• Title/Summary/Keyword: contents access

Search Result 1,137, Processing Time 0.029 seconds

Contents Sharing Model in Distributed Collaboration Environment (분산 협업 환경에서의 콘텐츠 공유 모델)

  • Hur, Hye-Jung;Lee, Ju-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.5
    • /
    • pp.79-87
    • /
    • 2014
  • In this paper, we propose contents sharing model for consolidating distributed collaboration environments. We provide the combined model by integrating different features-scalable resolution display walls resource, sharing contents on local and remote, multi-user interaction, and access control. There is a benefit that every user can interact within an environment, but overlaps would occur because of multi-user interaction. To manage overlap issue, the model includes access control. Access control would interfere flow of work process. Therefore, we conduct user study to evaluate these two factors of the model. The result shows that the proposed contents sharing model makes it possible to concentrate in a work.

A Study on Policy Design of Secure XML Access Control (안전한 XML 접근 제어의 정책 설계에 관한 연구)

  • Jo, Sun-Moon;Joo, Hyung-Seok;Yoo, Weon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.11
    • /
    • pp.43-51
    • /
    • 2007
  • Access control techniques should be flexible enough to support all protection granularity levels. Since access control policies are very likely to be specified in relation to document types, it is necessary to properly manage a situation in which documents fail to be dealt with by the existing access control policies. The existing access control has not taken information structures and semantics into full account due to the fundamental limitations of HTML. In addition, access control for XML documents allows only read operations, and there exists the problem of slowing down system performance due to the complex authorization evaluation process. In order to resolve this problem, this paper designs a XML Access Control Management System which is capable of making fined-grained access control. And then, in developing an access control system, it describes the subject and object policies of authorization for XML document on which authorization levels should be specified and which access control should be performed.

A study on Spectrum Allocation for Very High Speed Wireless Access Network in 5GHz Band (5GHz대역 초고속 무선랜의 주파수분배에 관한 연구)

  • 허보진;이재욱;박덕규
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.474-479
    • /
    • 2003
  • We discussed the usage of a radio resource, the spectrum allocation and the trends of policy about 5㎓ band in other countries, We studied about the technical regulation on high speed wireless access system and the spectrum allocation of ISM bard in 5㎓ bard for other countries. We also analyzed the efficient use of radio resource, the method of frequency sharing and the calculation of spec01m requirement in noel to progress the high speed wireless access system In addition We proposed the schemes of domestic spectrum allocation for high speed wireless access system at 5㎓ band

  • PDF

Efficient Authorization Method for XML Document Security (XML 문서 보안을 위한 효율적인 권한부여 방법)

  • Jo, Sun-Moon;Chung, Kyung-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.113-120
    • /
    • 2009
  • XML can supply the standard data type in information exchange format on a lot of data generated in running database or applied programs for a company by using the advantage that it can describe meaningful information directly. Therefore, as it becomes more and more necessary to manage and protect massive XML data in an efficient way, the development of safe XML access control techniques needs a new method. In this study access authorization policies are defined to design access control systems. The findings demonstrated that algorithm suggested in this study improved system performance which was low due to the complex authorization evaluation process in the existing access control techniques. It is consequently proved that the safe XML access control policy presented in this study is in an improved form as compared with the existing access control methods.

Access Control of Digital Content Package by Using XML Encryption (XML 암호화를 이용한 디지털 콘텐츠 패키지의 접근 제어)

  • Cho, Kwang-Moon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.291-295
    • /
    • 2004
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Until now research on XML security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex however XML security comes to involve not only network security but also managerial security. But XML encryption support simple network security. So it cannot support multiple users and multiple access control policy. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can support multiple authorization of multiple users with integrating access control. And this can reduce the cost of the existing complicated access evaluation process of access control by using pre-processing.

  • PDF

Design of User Interface for Optiomal Web Access of the Visually Impaired (시각장애인의 최적화된 웹 접근성을 위한 사용자 인터페이스 설계)

  • Lee, Jun-Suk;Lee, Kwang-Ok;Kim, Kyoung-Soo;Bae, Sang-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.58-64
    • /
    • 2010
  • These days, the Internet networks have rapidly expanded and used in various fields and been recognized as essential in our daily life. However, there are users who have difficulties in access to web sites like those with physical disabilities. Therefore, our country as well as developed countries have paid more attention to web access, and organized investigation and research are needed. This study presents how to reduce the number of access for efficient web access by the visually disabled and designs user interface.

Improved Single Packet Authentication and Network Access Control Security Management in Software Defined Perimeter (소프트웨어 정의 경계의 단일 패킷 인증 및 네트워크 접근통제 보안관리 개선)

  • Jung, Jin-kyo;Lee, Sang-ku;Kim, Young-Min
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.407-415
    • /
    • 2019
  • As the IT environment changes with cloud computing and smart work, the existing perimeter security model is showing its limitations and Software Defined Perimeter is being discussed as an alternative. However, SDP Spec 1.0 does not specify the device registration procedure, policy distribution process and authentication key generation and sharing process.In this paper, we propose a method to solve the problem of SDP access control by improving the operation procedure of Single Packet Authentication. This paper suggests that the proposed method can implement a consistent and automated integrated access control policy compared to the existing access control methods.

A Cross Sectional Study on Elementary Students' Access to Computer Online Pornography (일개지역 초등학교 고학년들의 컴퓨터 음란물 접촉 실태에 관한 연구)

  • Kim, Chung-Nam;Woo, Hae-Ja
    • Research in Community and Public Health Nursing
    • /
    • v.12 no.1
    • /
    • pp.150-167
    • /
    • 2001
  • This cross sectional study was done to find out the situation of computer online pornography access by 4th to 6th grade elementary school students. The subjects of this study were three elementary schools in Andong, which were selected randomly and 120 students randomly selected from 4th to 6th grade for a total of 360 students. The questionnaire was composed with the help of a community health nursing professor and through the reference review. The collected data were analysed by a PC SPSS 10.0 according to school grade and sex, an 12-test was implemented to learn what percent of students have computers and software which prohibit the viewing of online pornography, access motivation and time, content viewed, attitude after accessing the contents, and opinions about computer online pornography. The results of this study were as follows. 1. A total of 86.1% of students had computers at home. Most students placed computers in their own room, 78.9% of students had computer online communication experience. Higher grade students tended to have more experience of communications on the internet (P<0.001). Most students chatted on the internet once or twice a week and higher grade students tended to communicate online more frequently. (P<0.001). Most students used computers more than one hour a day (P<0.05). They used computers according to the following priorities: game, studying, listening to music, communications, chatting. 2. Regarding the frequency of going computer online more than seven times per week, male students showed a higher frequency than female students (P<0.05). Male students used computers more than one hour a day and female students less than half an hour (P<0.001). Male students mostly used computers to play computer games. On the other hand. female students used the computer to study, listen to music, and chat (P<0.001). 3. Regarding software installation to prevent access of computer online pornography, a total of 19.4% of students responded they installed one. but 80.6% didn't have any, 20.3% of students had accessed pornography, 46.6% of students responded. they first get to know to the computer online pornography through friends. 4. The reasons for accessing computer online pornography were ranked as follows: curiosity, interest, to release stress, and sex drive (P<0.05). Obscene contents were found in computer games, pictures, and video. Among these, pictures were the most common. 5. Regarding students' attitude toward online pornography, most students responded that they took much pleasure in the contents (P<0.05). 6. Regarding the question 'Does online pornography degrade morals and cause a sex crime', most students responded as 'no'. They also responded positively to the suggestion that the contents would be effective in preventing sex crimes and to release stress. 74.7% of students responded that males' access of the contents as proper but females' access as immoral. Regarding social efforts to protect students from this harmful environment. most replied that those efforts were unnecessary (P<0.001).

  • PDF

A Model to Predict Popularity of Internet Posts on Internet Forum Sites (인터넷 토론 게시판의 게시물 인기도 예측 모델)

  • Lee, Yun-Jung;Jung, In-Jun;Woo, Gyun
    • The KIPS Transactions:PartD
    • /
    • v.19D no.1
    • /
    • pp.113-120
    • /
    • 2012
  • Today, Internet users can easily create and share the digital contents with others through various online content sharing services such as YouTube. So, many portal sites are flooded with lots of user created contents (UCC) in various media such as texts and videos. Estimating popularity of UCC is a crucial concern to both users and the site administrators. This paper proposes a method to predict the popularity of Internet articles, a kind of UCC, using the dynamics of the online contents themselves. To analyze the dynamics, we regarded the access counts of Internet posts as the popularity of them and analyzed the variation of the access counts. We derived a model to predict the popularity of a post represented by the time series of access counts, which is based on an exponential function. According to the experimental results, the difference between the actual access counts and the predicted ones is not more than 10 for 20,532 posts, which cover about 90.7% of the test set.