• Title/Summary/Keyword: Role-Based

Search Result 11,820, Processing Time 0.049 seconds

A Study on Dynamic Role-based Service Allocation for Service Oriented Architecture System (서비스 지향 아키텍처 시스템을 위한 동적 역할 기반 서비스 할당에 관한 연구)

  • Park, Yong B.;Kwon, Ye Jin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.1
    • /
    • pp.12-20
    • /
    • 2018
  • Recently, web-based service software has been used as to combine various information or to share information according to the needs of users and the convergence of specialized fields and individual dependent systems. According to the necessity of the user, the proper service environment and the selective service environment according to the purpose and the needs of the user have been studied in a variety of specialized and combined professional research fields and industries. Software based on cloud systems and web services is being used as a tool for appropriate group and user groups and roles. A service system combined dynamically needs a module to manage a user through internal logic and grant a service access authentication. Therefore, it has been considered various approaches that a user who accesses the system is given a service access authority for a certain period of time. Also, when the deadline is over, the authority that you are given to access system will go through the process of expire the right. In this paper, we define the roles of users who access web services, manage user rights according to each role, and provide appropriate service resources to users according to their rights and session information. We analyzed the procedure of constructing the algorithm for the service according to the procedure of each user accessing the web service, granting the service resource and constructing a new role.

A Role-Performer Bipartite Matrix Generation Algorithm for Human Resource Affiliations (인적 자원 소속성 분석을 위한 역할-수행자 이분 행렬 생성 알고리즘)

  • Kim, Hak-Sung
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.149-155
    • /
    • 2018
  • In this paper we propose an algorithm for generating role-performer bipartite matrix for analyzing BPM-based human resource affiliations. Firstly, the proposed algorithm conducts the extraction of role-performer affiliation relationships from ICN(Infromation Contorl Net) based business process models. Then, the role-performer bipartite matrix is constructed in the final step of the algorithm. Conclusively, the bipartite matrix generated through the proposed algorithm ought to be used as the fundamental data structure for discovering the role-performer affiliation networking knowledge, and by using a variety of social network analysis techniques it enables us to acquire valuable analysis results about BPM-based human resource affiliations.

A Role-driven Security and Access Control Model for Secured Business Process Management Systems

  • Won Jae-Kang;Kim Kwang-Hoon
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.1-8
    • /
    • 2005
  • This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net(ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domain's and the application domain's. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC(Role-based Access Control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations.

  • PDF

Role based access control of healthcare information system for Mobile environments (모바일 환경에 적합한 헬스 케어 정보 시스템에서의 역할기반 접근제어)

  • Lee You-Ri;Park Dong-Gue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.119-132
    • /
    • 2005
  • The health care system revolutionized by the use of information and communication technologies. Computer information processing and electronic communication technologies play an increasingly important role in the area of health care. We propose a new role based access control model for pervasive health care systems, which changed location, time, environment information. Also our model can be solved the occurrence of an reduction authority problem to pervasive health care system at emergency environment. We propose a new role based access control model for pervasive health care systems, which combines role-to-role delegations, negative permission, context concept and dynamic context aware access control. With out approach we aim to preserver the advantages of RBAC and offer groat flexibility and fine-grained access control in pervasive healthcare information systems.

  • PDF

Collaboration in Agrotourism Development: The Role of Local Government in Yeongdong County, Chungcheongbuk Province, Korea

  • Lan, Ngo Thi Phuong;Chau, Hoang Ngoc Minh
    • Journal of People, Plants, and Environment
    • /
    • v.23 no.6
    • /
    • pp.589-602
    • /
    • 2020
  • Background and objective: There are many theories related to the development of agrotourism, and each stakeholder has its own role and function. If it is based on organizational functions, stakeholders need to be coordinated, and the state plays a major administrative role. But in the successful case of Yeongdong County, Chungcheongbuk province, the Republic of Korea, the government played an important role in the development of tourism, which grants us another perspective on the role of the government in promotion and development agrotourism activities. Methods: This article aims to examine the development of agrotourism through a cooperative approach, by clarifying the role of the local authorities in the Yeongdong region in the management and operation of the local agrotourism activities. The qualitative research method is based on a field survey conducted in Yeongdong County in 2019. Results: The study's findings show that in situations where conflicts of interest among stakeholders are prone to occur, the development of local tourism has a limited impact on the cooperative culture, and local governments play an important role. Accordingly, the local governments must actively formulate strategies to maintain and develop traditional agricultural industries and at the same time develop agrotourism activities. The government's ability to coordinate, cooperate, and participate reasonably is a key factor for the success of the sustainable development of the tourism industry. Conclusion: Based on coordination between stakeholders and a reasonable strategic direction, Yeongdong's agrotourism is being effectively deployed. The development of Yeongdong's agrotourism industry has achieved impressive results through an effective strategy, highlighting the important role of localgovernment in the consensus of local communities and collaboration with stakeholders. The role of outstanding local governments has been clearly demonstrated, especially in promoting, establishing, and contacting different organizations to effectively deploy agrotourism in the region.

Development and Evaluation of a Web-based Support Program for the Maternal Role of Primiparas (초산모의 어머니 역할에 대한 웹기반 지지중재 프로그램 개발 및 평가)

  • Kim, Jeong-Soo
    • Journal of Korean Academy of Nursing
    • /
    • v.35 no.1
    • /
    • pp.164-176
    • /
    • 2005
  • Purpose: This study was conducted to develop and evaluate a Web-based program for the maternal role of primiparas who use the internet. Method: The study process was a systems requirements analysis, design and development of a program, program testing by experts, program implementation, and program evaluation by users. A nonequivalent control group non-synchronized design was used. The data was collected from October 5th, 2002 to February 24th, 2003. Result: 1. Based on inquiries into mothers' needs, a Web-based support program was developed. The program was then modified from feedback received from experts. 2. In a sub-scale analysis of mothers' perception of a baby, amenability and persistence was significantly higher in the intervention group. The differences in the mean score of maternal self-confidence and maternal satisfaction were significant. 3. Cyber counseling was done for a total of 73 cases and the most frequent problems for counseling were feeding and nutrition (28.8%), followed by baby care, and health problems. Conclusion: It was proven that a Web-based support program provided appropriate support to primiparas and was effective in promoting their maternal role. Therefore, this study suggests that a Web-based support program for primiparas can become a powerful nursing intervention on virtually all mother and infant health concerns.

Context Conflicts of Role-Based Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경의 역할 기반 접근제어에서 발생하는 상황 충돌)

  • Nam Seung-Jwa;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.37-52
    • /
    • 2005
  • Traditional access control models like role-based access control model are insufficient in security needs in ubiquitous computing environment because they take no thought of access control based on user's context or environment condition. In these days, although researches on context-aware access control using user's context or environment conditions based on role-based access control are emerged, they are on the primary stage. We present context definitions md an access control model to provide more flexible and dynamic context-aware access control based on role-based access control. Specially, we describe the conflict problems occurred in the middle of making an access decision. After classifying the conflict problems, we show some resolutions to solve them. In conclusion, we will lay the foundations of the development of security policy and model assuring right user of right object(or resource) and application service through pre-defined context and context classification in ubiquitous computing environments. Beyond the simplicity of access to objects by authorized users, we assure that user can access to the object, resource, or service anywhere and anytime according to right context.

A Time Constraints Permission Based Delegation Model in RBAC (RBAC을 기반으로 하는 시간제한 권한 위임 모델)

  • Kim, Tae-Shik;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.163-171
    • /
    • 2010
  • RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. Delegation is a mechanism of assigning access rights to a user. RBDM0 and RDM2000 models deal with user-to-user delegation. The unit of delegation in them is a role. However, RBAC does not process delegation of Role or Permission effectively that occurs frequently in the real world. This paper proposes a Time Constraints Permission-Based Delegation Model(TCPBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. TCPBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation with time constraints. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.

An Implementation of NEIS′DB Security Using RBAC based on PMI (PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.31-45
    • /
    • 2004
  • Public Key Infrastructure(PKI) provides a strong authentication. Privilege Management Infrastructure(PMI) as a new technology can provide user's attribute information. The main function of PMI is to give more specified authority and role to user. To authenticate net and role, we have used digital signature. Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. NEIS(National Education Information System) can not always provide satisfied quality of security management. The main idea of the proposed RNEIS(Roll Based NEIS) is that user's role is stored in AC, access control decisions are driven by authentication policy and role. Security manager enables user to refer to the role stored in user's AC, admits access control and suggests DB encryption by digital signature.

A Study on the Role of Designer in the 4th Industrial Revolution -Focusing on Design Process and A.I based Design Software- (인공지능 시대에서 미래 디자이너의 역할에 관한 고찰 -디자인 프로세스와 디자인 소프트웨어를 중심으로-)

  • Jeong, Won-Joon;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.16 no.8
    • /
    • pp.279-285
    • /
    • 2018
  • The purpose of this study is to propose the role of future designers and capabilities to be developed in the age of A.I. Active and preliminary designers should prepare themselves to develop necessary capabilities. As a method of study, we investigated the meaning of design and the changing role of designers from the past to present. Additional research was conducted on generative design, design processes, and A.I based design software. Finally, based on the analysis, we proposed the role of future designers and their capabilities in the age of A.I. In conclusion, the role of future designer should lead social innovation through creativity by coworking with artificial intelligence based on understanding and empathy for users. Based on this research, designers are expected to develop unique humanities skills such as empathy and creativity and work with AI in response to $4^{th}$ industrial revolution.