• Title/Summary/Keyword: Right to Access

Search Result 324, Processing Time 0.031 seconds

Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 프록시 재암호화 기반의 데이터 관리 방식)

  • Song, You-Jin;Do, Jeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.288-299
    • /
    • 2012
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.

A Study on a Smart Home Access Control using Lightweight Proof of Work (경량 작업증명시스템을 이용한 스마트 홈 접근제어 연구)

  • Kim, DaeYoub
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.931-941
    • /
    • 2020
  • As natural language processing technology using machine learning develops, a Smart Home Network Service (SHNS) is drawing attention again. However, it is difficult to apply a standardized authentication scheme for SHNS because of the diversity of components and the variability of users. Blockchain is proposed for data authentication in a distributed environment. But there is a limit to applying it to SHNS due to the computational overhead required when implementing a proof-of-work system. In this paper, a lightweight work proof system is proposed. The proposed lightweight proof-of-work system is proposed to manage block generation by controlling the work authority of the device. In addition, this paper proposes an access control scheme for SHNS.

An Access Control using SPKI Certificate in Peer-to-Peer Environment (P2P 환경에서 SPKI 인증서를 이용한 접근 제어)

  • Shin, Jung-Hwa;Lee, Young-Kyung;Lee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.793-798
    • /
    • 2003
  • The P2P service is a technology that can share their information with each other who is able to be connected ith a relating program without passing by a server. Since all personal compiters that linked to the internet under the P2P service can opetate as server or a client, they can provide and share both their information and services through the direct connection. Currently, the P2P service is giving an equal privilege to all users for sharing their resources,.Under this situation, a lot of vulnerability against the various sttacks through the Unternet is possoble, more sophisticated security services are necessary. In this paper, We propose and access control schemae using SPKI(Simple Public Key Infrastructure). The scheme designates and access and acces control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own rights.

Design and Implementation of Differencing and Merging Scheme for Cooperative Version Control System (협동 버전제어 시스템을 위한 버전충돌 인지 및 버전병합 기능의 설계와 구현)

  • Lee, Byong-Gul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.126-134
    • /
    • 2000
  • Version control is an application to maintain consistency between different instances of the same document allowing operations such as navigation, differencing, and merging. Most version control systems, however, lack the support of functionality for cooperative writing environment, such as to represent and store the history of the actions of different individuals, to effectively differentiate and merge the individual actions including the text object, and to manage different access privileges for different granularity and individuals. With the help of Activity IDentification (AID) tag and its unique addressing scheme proposed in this paper, differencing and merging become simple and effective. Access and role control is improved by associating the access right table and role assignment in AID scheme also eliminates the requirements for large storage capacity for version information maintenance.

  • PDF

The Development of HeadZmouse for Computer Access Using Gyroscopic Technology and Macro-Interface for Computer Access (컴퓨터접근을 위한 매크로 인터페이스 및 자이로센서기술을 사용한 헤드마우스의 개발)

  • Rhee, K.M.;Woo, J.S.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.1 no.1
    • /
    • pp.1-6
    • /
    • 2007
  • Applying the gyroscopic technology, HeadZmouse has been developed to simulate left and right mouse click, double click, drag and drop, and even a wheel function for navigating web. This device was designed to work on both PC and Macintosh environments using a USB cable. The first time you use this device, you'll find out how much freedom it offers to someone who can't use his or her hands freely. Rather than being tied to your computer, simple manipulation such as blowing an air (breathing) into a sonic sensor can simulate all the functions which standard mouse has, even including a wheel function. Also, a macro-interface device has been developed. By storing repetitive tasks into a memory, you can carry out repetitive tasks just by clicking a button once.

  • PDF

A Protection Protocol for License-based Digital Rights (라이선스 기반 디지털 저작권 보호 방안)

  • Shin Weon
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.368-377
    • /
    • 2005
  • The Internet technologies allows anybody who has connect a network to access various multimedia information. But, it brings new issues about the violation of intellectual property and copyright of multimedia contents. Digital right managements have been actively studied as approaches to solve them. In this paper, we propose license-based schemes for the protection of contents and its rights on digital right management. The proposed schemes provide limited distribution and superdistribution of contents, and guarantee to securely use contents by usage rules.

  • PDF

Access Control of XML Documents Including Update Operators (갱신 연산을 고려한 XML문서의 접근제어)

  • Lim Chung-Hwan;Park Seog
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.567-584
    • /
    • 2004
  • As XML becomes popular as the way of presenting information on the web, how to secure XML data becomes an important issue. So far study on XML security has focused on security of data communications by using digital sign or encryption technology. But, it now requires not just to communicate secure XML data on communication but also to manage query process to access XML data since XML data becomes more complicated and bigger. We can manage XML data queries by access control technique. Right now current XML data access control only deals with read operation. This approach has no option to process update XML queries. In this paper, we present XML access control model and technique that can support both read and update operations. In this paper, we will propose the operation for XML document update. Also, We will define action type as a new concept to manage authorization information and process update queries. It results in both minimizing access control steps and reducing memory cost. In addition, we can filter queries that have no access rights at the XML data, which it can reduce unnecessary tasks for processing unauthorized query. As a result of the performance evaluation, we show our access control model is proved to be better than other access control model in update query. But it has a little overhead to decide action type in select query.

e-teaming산업의 현황과 활성화 방안에 관한 연구

  • Kim Eun-Jung;Kim Jong-Weon;Lee Moon-Bong
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2004.05a
    • /
    • pp.275-287
    • /
    • 2004
  • The purpose of the present study was to explore the plan to promote the e-Learning industry. The e-Learning is defined as the method of teaming or educational to access information and knowledge through Internet without time and boundary barriers. To promote e-Learning industry, first, establishing national strategy for e-Learning industry. Second, establishing e-Learning center to solve the problem of contents and technology standard. Third, right understanding of e-Leaning.

  • PDF

A Secure Personal Health Record System for Handling of Emergency Situations (응급 상황 처리를 위한 안전한 개인건강기록 시스템)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.117-123
    • /
    • 2016
  • In recent years, Personal Health Record (PHR) has emerged as a patient-centric model of health information exchange. The Personal Health Record (PHR) owners enjoy the full right of accessing their records anywhere and anytime making storage and retrieval more efficient. Due to the sensitivity and confidential nature of the PHR, however, the PHR is maintained in a secure and private environment with the individual determining rights of access. In this paper, we propose a system which enables access to the user's PHR in the event of emergency. In emergency situation where the user is unconscious, the emergency staff can use the PHR information to request a emergency access to the PHR server based on the predefined rights of access for PHR. Under the proposed system, the PHR owner can specify a fine grain access control policy during emergency situations.

An Exploratory Study on the Legislation of the Right for Cultural Welfare (문화복지의 법적 권리화에 대한 탐색적 연구)

  • Hyun, Taik-Soo;Yoon, Dong-Eun;Kim, Kwang-Byung
    • Korean Journal of Social Welfare
    • /
    • v.60 no.4
    • /
    • pp.157-173
    • /
    • 2008
  • Cultural welfare is the cultural activity provided and supported by state, a local autonomous entity, and private organizations to improve the quality of people's life. And as a basic concept as well as a premise of discussion on cultural welfare, cultural right is a social right, a right which can make cultural express, gain access to cultural activities. A statue concerning cultural activities contributed to the promotion of our people's cultural welfare interwoven with cultural right. But laws were made for the purpose of enforcing national policy and supporting regime rather than promoting fundamental human rights, and they became effective and were understood as a mere part of national government, not as perspective of their execution, security of right or realization of them. On the other hand, based on laws concerning social welfare, cultural life means human life consisting of minimum welfare system, and minimum level of life which guarantees least cultural life is becoming an objective standard. This means the standard level of cultural right, and for the handicapped cultural rights are concretely guaranteed as a right in that they will not be discriminated for their approaching to cultural activities. However, laws concerning cultural activities have limitation in that there are ambiguous concept and limitation of cultural life, and there are no concrete and active laws about cultural rights to guarantee cultural life. In a constitution and laws concerning social welfare, cultural welfare must have concrete contents about the range and the level of cultural rights. In order cultural rights to be turned into complete ones which can assert its rights, as seen in the Supreme Court, a court has to try to understand the violation of cultural rights as the violation of legal rights.

  • PDF