• Title/Summary/Keyword: authorization

Search Result 508, Processing Time 0.025 seconds

Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations

  • Bui, Quy-Anh;Lee, Wei-Bin;Lee, Jung-San;Wu, Hsiao-Ling;Liu, Jo-Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.437-454
    • /
    • 2020
  • According to the privacy regulations of the health insurance portability and accountability act (HIPAA), patients' control over electronic health data is one of the major concern issues. Currently, remote access authorization is considered as the best solution to guarantee the patients' control over their health data. In this paper, a new biometric-based key management scheme is proposed to facilitate remote access authorization anytime and anywhere. First, patients and doctors can use their biometric information to verify the authenticity of communication partners through real-time video communication technology. Second, a safety channel is provided in delivering their access authorization and secret data between patient and doctor. In the designed scheme, the user's public key is authenticated by the corresponding biometric information without the help of public key infrastructure (PKI). Therefore, our proposed scheme does not have the costs of certificate storage, certificate delivery, and certificate revocation. In addition, the implementation time of our proposed system can be significantly reduced.

A Anonymous Authorization Scheme Based on ECC for RFID Privacy (RFID 프라이버시를 위한 ECC기반의 익명인증기법)

  • Jin, Shi-Mei;Li, Yong-Zhen;Lee, Sang-Ho;Rhee, Chung-Sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.293-298
    • /
    • 2008
  • Recently, with the development of mobile techniques and the consideration to conveniency of using, the research on Mobile RFID Reader technique is getting more and more attentions. Until now, all security authentication algorithms of RFID are algorithms about range between Tag and Reader. The range between Reader and backend DB is composed by wired networks, so it's supposed to be secure range. But it must be taken account of the problem of information security and privacy in wireless range during the design of Mobile RFID Reader. In this paper we design an blind signature scheme based on weil-paring finite group's ECC encryption scheme, and by using this blind signature we propose the anonymous authorization scheme to Mobile RFID Reader's users.

Privacy Authorization for Internet Identity Management System (인터넷 Identity 관리 시스템을 위한 프라이버시 인가)

  • Roh Jong-Hyuk;Jin Seung-Hun;Lee Kyoon-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.648-659
    • /
    • 2005
  • One's identity on the Internet has been disclosed and abused without his consent. Personal information must be protected by appropriate security safeguard. An Individual should have the right to know whether his personal details have been collected and stored. This paper proposes various conceptual models for designing privacy enabling service architecture in the Internet identity management system. For the restriction of access to personal information, we introduce the owner's policy and the management policy The owner's policy should provide the user with enough information to manage easily and securely his data. To control precisely and effectively all personal information in the Identity provider, we propose the privacy management policy and the privacy authorization model.

Implementation of the Authorization Model for the Database Server of BADA-III system (바다-III 시스템의 데이타베이스 서버를 위한 권한부여 모델의 구현)

  • Kim, Young-Kyun;Cho, Ok-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.41-56
    • /
    • 1996
  • Database servers that are used to provide multimedia information services in World Wide Web(WWW) environment have to support the access control mechanism that allows authorized users to access the constructed databases. In this paper, we define an authorization model as well as authorization policies to enforce the proper access control on databases in the BADA-III object-oriented database server and propose an access evaluation algorithm. Also we implement this model and the algorithm in the BADA-III database server. Considering the service environment of the WWW, we expect that database service providers can simply and effectively protect their data using the proposed model.

The Efficient Education Program for the Activation of the ADR System (ADR제도 활성화를 위한 효율적인 교육프로그램에 관한 연구)

  • Lee, Kang-Bin
    • Journal of Arbitration Studies
    • /
    • v.18 no.1
    • /
    • pp.3-30
    • /
    • 2008
  • This paper is to research the current status of ADR in Korea, the qualifications of mediator (or conciliator) and arbitrator, the ADR education program of major foreign arbitration-related institutions and the efficient management device of ADR education program for the activation of the ADR system. In 2007, arbitration applications received at the Korean Commercial Arbitration Board numbered 320 and the amount involved those cases was US$ 216 millions. Mediation applications received at the KCAB numbered 552 and the amount involved those cases US$ 29millions. As of December 2007, the total numbers of arbitrators on the KCAB Panel of Arbitrators was 978. There are no provisions for the qualification of arbitrator in the UNCITRAL Model Law on International Commercial Arbitration and Arbitration Act of Korea. The KCAB has the consolidation regulation of the Panel of Arbitrator of which purpose is to regulate the criteria and procedure regarding the drawing up and maintenance of the panel of arbitrators. The UK Chartered Institute of Arbitrators has the criteria and qualifications for membership of which three grades are associate, member and fellow. The American Arbitration Association has the qualification criteria for admittance to the AAA National Roster of Arbitrators and Mediators. The Japan Association of Arbitrators has the official authorization regulation for membership of which three grades are special associate, ordinary associate and fellow. The UK Chartered Institute of Arbitrators has the ADR education programs which are composed of the mediation courses and arbitration courses. The American arbitrators Association has the ADR education programs which are composed of in-person training and online training. The Japan Association of Arbitrators has the ADR education programs which are composed of the cultivation courses of conciliator and the practical training courses of arbitrator. The efficient management devices of ADR education program are as follows: the execution of official authorization system of arbitrator, the establishment of specialized division for training and official authorization, the establishment of ADR regular training courses, the publication of ADR training texts and obtaining of instructors, and the consolidation of regulations related to the official authorization of arbitrator and ADR training. In conclusion, for the activation of ADR system, the KCAB and Korean Association of Arbitrators should make further effort to provide the ADR regular education and training programs for potential and practicing conciliators and arbitrators.

  • PDF

Hippocratic XML Databases: A Model and Access Control Mechanism (히포크라테스 XML 데이터베이스: 모델 및 액세스 통제 방법)

  • Lee Jae-Gil;Han Wook-Shin;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.684-698
    • /
    • 2004
  • The Hippocratic database model recently proposed by Agrawal et al. incorporates privacy protection capabilities into relational databases. Since the Hippocratic database is based on the relational database, it needs extensions to be adapted for XML databases. In this paper, we propose the Hippocratic XML database model, an extension of the Hippocratic database model for XML databases and present an efficient access control mechanism under this model. In contrast to relational data, XML data have tree-like hierarchies. Thus, in order to manage these hierarchies of XML data, we extend and formally define such concepts presented in the Hippocratic database model as privacy preferences, privacy policies, privacy authorizations, and usage purposes of data records. Next, we present a new mechanism, which we call the authorization index, that is used in the access control mechanism. This authorization index, which is Implemented using a multi-dimensional index, allows us to efficiently search authorizations implied by the authorization granted on the nearest ancestor using the nearest neighbor search technique. Using synthetic and real data, we have performed extensive experiments comparing query processing time with those of existing access control mechanisms. The results show that the proposed access control mechanism improves the wall clock time by up to 13.6 times over the top-down access control strategy and by up to 20.3 times over the bottom-up access control strategy The major contributions of our paper are 1) extending the Hippocratic database model into the Hippocratic XML database model and 2) proposing an efficient across control mechanism that uses the authorization index and nearest neighbor search technique under this model.

Enterprise Security Component Architecture

  • 이형기
    • Proceedings of the CALSEC Conference
    • /
    • 2002.01a
    • /
    • pp.454-457
    • /
    • 2002
  • ㆍ인증(Authentication) ㆍ허가(Authorization) ㆍ암호화(Encryption) ㆍ로그(Log) ㆍ채널(Channel)(중략)

  • PDF

Construction of Korean Korea CALS Standardization (한국적 CALS 표준화 구축방안)

  • 김철환;김규수;신영인
    • The Journal of Society for e-Business Studies
    • /
    • v.1 no.1
    • /
    • pp.117-140
    • /
    • 1996
  • CALS is recognized as a national response to the new chapter of information society. It is essential that the standardization in Korea should be constructed compatible with not only domestic but also international standardization trend. This study aims to propose a proper direction of CALS standardization in Korea, based on the international CALS standardization movement. This paper classifies standard into five types and provides a proper direction and guidance far each standard. As a trend of CALS standard, all ten data files are converted using SGML standard far the interchangeability of data among heterogenous systems. CAD and Graphic data arc also moving toward to the STEP as their standard. In this regard, this paper discusses how to implement SGML and STEP Model. Finally, this paper proposes a method how to construct an EDI system with CALS standard and how to establish a standard authorization institute which will be responsible far the standard authorization. Furthermore, this paper also proposes the CALS Test Network (CTN) as its experimental method.

  • PDF

A Study on Device Authentication Technology in AAA Mechanism of Mobile Environment (모바일 환경의 AAA 메커니즘에서 디바이스 인증 기술에 관한 연구)

  • Park, Jong-Hyuk
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.5
    • /
    • pp.444-450
    • /
    • 2008
  • With the advancement of the mobile device and arrival of the integrated wired/wireless environments, the damand for services accessible by mobile devices is rapidly increasing. However, unlike existing wired networks, communication in wireless networks has many weaknesses. Therefore, research and development into an appropriate security technology has reached a critical stage, as combined wired/wireless environments emerge. Therefor, in this paper, we propose that device authentication technology in AAA (Authentication, Authorization, Accounting) mechanism of Mobile environment for secure service offer.

  • PDF

Analysis for Individual-authorization of Functional Food Materials in Korea

  • Son, Chang-Gue
    • The Journal of Korean Medicine
    • /
    • v.36 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Objectives: This study aimed to provide basic information for the trend of individual-authorization on functional food materials in Korea to side of Korean medicine. Methods: Approval of materials for individual-authorized functional food in Korea was analyzed from 2004 to August 2015 using database from Ministry of Food and Drug Safety (MFDS), regarding the kinds of function, materials and their functional level by year. Results: Korean functional food market has rapidly grown to 1.56 trillion Won in 2014, with about 10% of annual growth rate. In particular, the increase of individual-authorized functional food is worth of notices, in detail 313 kinds of functional materials covering 31 body functions have been approved by August 2015. 15.7% of individual-authorized functional foods have used the herbal materials. This quantitative and qualitative expansion of functional foods, especially of individual-authorized functional foods, will affect the herbal drug industry negatively. Conclusion: This study figured out the current pattern of material approval for individual-authorized functional food in Korea, which would be essential in development of strategies by Korean medicine community in order to overcome such conditions.