• Title/Summary/Keyword: access right

Search Result 334, Processing Time 0.024 seconds

A Study on the Document Copy Detection System for Protection of Digital Document Contents (디지털 문서 콘텐츠 보호를 위한 문서 복제 탐지 시스템에 관한 연구)

  • Kim, Heon
    • Journal of Digital Contents Society
    • /
    • v.7 no.3
    • /
    • pp.199-205
    • /
    • 2006
  • Due to easy access to information in our digital society, there are many cases of illegal counterfeiting and usage of personal information. Producing information with investment and effort is important indeed, but managing and protecting information is becoming a furthermore important issue. This is to promote a new detecting theory and solution for cases of intellectual property violations and plagiarizing digital contents.

  • PDF

Live Electrooptic Imaging Camera for Real-Time Visual Accesses to Electric Waves in GHz Range

  • Tsuchiya, Masahiro;Shiozawa, Takahiro
    • Journal of electromagnetic engineering and science
    • /
    • v.11 no.4
    • /
    • pp.290-297
    • /
    • 2011
  • Recent progresses in the live electrooptic imaging (LEI) technique are reviewed with emphasis on its functionality of real-time visual accesses to traveling electric waves in the GHz range. Together with the principles, configurations, and procedures for the visual observation experiments by an LEI camera system, the following results are described as examples indicating the wide application ranges of the technique; Ku-band waves on arrayed planar antennas, waves on a Gb/s-class digital circuit, W-band waves traveling both in slab-waveguide modes and aerially, backward-traveling wave along composite right/left-handed transmission line, and, waves in monolithic microwave integrated circuit module case.

A Study on Improvements of the Educational Facilities & Equipment Services Supporting for Disabled Students in University (장애대학생 교육복지지원 시설·설비부문의 개선방안에 대한 연구)

  • Min, Kyung-Suk
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.27 no.5
    • /
    • pp.24-31
    • /
    • 2020
  • This study proposed an effective improvement direction for the education and welfare supporting facilities and equipment sectors to guarantee the right of disabled students to study in university. To derive high-demand items, the value engineering quality model technique was conducted on the students who majoring in architecture and the disabled students. The high-demand items for the education and welfare supporting facilities and equipment was detailed by interviews with the disabled students. Especially, anti-skid floor material, spacious access space for electric wheelchair, efficient operation system for elevator and cafeteria waiting time are strongly demanded for the disabled students. Based on this research, universities can make efficient investments and improvements in the education and welfare supporting facilities and equipment sectors for disabled students.

Protect Digital Contents and Instant Player using PKI (공개키 기반의 디지털 콘텐츠 및 인스턴트 플레이어 보호방법연구)

  • Ryu, Seok
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.837-842
    • /
    • 2006
  • According to the development of the internet technology, many people can access many kind of digital contents. This approach can infringe the copyright and right owner-ship. Currently many people research the DRM(Digital Rights Management) for protect digital content after digital content downloaded. This paper propose the system that client player witch encrypted using PKI have symmetric key and CCI (copy control information), decrypt digital content witch encrypted when digital content created.

Ethical Issues and Information Communication Technology (ICT) Use in the New Era

  • Otulugbu, Dumebi;Ogunobo, Marvellous-Mary
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.12 no.3
    • /
    • pp.19-29
    • /
    • 2022
  • The new age is characterised by information communication technology, where computers, laptops, mobile gadgets such as palmtops, tablets, mobile phones and the internet have made their way to every sphere of life from our domestic environments such a homes, small retail shops, banks to large industries and the world at large. Over time, so many questions about the ethical use of Information and Communication Technology (ICT) have emerged on who has access to what technology and the use of it and like every other technological invention. This paper will look at the morality involved in making use of ICT to promote ethical use of data or information in a virtual environment. ICT also possesses both positive and negative impacts; the questions that these impacts raise are what this piece attempts to answer, providing global scrutiny to these ethical issues, situations and questions; and providing recommendations in line with global best practices.

Smartcard Authentication for IPTV Contents Protection (IPTV의 콘텐츠 보호를 위한 스마트카드 인증시스템)

  • Hwang, Jin-Wook;Kim, Sun-Jae;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.699-700
    • /
    • 2009
  • IPTV(Internet protocol TV)가 상용화되고 가입자 수가 증가하면서 제공하는 콘텐츠의 양이 많아지고 많은 정보를 얻게 되었다. 이러한 많은 콘텐츠의 저작권을 보호하기 위해 수신제한시스템(Conditinal Access System, CAS)과 DRM(Digital Right Management) 기술이 사용되고 있다. 하지만 나날이 발전하는 개인정보의 유출과 해킹을 통한 불법 다운로드, 복제에서 저작권이 위협을 받고 있다. 따라서 현재 서비스 제공자들은 콘텐츠의 저작권을 보호하기 위한 많은 연구들이 진행되고 있다. 본 논문에서는 IPTV에서의 스마트카드를 이용한 인증체계 시스템을 제시하여 기존의 보안시스템보다 더 강화된 보안을 구축 할 수 있다.

A Novel Hybrid Algorithm Based on Word and Method Ranking for Password Security

  • Berker Tasoluk;Zuhal Tanrikulu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.161-168
    • /
    • 2023
  • It is a common practice to use a password in order to restrict access to information, or in a general sense, to assets. Right selection of the password is necessary for protecting the assets more effectively. Password finding/cracking try outs are performed for deciding which level of protection do used or prospective passwords offer, and password cracking algorithms are generated. These algorithms are becoming more intelligent and succeed in finding more number of passwords in less tries and in a shorter duration. In this study, the performances of possible password finding algorithms are measured, and a hybrid algorithm based on the performances of different password cracking algorithms is generated, and it is demonstrated that the performance of the hybrid algorithm is superior to the base algorithms.

Development of Market Distribution through Digital Marketing Transformation Trends to Maximize Sales Turnover for Traditional Beverage Products

  • Basrowi;Pertiwi UTAMI
    • Journal of Distribution Science
    • /
    • v.21 no.8
    • /
    • pp.57-68
    • /
    • 2023
  • Purpose: The research aims to investigate the development of market distribution through digital marketing transformation trends with the support of universities. This development strategy is to maximize sales turnover of limited liability companies' typical traditional beverage products. Research design, data, and methodology: The research design uses descriptive qualitative methods. Data were obtained by participatory observation, in-depth interviews, FGDs, and documentation. Results: The result shows that the partner's traditional product market distribution strategy has been carried out by adopting science and technology and expertise possessed by partner universities. Universities that are Partners have benefited from the implementation of the Independent Campus program. Conclusions: The conclusion from the findings is that business actors must collaborate with universities through the Kedaireka Matchmaking Fund Program. The collaboration will create the right strategy development for the business. The government needs to provide more access to finance in the future. The hope is that the traditional beverage industry and higher education can realize the ease of synergy contributing to national development and the vision of the Indonesian Ministry of Education and Culture's independent campus.

Key Management Server Design in Multiuser Environment for Critical File Protection

  • Sung-Hwa Han
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.2
    • /
    • pp.121-126
    • /
    • 2024
  • In enterprise environments, file owners are often required to share critical files with other users, with encryption-based file delivery systems used to maintain confidentiality. However, important information might be leaked if the cryptokey used for encryption is exposed. To recover confidentiality, the file owner must then re-encrypt and redistribute the file along with its new encryption key, which requires considerable resources. To address this, we propose a key management server that minimizes the distribution of encryption keys when critical files are compromised, with unique encryption keys assigned for each registered user to access critical files. While providing the targeted functions, the server employs a level of system resources comparable to that of legacy digital rights management. Thus, when implemented in an enterprise environment, the proposed server minimizes cryptokey redistribution while maintaining accessibility to critical files in the event of an information breach.

A Study on the Disclosure and Exemption of the Personal Data (개인정보의 공개와 보호에 관한 연구 - 영국 사례를 중심으로 -)

  • Kim, Jung Ae
    • The Korean Journal of Archival Studies
    • /
    • no.29
    • /
    • pp.225-268
    • /
    • 2011
  • The general public are interested in the politics and form public opinion and keep in check the government for true democracy. The general public have the right to be furnished information from the government. And the government should enact the Freedom of Information Act to provide the public's right to know. At the same time, the government should enact the Data Protection Act to provide the public's right to privacy. There is a friction between the Freedom of Information Act and the Data Protection Act. It's hard to maintain the proper balance between the Freedom of information Act and the Data Protection Act, but many countries try to do so. The UK enacted the Data Protection Act 1998(DPA), which entered into force on 2000, to comply with EU Directive 1995. The Freedom of Information Act 2000(FOI), which came fully into force on 2005, was passed in 2000. The FOI imposes significant duties and responsibilities on public authorities to give access to the information they hold. The purpose of this study is to consider the provisions of the personal data in FOI and DPA. Besides this, it identifies the complaint cases on public authorities about the disclosure and exemption of the personal data in comparison with the acts. If information is the personal data of the person making the request, it will disclose under the DPA. If information is the personal data of a third party, it will disclose under the FOI. These acts interact each other to make up for the weak points in the other to make a proper application of the act on public authorities. This study may have any limitation in making a comparative study of the disclosure and exemption of the personal data in Korea. But it is expected to provide a basis for understanding the disclosure and exemption of the personal data in the UK.