• Title/Summary/Keyword: access

Search Result 16,428, Processing Time 0.035 seconds

A Suggestion for the activation of Open Access Scholarly Communication in Domestic Libraries (국내 도서관에서의 자유이용(Open Access) 학술 커뮤니케이션 활성화 방안)

  • Hwang, Ok-Gyung
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.2 s.56
    • /
    • pp.253-273
    • /
    • 2005
  • The study investigated the 7 problems of journal publishing based scholarly communication and suggested that the open access scholarly communication could be an alternative to that scholarly communication. To understand the status of open access scholarly communication in Korea, the study investigated open access journal or archive, open access license and softwares in Korea, and suggested the expected role of library to be the herb in scholarly communication.

ENTERPRISE WIDE CENTRALIZED APPLICATION LEVEL ACCESS CONTROL USING XACML

  • Shaikh, Riaz A.;Rajput, Saeed;Zaidi, S.M.H.;Sharif, Kashif
    • Proceedings of the CALSEC Conference
    • /
    • 2005.03a
    • /
    • pp.62-67
    • /
    • 2005
  • In traditional approach, enterprise-wide consistent security policy enforcement for applications is very difficult task. Therefore, industry is now moving towards new unified enterprise application security concept that consist of centralized authentication and authorization mechanism. The eXtensible Access Control Markup Language (XACML); an XML-based standard defined by OASIS, is most suitable choice which can support centralized, role based, context aware access control mechanism. It is designed to provide universal standard for writing authorization policies and access control request/response language for managing access to the resources. This paper includes a brief overview on XACML and discusses its benefits, limitations and a data flow process. We propose a new generic access control architecture that supports enterprise wide centralized application level access control mechanism using XACML. The other benefits which can be achieved through this architecture are, reduce adnministration cost and complexity, support of heterogeneous computing platforms, centralized monitoring system, automatic fail over, scalability and availability, open standard based solution and secure communication.

  • PDF

The Relation of CLR and Blocking Probability for CBR Traffic in the Wireless ATM Access Network

  • Lee, Ha-Cheol;Lee, Byung-Seub
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1158-1163
    • /
    • 2002
  • In this paper it is focused on the relation between CLR (Cell Loss Ratio) and blocking probability, GoS(Grade of Services) parameters in the wireless ATM (Asynchronous Transfer Mode) access network which consists of access node and wireless channel. Traffic model of wireless ATM access network is based on the cell scale, burst scale and call connection level. The CLR equation due to buffer overflow for wireless access node is derived for CBR (Constant Bit Rate) traffic. The CLR equation due to random bit errors and burst errors for wireless channel is derived. Using the CLR equation for both access node and wireless channel, the CLR equation of wireless ATM access network is derived. The relation between access network CLR and blocking probability is analyzed for CBR traffic.

On the Characteristics of the Flow with Opening and Shutting of Access Panels in a Clean Room (Access Panel 개폐에 따른 청정실내 유동특성)

  • Park, M.S.;Lee, Jae-Heon;Ahn, K.H.;Kim, J.H.
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.5 no.1
    • /
    • pp.55-64
    • /
    • 1993
  • A numerical investigation has been carried out for the two-dimensional flow and pressure characteristics in a clean room equipped with two kinds of filters and four access panels. The distributed pressure resistance concept was applied to describe the momentum loss in filters and access panels. As a result, the velocity profile in the clean room became rather smooth by the presence of access panels. Furthermore, the average pressure drop of each access panel reached the same value so that the ratio of the flow rate should be the same at any zone. The closing of an access panel with maintaining the other access panels being opened had influenced on the velocity distribution in lower two thirds of left half space of the clean room.

  • PDF

LED-QR Authentication Technology for Access Control and Security

  • Chung, Youngseek;Jung, Soonho;Kim, Junwoo;Lee, Junghoon;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.69-75
    • /
    • 2015
  • There are several possible places which are accessible in many buildings and facilities, various types of systems have been utilized such as access control or surveillance depending on the purpose. Especially if security is important, it must go through the various authentication procedures when people can access. Until now many access control systems have been proposed and developed, they are applied and utilized to companies which security is needed. However, as time passes the problems with existing access control systems occur or the vulnerabilities related to access control are reported, as technology advances. The solution to this, we propose authentication technology related to access control using LED-QR tag.

A Study of Digital Message Transfer System based on R-NAD for FM Radios (FM무전기를 통한 디지털 메시지 전송장비에 R-NAD 적용 연구)

  • Rho, Hai-Hwan;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.523-526
    • /
    • 2010
  • FM Radio communication operating mode is half-duplex mode. FM radio network access control shall be used to detect the presence of active transmissions on a multiple-subscriber-access communications network and shall provide a means to preclude data transmissions from conflicting on the network. In this study, we implemented R-NAD(Random Network Access Delay) that is one of network access control method.

  • PDF

An extended Access Control with Uncertain Context

  • Kang, Woojun
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.66-74
    • /
    • 2018
  • While new information technology advances have made information access and acquisition methods much more diverse and easier, there are side effects that allow illegal access using diverse and high-performance tools. In order to cope with such threats, there are access control methods in database technology, and various studies are being conducted to extend traditional access control to cope with new computing environments. In this paper, we propose an extended access control with uncertain context-awareness. It enables appropriate security policy enforcement even if the contextual constraints specified by the security policy does not match those accompanied by access request query. We extract semantic implications from context tree, and define the argument that can quantitatively measure the semantic difference between two nodes in the context tree. It is used to semantically enforce the security policy, and to prevent the excessive authorization caused by the implication.

The Impact of Broadband Access on Unemployment Rate in Indonesia 2016-2019

  • SALSABILA, Roghibah;OKTORA, Siskarossa Ika
    • Asian Journal of Business Environment
    • /
    • v.12 no.3
    • /
    • pp.23-30
    • /
    • 2022
  • Purpose: This study aims to determine the effect of broadband access, education level, population numbers, and investment on the unemployment rate in Indonesia. Research design, data, and methodology: This study uses panel data from 34 provinces from 2016 to 2019. The analysis uses the fixed-effect model for panel data with the Feasible Generalized Least Square (FGLS) estimation method. Results: Broadband access has a negative and significant effect on the unemployment rate. Mean years of school, population, and foreign direct investment also have a negative and significant impact on the unemployment rate. In contrast, the domestic direct investment variable has a positive and significant effect. Conclusion: The availability of broadband access in an area allows easier and faster access to information. The ease of access to such information can affect producing goods and services, encouraging innovation and employment growth, and reducing the unemployment rate. This research recommends that the government intensify the Indonesia Broadband Plan policy to accelerate the development and equitable distribution of broadband access in all regions of Indonesia.

Performance Analysis of random access channels in multi-service multi-user OFDMA systems (다중 서비스 다중 사용자 OFDMA 시스템에서의 임의접근 채널 성능 분석)

  • Koo, In-Soo;Pham, Thi Hong Chau
    • Journal of Internet Computing and Services
    • /
    • v.9 no.5
    • /
    • pp.141-151
    • /
    • 2008
  • In the paper, we analyze the performance of random access channels in multi-service multi-user OFDMA systems. The resource of the random access channels in OFDMA systems are available sub-channels and PN-codes. For given available sub-channels and PN-codes,' we analyze the performance of the random access channels of OFDMA systems in terms of the access success probability, the blocking probability, the access delay and the throughput per each service class. Further, we find the feasible region of the access probability of each service class in which the allowable minimum access success probability, the allowable maximum blocking probability and the allowable maximum access delay are satisfied. The results also can be used to find proper region of the access probabilities of each service class for differentiated quality of service(QoS)s, and for the system operations in multi-service multi-user OFDMA systems.

  • PDF

A Study on Concept of the Mobile Access Part based on the ITU's Access Network Functional Model (ITU Access Network의 기능적 모형에 근거한 이동망의 가입자 접속 부문 정립에 관한 연구)

  • Kim, Moon-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1A
    • /
    • pp.17-24
    • /
    • 2003
  • Access network is one of the most critical components of telecommunication networks. Essentially it provides the final connection through to the subscriber and at the same it is usually the most expensive component in terms of capital investment and ongoing cost of maintenance and repair In recent, various access technologies with broadband have been developed and also are emerging newly Comparing fixed access networks, the concrete concept as well as the scope of mobile access networks or parts has not been defined yet although it is caused by peculiarities of mobile network with mobility-guarantee technology, use of RF resource, fixed-exchange and transport networks This article examines the characteristics and detailed functions of BTS, BSC, MSC and other components in CDMA mobile network under the IS-95 A/B and cdma 2000-1x standards comparing the ITU's access network functional model From the systematic and functional perspectives, futhermore, an alternative definition for access parts of mobile network is proposed.