• Title/Summary/Keyword: authorization

Search Result 507, Processing Time 0.031 seconds

Application of the Essential Uses Concept to Substances of Concern - PFAS, 6PPD and Benzene - (우려 화학물질에 대한 필수 용도 개념 적용 - PFAS, 6PPD, Benzene 중심으로 -)

  • Miran Jung;Hyunpyo Jeon;Sangheon Kim
    • Journal of Environmental Health Sciences
    • /
    • v.50 no.1
    • /
    • pp.54-65
    • /
    • 2024
  • Background: There is growing international recognition of the need for improvements to national chemical management systems for hazardous chemicals. The European Union has recently introduced the concept of 'essential uses' as a new approach to the management hazardous chemicals by limiting their uses. Objectives: This paper examines the concept of essential uses in chemical management and how to apply it through a case study of essential use. This approach is distinct from the current chemical management system, but seeks to improve its potential benefits by effectively restricting or gradually decreasing the use of hazardous substances. Methods: The concept of essential uses was introduced by reviewing the Montreal Protocol on Substances that Deplete the Ozone Layer, Cousins's three essentiality categories applied to PFAS, restriction options assessed in the PFAS restriction proposal under REACH, and the California Safer Consumer Products regulations prioritizing 6PPD in motor vehicle tires. Based on these essential uses concepts for PFAS and 6PPD, uses of benzene were classified in accordance with the essential uses approach for products using benzene in South Korea. Results: The essential use concept is able to manage the restriction and authorization of substances of concern through essential uses and non-essential uses and the feasible substitution of uses and substances. Conclusions: If the concept and methodology of essential uses are clearly established, they can be expected to shift the national chemical management paradigm from regulating substances to limiting uses under the existing substance management system.

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.

A Bioethical Study of the Informed Consent for Organ Donor (장기공여를 위한 사전동의의 생의윤리학적 고찰)

  • Um, Young-Rhan;Han, Sung-Suk
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.4 no.2
    • /
    • pp.475-487
    • /
    • 1998
  • This is a study to search for the ethical basis for valid informed consent of organ donors. It is an admirable action that a person give his own body part or organ as a gift to another person. The organ for transplantation can be removed only when the donor consents voluntarily to donation. It is recently proposed as the need for organ transplantation is increased that organs can be harvested although the consent of deceased cannot be obtained. This may raise many moral issues because human beings all have an unalienable right to control their own bodies. The principle of autonomy is usually regarded as an ethical basis for informed consent. However, some people criticize that the principle of autonomy requires a person and his decision to be autonomous (but there are many patients who aren't autonomous due to their confusion or unconscious condition in a clinical situation). or this principle can foster indifference to patients needing help: thus respect for principles of care and beneficence is necessary. When we consider the complexity of making a decision about organ donation. the principle of autonomy should be replaced by the principle of respect for individual autonomy. as expressed by Childress (1990). This principle requires the care givers to respect the client's individual decisions. The elements of informed consent are threshold elements: competence to understand and decide. voluntariness in deciding: information elements: disclosure of material information. recommendation of a plan. understanding of disclosure and recommendation: and consent elements: decision in favor of a plan. authorization of the chosen plan. In cases of living donors. the elements of competence and voluntariness are more important than the others. So only an adult can give a recipient his own body part. but it should be forbidden to harvest from minors or protected adults (i.e. developmentally disabled person However. when organs are removed from a cadaver donor. we ought to respect the donor's decision. So we ought to try to seek donor cards or any documents expressing the donor's opinion about organ transplant. All health care givers ought to disclose donor information about organ transplantation clearly enough for the donor to understand it and to be able to weigh the harms and benefits. We are going to propose 'the subjective standard' as the ethical standard of disclosure. This standard will assure that patients have enough information to be able to decide autonomously from their own position. Care givers have to consider the method of disclosure because donors can be influenced by it positively or negatively, Establishment of the Hospital Committee is recommended. because medical professionals will have a chance to discuss the procedure of decision and the validity of harvesting a organ from a person.

  • PDF

A Study on the Method and System for Organization's Name Authorization of Korean Science and Technology Contents (국내 과학기술콘텐츠 전거데이터 구축을 위한 소속기관명 식별 방법과 시스템에 관한 연구)

  • Kim, Jinyoung;Lee, Seok-Hyong;Suh, Dongjun;Kim, Kwang-Young
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.555-563
    • /
    • 2016
  • Science and technology contents (research papers, patents, reports) are the most common reference material for researchers involved in research and development in the fields of science and technology. Based on various search elements (title, abstract, keyword, year of publication, name of journal, name of author, publisher, etc.), many services are available for users to search science and technology contents and bibliographic information owned by libraries. Authority data on organization name can be useful as an element for author identification and as an element to search for results produced by specific organizations. However, organization name is not taken into account by current search services for domestic academic information and bibliographic records. This study analyzes organization name data contained in the metadata of science and technology contents, which are the basis of the establishment of authority data, and proposes a method and system based on string containment and exact string matching.

A Study on Vulnerability Prevention Mechanism Due to Logout Problem Using OAuth (OAuth를 이용한 로그아웃 문제로 인한 취약점 방지 기법에 대한 연구)

  • Kim, Jinouk;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.5-14
    • /
    • 2017
  • Many web services which use OAuth Protocol offer users to log in using their personal profile information given by resource servers. This method reduces the inconvenience of the users to register for new membership. However, at the time a user finishes using OAuth client web service, even if he logs out of the client web service, the resource server remained in the login state may cause the problem of leaking personal information. In this paper, we propose a solution to mitigate the threat by providing an additional security behavior check: when a user requests to log out of the Web Client service, he or she can make decision whether or not to log out of the resource server via confirmation notification regarding the state of the resource server. By utilizing the proposed method, users who log in through the OAuth Protocol in the public PC environment like department stores, libraries, printing companies, etc. can prevent the leakage of personal information issues that may arise from forgetting to check the other OAuth related services. To verify our study, we implement a Client Web Service that uses OAuth 2.0 protocol and integrate it with our security behavior check. The result shows that with this additional function, users will have a better security when dealing with resource authorization in OAuth 2.0 implementation.

A Study on the Development of HMR Products of Korean Foods Using Conjoint Analysis (컨조인트 분석법을 이용한 한국 음식의 HMR 상품 개발에 관한 연구)

  • Choi, Won-Sik;Seo, Kyung-Hwa;Lee, Soo-Bum
    • Culinary science and hospitality research
    • /
    • v.18 no.1
    • /
    • pp.156-167
    • /
    • 2012
  • The purpose of this study is to examine the structural elements of HMR in Korea foods and explore the way HMR products using Korean foods can be developed at this time of increased interest. Through an investigation of its importance by attributes and their partial values, hypothetical HMR products using Korean foods were estimated. In order to develop the optimal HMR goods of Korean food, a preference survey was conducted after selecting 9 profiles using conjoint analysis with orthogonal design, and 4 holdout sets were generated and used for cross-validity authorization and reliability of the model. The results of this study showed that customers put cooking levels, menu price, and the location of purchase into importance when selecting HMR products of Korean foods. They preferred to eat the products after sufficiently heating them and buy the products sold online and through home shopping programs, with the price range of 10,000 won and over. It was concluded that more customers can be attracted if a variety of HMR products using Korean foods which can be prepared readily anywhere and at any time are developed.

  • PDF

A Mobility Management Scheme based on the Mobility Pattern of Mobile Networks (이동 네트워크의 이동 패턴에 기반을 둔 이동성 관리 기법)

  • Yang, Sun-Ok;Kim, Sung-Suk
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.345-354
    • /
    • 2008
  • Recently, small-scale mobile network which is composed of many mobile devices in a man becomes popular. Also, Examples of large-scale mobile network can be thought access networks deployed on public transportation such as ships, trains and buses. To provide seamless mobility for mobile nodes in this mobile network, binding update messages must be exchanged frequently. However, it incurs network overhead increasingly and decreases energy efficiency of mobile router. If we try to reduce the number of the messages to cope with the problem, it may happen the security -related problems conversely Thus, mobile router needs a effective algorithm to update location information with low cost and to cover security problems. In this paper, mobility management scheme based on mobile router's mobility pattern is proposed. Whenever each mobile router leaves a visiting network, it records related information as moving log. And then it periodically computes mean resident time for all visited network, and saves them in the profile. If each mobile router moves into the visited network hereafter, the number of binding update messages can be reduced since current resident time may be expected based on the profile. At this time, of course, security problems can happen. The problems, however, are solved using key credit, which just sends some keys once. Through extensive experiments, bandwidth usages are measured to compare binding update messages in proposed scheme with that in existing scheme. From the results, we can reduce about 65% of mobility-management-related messages especially when mobile router stays more than 50 minutes in a network. Namely, the proposed scheme improves network usage and energy usage of mobile router by decreasing the number of messages and authorization procedure.

The Design and Implementation of User Authorization Module based on Zigbee for Automotive Smart-key System (차량용 스마트키 시스템을 위한 지그비 기반의 사용자 인증 모듈 설계 및 구현)

  • Kim, Kyeong-Seob;Lee, Yun-Seob;Yun, Hyun-Min;Choi, Sang-Bang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2442-2450
    • /
    • 2010
  • Using sensor devices applied to various objects will be needed wireless network that it is easy to install in them. Tiny devices configured to processor that bas comparatively low computing ability are inappropriate to use devices that are wireless LAN, etc. In result, network devices needed to not only have simple communication protocol, but have Plug and Play function that it works as soon as it connects without installing any device driver. it also will industrially have both low power and low cost because of mobility of it. From IEEE 802.11 standard, WPAN(Wireless Personal Area Network) included in LAN is being developed by WPAN WG(Working Group) on area with low power consumption and low complexity. In addition to, it is standardizing MAC and PRY of the standard that is expected to wirelessly communicate within 10m. WPAN will be used generally in the more near future because of both low power and low cost of Zigbee. In this paper we designed zigbee based user authentication module for a automotive smart-key system.

Optimized Route Optimization mode of MIPv6 between Domains Based on AAA (관리상의 도메인간 이동시 AAA 기반의 핸드오버 성능향상 방안)

  • Ryu, Seong-Geun;Mun, Young-Song
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.9
    • /
    • pp.39-45
    • /
    • 2009
  • When Mobile IPv6 is deployed in commercial network, a mobile node needs AAA services for an authentication, authorization and accounting. AAA and Mobile IPv6 are protocols which are operated independently. Then schemes which merge these protocols have been emerged. These schemes can enable a mobile node to establish a security association between the mobile node and a home agent and to perform a binding update for the home agent using AAA authentication request. But these schemes introduce many signal messages and long handover latency during the handover, since Route Optimization mode for Mobile Ipv6 is performed using Return Routability procedure. To solve this problem, we propose a scheme for Route Optimization mode that the home agent performs the binding update for a correspondent node via the AAA infrastructure between the home agent and the correspondent node instead of Return Routability procedure. For performance evaluation, we analyze signal message transmission costs and handover latencies during handover. We show performance improvement of the proposed scheme which reduces handover latency as 61% compared with the existing scheme.