, clinic administrators can access the app to introduce information about their hospitals with simple manipulations.

주거복지에 대한 이론적 개관 및 향후 정책과제 (Theoretical Overview of Housing Welfare and Future Policy Issues)

  • 김영태
    • 한국주거학회논문집
    • /
    • 제17권1호
    • /
    • pp.127-134
    • /
    • 2006
  • The purposes of this study are to define 'housing welfare' which constitutes an important theme of discussion today and to present some future policy issues. Recently, the expression 'housing welfare' is widely used in our daily life and written in some laws, but its concept is still ambiguous. Housing welfare can be defined as 'the situation in which citizens gain access to a decent housing and adapt themselves well to the community life. In this context, the goals of housing welfare policy should be as follows: reduction of the number of households living below the minimum standard in housing, promotion of the right to housing, housing provision and management based on housing needs, linkage of housing and other welfare measures, realization of social integration and social justice. But, there are still some controversies on such questions as target group, moral hazard of beneficiaries, social equity, etc. To get all the policy alternatives more effective, efforts should be made to improve the general infrastructure of welfare policies, to prevent NIMBY phenomenon of local actors, and so on.

Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey

  • Samkari, Esraa;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.67-74
    • /
    • 2022
  • One type of network security breach is the availability breach, which deprives legitimate users of their right to access services. The Denial of Service (DoS) attack is one way to have this breach, whereas using the Intrusion Detection System (IDS) is the trending way to detect a DoS attack. However, building IDS has two challenges: reducing the false alert and picking up the right dataset to train the IDS model. The survey concluded, in the end, that using a real dataset such as MAWILab or some tools like ID2T that give the researcher the ability to create a custom dataset may enhance the IDS model to handle the network threats, including DoS attacks. In addition to minimizing the rate of the false alert.

피구금자에 대한 권리보호적 측면에서의 도서관봉사

  • 홍명자
    • 한국도서관정보학회지
    • /
    • 제6권
    • /
    • pp.187-211
    • /
    • 1979
  • Persons who are waiting for decision of the court concerning whether they are guilty or not after they are involved in the criminal case and detained in the special institution isolated from society, will desire to de found innocent and acquited or to be slightly punished. Inmates are the suspected persons and the accused persons who are detained in the correctional institution. They have the right to de assisted by lawyes in order to receive the favorable verdict in the court. However, the right of the poor and the ignorant, in reality, cannot be perfectly protected due to the imperfection and defect of the defense counsel system itself and its application. Therefore, as a means to guarantee the so-called access to the court, the fundamental constitutional right, the law libraries are established and the legal information services are provided to the inmates within the correctional institution in the advanced country such as the United States. In addition, the judicial precedent and the various kinds of professional organizations provide the managerial guide-lines for such libraries to enoughly collect materials and to provide the effective information services to the inmates. In order to furnish the management of the correctional institution of Korea with useful information, the legal information services, materials collected, and information service personnel of the law libraries within the correctional institution are minutely examined in this paper.

  • PDF

라이센스 에이젼트를 이용한 멀티미디어 데이터관리 및 감시 시스템 설계 (The Design of a Multimedia Data Management and Monitoring System for using License Agent)

  • 조현섭;유인호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2007년도 제38회 하계학술대회
    • /
    • pp.1662-1664
    • /
    • 2007
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

정보화시대의 환자진료정보 보호에 관한 법.제도적 고찰 (A Study on Medical Information Privacy Protection Law and Regulation in the Information Age)

  • 윤경일
    • 한국병원경영학회지
    • /
    • 제8권2호
    • /
    • pp.111-129
    • /
    • 2003
  • This study discusses the direction of legislation to strengthen the legal protection of medical records privacy in information age. The legislation trends on privacy protection of medical records in European Union and United States are analysed and the current law and regulation of Korea on medical records are compared. The issues discussed include the ownership of medical records, the patient's right of access to medical records, medical information publication for other than treatment or insurance processing use, confidentiality responsibility of provider organizations, medical information management in provider organizations, penalty for the unlawful use of patient information. This study concludes that the patients' right on medical record and provider organization's responsibility in processing patient information should be strengthened in order to protect patients' privacy and to conform to the international standard on medical record protection in the information age.

  • PDF

시스템 보안을 무력화 시키는 전산관리자의 시스템 침해 행위 연구 (To Neutralize the Security Systems, Infringement Actions by the Administrator on the Computer Networks)

  • 류경하;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2012년도 추계학술대회
    • /
    • pp.165-168
    • /
    • 2012
  • 본 논문은 이 세상에 존재하는 어떤 종류의 보안시스템도 시스템 접근권한을 가진 전산 담당자의 시스템 침해 행위를 막아내기란 어려운 일이라는 점을 되새기고, 전산 담당자의 침해 행위 사례와 그로인한 피해의 정도 등 심각성을 재조명하고, 나아가 기술적 보안조치의 한계선상에 있는 전산 담당자의 권한 관리와 기술적 조치를 넘어 인적관리를 통한 침해예방 방안에 대해 나름의 대안을 찾아 보고자 한다.

  • PDF

고객생애가치를 이용한 납기확약 모델 구현에 관한 연구 (Design of Capable to Promise Using Lifetime Value)

  • 박재현;양광모;강경식
    • 대한안전경영과학회지
    • /
    • 제4권2호
    • /
    • pp.71-81
    • /
    • 2002
  • Today's environment of enterprise is changing. They have to face customer' demands with the right product, the right service and supply them at the right time. And also cut down logistics and inventory cost and bring up the profit as much as they can. This means the change of putting enterprise first in importance to putting customer first importance. therefore to correspond to customer's demand, shorting lead time is becoming a essential condition. The answer to this changes of environment is supply chain management. In the Supply chain, The ATP function doesn't only give customers to conformation of delivery. It can be used by the core function with ATP rule that can reconcile supplies and demands on the supply chain. Therefore We can be acquire the conformation about on the due date of supplier by using the ATP function of management about real and concurrent access on the supply chain, also decide the affect about product availability due to forecasting or customer's orders through the ATP. In this paper, It consolidates the necessity on a CTP and analyzes data which is concerned of ATP. Under the these environments, defines the ATP rule that can improve the customer value and data flow related the LTV(Life Time Value) and builds on a algorithm.

An Efficient Multi-Layer Encryption Framework with Authentication for EHR in Mobile Crowd Computing

  • kumar, Rethina;Ganapathy, Gopinath;Kang, GeonUk
    • International journal of advanced smart convergence
    • /
    • 제8권2호
    • /
    • pp.204-210
    • /
    • 2019
  • Mobile Crowd Computing is one of the most efficient and effective way to collect the Electronic health records and they are very intelligent in processing them. Mobile Crowd Computing can handle, analyze and process the huge volumes of Electronic Health Records (EHR) from the high-performance Cloud Environment. Electronic Health Records are very sensitive, so they need to be secured, authenticated and processed efficiently. However, security, privacy and authentication of Electronic health records(EHR) and Patient health records(PHR) in the Mobile Crowd Computing Environment have become a critical issue that restricts many healthcare services from using Crowd Computing services .Our proposed Efficient Multi-layer Encryption Framework(MLEF) applies a set of multiple security Algorithms to provide access control over integrity, confidentiality, privacy and authentication with cost efficient to the Electronic health records(HER)and Patient health records(PHR). Our system provides the efficient way to create an environment that is capable of capturing, storing, searching, sharing, analyzing and authenticating electronic healthcare records efficiently to provide right intervention to the right patient at the right time in the Mobile Crowd Computing Environment.