• 제목/요약/키워드: The Right of Access

검색결과 333건 처리시간 0.042초

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • 제8권3호
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.

시스템 보안을 무력화 시키는 전산관리자의 시스템 침해 행위 연구 (To Neutralize the Security Systems, Infringement Actions by the Administrator on the Computer Networks)

  • 류경하;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2012년도 추계학술대회
    • /
    • pp.165-168
    • /
    • 2012
  • 본 논문은 이 세상에 존재하는 어떤 종류의 보안시스템도 시스템 접근권한을 가진 전산 담당자의 시스템 침해 행위를 막아내기란 어려운 일이라는 점을 되새기고, 전산 담당자의 침해 행위 사례와 그로인한 피해의 정도 등 심각성을 재조명하고, 나아가 기술적 보안조치의 한계선상에 있는 전산 담당자의 권한 관리와 기술적 조치를 넘어 인적관리를 통한 침해예방 방안에 대해 나름의 대안을 찾아 보고자 한다.

  • PDF

Settlement Solution by ADR on Dispute in Intellectual Property Right

  • Lee, Jae Sung
    • 한국중재학회지:중재연구
    • /
    • 제29권3호
    • /
    • pp.121-140
    • /
    • 2019
  • First, the purpose of this research is to review the Online Dispute Resolution (ODR) regulations in Korea to resolve disputes which can arise in international e-commerce in the near future. Second, this research tries to look for alternative solutions to dispute resolutions according to these regulations. Third, this research pursues to enhance the effectiveness of business deals by providing efficient and satisfactory dispute resolution methods for e-commerce business. Furthermore, this study evaluates the definition of global e-commerce by comparing Online Dispute Resolution (ODR) with Alternative Dispute Resolution (ADR). Through analyzing the domestic ODR system and ADR system, this research could boost the employment of settlements in small-sized disputes through easy and convenient consumer access to both ODR and ADR procedures. The enhancement of the competitiveness of Korean companies in the global market is estimated to take place as a result. This research is estimated to provide benefits to our businesses both domestically and internationally by using ODR regulations and ADR methods. Moreover, this research is anticipated to verify usefulness in terms of consumer protection by advancing consumers' access to dispute solution authorities locally and abroad.

안전한 클라우드 비즈니스를 위한 접근권한 분산관리 (Distributed Access Privilege Management for Secure Cloud Business)

  • 송유진;도정민
    • 정보처리학회논문지C
    • /
    • 제18C권6호
    • /
    • pp.369-378
    • /
    • 2011
  • 최근 비즈니스 환경에서 공유되는 데이터의 기밀성과 유연성있는(fine-grained) 접근제어를 보장하기 위해서 KP-ABE(Key Policy-Attribute Based Encryption)와 PRE(Proxy Re-Encryption)를 활용한 시스템 모델이 제안되었다. 그러나 기존 방식은 클라우드 서버에 집중된 복호권한 때문에 데이터 기밀성을 침해하게 된다. 또한, 접근권한 관리에 대한 개념을 고려하지 않았으므로 악의적인 내부사용자의 공격에 취약하다. 이러한 문제를 해결하기 위해서 기존방식의 프로토콜 모델에서 권한 관리자 그룹을 두어 클라우드 서버에 저장되는 데이터 파일(data file)을 분산 저장하여 데이터 기밀성을 보장하고 AONT 기반의 XOR 임계치 비밀분산을 활용하여 접근권한 관리 모델을 구성하였다. 또한 XOR 쉐어를 활용하여 권한의 가중치를 부여할 수 있는 방법을 구체화했다. 4장에서 기존방식과 제안방식과의 비교 분석과 기능적 활용에 대해서 서술하여 제안방식의 차별화를 부각시켰다.

라이센스 에이젼트를 이용한 멀티미디어 데이터관리 및 감시 시스템 설계 (The Design of a Multimedia Data Management and Monitoring System for using License Agent)

  • 조현섭;유인호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2007년도 제38회 하계학술대회
    • /
    • pp.1662-1664
    • /
    • 2007
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

A Study on the Medical tourism customized service platform for clinic

  • Ahn, Yoon-Ju
    • International Journal of Advanced Culture Technology
    • /
    • 제9권3호
    • /
    • pp.238-242
    • /
    • 2021
  • Through diversification of 4th industries and transportation and globalization, tourism was developed for medical purposes, not limited to touring tourist attractions. The trend of medical tourism in Korea is shifting from large and medium-sized hospitals to professional medical services in one area of small hospitals rather than professional medical services. However, small hospitals lack medical coordinators and interpretation services, and tourists who visit Korea for treatment lack information on small hospitals. Therefore, a platform is needed to match small hospitals with medical tourists. In this study, using Platform as a Service (Paas) in cloud computing, clinic administrators can access the app to introduce information about their hospitals with simple manipulations. Tourists also want to propose a customized platform to select the right area for them to check information about small-scale hospitals and choose the treatment and tourist attractions they wants. In this study, using Platform as a Service (Paas) in cloud computing, clinic administrators can access the app to introduce information about their hospitals with simple manipulations.

Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey

  • Samkari, Esraa;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.67-74
    • /
    • 2022
  • One type of network security breach is the availability breach, which deprives legitimate users of their right to access services. The Denial of Service (DoS) attack is one way to have this breach, whereas using the Intrusion Detection System (IDS) is the trending way to detect a DoS attack. However, building IDS has two challenges: reducing the false alert and picking up the right dataset to train the IDS model. The survey concluded, in the end, that using a real dataset such as MAWILab or some tools like ID2T that give the researcher the ability to create a custom dataset may enhance the IDS model to handle the network threats, including DoS attacks. In addition to minimizing the rate of the false alert.

주거복지에 대한 이론적 개관 및 향후 정책과제 (Theoretical Overview of Housing Welfare and Future Policy Issues)

  • 김영태
    • 한국주거학회논문집
    • /
    • 제17권1호
    • /
    • pp.127-134
    • /
    • 2006
  • The purposes of this study are to define 'housing welfare' which constitutes an important theme of discussion today and to present some future policy issues. Recently, the expression 'housing welfare' is widely used in our daily life and written in some laws, but its concept is still ambiguous. Housing welfare can be defined as 'the situation in which citizens gain access to a decent housing and adapt themselves well to the community life. In this context, the goals of housing welfare policy should be as follows: reduction of the number of households living below the minimum standard in housing, promotion of the right to housing, housing provision and management based on housing needs, linkage of housing and other welfare measures, realization of social integration and social justice. But, there are still some controversies on such questions as target group, moral hazard of beneficiaries, social equity, etc. To get all the policy alternatives more effective, efforts should be made to improve the general infrastructure of welfare policies, to prevent NIMBY phenomenon of local actors, and so on.

정보화시대의 환자진료정보 보호에 관한 법.제도적 고찰 (A Study on Medical Information Privacy Protection Law and Regulation in the Information Age)

  • 윤경일
    • 한국병원경영학회지
    • /
    • 제8권2호
    • /
    • pp.111-129
    • /
    • 2003
  • This study discusses the direction of legislation to strengthen the legal protection of medical records privacy in information age. The legislation trends on privacy protection of medical records in European Union and United States are analysed and the current law and regulation of Korea on medical records are compared. The issues discussed include the ownership of medical records, the patient's right of access to medical records, medical information publication for other than treatment or insurance processing use, confidentiality responsibility of provider organizations, medical information management in provider organizations, penalty for the unlawful use of patient information. This study concludes that the patients' right on medical record and provider organization's responsibility in processing patient information should be strengthened in order to protect patients' privacy and to conform to the international standard on medical record protection in the information age.

  • PDF

1회용 암호와 네트워크 IP Tracking을 이용한 인증시스템의 설계 (Design of Model of Evidence System using the Single Cryptology and Network IP Tracking)

  • 채병수;차홍준
    • 한국정보전자통신기술학회논문지
    • /
    • 제2권2호
    • /
    • pp.87-95
    • /
    • 2009
  • 이 연구는 정보유통시스템으로 컴퓨터통신망에서 파일저장 장치의 보안과 인증시스템으로 설계하고 연구하려는 것으로 컴퓨터 정보처리에 이용되고 활용되어야 할 암호화된 정보와 데이터 파일 저장장치에 대한 보안을 유지되도록 사용자 이용권한(access)을 시스템적 접근 문제로 해결하려는 인증네트워크 시스템으로서, 1회용 암호와 네트워크 IP Tracking을 이용한 인증시스템의 설계를 연구하였다.

  • PDF