• Title/Summary/Keyword: contents access

Search Result 1,135, Processing Time 0.032 seconds

Access Control Method and Key Management Method for H.264/SVC (H.264/SVC에 대한 접근 제어 방법 및 키 관리 방법)

  • Cho, Tae-Nam;Yong, Seung-Lim
    • The KIPS Transactions:PartC
    • /
    • v.17C no.5
    • /
    • pp.415-426
    • /
    • 2010
  • CAS is an access control system by which only legal users can access contents. IPTV is a spotlighted system that uses CAS. H.264/SVC is a coding standard that provides a scalable coding method by which users who are in various network environments and have various devices can receive the contents. In this method, the contents are coded in a layered structure to make users choose the quality of the receiving contents. Therefore, contents provider should be able to control users to access only appropriate contents according to their subscriptions. The structure of CAS being employed in many applications is not suitable to control access for H.264/SVC. In this paper, we provide an efficient access control method and a key management method for H.264/SVC contents using CAS.

Internet Access Charging under High Quality Contents Delivery (고품질 콘텐츠 제공환경하에서 인터넷 접속료 책정방안)

  • Jung, Choong-Young
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.11
    • /
    • pp.588-599
    • /
    • 2017
  • This paper analyzes internet access model between ISP, CP and end users where CP uses various technologies to provide direct access to ISP owning subscribers to consume its own contents in low cost and high quality. The level of access charge depends on the competitiveness of CP market. When CP market is perfect competitive, the level of access charge is identical to that of social optimum while when CP market is monopoly, the level of access charge is influenced by the sensitivity of the contents price to access charge for CP. The dead weight loss due to monopoly market in CP can be removed by the regulation of access charge. Socially optimal access charge in monopoly market of CP is lower than that in competitive market. This is because the regulator wants to set access price to lower level to reduce welfare loss from monopoly in CP market where CP determines the price to over marginal cost.

Relationship between Access to Lewd Internet Contents by Middle School Students and Their Awareness of Sex (중학생의 인터넷음란물 접속과 성 의식의 관계)

  • Lim, Jong-In;Choi, In-Sook
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.4
    • /
    • pp.117-139
    • /
    • 2003
  • The purpose of this research lies in presenting logical viability for the measures that curtail access to lewd Internet contents by middle school students amidst the reality in which lewd contents are circulated freely through the Internet, a medium that the middle school students find most easy to access. In order to establish right form of awareness towards sex, this research identified the ways they access the lewd Internet contents, their reaction after the exposure to those contents, their knowledge of sex, their concerns regarding sex and their accessibility to sexual activities in order to conduct a comparative analysis on the relationship between lewd Internet contents and their awareness of sex. First, realities of accessing lewd Internet contents and reactions according to the demographics of middle school students There isa significant difference in the experience of accessing lewd Internet contents in terms of gender. Mostly, male students tend to access the contents more. As for the way they access the lewd Internet contents, both male and female students replied that they access through spam mail of lewd nature. Thus, measures to address this problem are needed urgently. As to when they first accessed the lewd contents, most of the research subjects replied that they accessed either in elementary school period or in the early middle school period. This shows that most of the students got exposed to lewd contents even before they could establish positive, correct awareness of sex. Thus, there is a risk that they may formulate wrong kind of sexual awareness. Accordingly, it is necessary to develop measures through focused sex education. Students are divided into two groups according to the time they spend on the contents averagely: those who spend over one hour and those who spend less than an hour on the lewd contents. If the students spending longer hours are not to be checked and properly guided, it may lead to increasing cases of sexual delinquencies due to their wrongly formed awareness of sex. When the question of existence(non-existence) of guardian was addressed, students with both parents tend to access the lewd Internet contents in a more diverse manner and tend to access more compared to those students from single parent or no-parent families. Accordingly, guardians need to pay attention to how their children are using the Internet. Second, awareness of sex depending on the middle school students' demographics In case of sexual knowledge, middle school students shows relatively high level of knowledge. In particular, female students are found more knowledgeable than male students, and the students in upper years are more knowledgeable as well. As a result, this research recommends that the students in lower years should be guided with more basc and detailed information, while those in upper years need to be taught to form and express their own thoughts and attitudes and to build up independence on this matter. In case of worries about sex, both male and female students don't worry too much about it. However, male students are more concerned about sex than female students in a more diverse ways. As for the differences by academic year, concerns for sex increase, as students get older. Accordingly, sex education that helps establish sound perception of the opposite sex and that focuses on the etiquettes that one must adhere to at the presence of the opposite sex need to be conducted against middle school students. In case of accessibility to sex, male students manifest higher tendency than female students. As for the differences by academic year, those in the first and second years show higher accessibility than those in their third year. In general, younger students tend to be more open-minded toward sex. Accordingly, students in lower academic years need to undergo basic knowledge oriented sex education, whereas those in upper academic years need to undergo discussion centered sex education where they subject to questions regarding their attitude and opinion. Third, relationship between the reactions after the exposure to the lewd Internet contents and their awareness of sex As the frequency of contact with lewd Internet contents increases, awareness of sex increases as well. Thus, the lewd Internet contents contribute to the increase in students' concern for sex as well as increase in accessibility to sex, which eventually become barriers to students' establishment of a healthy perception of sex. Reactions to sex after the exposure to lewd Internet contents and awareness of sex indicate a significant correlation. However, negative correlation is manifested with knowledge of sex. Thus, it is possible to know that the greater access to lewd Internet contents does not necessarily translate into increase in knowledge of sex. However, the study showed there is a correlation between concerns for sex and the level of accessibility to sex. In more detail, the more reactions to the contents they show, the more concerns for sex they have and the more positively they take acceptability to sex. Moreover, it is necessary to develop necessary measures since textbooks today do not include measures needed to address the lewd Internet contents. Given the above findings, it is necessary to continue to complement structural measures in order to prevent easy access of lewd Internet contents by middle school students. Moreover, it is necessary to be considerate of the students so that they themselves can form a healthy Internet culture and grow up within positive framework for the sex education.

  • PDF

An Exploratory Study on the Educational Enviroment for the Application of Virtual Reality Contents to the Curriculum -Focusing on Improving the Quality of Education (가상현실 콘텐츠의 교육 과정 운영을 위한 중학교 교육 환경에 대한 연구 - 교육 품질의 질적 제고를 중심으로)

  • Kim, Ki-yoon
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.3
    • /
    • pp.405-420
    • /
    • 2021
  • Purpose: This study started with the question of how to use Virtual Reality (VR) contents as a part of the non-face-to-face education tool that has recently attracted attention. Methods: In this paper, the use of VR contents as an educational tool is explained as a process of 'new media access dimension'. The question was explored on why Virtual Reality (or Augmented Reality) contents are not used as educational tools in the educational field. Results: As a result, the lack of 'material access' such as devices and infrastructure affects 'motivational access' approach stage, which is the previous stage. Again, it has a negative effect on literacy, which is 'skill access' approach stage. As it was found that it was not circulating to the level of "motive-material-skill-usage", it was discussed that it was taking a different step from the past adoption process of ICT and smart media. Conclusion: Based on this, it is believed that immersive content will contribute to arousing interest that can be applied and spread in the educational field, and it is also thought that it will be possible to derive academic interest in the educational effect according to the characteristics of immersive content such as VR.

Design and Implementation of Access Structure-based Contents Management System (CMS(Contents Management System)의 Access Structure에 관한 설계 및 구현)

  • 문남미;유소연
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05c
    • /
    • pp.133-137
    • /
    • 2002
  • 대량의 컨텐츠에 대한 정보 관리 및 잦은 사이트 변화에 따른 퍼블리케이션의 용이성으로 CMS(Contents Management System)의 도입이 많이 이루어지고 있다. 본 논문에서는 CMS의 백앤드와 프론트 엔드를 연결하는 Access Structure 에 관해 고찰해보고, 이를 통해 시스템의 컨텐츠 검색을 효율적으로 지원할 수 있는 방안과 카테고리 수의 무분별한 증가를 막고자 하며, 퍼블리케이션에서의 확장된 아키텍쳐를 지원하기 위한 모델을 제안하고자 한다.

  • PDF

A Design and Implementation of DRM System by Applying System Authentication Method (시스템 인증기법을 적용한 DRM 시스템 설계 및 구현)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.177-184
    • /
    • 2009
  • The digital contents distribution system via network provides comfortability, usability, and diversified functions to content's users. However, for the characteristic of easy access of digital contents, the copyright infringements and indiscreet contents distribution are realized in this days. In other words, any users with the authentication key can access to copyright contents with any restrictions. To solve this problems, we proposed a user authentication mechanism which prevent indiscreet access to the digital content by using user system information. Also, to provide safe distribution of digital content, we used user's unique content authentication key.

A Study on Security Architecture for Digital Content Dissemination (디지탈 컨텐츠 배포를 위한 보안 체계에 관한 연구)

  • 김대엽;주학수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.147-155
    • /
    • 2003
  • The diffusion of internet infrastructure and a fast increase of Population to use it is becoming a base of the service that can use various information, data and digital contents which were provided through off-line physically and used. Recently, the. techniques for copy deterrence and copyright protection have been important in e-commerce because various contents in digital form can be duplicated easily. The Access Control(AC) technique that only a user having the qualifications can access and use contents normally has been studied. The Conditional Access System(CAS) used in a satellite broadcasting md Digital Right Management System(DRMS) used for contents service are representative models of current commercialized access control. The CAS and DRM can be considered as an access control technique based on the payment based type(PBT). This paper describe the access control method of payment free type(PFT) suggested in [5] which are independent on the payment structure. And then we suggest a new access control method of payment free type which is more efficient than the previous one.

RCBAC(Relationship-Content based Access Control) Model for User Privacy Protection of Digital Contents in Web 2.0 Environment (웹 2.0 환경에서 사용되는 디지털 컨텐츠의 사용자 프라이버시 보호를 위한 RCBAC 모델)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha;Kim, Jeong-Dong;Kang, Dong-Su;Baik, Doo-Kwon
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.697-705
    • /
    • 2008
  • The recent web technology has been developed by three mainsprings which include integration, virtualization, and socialization. The web technology provides the increment of the social networking ability. However it deepens the exposure of privacy about personal information as more complicating and difficult problems. Representatively, it is impossible to define and manage the specific relation, so the personal information and interest can be inferred from collecting and summarizing the contents. Also, there are some problems that it is hard to construct the information owner's own social network. Thus this paper proposes the RCBAC(Relationship-Content based Access Control) Model which applies both the concepts of Relationship and Content Semantic to the existing access control methods to protect the user's own digital contents in web 2.0 environment. This method prevents privacy such as personal inclination from being exposed and enables to define and manage the specific relation. By doing this the information owners can construct their social network. This social network can be applied and extended to web contents.

  • PDF

Optimal TCP Segment Size for Mobile Contents Server Access over Wireless Links of Cellular Networks (이동통신망에서의 모바일 컨텐츠 서버 통신을 위한 최적의 TCP 세그먼트 길이)

  • Lee, Goo-Yeon;Jeong, Choong-Kyo;Kim, Hwa-Jong;Lee, Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.12 s.354
    • /
    • pp.31-41
    • /
    • 2006
  • Internet access from mobile phones over cellular networks suffer from severe bandwidth limitations and high bit error rates over wireless access links. Tailoring TCP connections to best fit the characteristics of this bottleneck link is thus very important for overall performance improvement. In this work, we propose a simple algorithm in deciding the optimal TCP segment size to maximize the utilization of the bottleneck wireless TCP connection for mobile contents server access, taking the dynamic TCP window variation into account. The proposed algorithm can be used when the product of the access rate and the propagation time is not large. With some numerical examples, it is shown that the optimal TCP segment size becomes a constant value when the TCP window size exceeds a threshold. One can set the maximum segment size of a wireless TCP connection to this optimal segment size for mobile contents server access for maximum efficiency on the expensive wireless link.

Design of Access Control Model for Secure EDI Service (안전한 EDI 서비스를 위한 접근제어 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Journal of Digital Contents Society
    • /
    • v.1 no.1
    • /
    • pp.23-37
    • /
    • 2000
  • EDI is basically the concept of computer-to-computer exchange of messages relating to various types of activities or business areas, such as banking, trade, medicine, publishing, etc. Therefore, security, reliability and special functionality will be implicit requirements of EDI systems. We will design access control model to content security of these requirements. Access controls in information systems are responsible for ensuring that all direct access to the entities occur exclusively according to the access modes and rules fixed by security policies. On this paper, security policies for access control model are presented from the viewpoints of identity-based, rule-based, role-based policy. We give a design of access control model for secure EDI service based on the derived access control rules and operations to enforce the defined security policies. The proposed access control model provides integrity, confidentiality and a flow control of EDI messages.

  • PDF