• Title/Summary/Keyword: Rights Control

Search Result 291, Processing Time 0.027 seconds

A study on the Derivation of Improvement Method for the Problems of the Current Land Category System - Focused on Land Category Classification and Conversion Cases - (현행 지목제도의 문제점에 대한 개선방안 도출에 관한 연구 - 지목의 설정과 변경 사례를 중심으로 -)

  • Choi, Dae-Jiup;Shin, Man-Joong
    • Journal of Cadastre & Land InformatiX
    • /
    • v.52 no.2
    • /
    • pp.67-80
    • /
    • 2022
  • This study proposes a legal limit from the administrative and management standpoint of the city hall/county office/gu office, which is the cadastral authority, in relation to the discrepancy between the actual land use status and the cadastral study that has been continuously raised. And also, from the point of view of civil complaints such as landowners, this study tried to evaluate the practical problems of the current land category system from the point of view of civil complaints such as landowners and to derive a solution to these problems. Therefore, this study indicates how the category of land use is classified, and how land use is restricted by the laws of Registration & Management of public cadastre. Also, it shows the reasons why discrepancy between the land use fixed by the law and the current state of actual use of land occurs. Addtionally, This study suggests a plan to reorganize the Land Category system and it includes consolidation and subdivision of land. The study also describes a way to minimize the targets for conversion of land under control of Land Category System as well as to improve the law that protects the people's property rights.

The Design of Key Management Module for IPTV Service (IPTV 서비스를 위한 수신 제한 키 관리 시스템 설계)

  • Hwang, Kyung-Min;Kim, Chang-Soo;Kim, Seo-Kyun;Kim, Chul-Won;Park, Ki-Chul;Kim, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.544-547
    • /
    • 2008
  • The Growth of Multimedia Digital Content market is extending to IP network environment. this is realized via IPTV service which provide Triple-Service that is broadcasting, communication, telephone service. Recently on IPTV Settop box has fixed key for control access permission. and this is cause of Wasting resource to operation and management. it can be resolved to apply DRM System which mixed MPEG-21 REL(Rights Expression Language) and XML Signature. In this paper, we designed Permission Management Module for IPTV Service which can control permission to access via MPEG-21 and XML Signature.

  • PDF

'Mansu', a Hardy Kiwifruit (Actinidia arguta Planch. et Miq.) Cultivar with Improved Storage Life

  • Jung, Byung Joon;Cho, Hye Sung;Park, Moon Young;Cho, Youn Sup
    • Horticultural Science & Technology
    • /
    • v.34 no.5
    • /
    • pp.755-760
    • /
    • 2016
  • In general, the storage life of hardy kiwifruit (Actinidia arguta) is approximately one month, even in cold storage, which is a limiting factor for its commercialization due to the short marketing period. This short shelf life is in contrast to those of green kiwifruit (A. deliciosa, 6 to 8 months) and gold kiwifruit (A. chinensis, 4 to 6 months). To increase the storage life of hardy kiwifruit, we performed a cross between A. arguta (a local collection, 'Hy2-1', female) and A. deliciosa ('Matua', male) at Wando station at the Fruit Research Institute of JARES, Korea in 1999. After the first selection in 2006, we clonally propagated the hybrid plants by grafting them onto A. arguta seedlings in Gwangyang and Haenam province, Korea. We performed the final selection of this cultivar in 2012 and applied for plant protection rights from the Korea Forest Research Institute in 2013. Several experimental orchards have been established for commercial production. 'Mansu' begins to flower on May 20 in Gwangyang. The horticultural maturity date in 'Mansu', when the soluble solid content reaches $7^{\circ}Bx$, is October 15, whereas that of the control variety ('Chiak') is October 5. The average fruit size of 'Mansu' is approximately 15 g. The soluble solid content of 'Mansu' is approximately 16 to $17^{\circ}Bx$ after ripening. The total yield of mature 'Mansu' vines is estimated to be 2.2 to 2.5 tons per 10a. The fruit firmness of 'Mansu' exceeded 1.5 kg/5 mmØ until 70 days after storage (at 0 and $1^{\circ}C$). Therefore, 'Mansu' fruits have much longer storability than the control. The cultivation and production of 'Mansu' may extend the marketing period for hardy kiwifruit.

Domestic radio waves propagate management and control systems investigate the system status (국내 전파관리제도 및 전파관리 시스템 현황에 대한 조사)

  • Shin, Hyun-Shin;Kim, Sung-Hong;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.5
    • /
    • pp.441-450
    • /
    • 2016
  • The International Telecommunications Union(: ITU) Radio Regulations(: RR) and in which is defined as the frequency of electromagnetic waves below 3000GHz spread in space without artificial guidance, our country also follows the international definition. As radio waves are electromagnetic waves spreading in space without artificial induction means having a frequency within the range set by the ITU. Frequency distribution for dual-work is to inde 300GHz, among the divided frequency is our daily or less than 90% of the frequency band is in contact saenghwalyong 3GHz. Propagation, but can occur indefinitely without depleting that anyone can create only gatchumyeon transmission equipment, if the radio frequency to use at the same time and space, the soul is the interference occurs is not available radio resources. Due to the physical finiteness used in our country for the first time on such a propagation laws enacted in 1961 and to the state radio resource management, and rules to be used for propagation only if granted the rights.

Improvement of Bioethics in the Unit of 'Heredity and Evolvement' of Middle School Ninth-Grade Science (중학교 3학년 과학 '유전과 진화' 영역을 통한 생명윤리의식 함양)

  • Lee, Yun-Jung;Choi, Don-Hyung;Son, Yeon-A
    • Hwankyungkyoyuk
    • /
    • v.20 no.3
    • /
    • pp.1-17
    • /
    • 2007
  • The purpose of this study was to establish objectives for ninth grade studies of heredity and evolution in middle school in an attempt to foster students' consciousness of bioethics, and it's additionally intended to develop and apply lesson plans handling different points at issue and to determine the effects of the lesson plans on the bioethics of middle school students. The subjects in this study were 152 ninth graders in a middle school, whose science scores were similar. An experimental group and a control group were made up of 76 students respectively, and a pretest was conducted with test paper developed by this researcher to assess their awareness of bioethics. The experimental group took lessons by using the teaching plans prepared in this study, and the control group received typical education according to the curriculum. And then a posttest was implemented with test paper developed in this study to compare the two groups. In addition their science grades were compared as well. The findings of the study were as follows: First, seven learning objectives were selected from three units related to bioethics in the third-year 8th category of heredity and evolution of middle school. Second, in order to attain the selected learning objectives, four session lesson plans were prepared. Third, the experimental group that studied using by the lesson plans made better progress in bioethics awareness and the gap between the two was statistically significant(t=6.61, p<.001). The former were ahead of the latter in consciousness about species equity(t=7.71, p<.001), the dignity of life (t=3.78, p<.001), human rights(t=2.99, p<.01) and equity among generations(t=2.66, p<.01), but not in awareness of the diversity of species. Fourth, there was no significant gap in science scores between the students studied according to the curriculum and those who received instructions by using the lesson plans developed in the study.

  • PDF

A Group based Privacy-preserving Data Perturbation Technique in Distributed OSN (분산 OSN 환경에서 프라이버시 보호를 위한 그룹 기반의 데이터 퍼튜베이션 기법)

  • Lee, Joohyoung;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.675-680
    • /
    • 2016
  • The development of various mobile devices and mobile platform technology has led to a steady increase in the number of online social network (OSN) users. OSN users are free to communicate and share information through activities such as social networking, but this causes a new, user privacy issue. Various distributed OSN architectures are introduced to address the user privacy concern, however, users do not obtain technically perfect control over their data. In this study, the control rights of OSN user are maintained by using personal data storage (PDS). We propose a technique to improve data privacy protection that involves making a group with the user's friend by generating and providing fake text data based on user's real text data. Fake text data is generated based on the user's word sensitivity value, so that the user's friends can receive the user's differential data. As a result, we propose a system architecture that solves possible problems in the tradeoff between service utility and user privacy in OSN.

A Design and Implementation of System to Provide Secure Digital Contents Distribution on Mobile Environment (무선 환경에서 안전한 디지털 컨텐츠 유통을 제공하는 시스템 설계 및 구현)

  • Lee, Kwon-Il;Kim, Bong-Seon;Shin, Young-Chan;Ryou, Jae-Cheol;Lee, Jun-Seok
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.327-336
    • /
    • 2004
  • There is a need for content providers and operators to control the usage of downloaded digital contents. Digital Rights Management(DRM) is the means to control the usage of the digital contents once it has been downloaded. Therefore, appropriate security mechanism is required. The mobile DRM system Is same as the general DRM system. We use encryption technology to package digital contents. In case of Mobile DRM system, secure distribution and secure keeping of packaging encryption key is important. In this paper, we design and implement DRM system on the Mobile Environments following on OMA(Open Mobile Alliance) DRM Model. We considered being a secure DRM system to contain appropriate security solution.

Prospects for Building a Legal System for Marine Environment Protection in China (중국의 해양환경법제 분석과 전개방향에 관한 고찰)

  • Yang, Hee-Cheol;Park, Seong-Wook;Park, Su-Jin;Kwon, Suk-Jae
    • Ocean and Polar Research
    • /
    • v.30 no.1
    • /
    • pp.89-107
    • /
    • 2008
  • Marine environment is subject serious destruction because of frequent accidents during exploration of marine resources and overseas transport. Also, as many industrial enterprises discharge high volume of wastes and contamination, marine pollution has become a serious threat to people (especially in China). China is quickly becoming a world economic leader of the 21st century. Rapid industrialization and social changes have raised the standard of living of millions of the Chinese, mainly in the areas of East and South East coast. The process of industrialization, however, is often followed by deterioration of the marine environment and rarely turned around until a country has increased its standard of living. Solving these array of problems will take decades and currently the government is addressing minor specific issues only. Fortunately, the Chinese government has enacted a number of marine pollution control laws. On 25 December 1999, the 13th Session of the Ninth Standing Commettee of the National People's Congress passed the amended the Marine Environment Protection Law of the People's Republic of China. This Law establishes rights and responsibilities of the relevant departments concerning marine environment management and provides for two new chapters on "Marine Environment Supervision" and "Marine Ecological Protection", along with "Supervision of Pollution Prevention for Marine Construction Projects", "Marine Ecological Protection" and "Marine Environment Pollution Prevention for Marine Construction Projects". Also, the Law was amended with provisions for integrated pollution discharge control system and oil spillage emergency response plan and enhanced legal responsibilities. Chinese government recognizes that international and national experience can be useful for China to prevent further ecological degradation of the marine environment.

Applied Method of Privacy Information Protection Mechanism in e-business environments (e-Business 환경 내 개인정보 보호 메커니즘적용 방안)

  • Hong, Seng-Phil;Jang, Hyun-Me
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.51-59
    • /
    • 2008
  • As the innovative IT are being developed and applied in the e-business environment, firms are recognizing the fact that amount of customer information is providing care competitive edge. However, sensitive privacy information are abused and misused, and it is affecting the firms to require appropriate measures to protect privacy information and implement security techniques to safeguard carparate resources. This research analyzes the threat of privacy information exposure in the e-business environment, suggest the IPM-Trusted Privacy Policy Model in order to resolve the related problem, and examines 4 key mechanisms (CAM, SPM, RBAC Controller, OCM) focused on privacy protection. The model is analyzed and designed to enable access management and control by assigning user access rights based on privacy information policy and procedures in the e-business environment. Further, this research suggests practical use areas by applying TPM to CRM in e-business environment.

  • PDF

A Study of Effective Privacy Protection System on High Concurrent Transaction Database System (동시 트랜잭션이 많은 데이터베이스에서 효과적인 개인정보보호 시스템 연구)

  • Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.107-113
    • /
    • 2012
  • Recently, according to the establishment of personal information protection Act, the public and private organizations are taking a step to protect personal information rights and interests by employing the technical methods such as the access control mechanism, cryptography, etc. The result of the personal information leakage causes a serious damage for the organization image and also has to face with the responsibility by law. However, applying access control and cryptographic approach on the personal information item for every connection to large database system causes significant performance degradation in a large database system. In this paper, we designed and implemented the light weight system using JVM (Java Virtual Machine) for the Oracle DBMS environment which the concurrent transaction occurs many, thereby the proposed system provides the minimum impact on the system performance and meets the need of personal information protection. The proposed system was validated on the personal information protection system which sits on a 'A' public organization's portal site and personnel information management system.