• Title/Summary/Keyword: The Right of Access

Search Result 333, Processing Time 0.03 seconds

The Design of License Agent Rights Protection (디지털 저작권 보호를 위한 라이센스 에이전트의 설계)

  • 이광형;이근왕;김희숙
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.275-282
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PBD security method real time action monitoring for user, data security for itself.

  • PDF

Access Management Using Knowledge Based Multi Factor Authentication In Information Security

  • Iftikhar, Umar;Asrar, Kashif;Waqas, Maria;Ali, Syed Abbas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.119-124
    • /
    • 2021
  • Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company's information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.

A Study on the Convergence Perception of Students in Radiology on the Reorganization of Safety Management System by person with frequent access of Nuclear Safety Act (원자력안전법 수시출입자 안전관리체계 개편에 대한 방사선학과 재학생들의 융합적 인식 연구)

  • Lee, Bo-Woo;Kim, Chang-Gyu
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.6
    • /
    • pp.89-94
    • /
    • 2019
  • This study will examine the awareness of students in radiology who have applied the reorganization of the safety management system of frequent visitors according to the amendment of the Nuclear Safety Act. A survey was conducted on 175 students from the Department of Radiology at K University. 98.1% of the students in the second grade, 90.3% in the third grade, and 97.7% in the fourth grade were recognized as need to be classified as person with frequent access by the Nuclear Safety Act. Limiting the operation of radiation equipment in radiography practice is a regulation that violates students' right to learn, and it is necessary to enact an exception rule for learning so that the right to study is not violated.

Efficacy of Transradial Cerebral Angiography in the Elderly

  • Park, Jung-Hyun;Kim, Dae-Yong;Kim, Jin-Wook;Park, Yong-Seok;Seung, Won-Bae
    • Journal of Korean Neurosurgical Society
    • /
    • v.53 no.4
    • /
    • pp.213-217
    • /
    • 2013
  • Objective : Transradial angiography has become popular among many cardiologists as a diagnostic and therapeutic tool. However, transradial cerebral angiography is not utilized to the same extent. The purpose of this study is to present our experience regarding the usefulness of transradial cerebral angiography, especially in elderly patients. Methods : Between May 2011 and February 2012, a total of 126 cerebral angiographies were performed via a transradial approach in a single center. Of them, only 47 patients were over 60 years old. In our institution, we shifted the initial access from the right femoral artery to the right radial artery in all patients requiring cerebral angiography in 2011. We did not attempt radial access in 40 cases for variable reasons. Results : The procedural success rate was 92.2%. We have four failures of transradial angiography; two because of loop formations of the radial and brachial artery and two due to multiple puncture failures. All supra-aortic vessels were successfully catheterized. However, the selective catheterization rates of the left side distal vessels were lower, as success rates were 89.7% for the right internal carotid artery and 75% for the left internal carotid artery. Procedure-related vascular complications, such as puncture site hematoma, hand ischemia, pseudoaneurysm, arteriovenous fistula and arterial dissection were not observed in our series. However, intraprocedural thrombosis developed in one patient, which was resolved completely by intraarterial thrombolytic agents. Conclusion : With advancing patient's age, we believe that transradial cerebral angiography is a useful tool to decrease patient's discomfort and more effectively manage the vessel tortuosity.

Implementation and Evaluation of IoT Service System for Security Enhancement (보안성 향상을 위한 IoT 서비스 시스템 구현 및 평가)

  • Kim, Jin-bo;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.181-192
    • /
    • 2017
  • Internet of Things includes the whole process of collected information generated from a variety of objects, as well as analyzing and sharing it, and providing useful information services to people. This study seeks ways to improve security and safety in the areas of service security technology, ID management technology and service access control, all of which take place in the IoT environment. We have implemented the services that can design and issue C&C (Certificate and Capability) service token authentication, which is based on a public key, to improve the service security. In addition, we suggest LCRS (Left Child-Right Sibling) resource model management for the efficient control of resources when generating the resource services from the data collected from node devices. We also implemented an IoT services platform to manage URL security of the resource services and perform access control for services.

A Dynamic Security Service using Access Control Model in Distributed Framework Support for u-Healthcare (u-헬스케어 지원 분산 프레임워크에서 접근 제어 모델을 이용한 동적 보안 서비스)

  • Jeong, Chang-Won;Kim, Dong-Ho;Kim, Myung-Hee;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.29-42
    • /
    • 2007
  • This paper describes a security object designed to support a dynamic security service for application services in u-healthcare computing environments in which domains are used to object groups for specifying security policies, In particular, we focus on security object for distributed framework support for u-healthcare including policy, role for security and operations use to access control. And then, by using the DPD-Tool. we showed the access right grant procedure of objects which are server programs, the developing process of client program. Also, we verified the executablility of security service supporting by distributed framework support for u-healthcare use to the mobile monitoring application developing procedure implemented through DPD-Tools.

  • PDF

A Study on Improving the Privacy for personal information collected for statistical processing (통계처리를 위해 수집된 개인정보에 대한 개인정보보호 개선방안에 관한 연구)

  • Bae, Sang-ho;Shin, Je-su;Chun, Sam-hyun;Chung, Hyun-soo
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.25-30
    • /
    • 2016
  • Personal Information Protection Act does not apply to certain personal information processings and personal information management as well as the data subject's right to access to their personal information collected by public authorities pursuant to Statistics Act. Such exclusion may lead to problems such as misuse and mishandling of personal information by data controllers as well as infringement upon the data subejct's right to control over their personal information. This study is to find solutions to the above problems, considering the public interests of statistics and the facilitation of the collection and the use of statistics. Ultimately, the study is to suggest recommendations for the Personal Information Protection Act to ensure the data subject's rights to request access and rectification as well as safe management of the collected personal information.

A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack (IPTV 환경에서 스마트카드 복제에 강건한 다중 셋톱박스 인증기법)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.37-46
    • /
    • 2010
  • In an IPTV system, the rights of the content and service provider can be protected by using Conditional Access System (CAS) and Digital Right Management (DRM). In case of the CAS, only the authorized user who has structured authentication keys can decrypt the encrypted content. However, since the CAS establishes a secure channel only between content provider and Smart Card (SC), it cannot protect the system against McCormac Hack attack which eavesdrops on unsecure channel between SC and Set-Top Box (STB) and SC cloning attack. In this paper, we propose a robust multi-STB assisted SC / STB authentication protocol which can protect the IPTV system against not only McCormac Hack attack, but also SC cloning attack. The previous works which bind a STB and a SC during the SC registration phase against the SC cloning attack does not support multi-STB environments. The proposed system which dynamically updates the STB information in subscriber management system using the bi-directional channel characteristic of IPTV system can support the user's multi-STB device effectively.

The Design of a Multimedia Data Management and Monitoring System for Digital Rights Protection using License Agent (라이선스 에이전트를 이용한 디지털 저작권 보호를 위한 멀티미디어 데이터 관리 및 감시 시스템의 설계)

  • Park, Jae-Pyo;Lee, Kwang-Hyung;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.281-292
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical Issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

A GDPR based Approach to Enhancing Blockchain Privacy (GDPR에 기반한 블록체인 프라이버시 강화 방안)

  • Han, Sejin;Kim, Suntae;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.33-38
    • /
    • 2019
  • In this paper, we propose a new blockchain technology that could comply with GDPR. The proposed model can prevent illegal access by controlling access to the personal information according to a access policy. For example, it can control access to the information on a role-basis and information validation period. The core mechanism of the proposed model is to encrypt the personal information with public key which is associated with users attributes policy, and then decrypt it with a private key and users attributes based on a Attribute-based Encryption scheme. It can reduce a trusted third-part risk by replacing it with a number of nodes selected from the blockchain. And also the private key is generated in the form of one-time token to improve key management efficiency. We proved the feasibility by simulating the proposed model using the chaincode of the Hyperledger Fabric and evaluate the security.