• Title/Summary/Keyword: access authority

Search Result 242, Processing Time 0.021 seconds

Privacy Model based on RBAC for U-Healthcare Service Environment (u-헬스케어 환경에서 환자의 무결성을 보장하는 RFID 보안 프로토콜)

  • Rhee, Bong-Keun;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.3
    • /
    • pp.605-614
    • /
    • 2012
  • Nowadays u-healthcare which is very sensitive to the character of user's information among other ubiquitous computing field is popular in medical field. u-healthcare deals extremely personal information including personal health/medical information so it is exposed to various weaknees and threats in the part of security and privacy. In this paper, RFID based patient's information protecting protocol that prevents to damage the information using his or her mobile unit illegally by others is proposed. The protocol separates the authority of hospital(doctor, nurse, pharmacy) to access to patient's information by level of access authority of hospital which is registered to management server and makes the hospital do the minimum task. Specially, the management server which plays the role of gateway makes access permission key periodically not to be accessed by others about unauthorized information except authorized information and improves patient's certification and management.

Making the Difference in Occupational Health: Three Original and Significant Cases Presented at ICOH Congresses in the 20th Century

  • Iavicoli, Sergio;Valenti, Antonio;Barillari, Caterina;Fortuna, Grazia;Boccuni, Valeria;Carnevale, Francesco;Riva, Michele A.;Kang, Seong-Kyu;Tomassini, Luigi
    • Safety and Health at Work
    • /
    • v.11 no.2
    • /
    • pp.215-221
    • /
    • 2020
  • Background: The aim of this study is to illustrate the historical role of the International Commission on Occupational Health (ICOH) congresses as an arena where national and international occupational medicine can dialogue and as the first example of scientific transferability of the research and prevention results that have had such an impact on global public health. Methods: We used the ICOH Heritage Repository, in which ICOH congress proceedings (from the first congress in Milan in 1906 to the last congress, held in Dublin in 2018), are organised in an orderly way, updated and easily accessible according to open access logic. Results: We describe studies by three physicians who submitted significant scientific work to ICOH congresses, one on the battle against ancylostomiasis (Volante, 1906), the second (Quarelli, 1928) on carbon disulphide poisoning, and the third (Viola, 1969) on the carcinogenicity of vinyl chloride monomer. Priority is given to Italian cases, on account of the authors' obvious familiarity with the issues. Conclusion: The visibility offered in ICOH conferences and their published proceedings has boosted the international spread of their findings, contributing to the scientific transferability of the research results and influencing the development of policies and prevention interventions that have had a great impact on global public health.

A Study on Developing Archival Authority Records through Analyzing Descriptive Elements and Applying EAC-CPF in University Archives: Converging Archival Information Descriptive Rules with Data Structure Standards (대학기록물 전거레코드 구축을 위한 기술요소 분석과 EAC-CPF 적용에 관한 연구: 기록물 기술규칙과 데이터구조표준의 융합을 중심으로)

  • Kim, Moon-kyung;Koo, Joung Hwa
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.1
    • /
    • pp.65-75
    • /
    • 2021
  • The research aims to suggest descriptive elements for developing archival authority records in university archives through converging archival information descriptive rules with EAC-CFP, data structure standards. To achieve the purpose, the research conducted the following research phases: first, to analyze the main characteristics of record producers according to the features of both functions and organizations of the university. Second, to analyze the descriptive elements by comparing the rules between ISAAR(CPF) and the guidelines of the authority records of NAK and suggest descriptive elements to build archival authority records. Finally, to suggest the finally deducted descriptive elements by matching up with those of EAC-CPF. The significance of the result is to provide both standardized access points to retrieve university records and to search the contextual information of record production in the online environments by converging the data standard structure, EAC-CPF.

Discussion on the Forms of Authorized Access Points Representing Multilingual Works (다국어 저작의 전거형 접근점 형식에 관한 논의)

  • Rho, Jee-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.4
    • /
    • pp.123-147
    • /
    • 2016
  • With the rapid progress toward a new cataloging model, the revision of Korean Cataloging Rules (KCR) are under discussion. The purpose of this study is to make a suggestion on constructing authorized access points for multilingual works, especially focused on the language and script of authorized access points. To the end, this study investigates (1) the extended functions and meanings of access points on the new model, (2) related guidelines and regulations reflected in International Cataloging Principles and typical cataloging rules, and (3) the characteristics of access points in the current Korean cataloging practices. Finally, (4) desirable languages and scripts of authorized access points representing multilingual works are suggested.

Management of Korean Biological Resources for Access Regulation and Benefit-sharing (접근규제와 이익공유를 위한 효율적인 생물유전자원 관리 방안)

  • 김기대;오경희;이병윤;김말희;김태규;이은영;노환춘;이민효;이덕길
    • Korean Journal of Environmental Biology
    • /
    • v.22 no.2
    • /
    • pp.259-264
    • /
    • 2004
  • Convention on Biological Diversity has authorized national sovereignty over biological resources so that legislative framework should be established. In biological resources management, the access to biological resources and the benefit sharing arising out of their utilization are two most important steps. Bonn guidelines adopted by the 6th COP of the Convention on Biological Diversity contain MAT (Mutually Agreed Terms) and PIC (Prior Informed Consent) indispensable to implement the access and benefit-sharing process. MAT is contractual agreement between provider countries and use entities while PIC is a specific measure associated with consent prior to access to biological resources. Moreover, the guidelines include the responsibilities of national focal point and competent national authority, incentives and so on. Our laws related to access to biological resources have no items on benefit-sharing and intellectual property rights. The role of the competent national authority is very important to coordinate the organization controlling information availability, opening to the public, and intellectual property rights with other stakeholders. But, the national regulations must not interfere with academic studies on biological diversity and disobey the two objectives of the Convention on Biological Diversity, the conservation of biological diversity and its sustainable use.

The Study on the Directions of KCR4 under the New ICP 2009 (국제목록원칙 2009 제정에 따른 한국목록규칙의 방향성에 관한 연구)

  • Lee, Mi-Hwa
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.2
    • /
    • pp.261-280
    • /
    • 2012
  • This study seeks to replace PaRIS Principles and find directions of revising KCR4 by analyzing the international Cataloging Principles 2009(ICP 2009) established in the environment of Machine Readable Cataloging. ICP 2009 was reflected in cataloging rules such as RDA and ISBD 2010 as the minimal principles for uniformity in establishing each nation's cataloging rules. In contrary, KCR4 needs to be revised because it has never been changed after 2003, and has only description rules without any rules for the choice and forms of access points. Therefore, this study aims to grasp requirements that should be reflected in KCR4 through analyzing ICP 2009. In first step, it is to grasp the features of ICP 2009 by comparing PaRIS Principle and ICP 2009 and to compare KCR4 in aspects of ICP 2009. The detailed elements for comparison between ICP 2009 and KCR4 are scope, general principles, entitles, attributes, and relationships, objectives and functions of the catalogue, bibliographic description, access points, foundations for search capabilities as the contents of ICP 2009. As a result, this study could give some directions of KCR4 in the future. First, ISBD 2010 and conceptual models should be reflected in KCR4 in description. Second, it should regulate the authority access points in KCR4 based on ICP 2009. Third, it will describe essential access points of work and expression attributes in bibliographic records and authority records to find works and expression. This study will contribute to guide the national cataloging rules.

Robust and Auditable Secure Data Access Control in Clouds

  • KARPAGADEEPA.S;VIJAYAKUMAR.P
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.95-102
    • /
    • 2024
  • In distributed computing, accessible encryption strategy over Auditable data is a hot research field. Be that as it may, most existing system on encoded look and auditable over outsourced cloud information and disregard customized seek goal. Distributed storage space get to manage is imperative for the security of given information, where information security is executed just for the encoded content. It is a smaller amount secure in light of the fact that the Intruder has been endeavored to separate the scrambled records or Information. To determine this issue we have actualize (CBC) figure piece fastening. It is tied in with adding XOR each plaintext piece to the figure content square that was already delivered. We propose a novel heterogeneous structure to evaluate the issue of single-point execution bottleneck and give a more proficient access control plot with a reviewing component. In the interim, in our plan, a CA (Central Authority) is acquainted with create mystery keys for authenticity confirmed clients. Not at all like other multi specialist get to control plots, each of the experts in our plan deals with the entire trait set independently. Keywords: Cloud storage, Access control, Auditing, CBC.

Access Control to XML Documents Based on Hierarchical Key Assignment Scheme (계층적 키 할당 기법을 기반으로 하는 XML 문서의 접근제어)

  • Ban, Yong-Ho;Kim, Jong-Hun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1520-1530
    • /
    • 2005
  • As XML is recognized as a prevalent standard for document representation and exchange in the Internet, the need for security of XML becomes very important issue. Until now researches on XML security have been focused on confidentiality or integrity like encryption and digital signature technology. But, as XML data becomes more massive and complicated, it requires managerial security that decided access permit or deny by the authority oi user who is using the XML data. Thus it requires models and mechanisms enabling the specification and enforcement of access control policies for XML documents. In this paper, we suggest the new access control model and mechanism that separate XML documents by access level, assign roles to each user by applying Role Based Access Control (RBAC) and perform access control to specific documents by encrypting each section with roles. The method, we suggested, has an advantage that it does not need to update the whole keys used in encryption process by updating only the relations between appropriate secure layers.

  • PDF

A Study on Considerations in the Authority Control to Accommodate LRM Nomen (LRM 노멘을 수용하기 위한 전거제어시 고려사항에 관한 연구)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.1
    • /
    • pp.109-128
    • /
    • 2021
  • This paper is to explore considerations in authority control to accommodate LRM nomen entities through the literature reviews, the analysis of RDA rules, and the opinion survey of domestic catalog experts. As a result, for authority control, considerations were proposed in the aspect of nomen's attribute elements, catalog description, and MARC authority format. First, it is necessary to describe in as much detail as possible the category, the scheme, intended audience, the context of use, the reference source, the language, the script, the script conversion as the attributes of the nomen with the status of identification, note, and indifferentiated name indicators added in RDA. Second, the description method of attribute elements and relational elements of nomen can be unstructured, structured, identifier, and IRI as suggested in RDA, and vocabulary encoding scheme (VES) and string encoding scheme (SES) should be written for structured description, Also, cataloging rules for structuring authorized access points and preferred names/title should be established. Third, an additional expansion plan based on Maxwell's expansion (draft) was proposed in order to prepare the MARC 21 authority format to reflect the LRM nomen. (1) The attribute must be described in 4XX and 5XX so that the attribute can be entered for each nomen, and the attributes of the nomen to be described in 1XX, 5XX and 4XX are presented separately. (2) In order to describe the nomen category, language, script, script conversion, context of use, and date of usage as a nomen attribute, field and subfield in MARC 21 must be added. Accordingly, it was proposed to expand the subfield of 368, 381, and 377, and to add fields to describe the context of use and date of usage. The considerations in authority control for the LRM nomen proposed in this paper will be the basis for establishing an authority control plan that reflects LRM in Korea.

Design and Implementation of ACM-based Web Security Access Control System for Intranet Security (인트라넷 보안을 위한 ACM기반 웹 보안 접근 제어 시스템의 설계 및 구현)

  • Cho Nam-Deok;Park Hyun-Gun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.643-648
    • /
    • 2005
  • Intranet system for use within an organization, usually a corporation, is to basically pass through user authentication, but information can be leaked, modified, and deleted by malevolent users who disguise an authorized user or due to user's mistakes in using various functions of web browser. Thus, there is a need for measures to protect the information from illegal use, transformation through partial modification, and illegal leakage such as fraudulent use. This paper presents a flexible Web Security Access Control system based ACM which Provide efficient suity Policy to Protect information in intranet. This Web Security Access Control system not only enhances security by Performing encryption/decryption of information in intranet but also, for sharing confidential information among departments, performs effective and useful access control by assigning different authority to the secured web page. And, by controlling the functions of client PC in various ways, information leakage on malicious purpose or by mistake can be prevented.