• Title/Summary/Keyword: Role-Based

Search Result 11,820, Processing Time 0.045 seconds

Role-Based Application Model for Supporting Spontaneous Interoperation in Ubiquitous Environments (유비쿼터스 환경에서 자발적 상호연동을 지원하는 역할 기반 응용 모델)

  • Jung, Jong-Yun;Ryu, Ki-Yeol;Lee, Jung-Tae
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.269-285
    • /
    • 2012
  • The spontaneous interoperation is an important characteristic of ubiquitous applications and is closely related with mobility. The mobile components in ubiquitous environments are liable to appear in and disappear from one physical space to another. Because this characteristic certainly influences the structure and behavior of applications, they should adapt themselves to the changed environments by configuring their structure and behaviors. Consequently, developers are faced with the above challenging issue when they design and implement ubiquitous applications. The role concept is an efficient tool to model participant entities, their relationship, and collaboration, so role-based model are appropriate to describe a structure and behavior of software system. But, little attention has been given to reflect characteristics of ubiquitous applications. To tackle the problem, this study considers a ubiquitous application as a software organization which consists of software components and proposes an enhanced role-based application model for supporting spontaneous interoperation.

Design of a Role-Based Access Control Model for Web-based Applications (웹 기반 응용을 위한 직무 기반 접근 제어 모델의 설계)

  • Lee, Ho
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.59-66
    • /
    • 2002
  • The access controls are the methods which are generally used in such systems as computer operating systems, workflow systems, information security systems and etc.. In the paper, is proposed a role-based access control model which not only has fundamental security functions such as security, integrity and flow control, but also meets the access control requirements of role-based social organizations. The proposed role-based access control model is designed in order to perform its functions in simple and secure way, largely in the environment of web-based applications.

  • PDF

Work/Family Role Conflicts and Coping Strategies of Employed Wives. (전문직 취업주부의 역할갈등과 갈등대처전략)

  • 이기영;구은영
    • Journal of Families and Better Life
    • /
    • v.10 no.2
    • /
    • pp.99-112
    • /
    • 1992
  • This research was designed to illuminate that work domains and family domains are not separated but interacting spheres and to suggest efficient coping strategies than alleviate work/family role conflicts. The subjects of this study were 395 employed professional wives living in Seoul. Korea. Survey methods were questionnaires. Data analysis strategies were percentile, frequency, one-way-anova and multiple classification analysis. The results were as follows; 1)Employed wives experienced time-based conflicts and strain-based role conflicts. This finding supports the scarcity approach that multiple roles inevitably create strain. 2) Individual, family and work-related variables were predictors of work/family role conflicts. This findings indicate that work domains and family domains cannot be regraded as separated spheres. 3) Employed wives tried to meet all the given roles demands not by reducing role responsibilities, but by increasing the efficiency of role performance. This finding reflects the characteristics of employed wives who try to perform successfully all the responsibilities. 4)The negative correlation of coping strategies and work/family role conflicts suggests that strategies can function effectively in alleviating the work/family role conflicts.

  • PDF

A Study of Temporary Permission Delegation In Role-Based Access Control Policy (역할-기반 접근 제어 정책에서 일시적 권한 위임에 관한 연구)

  • Na, Sang-Yeob
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.1
    • /
    • pp.21-28
    • /
    • 2009
  • Role-Based Access Control Policy has a role hierarchies in which a higher case role can perform permissions of a lower case role. However, it is necessary for a lower case role to perform a higher case role's permission, which is not allowed to a lower case role, basically. In this paper propose a temporary permission delegation method. As the result of a temporary permission delegation, junior roles can perform senior roles' permissions in a dedicated interval.

  • PDF

A Study on UML-Based Role Modeling for Extracting Components (컴포넌트 추출을 위한 UML 기반의 역할 모델링에 관한 연구)

  • Song, Ho-Young;Kim, Jung-Jong
    • The KIPS Transactions:PartD
    • /
    • v.11D no.3
    • /
    • pp.591-596
    • /
    • 2004
  • Systematic modeling methods. which can correctly represent user requirements, are absolutely required to extract components when developing components. But, components are designed and developed In general based on the concept of object modeling so that they lacks in supporting representing cooperation and interaction as well as reuse. It means extracting components is not easy to be applied to complicated and sophisticated large-scale systems. This paper utilizes a role modeling method based on the role of objects, not on objects themselves, to complement object modeling. The Role modeling can break down a complicated system into simple models through abstracting the pattern of objects based on roles of the objects. In this study, an UML-based method extracting components through role modeling is embodied. UML can represent models from various standpoints so that role models arc also viewed from several points of view.

A Design of Role-Based Access Control Model (직무기반 접근제어 모델 설계)

  • Lee, Ho;Chung, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.1
    • /
    • pp.60-66
    • /
    • 2001
  • We designed a role-based access control model that can resolve the complicated tasks of control requirements. The designed access control model can control permissions efficiently use of a role-based access control. It guarantees the confidentiality integrity and availa information making use of identity-based and rule-based access controls. It can also centre information flow. Our access control model protects resources from unauthorized accesses b multi-level security policies such as role, security level, integrity level and ownership.

  • PDF

Effect of Perceived Supervisor Support on In-Role and Extra-Role Performance: The Mediating Role of Job-Based Psychological Ownership (상사지원인식이 역할내 성과와 역할외 성과에 미치는 영향: 직무기반 심리적 주인의식의 매개효과를 중심으로)

  • Chah, Dong-Ok;Hong, Kwon-Pyo;Chang, Je-Wook;Park, Sung-Hyun;Kang, Geum-Won
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.398-410
    • /
    • 2012
  • This study aims to investigate the effect of perceived supervisor support(PSS) on employees' in-role and extra-role performance by examining the mediating role of job-based psychological ownership(JBPO). Data were collected from 269 employees from a variety of companies. Both regression analysis and structural equation modeling were used. Previous research has found a positive relationship between PSS and job performance. However, empirical analysis has not yet demonstrated PSS-performance relationships mediated through JBPO. Thus, this study investigated this mediation in predicting in-role and extra-role performance. In the current study, JBPO was found to fully mediate the relationship between PSS and in-role performance and to partially mediate the relationship between PSS and extra-role performance. Future discussions and practical implications are discussed.

Role Based Access Control Model contains Role Hierarchy (역할계층을 포함하는 역할기반 접근통제 모델)

  • 김학범;김석우
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.49-58
    • /
    • 2002
  • RBAC(Role Based Access Control) is an access control method based on the application concept of role instead of DAC(Discretionary Access Control) or MAC(Mandatory Access Control) based on the abstract basic concept. Model provides more flexibility and applicability on the various computer and network security fields than the limited 1functionality of kernel access control orginated from BLP model. In this paper, we propose $ERBAC_0$ (Extended $RBAC_0$ ) model by considering subject's and object's roles and the role hierarchy result from the roles additionally to $RBAC_0$ base model. The proposed $ERBAC_0$ model assigns hierarchically finer role on the base of subject and object level and provides flexible access control services than traditional $RBAC_0$ model.

  • PDF

Extended GTRBAC Delegation Model for Access Control Enforcement in Enterprise Environments (기업환경의 접근제어를 위한 확장된 GTRBAC 위임 모델)

  • Hwang Yu-Dong;Park Dong-Gue
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.17-30
    • /
    • 2006
  • With the wide acceptance of the Internet and the Web, volumes of information and related users have increased and companies have become to need security mechanisms to effectively protect important information for business activities and security problems have become increasingly difficult. This paper proposes a improved access control model for access control enforcement in enterprise environments through the integration of the temporal constraint character of the GT-RBAC model. sub-role hierarchies concept and PBDM(Permission Based Delegation Model). The proposed model. called Extended GT-RBAC(Extended Generalized Temporal Role Based Access Control) delegation Model. supports characteristics of GTRBAC model such as of temporal constraint, various time-constrained cardinality, control flow dependency and separation of duty constraints (SoDs). Also it supports conditional inheritance based on the degree of inheritance and business characteristics by using sub-roles hierarchies and supports permission based delegation, user to user delegation, role to role delegation, multi-step delegation and temporal delegation by using PBDM.

  • PDF

Men's Role Conflicts in Dual-Earner Family (맞벌이 가족 남서의 역할갈등에 관한연구)

  • 김태현
    • Journal of Families and Better Life
    • /
    • v.16 no.1
    • /
    • pp.81-94
    • /
    • 1998
  • The purpose of this study is to examine men's role conflicts of dual-earner family based on man's role type. Man's role type is composed of man's sex role attitude and family-role performance and categorized in four types such as traditionalism type neo-traditionalism type equalitarianism type and inconsistancy type. The test analysis can be summarized as follows; First test analysis can be summarized as follows; role performance and man's role conflict as working hours is long wife's role requirement is high family-role conflict as working hours is long wife's role requirement is high family-role is not commit man's role conflict directly affected. In addition indirect affect through family-role performance shows that man's role conflict level is low as level of income is high level of income difference between man and wife is low child is younger and intent to modern sex-role attitude. Second looking into the difference role conflict to man's role type it shows that equalita ianism type's role conflict is low and man's role conflict in traditionalism and neo-traditonalism types is high.

  • PDF