• 제목/요약/키워드: information access

검색결과 10,262건 처리시간 0.034초

유비쿼터스 환경을 위한 CASA 기반의 동적 접근 제어 기법 (A CASA-Based Dynamic Access Control Scheme for Ubiquitous Environments)

  • 김경자;장태무
    • 한국컴퓨터정보학회논문지
    • /
    • 제13권4호
    • /
    • pp.205-211
    • /
    • 2008
  • 기존의 상황 인식 서비스 모델에서는 리소스에 대한 접근 권한을사용자의 인증으로만 리소스에 대한 접근을 허용하였으나, 사용자의 주변 상황 정보가 빈번하게 변화하는 유비쿼터스 환경에서는 상황 변화에 따른 리소스 접근제어가 제공될 필요가 있다. 본 논문에서는 사용자의 상황 정보가 변경되는 경우에 따라 리소스에 대한 접근 권한을 동적으로 제어하고자 한다. 접근 제어는 기존의 CASA(Context-Aware Security Architecture)를 기반으로 하지만 현재 서비스를 받고 있는 사용자라 할지라도 리소스 접근 권한을 제한할 수도 있다. 즉, 주위 환경 정보를 실시간으로 검사하여 주위 환경에 따라 동적으로 접근 권한을 달리 부여하여 기존의 상황 인식 서비스보다 리소스에 대한 강인한 보안 서비스를 제공한다.

  • PDF

특성화 사설 네트워크 정보보호를 위한 접근권한 추론모드에 관한 연구 (A Study on Access Authorization Inference Modes for Information Security of Specialized Private Networks)

  • 서우석
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.99-106
    • /
    • 2014
  • The most significant change and trend in the information security market in the year of 2014 is in relation to the issue and incidents of personal information security, which leads the area of information security to a new phase. With the year of 2011 as the turning point, the security technology advanced based on the policies and conditions that combine personal information and information security in the same category. Such technical changes in information security involve various types of information, rapidly changing security policies in response to emerging illegal techniques, and embracing consistent changes in the network configuration accordingly. This study presents the result of standardization and quantification of external access inference by utilizing the measurements to fathom the access authorization performance in advance for information security in specialized networks designed to carry out certain tasks for a group of clients in the easiest and most simple manner. The findings will provide the realistic data available with the access authorization inference modes to control illegal access to the edge of a client network.

In Whom Do Cancer Survivors Trust Online and Offline?

  • Shahrokni, Armin;Mahmoudzadeh, Sanam;Lu, Bryan Tran
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제15권15호
    • /
    • pp.6171-6176
    • /
    • 2014
  • Background: In order to design effective educational intervention for cancer survivors, it is necessary to identify most-trusted sources for health-related information and the amount of attention paid to each source. Objective: The objective of our study was to explore the sources of health information used by cancer survivors according to their access to the internet and levels of trust in and attention to those information sources. Materials and Methods: We analyzed sources of health information among cancer survivors using selected questions adapted from the 2012 Health Information National Trends Survey (HINTS). Results: Of 357 participants, 239 (67%) had internet access (online survivors) while 118 (33%) did not (offline survivors). Online survivors were younger (p<0.001), more educated (p<0.001), more non-Hispanic whites (p<0.001), had higher income (p<0.001), had more populated households (p<0.001) and better quality of life (p<0.001) compared to offline survivors. Prevalence of some disabilities was higher among offline survivors including serious difficulties with walking or climbing stairs (p<0.001), being blind or having severe visual impairment (p=0.001), problems with making decisions (p<0.001), doing errands alone (p=0.001) and dressing or bathing (p=0.001). After adjusting for socio-demographic status, cancer survivors who were non-Hispanic whites (OR= 3.49, p<0.01), younger (OR=4.10, p<0.01), more educated (OR= 2.29, p=0.02), with greater income (OR=4.43, p<0.01), and with very good to excellent quality of life (OR=2.60, p=0.01) had higher probability of having access to the internet, while those living in Midwest were less likely to have access (OR= 0.177, p<0.01). Doctors (95.5%) were the most and radio (27.8%) was the least trusted health related information source among all cancer survivors. Online survivors trusted internet much more compared to those without access (p<0.001) while offline cancer survivors trusted health-related information from religious groups and radio more than those with internet access (p<0.001 and p=0.008). Cancer survivors paid the most attention to health information on newsletters (63.8%) and internet (60.2%) and the least to radio (19.6%). More online survivors paid attention to internet than those without access (68.5% vs 39.1%, p<0.001) while more offline survivors paid attention to radio compared to those with access (26.8% vs 16.5%, p=0.03). Conclusions: Our findings emphasize the importance of improving the access and empowering the different sources of information. Considering that the internet and web technologies are continuing to develop, more attention should be paid to improve access to the internet, provide guidance and maintain the quality of accredited health information websites. Those without internet access should continue to receive health-related information via their most trusted sources.

Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme

  • Sadikin, Rifki;Park, Young Ho;Park, Kil Houm
    • 한국산업정보학회논문지
    • /
    • 제19권1호
    • /
    • pp.1-12
    • /
    • 2014
  • An access control system is needed to ensure only authorized users can access a sensitive resource. We propose a secure access control based on a fully secure and fine grained ciphertext-policy attribute-based encryption scheme. The access control for a sensitive resource is ensured by encrypting it with encryption algorithm from the CP-ABE scheme parameterized by an access control policy. Furthermore, the proposed access control supports non-monotone type access control policy. The ciphertext only can be recovered by users whose attributes satisfy the access control policy. We also implement and measure the performance of our proposed access control. The results of experiments show that our proposed secure access control is feasible.

The Impact of Facebook Access Motivation on Facebook Addiction among High School Students: The Mediator Role of Online Self-Disclosure

  • Lee, Eunhee
    • International Journal of Advanced Culture Technology
    • /
    • 제7권2호
    • /
    • pp.103-112
    • /
    • 2019
  • Online self-disclosure was hypothesized as a mediating variable, explaining the relationship between Facebook access motivation (relationship expansion, curiosity about others' life, maintenance of social connection, social pressure from others, habitual use, impression management, searching for information, and content sharing) and Facebook addiction. Data came from 407 high school students in the Busan, and Gyeongnam provinces. Structural analysis was used to specify the relations among measured construct. Facebook access motivation of curiosity about others' life, Facebook access motivation of maintenance of social connection, Facebook access motivation of social pressure from others, Facebook access motivation of habitual use, and Facebook access motivation of impression management were significant predictors of Facebook addiction. Online self-disclosure mediates between Facebook access motivation of curiosity about others' life, Facebook access motivation of social pressure from others, Facebook access motivation of searching for information & Facebook access motivation of content sharing and Facebook addiction. Viewing online self-disclosure as a mediator has important implications for social media addiction counseling practice.

기업환경을 위한 과업-역할기반 접근제어 모델 (Task-Role-Based Access Control Model For Enterprise Environment)

  • 오세종;박석
    • 정보보호학회논문지
    • /
    • 제11권1호
    • /
    • pp.55-63
    • /
    • 2001
  • 대형 기업들은 많은 수의 사용자와 정보객체들을 가지고 있으며 승인된 사용자만이 지정된 정보 객체를 접근할 수 있도록 접근을 제어하는 것이 중요한 과제로 대두되고 있다, 그러나 기존에 제시된 접근제어 모델들은 기업의 접근제어 요구사항을 충분히 만족시키지 못하고 있다. 본 논문은 기업환경에 적합한 접근제어 모델을 제안하는 것을 목표로 한다. 이를 위해 접근제어와 관련된 기업 환경의 특성에 대해 분석하였고 이를 바탕으로 과업-역할기반 접근제어(T-RBAC) 모델을 제안하였다. 이 모델은 과업 및 과업 분류에 기초하고 있으며, 과업이 속한 클래스의 특성에 따라 서로 다른 접근제어를 적용 할 수 있도록 하였다. 또한 권한관리를 용이하게 하기 위하여 감독-역할계층을 지원할 수 있도록 하였다.

통합 접근 제어를 위한 시뮬레이션 모델 설계 (Design of a Simulation Model for Integrated Access Control)

  • 이호
    • 한국컴퓨터정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.49-54
    • /
    • 2004
  • 규칙 기반 접근 제어가 신분 기반 접근 제어의 완전한 대체 방법이 아니듯이 직무 기반 접근 제어도 신분 기반 접근 제어와 규칙 기반 접근 제어의 병합이 아닌 상호 보완적인 방법이다. 본 논문에서는 기존의 접근 제어 메커니즘을 통합하여 보안성 무결성 및 흐름 제어 보안 기능을 제공하며 직무 중심 조직의 접근 제어 요구를 용이하게 수용할 수 있는 새로운 방식의 통합 접근 제어를 위한 시뮬레이션 모델을 설계하여 이를 실제의 응용 시스템에 적용할 수 있도록 한다.

  • PDF

Global Scenario of Open Access Publishing: A Decadal Analysis of Directory of Open Access Journals (DOAJ) 2003-2012

  • Pandita, Ramesh;Ramesha, B.
    • Journal of Information Science Theory and Practice
    • /
    • 제1권3호
    • /
    • pp.47-59
    • /
    • 2013
  • The present study aims to assess the growth of open access journals at a global level. The concept of Open Access (OA) publishing is being well received among academic circles and as a result we can see more and more scholarly content is being made these days available in open access format. The present study is simply an attempt to assess the trend and growth of open access journals during the last decade, viz. for the period 2003-2012, for which data has been retrieved from the Directory of Open Access Journals (DOAJ), which as of date hosts more than 9700 journals from 120 countries across the world covering major languages of the world. But keeping in view the period of our study the data has been retrieved as per our applicability, which as a result confines our study to 8453 journals only. The directory covers 18 main subject areas having 76 sub-disciplines, each having on average 118.53 journals. During the entire decade the number of countries which entered into OA publishing rose from 49 to 120 with a growth of 144%, and if this growth rate continues to be the same for the next five years, viz. by 2018, the world will turn into 100% open access. At the continental level Europe leads the tally by publishing a maximum of 3140 OA journals contributed by 43 countries across Europe, which again is the highest number from any continent.

A Role-driven Security and Access Control Model for Secured Business Process Management Systems

  • Won Jae-Kang;Kim Kwang-Hoon
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제14권3호
    • /
    • pp.1-8
    • /
    • 2005
  • This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net(ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domain's and the application domain's. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC(Role-based Access Control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations.

  • PDF

비윤리적 정보공유 딜레마와 사회적 네트워킹 관계에서 정보접근 모니터링의 영향력 (The Impact of Information Access Monitoring between Dilemma of Unethical Information Sharing and Social Networking)

  • 정병호
    • 디지털산업정보학회논문지
    • /
    • 제14권2호
    • /
    • pp.91-105
    • /
    • 2018
  • The purpose of this study is to examine an immoral effectiveness decrease by information access monitoring between ethical dilemma and unethical information-sharing behavior. Firms are raising the demand of confidential information management and are highlighting the ethical awareness of organizational members. The individuals in organization are concerned information sharing for future-oriented social networking. To prevent their immoral behavior, Firms should consider investing the information access monitoring. This system is aiming at log verification of movement, storage and deletion on information and will reduce an ethical conflict and unethical behavior on employees. I used the structural equation methodology for this empirical study. The research model constructs the voluntary and involuntary dilemma of information sharing on the two independent-variables, the unethical information behavior and the improper networking reinforcement on the two dependent-variables and the information access monitoring the one mediating-variables. This model tests the power effect of direct path, indirect path and total path. According to the study, the two ethical dilemma of information sharing provided a high influence to the unethical sharing action and to the inappropriate social networking strengthens. However, the mediating role of information access monitoring shows the effect weakens of independent and dependent variables. Thus, the mediating variables appeared to be important for the controlling role of an unethical behavior and improper social networking. Ultimately, The firms will need to invest the information access monitoring for a compulsory ethics behavior of organizational members. In addition, this can hinder networking enhancements for future opportunistic behaviors.