• 제목/요약/키워드: access authority

검색결과 242건 처리시간 0.024초

기록물 생산기관명 접근점 제어 온톨로지 기술에 관한 연구 (A Study on the Description of Archives Name by Controlled Access Point in Ontology)

  • 강현민
    • 정보관리학회지
    • /
    • 제35권3호
    • /
    • pp.147-164
    • /
    • 2018
  • 기록물 생산기관에 부여된 행정표준기관코드(Standard Administration Code) 식별기호체계를 이용하여 동일 정체성과 동일 신원을 지닌 기록물 최종 생산기관명을 유일한 우선어 형식(preferred form)으로 정의하였다. 또한 동일 정체성과 동일 신원을 지닌 생산기관명에 대해 다양한 형식의 언어와 문자로 알려진 이형형식의 접근점 중에 대표 이름형식 접근점을 선정하고 온톨로지로 기술하였다. 이로써 과거부터 현재에 이르기까지 동일 정체성과 동일 신원의 생산기관이 생산한 모든 기록물에 대해 식별 접근할 수 있도록 하였다. 또한 '출처주의 원칙'과 '원질서 존중의 원칙'이라는 기본적인 기록물 관리 원칙을 온톨로지 환경에서도 준수함으로써, 기록물에 대한 관리방식 개선과 이용자들에게 기록물 접근의 편의성 및 확장된 검색결과를 제공할 수 있도록 하였다.

전력정보 전달을 위한 ATM 망 설계 (Design of ATM Networks to transfer for Electric Power System Informations)

  • 정영경;김한경
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1998년도 추계학술대회 논문집 학회본부 B
    • /
    • pp.572-574
    • /
    • 1998
  • In this paper, we are proposed design of ATM networks to transfer for electric power system informations, proposed transport networks is partitioned management part and functional part, management part is partitioned edge network, core network, local network, authority network, functional part is partitioned core network, access network, edge area. It is based on laying and partitioning by ITU-T G.805, we also proposed ATM network requirements for Carrier Relay traffic acceptability in electric power system information.

  • PDF

PKI 를 이용한 CITIS 사용자 인증 시스템 (A Certification System Using PKI for CITIS Users)

  • 정우필;박정선
    • 대한산업공학회지
    • /
    • 제26권4호
    • /
    • pp.411-420
    • /
    • 2000
  • Among the standards of CALS, CITIS(Contractor Integrated Technical Information Service) is a standard in information share procedure which manages all data and services occurred between a contractor and a purchaser. CITIS services have some security problems like authentication problem and repudiation problem, when they are implemented using the Internet. To solve these problems, CITIS needs a user certificate system which can allow to access important information only to qualified users. This paper proposed a PKI(Public Key Infrastructure) Certificate Authority for CITIS, and created a real User Certificate System which can be adjusted to circumstances of real CITIS.

  • PDF

무인항공기 인증제도에 관한 연구 (A Study on the Certification System of the Unmanned Aircraft)

  • 최주원
    • 항공우주시스템공학회지
    • /
    • 제6권1호
    • /
    • pp.19-25
    • /
    • 2012
  • Nowadays, the demand of civil application of an UAV has been being increased all over the world. And many projects are going on to develop a new regulatory system for an UAV to access a national airspace. Especially, to fly UAV over the non-restricted airspace as a standard airworthiness standard, many authority funded research institutes and associations are studying regulatory environment. For the UAV to access civil airspace, the certification system of the aviation regulation have to allow this. FAA of US, CASA of Australia and European authorities are now issuing an experimental airworthiness certificate to a civil UAV. This is the first step of issuing a standard airworthiness certificate. And many people believe that civil UAV can fly over a NAS if some technical issues are resolved. In this study, I would like to present an international trends of a civil UAV regulation system, reliability trend of unmanned aerial system and would like to bring up a our regulatory environment and suggest an UAV regulatory policy.

공유 데이터베이스 환경에서 고성능 트랜잭션 처리를 위한 버퍼 무효화 기법 (Buffer Invalidation Schemes for High Performance Transaction Processing in Shared Database Environment)

  • 김신희;배정미;강병욱
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제6권1호
    • /
    • pp.159-180
    • /
    • 1997
  • Database sharing system(DBSS) refers to a system for high performance transaction processing. In DBSS, the processing nodes are locally coupled via a high speed network and share a common database at the disk level. Each node has a local memory, a separate copy of operating system, and a DBMS. To reduce the number of disk accesses, the node caches database pages in its local memory buffer. However, since multiple nodes may be simultaneously cached a page, cache consistency must be ensured so that every node can always access the latest version of pages. In this paper, we propose efficient buffer invalidation schemes in DBSS, where the database is logically partitioned using primary copy authority to reduce locking overhead. The proposed schemes can improve performance by reducing the disk access overhead and the message overhead due to maintaining cache consistency. Furthermore, they can show good performance when database workloads are varied dynamically.

  • PDF

어플리케이션의 가상 메모리 보호를 위한 연구 (A Study for Protecting the Virtual Memory of Applications)

  • 김동율;문종섭
    • 대한임베디드공학회논문지
    • /
    • 제11권6호
    • /
    • pp.335-341
    • /
    • 2016
  • As information technology advances rapidly, various smart devices are becoming an essential element in our lives. Smart devices are providing services to users through applications up on the operating system. Operating systems have a variety of rules, such as scheduling applications and controlling hardwares. Among those rules, it is significant to protect private information in the information-oriented society. Therefore, isolation task, that makes certain memory space separated for each application, should highly be guaranteed. However, modern operating system offers the function to access the memory space from other applications for the sake of debugging. If this ability is misused, private information can be leaked or modified. Even though the access authority to memory is strictly managed, there exist cases found exploited. In this paper, we analyze the problems of the function provided in the Android environment that is the most popular and opened operating system. Also, we discuss how to avoid such kind of problems and verify with experiments.

그룹 통신을 위한 안전 MAC 주소 기반 X.509 인증서에 관한 연구 (Secure MAC address-based Authentication on X.509 v3 Certificate in Group Communication)

  • 홍성혁
    • 인터넷정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.69-77
    • /
    • 2008
  • X.509 인증서 확장영역에 사용자 MAC 주소를 추가함으로써 더 신뢰성 있는 사용자 인증을 제공한다. 사용자 MAC 주소를 인증서에 첨가해도 통신 퍼포먼스에 영향을 미치지 않는 것을 시연하였으며, 간단한 MAC 주소 첨가로 인해 향상된 사용자 인증을 기대한다.

  • PDF

프라이버시를 제공하는 저작권 보호 프로토콜 (Copyright Protection Protocol providing Privacy)

  • 유혜정
    • 디지털산업정보학회논문지
    • /
    • 제4권2호
    • /
    • pp.57-66
    • /
    • 2008
  • There have been proposed various copyright protection protocols in network-based digital multimedia distribution framework. However, most of conventional copyright protection protocols are focused on the stability of copyright information embedding/extracting and the access control to data suitable for user's authority but overlooked the privacy of copyright owner and user in authentication process of copyright and access information. In this paper, we propose a solution that builds a privacy-preserving proof of copyright ownership of digital contents in conjunction with keyword search scheme. The appeal of our proposal is three-fold: (1) content providers maintain stable copyright ownership in the distribution of digital contents; (2) the proof process of digital contents ownership is very secure in the view of preserving privacy; (3) the proposed protocol is the copyright protection protocol added by indexing process but is balanced privacy and efficiency concerns for its practical use.

A Study on User Authorization for Grid Resources

  • Lee, Seoung-Hyeon;Lee, Won-Goo;Lee, Jae-Kwang
    • Journal of information and communication convergence engineering
    • /
    • 제2권2호
    • /
    • pp.128-131
    • /
    • 2004
  • We suggest resource authorization system based on RBAC admitting someone to access resources. In existing grid environment, The authorization mechanism on user's resource is to give users an authority on the basis of DN(Distinguished Name) of proxy certificate and map file mapped in local system ID by one-to-one. In this case, it is difficulty in resource management such as each accounting management, memory resource, and disk resource, if the number of users, who want to use them is increased. To solve this problem, we specify the role of user's task in extension fields of his proxy certificate instead of the authorization mechanism of user's ID and propose resource authorization system being able to access his resource.

S/W 개발 분석 단계에서 접근 통제 (Legal System and Regulation Analysis by S/W Development Security)

  • 신성윤;진동수;신광성;이현창
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.215-216
    • /
    • 2014
  • 본 논문에서는 업무수행자인 사용자의 역할과 데이터 사용행위를 기반으로 한 접근 및 권한 통제가 이루어져야 한다는 점을 강조한다. 조직의 운명을 좌우하는 매우 중요한 정보의 대량 조회 및 변경 작업은 반드시 사전 결재를 취득해야 가능하다는 점도 제시한다.

  • PDF