• Title/Summary/Keyword: permission

Search Result 733, Processing Time 0.031 seconds

Study on Applicability of Slope Types to Permission Standard for Forestland Use Conversion (산지의 사면유형을 고려한 산지전용허가기준에 관한 연구)

  • CHOI, Jung-Sun;KWAK, Doo-Ahn;KWON, Soon-Duck;BAEK, Seung-A
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.4
    • /
    • pp.145-157
    • /
    • 2018
  • Mountainous areas are 64% in Korea and are allowed to be used by the permission standards of the "Mountainous Districts Management Act". In the act, slope and elevation criteria are defined to regulate the use of vulnerable land parcels to disaster. However, the standards cannot represent topographical variation in a land parcel such as terrain relief. Therefore, the applicability of slope type standard as a permission standard was tested using Catena in this study. Based on the theoretical grounds, two slope types were analyzed as 'risky slope' with disaster risk. The slope types of landslides in Namwon City were analyzed that 'risky slope' types were distributed about 57%. This study analyzed the forestland parcels that could be used when applying the current permission standards and the parcels that were already used in Namwon City. The ratio of the 'risky slope' in the parcels was more than 50%. Therefore, it is necessary to prevent the mountain development in 'risky slope' by establishing permission standard related to slope types. In addition, this study suggested the ratio of 'risky slope' in the parcel for the permission standard for forestland use conversion.

Implementation of a MAC protocol in ATM-PON

  • Kim, Tea-Min;Shin, Gun-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.586-597
    • /
    • 2004
  • MAC (Medium Access Control) protocol is necessary for a OLT (Optical Line Termination) to allocate bandwidth to ONUs (Optical Network Units) dynamically in ATM PON (Passive Optical Network) operated in a kind of optical subscriber network having tree topology. The OLT collect information about ONUs and provide all permission with each ONU effectively by means of MAC protocol. Major functions of MAC protocol are composed of the algorism for distributing permission demanded by a ONU dynamically and allocation all permission used in APON properly. Sometimes MAC get to be a element of limiting the whole operation speed and occupy a most frequent operation part of the TC (Transmission Convergence) function module so it have to be designed to guarantee the best quality for each traffic. This paper introduce the way of implementation of a algorism which satisfy all of the upper renditions. This MAC algorism allocate bandwidth according to a number of working ONU and the information of the queue length dynamically and distribute permission for same interval to minimize delay variation of each ONU cell. MAC scheduler for the dynamic bandwidth allocation which is introduced in this paper has look-up table structure that makes programming possible. This structure is very suitable for implementation and operated in high speed because it require very simple and small chip size.

A Time Constraints Permission Based Delegation Model in RBAC (RBAC을 기반으로 하는 시간제한 권한 위임 모델)

  • Kim, Tae-Shik;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.163-171
    • /
    • 2010
  • RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. Delegation is a mechanism of assigning access rights to a user. RBDM0 and RDM2000 models deal with user-to-user delegation. The unit of delegation in them is a role. However, RBAC does not process delegation of Role or Permission effectively that occurs frequently in the real world. This paper proposes a Time Constraints Permission-Based Delegation Model(TCPBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. TCPBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation with time constraints. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.

A Visualization System for Permission Check in Java using Static Analysis (정적분석을 이용한 자바 언어의 권한검사 시각화 시스템)

  • Kim, Yun-Kyung;Chang, Byeong-Mo
    • The KIPS Transactions:PartA
    • /
    • v.13A no.5 s.102
    • /
    • pp.399-404
    • /
    • 2006
  • In Jana 2, to enforce a suity policy of a program, programmer writes permission sets required by the code at the policy file, sets Security Manager on system and executes the program. Then Security Manager checks by stack inspection whether an access request to resource should be granted or denied whenever code tries to access critical resource. In this paper, we develop a visualization tool which helps programmers enforce security policy effectively into programs. This system is based on the static permission check analysis which analyzes permission checks which must succeed or fail at each method. Based on this analysis information, programmer can examine visually how permission checks and their stack inspection are performed. By modifying program or policy file if necessary and examining analysis information repeatedly, programmer can enforce security policy correctly.

Enhancing the Applicability and Improvement Direction of Integrated Environmental Permit System (통합환경허가시스템의 활용도 제고 및 개선방향)

  • Park, Jae Hong;Shin, Su Jeong;Lee, Dae Gyun
    • Journal of Korean Society on Water Environment
    • /
    • v.34 no.3
    • /
    • pp.339-345
    • /
    • 2018
  • The integrated environmental permit system is currently in operation online. It carries out various functions of postmanagement such as the submission of annual reports containing operations management data onto integrated management workplaces, the operation and management of emission facilities and prevention facilities, and the disclosure of information on the integrated permission. On the other hand, the integrated environmental permit system needs to perform various roles in order to stably manage and smoothly perform the permitting work. It is necessary to utilize this system to establish policies by using diverse operations management data onto integrated management workplaces collected in the integrated environmental permit system. This system can also play a role in improving the post-management system and user convenience after the permission review and approval processes. The integrated environmental permit system can be effectively used to set up the BAT-AEL because it collects all of the cross-media data and identifies the overall status of the workplace. In order to establish a post management system after the approval, it is necessary to provide performance management and performance evaluation functions as conditions of the permit after approval. In addition, a variety of support functions should be provided to enable the permission authority and the environmental expert examination agency to facilitate the review of permits. It will be necessary to provide an evaluation system and a proactive diagnostic function to determine whether permission conditions and permit emission standards will change in the future. Also, it is important to adopt an information exchange platform that can be used to collect the status data onto the workplaces; the platform can also be used as an information exchange site for technical working groups (TWG), and for collecting field experts' opinions.

A study on the on-the-spot survey of Road occupation Information using mobile techniques (모바일 기술을 활용한 도로점용민원 현장조사 방안 연구)

  • Kim, Byung-Kon;Kim, Jin-Uk;Jeong, Seong-Yun;Kim, Young-Jin;Kim, Tae-Hak
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.832-835
    • /
    • 2007
  • The purpose of this study is to suggest the on-the-spot survey method of road occupation information. The on-the-spot survey method is proposed through the analysis of information searching function, document and process. The decision of road occupation permission and the grasp of illegal occupation status are closely connected with national rights and interests. To keep the road occupation permission and illegal occupation status, the easy acquisition of road occupation information is very important. But the person in charge of road occupation have a difficulty in obtaining occupation information because that information is still managed by paper drawing. Accordingly. this study develop the on-the-spot survey tool of road occupation using the occupation information that is managed by Construction Authorization & Permission System and the mobile techniques like UMPC. As the result of this study. the efficiency on the authorization. permission. and public grievance of construction project has improved

  • PDF

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.

APDM : Adding Attributes to Permission-Based Delegation Model

  • Kim, Si-Myeong;Han, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.107-114
    • /
    • 2022
  • Delegation is a powerful mechanism that allocates access rights to users to provide flexible and dynamic access control decisions. It is also particularly useful in a distributed environment. Among the representative delegation models, the RBDM0 and RDM2000 models are role delegation as the user to user delegation. However, In RBAC, the concept of inheritance of the role class is not well harmonized with the management rules of the actual corporate organization. In this paper, we propose an Adding Attributes on Permission-Based Delegation Model (ABDM) that guarantees the permanence of delegated permissions. It does not violate the separation of duty and security principle of least privilege. ABDM based on RBAC model, supports both the role to role and user to user delegation with an attribute. whenever the delegator wants the permission can be withdrawn, and A delegator can give permission to a delegatee.

The interaction effect of descriptive norm message and regulatory focus in online context of franchise system (프랜차이즈 시스템의 온라인 맥락에서 서술적 규범 메시지와 조절초점의 상호작용 효과)

  • Kim, Sae-Rom;Lee, Dong-il
    • The Korean Journal of Franchise Management
    • /
    • v.9 no.2
    • /
    • pp.31-38
    • /
    • 2018
  • Purpose - In recent years, many companies include franchises have acquire customers by making an online stores and they are carrying out permission marketing activities with e-mail and SMS. Permission marketing requires voluntary customer approval for receiving commercial messages such as cross-selling and upselling. Therefore, it is necessary for the business to induce the customer's acceptance. The purpose of this study is to examine which type of different messages can affect higher in consumer persuasion. Thus, we investigated the impact of descriptive norm message on intention of reception in an online store context, and its interaction with chronic regulatory focus. Research design, data, and methodology - This study hypothesized that the descriptive norm message would affect positive influences to consumers' intension of reception. Specially, this study inquired into whether the interaction effect between descriptive norm and regulatory focus. To verify the hypothesis, we conducted 2 × 2 between-subject factorial design with message type (general message and descriptive norm message) and regulatory focus(promotion focus and prevention focus) as independent variables. Participants of the experiment were assigned to one of 2 kind experimental situations randomly according to characteristics of message type. A total of 131 participants (descriptive norm message: 65, general message: 66) responded for this study. The data were analyzed using frequency analysis, exploratory factor analysis, and two-way ANOVA. Result - The results of the study are as follows. First, we found main effects of the descriptive norm message. The intention of reception were significantly higher in the descriptive norm message rather than general message as in previous researches. Second, interaction effect between the descriptive norm message and regulatory focus was significant. The prevention focus (vs. promotion focus) were hight in a positive behavior intention when the descriptive norm message was given. Conclusions - This study verifies the main effect and interaction effect of descriptive norm message and regulatory focus on the consumers' intention of reception in permission marketing, and persuasive message in the online store context. The results of this study will provide various advantages to companies that want to establish long lasting relationship with customers by carrying out permission marketing in the future.

A Study on the Factors Affecting Small-scale Construction Site Safety and Health Compliance (소규모 건설현장 안전보건규제 준수의지 요인 연구)

  • Lee, Byung-Kwan
    • Journal of the Korea Safety Management & Science
    • /
    • v.20 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • The purpose of this study is to reduce the accident rate by introducing a safety system for small construction sites belonging to local governments. In the case of a small construction site, permission is granted through the building permission department and the construction management of the building safety management of 1,000 square meters of floor area less than 3 stories is not properly performed in the Enforcement Decree of the Building Act of Korea. In the current state of industrial accidents in 2016, 81.8% of all accident victims are found to be vulnerable to accident such as those occurring at work places with less than 50 employees. Considering the fact that the construction work with less than 5 billion KRW of the construction cost in Korea generates the most deaths, it is time to introduce the safety and health system of local governments.