• Title/Summary/Keyword: access authority

Search Result 242, Processing Time 0.027 seconds

Subject Access to OPACs in Korea (우리나라 온라인열람목록의 주제접근 방법)

  • 장혜란
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 1997.08a
    • /
    • pp.109-112
    • /
    • 1997
  • To understand and analyze the variety of the subject access methods of OPACs, telephone interviews were administered to the computerized libraries in Seoul. Data was collected during 4 days in Feb. 1997, and 155 libraries were responded. It was found that 105 libraries are operating OPACs. Among the 105 libraries, almost of all provide classification number and title keyword access, however, only half of them provide subject name access. 18 libraries allow linking/browsing facility between classification number and subject name/keyword. The language of the subject name to oriental books is mainly Korean and that to the Western books is mainly English. LCSH is the major authority list used. 36 libraries, 2/3 of them are special libraries, subject name is assigned by librarian without control. Based on the results, problems and suggestions to enhance subject access capability are presented.

  • PDF

Redactable Blockchain Based Authority Alteration and Accessn Control System (수정 가능한 블록체인 기반 권한 변경 및 접근 제어시스템)

  • Lee, Yeon Joo;Choi, Jae Hyun;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.513-525
    • /
    • 2022
  • The immutability of blockchain is core elements of security of blockchain and guarantee data integrity. However, the characteristic that the data recoreded once in the blockchain cannot be modified has place for abuse by a specific user. In fact improper contents that is inappropriate to be recorded on the blockchain, such as harmful data and user personal data, is exposed on Bitcoin. As a way to manage improper content existing in the blockchain, there is a redactable blockchain using chameleon hash proposed for the first time by Ateniese. The redactable blockchain meet the right to be forgotten of GDPR by allowing data modification and deletion. Recently, Research on personal data management is being conducted in a redactable blockchain. Research by Jia et al. proposed a model that enables users to manage their personal data in the redactable blockchain. However, semi trusted regulators, which are blockchain participation nodes, have powerful authority in the blockchain, such as modification rights and deprivation of transaction rights for all blocks, which may cause side effects. In this paper, to weaken the authority of regulators in Y. Jia et al., we propose a method of authority subject altering and authority sharing, and propose a redactable blockchain-based authority change and access control system model based on applicable scenarios.

A Qualitative Study on Librarians' Recognition of the Joint Utilization of National Authority Data (국가전거데이터 공동활용에 대한 사서들의 인식에 관한 질적 탐구)

  • Lee, Sung-Sook
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.1
    • /
    • pp.443-467
    • /
    • 2021
  • The purpose of this study was to conduct interviews with librarians who have experience in establishing local authority data by participating in the national authority sharing system of the National Library of Korea and to understand librarians' recognition and support for the joint utilization of national authority data. For this purpose, a total of 10 librarians who participated in the national authority sharing system project were interviewed by telephone using semi-structured questionnaires. Through this, it was possible to investigate the benefits, difficulties, utilization plans, revision plans of headings, and opinions on necessary support. The results of this study showed that the participants recognized that the joint utilization of national authority data provides the basis for the authority work of the local library and brings about the efficiency of the authority work, but they recognized the difficulty of modifying, selecting, creating new data, lacking knowledge, and lacking support system. The necessary support for the joint utilization of national authority data was provided with education and manuals related to authority, provision of rules related to authority that fully consider the position of the institution, budget and manpower support for system development and maintenance, establishment of communication channel and council, system and data advancement, and incentive to participating libraries. Based on the results of the study, the method and direction for the future operation of the joint utilization of national authority data were presented.

A Study on the Description of Personal Name Access Point Control Ontology Using Axiom Definition (공리정의를 이용한 인명접근점제어 온톨로지 기술에 관한 연구)

  • Kang, Hyen-Min
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.2
    • /
    • pp.157-174
    • /
    • 2012
  • This study tries to describe personal name access point control ontology for the American novelist Mark Twain using RDF/OWL axiom to control access point based on the ontology. The Axiom used in this study are disjoint with class, domain and range, property cardinality, inverse functional property, individual and literal data property. As a result, in the ontology environment we can accept various access points as equal access points exclusive of authority heading and heading concept. It can successfully describe Mark Twain's personal name access point control ontology and display using the OntoGraf.

A Study on Control of Access to Internal Network Information and Authority Set Up Management for Client by Class (제한된 내부 네트워크 정보 접근제어와 계층별 클라이언트 권한설정 관리에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.287-293
    • /
    • 2012
  • It has been only few years that various contents information subject for information processing system has been remarkably increased in online. If we say the year 2000 is the technology based year when deluge of information and data such as real time sharing, the time since after 2000 until 2011 has been a period plentiful of application based functions and solutions. Also, as the applicable range of these information process systems extends, individual information effluence has been social issues twice in 2009 and 2010. Thus now there are continuous efforts made to develop technologies to secure and protect information. However, the range problem has been extended from the illegal access from outside to the legal access from internal user and damages by agents hidden in internal information process system and client system. Therefore, this study discusses the necessity for the studies on efficiency based information security by control of access to internal information and authority setting for administrator and internal users. Based on the result of this study, it provides data that can be used from SOHO class network to large scale for information security method.

A User Authentication Model Based on Double Key for Secure Collusion Resistance in the Cloud Environment (클라우드 환경에서 공모 저항을 지원하는 이중 키 기반의 사용자 인증 모델)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.261-273
    • /
    • 2019
  • Recently, with the development of IT technology, there is an increasing interest in cloud services as the number of users using mobile devices such as mobile phones and tablets is increasing. However, there is a need for techniques to control or control various methods of accessing data as the user's service demands increase. In this paper, we propose a dual key based user authentication model that improves the user 's authentication efficiency by using two keys (secret key and access control key) to access the users accessing various services provided in the cloud environment. In the proposed model, the operation process and the function are divided through the sequence diagram of the algorithms (key generation, user authentication, permission class permission, etc.) for controlling the access right of the user with dual keys. In the proposed model, two keys are used for user authentication and service authorization class to solve various security problems in the cloud service. In particular, the proposed model is one of the most important features in that the algorithm responsible for access control of the user determines the service class of the user according to the authority, thereby shortening the management process so that the cloud administrator can manage the service access permission information of the user.

Development of OPAC and theories on online subject access (OPAC의 발전과정과 주제접근방법론)

  • 최달현
    • Journal of Korean Library and Information Science Society
    • /
    • v.20
    • /
    • pp.155-186
    • /
    • 1993
  • This study aims at defining the concept of OPAC, tracing of research trends and development of it, and clarifying various methods of subject access and patterns of bibliographic searching in OPAC as well as strategies for improving to implement online catalogs. Although OPAC is so far the most user-friendly bibliographic searching method, there are still a lot of issues including online subject access in particular. Therefore a more effective and useful method for computer end-users have to be developed, for instance, improvement of an indexing system, a n.0, pplication of the classification system as a searching tool, a new design and construction of standardized thesaurus, betterment of user interface, introducing of expert system into bibliographic searching, establishment of subject authority file. Those would raise the success-rate of users seeking bibliographic information in the library catalogs. Korean libraries are in very early stage of OPAC implementation so that every efforts and concerns to improve strategies and techniques for subject access to OPAC have been strongly asked.

  • PDF

Work-Related Stress Risk Assessment in Italy: A Methodological Proposal Adapted to Regulatory Guidelines

  • Persechino, Benedetta;Valenti, Antonio;Ronchetti, Matteo;Rondinone, Bruna Maria;Tecco, Cristina Di;Vitali, Sara;Iavicoli, Sergio
    • Safety and Health at Work
    • /
    • v.4 no.2
    • /
    • pp.95-99
    • /
    • 2013
  • Background: Work-related stress is one of the major causes of occupational ill health. In line with the regulatory framework on occupational health and safety (OSH), adequate models for assessing and managing risk need to be identified so as to minimize the impact of this stress not only on workers' health, but also on productivity. Methods: After close analysis of the Italian and European reference regulatory framework and workrelated stress assessment and management models used in some European countries, we adopted the UK Health and Safety Executive's (HSE) Management Standards (MS) approach, adapting it to the Italian context in order to provide a suitable methodological proposal for Italy. Results: We have developed a work-related stress risk assessment strategy, meeting regulatory requirements, now available on a specific web platform that includes software, tutorials, and other tools to assist companies in their assessments. Conclusion: This methodological proposal is new on the Italian work-related stress risk assessment scene. Besides providing an evaluation approach using scientifically validated instruments, it ensures the active participation of occupational health professionals in each company. The assessment tools provided enable companies not only to comply with the law, but also to contribute to a database for monitoring and assessment and give access to a reserved area for data analysis and comparisons.

WiCoin : Wireless LAN Sharing Using Block Chain Technology (와이코인 : 블록체인 기술을 이용한 무선랜 공유)

  • Kim, Woo-Seong;Ryu, Kyoung-Ho;Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.195-201
    • /
    • 2019
  • This paper proposes a blockchain system to share Wireless Local Area Network (WLAN) that recently suffers from mutual interference among increasing devices using unlicensed bands. Blockchain technology can induce cooperation from users by incentivizing them with cryptocurrency like shown in Bitcoin example. In this paper, we describe Blockchain based access mechanism in WLAN instead of conventional authentication based access. Here, users can access any WLAN access point by paying through smart contract while they also receive payment from others. In order to support real-time transaction, we apply proof-of-authority that is realized by Byzantine fault tolerant protocol instead of well-known proof-of-work that requires huge computing power and delay.

A Study on Security Model Design of Adaptive Access Control based Context-Aware (상황인식 기반 적응적 접근제어 보안모델 설계에 관한 연구)

  • Kim, Nam-Il;Kim, Chang-Bok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.211-219
    • /
    • 2008
  • This paper is proposed context-aware based access control, model by extending original access control model. In this paper, we survey the recent researches about security model based context-aware such as xoRBAC and CAAC. For exactly policy evaluation, we make an addition Context Broker and Finder in existing CAAC security model. By this security model, Context information and context decision information is able to be collected easily for more correct policy decision. This paper controlled access of possible every resources that is able to access by user's event and constraint from primitive access resources. In this paper proposed security model can be offer dynamically various security level and access authority method alone with specified policy and constraint adjustment at user's role.

  • PDF