• Title/Summary/Keyword: authorization

Search Result 508, Processing Time 0.026 seconds

The Comparative Analysis of Middle School Informatics Textbooks Based on 2009 Revised Curriculum (2009 개정 교육과정에 근거한 중학교 정보 교과서의 비교 분석)

  • Kang, Oh Han
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.6
    • /
    • pp.1065-1073
    • /
    • 2016
  • In this paper, we examined informatics textbooks for middle school students in accordance with 2009 revised curriculum through conducting both content analysis and surveys. The content analysis was analyzed the composition and contents of textbooks. Survey questionnaires were based on the authorization criteria and selection standards of informatics textbooks. The content analysis demonstrated that there were discrepancies among textbooks in areas such as the total number of pages, related material, the number of core concepts introduced in each chapter, and the application of software. The survey results showed that two sections - 'Expression and Modification' and 'Text' exhibited the most positive results, and the 'Creativity' section the least. Using the findings above, we present alternative ways to improve qualities of these textbooks.

Implementation and Verification of Multi-level Convolutional Neural Network Algorithm for Identifying Unauthorized Image Files in the Military (국방분야 비인가 이미지 파일 탐지를 위한 다중 레벨 컨볼루션 신경망 알고리즘의 구현 및 검증)

  • Kim, Youngsoo
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.858-863
    • /
    • 2018
  • In this paper, we propose and implement a multi-level convolutional neural network (CNN) algorithm to identify the sexually explicit and lewdness of various image files, and verify its effectiveness by using unauthorized image files generated in the actual military. The proposed algorithm increases the accuracy by applying the convolutional artificial neural network step by step to minimize classification error between similar categories. Experimental data have categorized 20,005 images in the real field into 6 authorization categories and 11 non-authorization categories. Experimental results show that the overall detection rate is 99.51% for the image files. In particular, the excellence of the proposed algorithm is verified through reducing the identification error rate between similar categories by 64.87% compared with the general CNN algorithm.

A Study on the Design of the Security Gateway for Role-based Dynamic Security Rule-Set (역할 기반 변동 보안 룰셋 적용을 위한 네트워크 보안 게이트웨이 설계에 관한 연구)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.719-726
    • /
    • 2008
  • In this thesis investigate the security gateway that manage authorization for user access dynamically by recognizing automatically and comparison & distinction between database and User-information while a terminal unit(PC) trying to access to the network of subnet. Also, it present User-interfaced authorization allowance role model, so administrator can assign united access control between network level(L2) and application level(L7) in relation to system construction.

Method for network divided subscriber's facilities (망 분리 가입자 부가 서비스 제공 방법)

  • Yoon, Tae-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.1
    • /
    • pp.37-44
    • /
    • 2016
  • In this paper, to provide a method for providing a network separation subscriber's facilities. How to provide this subscriber's facilities include phase generating authorization key in server, saving activation file in portable data medium included server's authorization key, executing saved activation file in client's portable storage and providing virtual machine by result client's execute file. In case of moving work, the virtual subscriver's facility can provide for a business traveler.

ENTERPRISE WIDE CENTRALIZED APPLICATION LEVEL ACCESS CONTROL USING XACML

  • Shaikh, Riaz A.;Rajput, Saeed;Zaidi, S.M.H.;Sharif, Kashif
    • Proceedings of the CALSEC Conference
    • /
    • 2005.03a
    • /
    • pp.62-67
    • /
    • 2005
  • In traditional approach, enterprise-wide consistent security policy enforcement for applications is very difficult task. Therefore, industry is now moving towards new unified enterprise application security concept that consist of centralized authentication and authorization mechanism. The eXtensible Access Control Markup Language (XACML); an XML-based standard defined by OASIS, is most suitable choice which can support centralized, role based, context aware access control mechanism. It is designed to provide universal standard for writing authorization policies and access control request/response language for managing access to the resources. This paper includes a brief overview on XACML and discusses its benefits, limitations and a data flow process. We propose a new generic access control architecture that supports enterprise wide centralized application level access control mechanism using XACML. The other benefits which can be achieved through this architecture are, reduce adnministration cost and complexity, support of heterogeneous computing platforms, centralized monitoring system, automatic fail over, scalability and availability, open standard based solution and secure communication.

  • PDF

A study on the situation of publishing middle and high school mathematics textbooks in the period of the first curriculum (제1차 교육과정기의 중·고등학교 수학 교과서 발행 실태 연구)

  • Park, Kyo Sik
    • Journal for History of Mathematics
    • /
    • v.33 no.1
    • /
    • pp.55-71
    • /
    • 2020
  • In this study, the situation of publishing middle and high school mathematics textbooks used at the period of the first curriculum were investigated. In the period of the first curriculum, middle and high school textbooks were used from 1956, and middle school textbooks were used until 1965, and high school textbooks were used until 1967. First of all, the announcements of the ministry of education related to the textbook authorization were examined in the government official gazettes of 1956~1967. However, there were considerable typographical errors in these announcements of the ministry of education. So textbooks used at that period were examined, and typographical errors were corrected by cross-checking the bibliographic information.

A Study on the Effectiveness of International Commercial Arbitration Agreement in China (중국의 국제상사중재합의 효력에 관한 연구)

  • Ha, Hyun-Soo
    • Journal of Arbitration Studies
    • /
    • v.22 no.3
    • /
    • pp.25-46
    • /
    • 2012
  • China instituted arbitration law on September 1, 1995, after having legislated the law under the UNCITRAL Model Law. However, Chinese arbitration law has some problems related to the effectiveness of its arbitration agreement, unlike the UNCITRAL Model Law. Thus, parties in dispute who want to settle a dispute based on Chinese arbitration law as governing law have more to take into consideration because there could be serious problems related to the effectiveness of the arbitration agreement. Therefore, this paper attempted to analyze the classification of jurisdiction related to the authorization of effectiveness in arbitration agreement of arbitral organization and Chinese, verify the problems, and suggest the solutions. Moreover, the author tried to verify the problems in applying the law related to the authorization of effectiveness in Chinese arbitration agreements and suggest some improvements. This paper also suggests improvements and problems related to the selection of arbitral organizations among several conditions for effective arbitration agreement in Chinese arbitration law. Finally, the author suggests some cautions and countermeasures related to arbitrations agreement for domestic investors and traders dealing with the Chinese.

  • PDF

A Binding Mechanisms Using One-Time Attribute Certificates (일회성 속성인증서의 바인딩 메커니즘)

  • 박종화;이상하;김동규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.342-347
    • /
    • 2004
  • An ID certificate is digitally signed by a certificate authority for authentication and an attribute certificate is digitally signed by an attribute certificate authority for authorization. In many applications in web, there should be a mechanism to bind attributes to proper identities. The dependencies between them should be maintained. So we analyzed some known binding methods, selective revocation methods and cryptographic binding methods. And we proposed a binding mechanism using one-time attribute certificates in order to solve their problems.

Some Issues in Mathematics Textbooks under the 7th Curriculum (제7차 교육 과정과 교과서의 문제점)

  • 김흥기
    • The Mathematical Education
    • /
    • v.40 no.1
    • /
    • pp.139-159
    • /
    • 2001
  • There are many papers about the 7th curriculum. According to those papers, the 7th curriculum is a new one which makes considerable change in mathematics education. But there are some problems in the 7th curriculum. In this paper, we discuss those problems at first. That is, the 30% reduction of mathematics contents may not be true, and there are some problems about the terms, symbols, and consistency in mathematics contents. We also consider some problems in mathematics textbooks itself and the mathematics textbook authorization under the 7th curriculum. We suggest that (1) there must be valid process in passage of mathematics contents, (2) we must give emphasis on the process - particularly, the teaching of basic concept or principles - rather than the result, (3) we must have guarantee of the equity in the mathematics textbook authorization.

  • PDF

IAM Clustering Architecture for Inter-Cloud Environment (Inter-Cloud 환경을 위한 IAM 클러스터링 아키텍처)

  • Kim, Jinouk;Park, Jung Soo;Park, Minho;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.860-862
    • /
    • 2015
  • In this paper, we propose a new type of IAM clustering architecture for the efficiency of user authentication and authorization in the Inter-Cloud environment. clustering architecture allows users to easily use un-registered services with their registered authentication and access permissions through pre-Access Agreement. through this paper, we explain our authentication protocol and IAM clustering architecture components.