• Title/Summary/Keyword: data management rights

Search Result 227, Processing Time 0.027 seconds

Information Asset Authentication Method for Preventing Data Leakage in Separated Network Environments (단독망 자료유출 방지를 위한 정보자산 인증 방안)

  • Ilhan Kim;Juseung Lee;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.3-11
    • /
    • 2024
  • Information security is crucial not only for protecting against external cyber-attacks but also for identifying and blocking internal data leakage risks in advance. To this end, many companies and institutions implement digital rights management(DRM) document security solutions, which encrypt files to prevent content access if leaked, and data loss prevention(DLP) solutions, which control devices such as USB ports on computing equipment to prevent data leaks. At a time when efforts to prevent internal data leaks are crucial, there is a growing need for control policies such as device control and the identification of information assets in standalone network environments, which could otherwise fall into unmanaged domains. In this study, we propose a Generation-Distribution-Application model for device control policies that are uniquely applied to standalone information assets that are not connected to internal networks. To achieve this, we developed an authentication technique linked with the asset management system, where information assets are automatically registered upon acquisition. This system allows for precise identification of information assets and enables flexible device control, and we have designed and implemented a system based on these principles.

A Study on Standardization of Copyright Collective Management for Digital Contents (디지털콘덴츠 집중관리를 위한 표준화에 관한 연구)

  • 조윤희;황도열
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.301-320
    • /
    • 2003
  • The rapidly increasing use of the Internet and advancement of the communication network, the explosive growth of digital contents from personal home pages to professional information service the emerging file exchange service and the development of hacking techniques . these are some of the trends contributing to the spread of illegal reproduction and distribution of digital contents, thus threatening the exclusive copyrights of the creative works that should be legally protected Accordingly, there is urgent need for a digital copyright management system designed to provide centralized management while playing the role of bridge between the copyright owners and users for smooth trading of the rights to digital contents, reliable billing, security measures, and monitoring of illegal use. Therefore, in this study, I examined the requirements of laws and systems for the introduction of the centralized management system to support smooth distribution of digital contents, and also researched on the current status of domestic and international centralized management system for copyrights. Furthermore, 1 tried to provide basic materials for the standardization of digital contents copyright management information through the examination of the essential elements of the centralized digital contents management such as the system for unique identification the standardization for data elements, and the digital rights management (DHM) .

Design and Implementation of Secure DRM System for Contents Streaming (컨텐츠 스트리밍을 위한 안전한 DRM 시스템 설계 및 구현)

  • 이진흥;김태정;박지환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.177-186
    • /
    • 2003
  • DRM(Digital Rights Management) is a technology that manages secure distributions and copyrights of digital contents on the Internet. It is general giving the rights to use the encrypted contents that are downloaded by a simple authorization process in the existing DRM system. Once this is done you are allowed to access. In this paper, we use RTP(Real-time Transport Protocol) for end-to-end real-time data transmission. And the system is designed to make it Possible to Protect copyrights and to distribute contents with safety through periodic authentication. We implemented DRM system to stand this basis. The proposed system vests only authorized users with authority to access the license. Hence it prevents contents to be distributed and copied illegally on networks.

Development of effective management strategy for geographical database based on the concept of intellectual property rights (지리정보DB의 효율적 유통관리 방안 연구 - 지적재산권 설정을 중심으로 -)

  • 양광식;이종열;이영대
    • Spatial Information Research
    • /
    • v.11 no.1
    • /
    • pp.73-88
    • /
    • 2003
  • Geographical data sets are expensive to create and are very easy to copy because the intellectual property rights for the distribution should be protected. The main object of copyright law is to encourage expression of ideas in tangible form and it extend only to original works, it is limited to control the balance of interests between data producers and user. Because the development of a useful legal framework for both private and public activity in this field is an important issue. This paper presents an intial attempt at such a the effective management strategy intended to support continuing research into the legal protection of geographical information.

  • PDF

IECS: an Integrated E-Community System for Management, Decision and Service

  • Bo, Yu;Wang, Hongding;Peng, Zhang;Tong, Yunhai;Tang, Shiwei;Yang, Dongqing
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.375-387
    • /
    • 2004
  • The paper presents an Integrated E-Community System (IECS) for management, decision and service, designed for the e-government project of Haishu District of Ningbo, Zhejiang, China. The project need is to promote the integration of management information and service information of communities, providing a unified platform on which different departments of the district government can share and exchange community information, government officers can analyze information and make decisions, and the outside users can access and request services. To meet the project need, the IECS consists of five parts: 1) The Central DataBase (CDB) that stores all information related with management, decision and service of communities: 2) Information Extracting Subsystem (IES) that provides functions of extracting data from data sources, transforming and loading them into the CDB for system administrators; 3) Information Management Subsystem (IMS) that provides functions of querying and sharing of information for government users, and functions of information maintenance, rights and log management for system administrators: 4) Intelligent Analysis Subsystem (IAS) that provides functions of extracting analysis related data from the CDB and loading them into the DW, and functions of multi-dimensional analysis and decision-making based on the DW and OLAP for government users; 5) Information Service Website (ISW) that provides functions of promulgating and collecting of information for government users and system administrators, and functions of browsing, querying and requesting of service information for outside users. The IECS supports management, decision and service of a government based on a unified data platform--the CDB, and ensures data security by providing different workplaces and rights for different users. In the real application, the system works well.

  • PDF

The Study of Models for Multimeia Digital rights Managements in Home Network (홈네트워크 환경에서의 멀티미디어 디지털 컨텐트 권한 관리 모델에 관한 연구)

  • Jung, Jong-Jin;Kim, Yun-Sang;Lim, Tae-Bum;Lee, Suk-Pil
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.518-520
    • /
    • 2006
  • Due to the rapid popularization of mobile multimedia devices and the Internet as well as the realization of high-speed data transmission and large-volume data recording media, high quality content distribution and ubiquitous information services are making progress and a new type of information distribution and network sharing service has gradually emerged into the market. It is capable of utilizing terabyte sized home servers also in private homes. Under these circumstances, in distribution of content over shared networks, it is crucial to establish DRM (Digital Rights Management) technologies to protect the content from illegal copying and usage. A truly successful DRM system must be built on open worldwide specifications and provide maximum interoperability and user acceptance. An open interoperability of DRM is able to construct highly expandable PKI based DRM, targeting usage between systems, considering the expansion of recent content distribution services and clients This document gives protocol specifications for the exchange of rights information between the DRM module, description of specifications for rights information and encrypted content formats.

  • PDF

An Efficient Comparing and Updating Method of Rights Management Information for Integrated Public Domain Image Search Engine

  • Kim, Il-Hwan;Hong, Deok-Gi;Kim, Jae-Keun;Kim, Young-Mo;Kim, Seok-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.57-65
    • /
    • 2019
  • In this paper, we propose a Rights Management Information(RMI) expression systems for individual sites are integrated and the performance evaluation is performed to find out an efficient comparing and updating method of RMI through various image feature point search techniques. In addition, we proposed a weighted scoring model for both public domain sites and posts in order to use the most latest RMI based on reliable data. To solve problem that most public domain sites are exposed to copyright infringement by providing inconsistent RMI(Rights Management Information) expression system and non-up-to-date RMI information. The weighted scoring model proposed in this paper makes it possible to use the latest RMI for duplicated images that have been verified through the performance evaluation experiments of SIFT and CNN techniques and to improve the accuracy when applied to search engines. In addition, there is an advantage in providing users with accurate original public domain images and their RMI from the search engine even when some modified public domain images are searched by users.

Research on SecureOS Module Based on File System for Data Protection (데이터 보호를 위한 파일시스템 기반의 SecureOS Module에 관한 연구)

  • Yonggu JANG;Inchul KIM;Jisong RYU
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.26 no.4
    • /
    • pp.67-79
    • /
    • 2023
  • Service environments through laptops, smart devices, and various IoT devices are developing very rapidly. Recent security measures in these Internet environments mainly consist of network application level solutions such as firewall(Intrusion Prevention Systems) and IDS (intrusion detection system). In addition, various security data have recently been used on-site, and issues regarding the management and destruction of such security data have been raised. Products such as DRM(Digital Rights Management) and DLP(Data Loss Prevention) are being used to manage these security data. However despite these security measures, data security measures taken out to be used in the field are operated to the extent that the data is encrypted, delivered, and stored in many environments, and measures for encryption key management or data destruction are insufficient. Based on these issues we aim to propose a SecureOS Module, an OS-based security module. With this module users can manage and operate security data through a consistent interface, addressing the problems mentioned above.

Developing Standards for Measuring Consumers' Ability of College Student: Focus on the Consumer Education Effects (대학생 소비자능력 측정을 위한 척도개발: 소비자교육효과 측정을 중심으로)

  • Seo, In-Joo
    • Journal of Family Resource Management and Policy Review
    • /
    • v.13 no.4
    • /
    • pp.115-139
    • /
    • 2009
  • This study focused on the development of a scale measuring the effect of consumer education. The purposes of this study were to develop a tool which could measure consumer knowledge, consumer attitudes and consumer behavior. Data were collected from 266 college students. Analysis was done using frequency, cross tabulation analysis, reliability test, principle components factor analysis, confirmatory factor analysis (Amos 5.0), and multiple regression analysis. The results from this study were as follows: 1) Nine consumer knowledge factors (23-items) were identified: consciousness of consumer education and evaluation, consumer rights and allowance management, methods of consumer education and consumer institutions, green energy and environmental consumption, essence and content of consumer education, consumer rights and consumer duty, critical consideration and consumer's damage salvation, buying minds and decision-making, independent consumers. Total variance was 58.4%. Cronbach's alpha for the nine factors ranged from .68-.79. 2) Five consumer attitude factors (26-items) were identified: green environmental consumption, consumer's role and rights, resources saving and consumer's damage salvation, consciousness of consumers, and right consumption. Total variance was 59.2%. Cronbach's alpha for the five factors ranged from .89-.94. 3) Seven consumer behavior factors (27-items) were identified: social role and rights of consumer and consumer movement, right buying and segregated garbage collection, green environmental consumption and resources saving, altruism and decision-making, allowance management and impulse buying, consumer's damage salvation, and consciousness of consumer. The total variance was 59.1%. Cronbach's alpha for the seven factors ranged from .77-.88. Finally, a scale measuring the effect of consumer education consisting of 76 items (consumer knowledge: 23 items (9 factors), consumer attitude: 26 items (5 factors), consumer behavior: 27 items (7 factors)) was constructed.

  • PDF

A Study of Mental Health Care Workers' Recognition and Guarantee for Psychiatric Patients' Rights (정신보건시설 종사자의 정신질환자에 대한 권리인식과 보장)

  • Jung, Chun Hwa;Ko, Sung Hee;Kim, Jiyoung
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.455-462
    • /
    • 2013
  • This study was to examine the recognition and guarantee for psychiatric patients' rights of mental health care workers. The participants of this study were 231 mental health care workers from 10 mental health care institutions located in J city, Korea. Data was collected using questionnaires consisting of one instrument measuring participants' recognition and guarantee for psychiatric patients' rights, and participants' characteristics. Collected data were analyzed using descriptive analysis, t-test, one-way ANOVA with SPSS 12.0. The results of this study showed the mental healthcare workers' recognition and guarantee were significantly different in every subscales. Besides, the difference between recognition and guarantee toward psychiatric patients' rights was significantly associated with participants' occupations. Based on the findings, guiding where nursing education efforts should be focused to help putting in place the psychiatric patients' rights.