• Title/Summary/Keyword: data access authority

Search Result 101, Processing Time 0.021 seconds

Roles of Cancer Registries in Enhancing Oncology Drug Access in the Asia-Pacific Region

  • Soon, Swee-Sung;Lim, Hwee-Yong;Lopes, Gilberto;Ahn, Jeonghoon;Hu, Min;Ibrahim, Hishamshah Mohd;Jha, Anand;Ko, Bor-Sheng;Lee, Pak Wai;MacDonell, Diana;Sirachainan, Ekaphop;Wee, Hwee-Lin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.4
    • /
    • pp.2159-2165
    • /
    • 2013
  • Cancer registries help to establish and maintain cancer incidence reporting system, serve as a resource for investigation of cancer and its causes, and provide information for planning and evaluation of preventive and control programs. However, their wider role in directly enhancing oncology drug access has not been fully explored. We examined the value of cancer registries in oncology drug access in the Asia-Pacific region on three levels: (1) specific registry variable types; (2) macroscopic strategies on the national level; and (3) a regional cancer registry network. Using literature search and proceedings from an expert forum, this paper covers recent cancer registry developments in eight economies in the Asia-Pacific region - Australia, China, Hong Kong, Malaysia, Singapore, South Korea, Taiwan, and Thailand - and the ways they can contribute to oncology drug access. Specific registry variables relating to demographics, tumor characteristics, initial treatment plans, prognostic markers, risk factors, and mortality help to anticipate drug needs, identify high-priority research area and design access programs. On a national level, linking registry data with clinical, drug safety, financial, or drug utilization databases allows analyses of associations between utilization and outcomes. Concurrent efforts should also be channeled into developing and implementing data integrity and stewardship policies, and providing clear avenues to make data available. Less mature registry systems can employ modeling techniques and ad-hoc surveys while increasing coverage. Beyond local settings, a cancer registry network for the Asia-Pacific region would offer cross-learning and research opportunities that can exert leverage through the experiences and capabilities of a highly diverse region.

Pharmaceutical Data Exclusivity - Comparative Study and Future Direction in Korea (의약품 자료독점제도의 국가별 현황과 국내 제도의 발전방향)

  • Park, Syl-Vi-A
    • Journal of Pharmaceutical Investigation
    • /
    • v.39 no.4
    • /
    • pp.299-307
    • /
    • 2009
  • Data exclusivity is one of the most important intellectual property rights of pharmaceuticals. During data exclusivity period, third parties are prohibited from relying on the data which the original company has submitted to regulatory authority for drug application. I investigated data exclusivity systems for pharmaceuticals in the US, EU, Canada and Korea. New chemical entities were usually given the longest periods of data exclusivity compared to drugs with new indication or new formulation, although the protection periods varied by country. For new drugs to be entitled to a data exclusivity, strict conditions should be met. Data exclusivity has also been provided as an incentive to promote clinical investigation and drug development for pediatric population or orphan diseases. In Korea, data exclusivity was adopted in 1995 as an additive provision to "drug re-examination" which is to investigate post-marketing safety information of new drugs. It was introduced with few discussion on the purposes or effects of data exclusivity on pharmaceutical industry and pharmaceutical market in this country. I found that Korea's data exclusivity system falls short of considerations on valuing innovation of pharmaceutical research. It is necessary to improve data exclusivity system in order to promote innovative pharmaceutical development and to balance intellectual property rights protection and access to drugs in this country.

NACSIS, Bibliographic Control and Standardization (NACSIS, 서지 제어와 표준화)

  • Naito, Eisuke
    • Journal of the Korean Society for information Management
    • /
    • v.7 no.1
    • /
    • pp.24-39
    • /
    • 1990
  • Many factors play a role in designing the interface for bibliographic data entry system in response to the various needs. Among the major variables to be considered are planning, record format screen design, automatic generation of access points, error chocking, download from bibliographic databases, character codes, card catalog production, and use of authority data. This paper described with examples how these design considerations can be implemented in empirical system.

  • PDF

Study on Developing a Monitoring System for Safe Fire Testing (안전한 탄 발사시험을 위한 모니터링 시스템 개발에 관한 연구)

  • Ki Jae-sug
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2005.05a
    • /
    • pp.453-459
    • /
    • 2005
  • On this research, we show some concrete examples as software design, 2D/3D display, graph display, and gage display to develop a data monitoring system for real time safe fire testing. Developed software which is simulation software for live fire testing, has been designed to display informations about whole test status in a live fire testing, and with this, user can control a live fire testing under the safe environment. Beside, we increase a security by using a authority of user to access on this software. and we develop it based on module designed to apply a requirement of user later on.

  • PDF

Study on Developing a Monitoring System for Safe Fire Testing (안전한 탄 발사시험을 위한 모니터링 시스템 개발에 관한 연구)

  • Ki Jae Sug
    • Journal of the Korea Safety Management & Science
    • /
    • v.7 no.2
    • /
    • pp.65-72
    • /
    • 2005
  • On this research, we show some concrete examples as software design, 2D/3D display, graph display, and gage display to develop a data monitoring system for real time safe fire testing. Developed software which is simulation software for live fire testing, has been designed to display informations about whole test status in a live fire testing, and with this, user can control a live fire testing under the safe environment. Beside, we increase a security by using a authority of user to access on this software. and we develop it based on module designed to apply a requirement of user later on.

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

A Study on Ontology Architecture for FRSAD Model (온톨로지 구조로 표현된 FRSAD 모형에 관한 연구)

  • Lee, Hye-Won
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.1
    • /
    • pp.5-26
    • /
    • 2012
  • Mapping FRSAD and other ontology models intends to suggest a higher knowledge level that is independent of any information implementation system or specific context, and to endeavor to focus on the semantics, knowledge structures, subject access, and interoperability. Providing an application of FRSAD model to information environment and representing and sharing the information within the library sector and beyond, there needs encoding scheme for knowledge representation. This study suggested an OWL based ontology architecture for FRSAD model and demonstrated the pilot FRSAD ontology model using Prot$\acute{e}$g$\acute{e}$ software.

Design and Implementation of Secure DRM System for Contents Streaming (컨텐츠 스트리밍을 위한 안전한 DRM 시스템 설계 및 구현)

  • 이진흥;김태정;박지환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.177-186
    • /
    • 2003
  • DRM(Digital Rights Management) is a technology that manages secure distributions and copyrights of digital contents on the Internet. It is general giving the rights to use the encrypted contents that are downloaded by a simple authorization process in the existing DRM system. Once this is done you are allowed to access. In this paper, we use RTP(Real-time Transport Protocol) for end-to-end real-time data transmission. And the system is designed to make it Possible to Protect copyrights and to distribute contents with safety through periodic authentication. We implemented DRM system to stand this basis. The proposed system vests only authorized users with authority to access the license. Hence it prevents contents to be distributed and copied illegally on networks.

Efficient RBAC based on Block Chain for Entities in Smart Factory (스마트 팩토리 엔터티를 위한 블록체인 기반의 효율적인 역할기반 접근제어)

  • Lee, YongJoo;Lee, Sang-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.69-75
    • /
    • 2018
  • The key technology of Industry 4.0, Smart factory is evaluated as the driving force of our economic development hereafter and a lot of researches have been established. Various entities including devices, products and managers exist in smart factory, but roles of these entities may be continuous or variable and can become extinct not long after. Existing methods for access control are not suitable to adapt to the variable environment. If we don't consider certain security level, important industrial data can be the targets of attacks. We need a new access control method satisfying desired level of efficiency and security without excessive system loads. In this paper, we propose a new RBAC-PAC which extend AC defined for PKC to the authority attribute of roles. We distribute PACs for roles through block chain method to provide the efficient access control. We verified that RBAC-PAC is more efficient in the smart factory with large number of entities which need a frequent permission update.

Evaluation of Access Control Function of the Standard Records Management System (표준기록관리시스템 기능 평가 접근관리 기능을 중심으로)

  • Park, Min-Yung
    • The Korean Journal of Archival Studies
    • /
    • no.38
    • /
    • pp.3-35
    • /
    • 2013
  • The physical access or control of records with material entities is relatively easy. However, in the case of electronic records, due to its heightened applicative aspect that allows anyone with the authority to have access over the data, it requires an appropriate standard and stability to ensure the authenticity and integrity of electronic records. This study performed functional evaluation by extracting the minimum critical items from the national functional requirements documents and standards to explore the access control function that play an important role for the standard records management system to maintain quality requirements of electronic records. Based on this checklist, it evaluates whether the standard records management system properly carries out the access control function and investigates the current condition of application to practical records management work. Records managers generally do not use access control function, which may be because they do not feel the necessity, since the application of records management system is not yet actively promoted. In order for the standard records management system to be developed to become a more active system, it requires system improvement as well as considerations for below factors: First, although the necessity of establishing access control conditions is already recognized, it requires a clear stipulation of the regulation. Second, measures must be taken to implement access control in the records management system through document security solution. Third, it requires self-reflection of records manager, who utilizes the records management system. Instead of placing all responsibility on the National Archives, which established the system, professionals must further develop the system through continuous evaluation and improvement. Finally, a general discussion is required to publicize the issue of functional improvement of records management system. Although there is a bulletin board already created for this purpose, its users are extremely limited and it only deals with current problems. A space in online as well as in offline is required to solve the fundamental problems and exchange opinions.