• Title/Summary/Keyword: access right

Search Result 334, Processing Time 0.026 seconds

Design and Implementation of Physical Secure Card for Financial Security (금융보안을 위한 물리적 보안 카드의 설계 및 구현)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.855-863
    • /
    • 2015
  • In this paper, we present a novel method to verify the financial site and prevent sensitive information disclosure with financial security card and smart phone. This method allows homepage access when user accesses to the valid site with right security card and smart phone. Furthermore, traditional OTP method cannot be secure against to Man in the middle attack, but out method presents the countermeasure of this. User can readily recognize the phishing and pharming sites and even avoid Man in the middle attack by malicious users.

The Characteristics of the Copyright Management for Korean Journals (국내 학술지의 저작권 관리 특성 분석)

  • Joung, Kyoung Hee;Kim, Gyuhwan
    • Journal of the Korean Society for information Management
    • /
    • v.33 no.4
    • /
    • pp.269-291
    • /
    • 2016
  • This study analyzed 1,890 KRF journals to understand the current situation and problems related to copyright management by journal publishers. The results of the study are as follows: 32.6% of journals did not provide any copyright notice, 77.1% of 1,141 journals which gave copyright information with regulation documents did not specify the type of author's property right to be transferred and most of the journals which owned copyright transferred from the author did not specify the permission needed to use their article. This study suggested that journal publishers establish the object and method for distribution of journal articles and then develop and publish their copyright policy suited to their own objective.

The Relationships Between Navigational Pattens and Information Processing Styles of Hypermedia Users (하이퍼미디어 사용자의 정보처리 유형이 정보탐색 패턴에 미치는 영향)

  • 이미자
    • Korean Journal of Cognitive Science
    • /
    • v.12 no.1_2
    • /
    • pp.65-76
    • /
    • 2001
  • This study investigated the relationships between hypermedia users information processing styles and navigational patterns. Three aspects of navigational patterns were investigated: (a) navigational breadth patterns which reveal how comprehensively users access, (b) navigational path patterns which display what sequences users follow. and (c) navigational method patterns which show what methods u users employ when using the system. Information processing styles were measured by the Human Information Processing Styles(HIPS) Survey. The subjects were 102 undergraduate students enrolled in management courses at a university. Participation was voluntary 34 students were selected for each of left, right, and integrated information processor group. The subjects interacted with A.g.i.l.e. TrainerTM program to complete two types of searching tasks 'open-ended and closed-ended tasks' Findings indicated that the information processing style seems to play an important role in how an individual interacts with the hypermedia systems.

  • PDF

A Study on Government Documents and the Federal Depository Library Program (FDLP) in America (미국의 정부 문서와 연방정부 간행물 기탁 도서관제도(FDLP)에 대한 고찰)

  • Han Rho, Jinja
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.9 no.2
    • /
    • pp.5-18
    • /
    • 2009
  • Congress established the Federal Depository Library Program (FDLP) to ensure that the public has free access to the Government's information. Operated by the U.S. Government Printing Office (GPO), the mission of the FDLP is to disseminate information products from all three branches of the Government to over 1,250 Depository libraries in the FDLP program nationwide. Depository libraries safeguard the American public's right to information by making Government information in all formats freely available. This paper discusses the role of the GPO and FDLP, the GPO's organizational structure, the Depository library's obligations and responsibilities, services and collections, referrals and networking, and the Depository's future and challenges.

A Study on the Remedies in Digital Information Transaction - Focusing on the urn A Part 8 - (디지털정보거래에 있어 계약위반에 대한 구제에 관한 연구 - UCITA 제8장을 중심으로 -)

  • Han, Byoung-Wan;Seo, Min-Kyo
    • International Commerce and Information Review
    • /
    • v.12 no.3
    • /
    • pp.79-98
    • /
    • 2010
  • The National Conference of Commissioners on Uniform State Laws promulgated the Uniform Computer Information Transactions Act (UCITA) in 1999. In 2000 and 2002, this Act was also Amended. UCITA provides a comprehensive set of rules for licensing computer information, whether computer software or other clearly identified forms of computer information. Computerized databases and computerized music are other examples of computer information that would be subject to UCITA. It would also govern access contracts to sites containing computer information, whether on or off the Internet. UCITA would not govern contracts, even though they may be licensing contracts, for the traditional distribution of movies, books, periodicals, newspapers, or the like. Part 8 of UCITA provides a remedy structure somewhat modeled on that of Article 2 but adapted in significant respects to the different context of a computer information transaction. For example, 808 of UCITA recognizes the focus in a license context for a licensor's remedy should properly be on recovery for benefit conferred or for lost profit, rather than on damage measurement by a substitute transaction, where the license is non-exclusive so additional transactions are permitted and there is very little cost in reproduction of the information and its redistribution. Section 816 of UCITA also contains very important limitations on the generally recognized common law right of self-help as applicable in the electronic context.

  • PDF

The Practical Effectiveness of the Intellectual Property Legislation of the R&D National Projects (디지털환경에서의 지식재산권 관련 R&D사업 규정의 실용성 분석)

  • Yoo, Sa-Rah
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.16 no.1
    • /
    • pp.269-283
    • /
    • 2005
  • Research and Development projects sponsored by the government are one of the main production sectors of academic and research information in domestic area. The access control and information service of R&D outcomes should be considered as a critical factor of nation-wide knowledge-based IS management. This study focused on the practical utilities of three IPR legislations of the government projects and analyzed if they are good enough to support the information service in recent digital network environment. Some suggestions in different perspectives were provided for the improvement of the existed IPR legislation.

  • PDF

Performance Monitoring Study of Unglazed Transpired Solar Air Heating Module (무창 기공형 태양열 공기 난방 모듈 성능 모니터링 연구)

  • Kang, Eun-Chul;Hyun, Myung-Taek;Lee, Euy-Joon
    • Journal of the Korean Solar Energy Society
    • /
    • v.22 no.1
    • /
    • pp.67-72
    • /
    • 2002
  • Solar Air Systems (SAS) have unique advantages for space heating and tempering ventilation air. Air, unlike water, needs no protection against freezing nor are leaks damaging to the building structure or its contents. In contrast to glazed collector, unglazed steel solar collector may have higher efficiencies over glazed flat collector due to the absence of the glass. Therefore, the monitoring of SAS is so important to evaluate actual performance of SAS for right applications. This study is to provide a testing method with a movable test cell developed in KIER to evaluate the thermal performance of SAS based on international standard method ASHRAE 93-86, "Method of Testing to Determine the Thermal Performance of Solar Collectors". The monitoring tool used advanced technique LabVIEW 6i with portable notebook computer. Sample results have been obtained to access the performance of a reference and a target SAS module. The process and tool introduced here could be used to provide a performance verification data for future implementation study applications.

A Comparative Analysis of EAP Authentication/Key-Establishment Protocols (EAP 인증/키설정 프로토콜 비교분석)

  • Park DongGook;Cho Kyung-Ryong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1323-1332
    • /
    • 2005
  • EAP (Extensible authentication protocol) is a sort of general framework for authentication rather than a specific authentication protocol. An important consequence of this is that EAP can accommodate a variety of authentication/key-establishment protocols for different internet access networks possibly integrated to a common IP core network This paper tries a comparative analysis of several specific authentication/key establishment protocols for EAP, and suggest a strategic viewpoint toward the question: which one to un. In addition, we tried to make things clear about an intellectual property right issue with regard to some password-based protocols.

A study on the environment-controlling system by members on the basis of HNS (HNS기반의 구성원별 자동 환경 제어 시스템에 관한 연구)

  • 황선주;조대제;임한규
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.720-723
    • /
    • 2003
  • So far the study of digital home has mainly been made up of the network technology and the sorority system, but the application to consider the discriminatory characteristics of the individual family members has been interested in comparison with the necessity. The system proposed in this study is to get the information of the internal users through the access-controlling system. The controller offers the discriminatory environment by activating the database of the internal users and controls the sub-system of the home-network. The suggested system can automatically offer the discriminatory environment among the family members by limiting TV programs or channels according to the users' age, by offering other internet environment according to the users, by putting restrictions on telephone numbers, or by restricting the settling right of the home-shopping companies.

  • PDF

Design & Implementation of License-based Digital Rights Management System (라이센스 기반 디지털 저작권 보호 시스템 설계 및 구현)

  • Jeong, Yeon-Jeong;Yoon, Ki-Song;Ryu, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.55-62
    • /
    • 2004
  • The web-based technology allows anybody who has access to the Internet to get all kinds of information from the World Wide Web. It brings about issues regarding intellectual property and copyright threats. After content is downloaded, no further protection is provided on the content that has been accessed. DRM (Digital Right Management) technologies came out to ensure the protection of copyrighted content and information. In this paper, we propose architecture of license-based digital rights management system for protection of contents and principles' rights such as contents creators, providers, distributors, and uses in contents distribution value-chain over Internet. This system makes on-line processing of all value-chain from creator to purchaser possible, compared with existing DRM products only supporting only limited distribution between distributor and purchaser.