• Title/Summary/Keyword: authorization

Search Result 508, Processing Time 0.022 seconds

Path Authorization Technique in Diameter Base Protocol

  • Yu Hui Jong;Kim Hyun Gon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.585-587
    • /
    • 2004
  • Diameter base protocol is intended to provide an AAA framework for applications such as IP mobility. Currently Diameter base protocol is standardized to RFC 3588, but there are some problems. One of them, path authorization is already argued at IETF WG Mailing List. According to RFC 3588, path authorization function causes inefficient data traffic and conflicts with RFC 3588 itself. In this paper, we analysis these problems about path authorization function and propose more improved solution.

  • PDF

On Development of New Mathematics Textbook and the Standard Textbook Authorization of the 7th Educational Curriculum (수학과 2종 교과서 개발 및 검정 기준에 관한 소고)

  • 황혜정
    • The Mathematical Education
    • /
    • v.39 no.1
    • /
    • pp.1-9
    • /
    • 2000
  • Now, mathematics textbook is being developed in accordance with the 7th educational curriculum. It is expected that qualified textbook reflecting 'differentiated education' concept be developed and published. But there are still many limitations of textbook authorization system to develop 'such' textbook. Many authors of textbook have difficulty in developing creative and qualified textbooks in their own way. In this paper, we deal with what the authors should keep in mind and could reflect related on textbook authorization system in developing textbook. For this purpose, focusing on new 'content principle' of mathematics textbook authorization, the paper presented its educational background.

  • PDF

Analysis of Access Authorization Conflict for Partial Information Hiding of RDF Web Document (RDF 웹 문서의 부분적인 정보 은닉과 관련한 접근 권한 충돌 문제의 분석)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.49-63
    • /
    • 2008
  • RDF is the base ontology model which is used in Semantic Web defined by W3C. OWL expands the RDF base model by providing various vocabularies for defining much more ontology relationships. Recently Jain and Farkas have suggested an RDF access control model based on RDF triple. Their research point is to introduce an authorization conflict problem by RDF inference which must be considered in RDF ontology data. Due to the problem, we cannot adopt XML access control model for RDF, although RDF is represented by XML. However, Jain and Farkas did not define the authorization propagation over the RDF upper/lower ontology concepts when an RDF authorization is specified. The reason why the authorization specification should be defined clearly is that finally, the authorizatin conflict is the problem between the authorization propagation in specifying an authorization and the authorization propagation in inferencing authorizations. In this article, first we define an RDF access authorization specification based on RDF triple in detail. Next, based on the definition, we analyze the authoriztion conflict problem by RDF inference in detail. Next, we briefly introduce a method which can quickly find an authorization conflict by using graph labeling techniques. This method is especially related with the subsumption relationship based inference. Finally, we present a comparison analysis with Jain and Farkas' study, and some experimental results showing the efficiency of the suggested conflict detection method.

Access Control of XML Documents using Predictable Flags (예측성 플래그를 이용한 XML 문서의 접근통제 기법)

  • Son, Tae-Yong;Lee, Jong-Hak
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.3
    • /
    • pp.321-332
    • /
    • 2014
  • In this paper we propose a new notion of predictable flags type of authorization for controlling access to XML documents. By using predictable flags, we are able to efficiently detect conflicts between existing authorizations and new authorizations to be added. XML documents have an element-composition hierarchical structure in that a higher level element consists of multiple lower level sub-elements. Many XML documents systems have used the notion of implicit authorization that grants authorizations to an element and the all descendants to avoid the overhead caused by explicitly storing all authorization for each element. When we grant an authorization on an element in the XML documents, the implicit authorization method is inefficient in determining the conflicts since it needs to examine all authorizations on the descendants of that element. In contrast, our mechanism using predictable flags has the advantage of detecting the conflicts immediately at the element where an explicit authorization is to be granted.

A Study on the Railway Safety Authorization for Assuring Safety of Light Rail Transit System (경전철시스템의 안전확보를 위한 안전승인(확인)제도 연구)

  • Lee, Ji-Woong;Shin, Jeong-Beom;Lee, Byung-Suk
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.2539-2547
    • /
    • 2011
  • This paper will introduce the safety authorization system for light rail transit(LRT) through investigating safety certification & safety authorization in foreign country and aviation field in Korea. The safety authorization system proposed by the government these day was also investigated. Korea Transportation Safety Authority(KOTSA) have conducted safety validation process on Busan-Gimhae LRT before its revenue service during three months since Jan. of 2011. We describe the overview of these validation activities, results and safety certification issued. Learning from this process, we propose the standardized safety validation process including checklists which can be applied to common unmanned light rail system. This study will be a basis of railway safety authorization for LRT and will be continually improve its application ability by the future study.

  • PDF

Current Situation of the International Recognition of Toxicologists -Update of the Japanese Society of Toxicology-

  • Horii, Ikuo
    • Toxicological Research
    • /
    • v.17
    • /
    • pp.193-196
    • /
    • 2001
  • Issuance of certification and licensing for toxicologists authorized by the Japanese Society of Thxicology (JST) became effective on July 24, 1997. The certification system consists of examination, eligibility requirements for the applicants, authorization/license by the board of trustees of JST, and the re-certification of previously authorized qualification. In the last 2-3 years, about 30-40% of candidates for the examination have succeeded. The Committee has estimated that the level of the examination would be sufficient to determine qualified toxicologists. This updated status and a detailed explanation are to be presented at the workshop. In global terms, the JST special committee agrees that "harmonization of certification/registration procedure for qualified toxicologists means to ensure/set the minimum requirement for the global authorization of qualified toxicologists". The following items in global authorization are ad-dressed for further discussion: (1) What's the benefit\ulcorner (2) Toxicological safety assessment standards, and (3) the JST position for authorization.orization.

  • PDF

A Study on Certification Procedures for Technical Standard Order Authorization of USA and Europe (미국과 유럽의 항공기 기술표준품 인증절차에 관한 고찰)

  • Lee, Kang-Yi;Park, Guen-Young;Chung, Ha-Girl;Ryoo, Chang-Kyung
    • Journal of Aerospace System Engineering
    • /
    • v.9 no.1
    • /
    • pp.19-27
    • /
    • 2015
  • The Technical Standard Order articles are the parts and appliances for which the civil aviation authority designates as it is necessary to standardize for the expedited certification process and aviation safety. TSO articles were used on the type certified aircraft as replacement parts in the early days of TSO authorization system, but those articles are widely used on the newly developed aircraft as well in these days. In this paper, we compared the differences of the TSO authorization systems between FAA and EASA, and proposed the rulemaking items to improve Korean TSO authorization system and to contribute to growth of aviation industry.

The Performance of the National Authorization System of Private Qualification (민간자격 국가공인제도의 효과)

  • Kim, Hyun-Soo;Kim, Sang-Ho;Park, Jong-Sung
    • Journal of Engineering Education Research
    • /
    • v.11 no.1
    • /
    • pp.15-23
    • /
    • 2008
  • This research was conducted to evaluate economic & non-economic performance of the National Authorization System of Private Qualification. After the Private Qualifications had the National Authorization, acquisitors have been helped related to the job-seeking compare to private certification's acquisitors, but promotion and wage of acquisitors were not about economic performance. Non-economic performance was lowed like satisfaction of job and improvement of special competence. However fear of current employment have been relieve throughout national authorization.

Implement of XML-Based Authorization Policy Module (XML 기반 권한 정책 모듈 구현)

  • Shin Myeong-Sook;Lee Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1762-1767
    • /
    • 2005
  • PKI provides good resolutions for the authentication of user in the situation not to meet each other, but it is not enough to provide the resolution of authorization in distributed computing environments. Especially, we offer a variety forms of the user Authentication, the Integrity and a security service of the Non-Repudiation, but an authorization Policy, because of the complexity with a lot of information, using m understandable XML, makes a simple and easy certificate to read, and we get the information from DOM fee and do a XML analysis and stardardized-method usage easily In this paper, we provide the AAS model being able to use with the solution of the distributed users' authorization, and we implement an authorization policy module, using XML. in the Linux-based Apache Web server.

Secure User Authority Authentication Method in the Open Authorization (Open Authorization에서의 안전한 사용자 권한 인증 방법에 관한 연구)

  • Chae, Cheol-Joo;Lee, June-Hwan;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.289-294
    • /
    • 2014
  • Recently, the various web service and applications are provided to the user. As to these service, because of providing the service to the authenticated user, the user undergoes the inconvenience of performing the authentication with the service especially every time. The OAuth(Open Authorization) protocol which acquires the access privilege in which 3rd Party application is limited on the web service in order to resolve this inconvenience appeared. This OAuth protocol provides the service which is convenient and flexible to the user but has the security vulnerability about the authorization acquisition. Therefore, we propose the method that analyze the security vulnerability which it can be generated in the OAuth 2.0 protocol and secure user authority authentication method.