• Title/Summary/Keyword: permission type

Search Result 81, Processing Time 0.027 seconds

A Study on Authentication Technique based on OSGi Service Platform (OSGi 서비스 플랫폼 기반의 인증 기법에 관한 연구)

  • I, Chang-Uk;Hong, Won-Gi;Chang, Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.387-395
    • /
    • 2009
  • The establishment of security architecture is essential because security vulnerabilities occur such as user's unjustifiable connection for the opened gateway and access to resources without permission in OSGi service platform environment. In this paper, it proposes a authentication technique for an Automatic user authentication which is used the Symmetric Key and the Service bundle authentication to consider the constraints of the hardware in the OSGi service platform environment. Typically, the type of entering a password is used for the user authentication mechanism however OSGi platform environment studies not entering the password but using MAC address and encrypted identifier of the automatic user authentication mechanism because the devices are limited in their input. In this paper, the Symmetric Key is used for bundle authentication mechanism. Therefore operation becomes quick and secure authentication process has been successfully completed by using the time data and a ticket which contains a license. Based on these two different authentication mechanisms, it could eliminate the constraints of resources and improve the convenience of users and administrators. Also it shows an effect from omitting the waiting time to enter a password and reducing operations which need for authentication in the OSGi service platform environment.

Inhalational Deep Sedation Using Sevoflurane in Pediatric Dental Patients (소아치과 환자에서의 세보플루란을 이용한 흡입 심진정법)

  • Lee, Won-Ho;Kim, Young-Jae;Jang, Ki-Taeg;Lee, Sang-Hoon;Seo, Kwang-Suk;Kim, Hyun-Jeong;Yum, Kwang-Won;Park, Chang-Joo
    • Journal of The Korean Dental Society of Anesthesiology
    • /
    • v.4 no.2 s.7
    • /
    • pp.90-95
    • /
    • 2004
  • Background: Sevoflurane, a rotatively new inhalational anesthetic. has non-pungent odor and is less reluctant to pediatric patients. The purpose of this study is to examine the feasibility of sevoflurane in inhalational sedation instead of the nitrous oxide for short and simple dental treatments in pediatric patients. Patients and Methods: Fifteen healthy children, whose dental treatment was abandoned due to their little or no cooperation, were selected with their caregivers' written permission. Deep sedation was induced and maintained with oxygen and 1-5% sevoflufane via specially designed nasal mask. Blood pressure, heart rate, oxygen saturation, and electrocardiogram were monitored at 3-nin interval. A dental anesthesiologist, who was independent of dental treatments, was wholly responsible for the sedation procedure. Post-sedation complications and operator's and caregiver's acceptability of this type of inhalational sedation were also investigated. Results: The systolic and diastolic blood pressure, heart rate, and oxygen saturation was significantly depressed during the deep sedation using sevoflurane (P < 0.05). No severe post-sedation complications were found, however, bradycardia was reported in 3 patients. Almost all the operators and caregivers answered that they would adapt this sedation procedure again if possible. Conclusion: In this study, inhalational deep sedation using sevoflurane for dental treatments was found to be very useful. Furthermore, the application of sevoflurane to conscious sedation for pediatric and adult dental patients should be added.

  • PDF

Simplification of Device-Triggered Reporting Procedure on 3GPP GERAN Cellular IoT Communications (3GPP GERAN CIoT 환경에서 디바이스 Triggering 기반 Reporting 절차 간소화 방안)

  • Kim, Jun Suk;Shin, Jung Wan;Chung, Min Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.1
    • /
    • pp.80-83
    • /
    • 2016
  • In this paper, a simplified uplink transmission procedure is proposed for reducing energy consumption and improving lifetime of CIoT devices. In the proposed procedure, the CIoT devices register information on their service and traffic to the networks, and the networks statically allocate pre-defined amounts of radio resources when the CIoT devices have requested permission for their uplink transmissions. This paper provides details of the proposed procedure comparing with those of the current GSM procedure, and defines detailed operations of the devices and the networks for the proposed one. This shows that the proposed scheme can effectively support CIoT services on GSM networks.

Encapsulation of SEED Algorithm in HCCL for Selective Encryption of Android Sensor Data (안드로이드 센서 정보의 선택적 암호화를 지원하는 HCCL 기반 SEED 암호의 캡슐화 기능 연구)

  • Kim, Hyung Jong;Ahn, Jae Yoon
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.73-81
    • /
    • 2020
  • HCCL stands for Heterogenous Container Class Library. HCCL is a library that allows heterogeneous types of data to be stored in a container as a single record and to be constructed as a list of the records to be stored in database. With HCCL, encryption/decryption can be done based on the unified data type. Recently, IoT sensor which is embedded in smartphone enables developers to provide various convenient services to users. However, it is also true that infringement of personal information may occur in the process of transmitting sensor information to API and users need to be prepared for this situation in some sense. In this study, we developed a data model that enhances existing security using SEED cryptographic algorithms while managing information of sensors based on HCCL. Due to the fact that the Android environment does not provide permission management function for sensors, this study decided whether or not to encrypt sensor information based on the user's choice so that the user can determine the creation and storage of safe data. For verification of this work, we have presented the performance evaluation by comparing with the situation of storing the sensor data in plaintext.

North Korean Fisheries Status and Cooperation through International Organizations (북한의 수산업 실태와 국제기구를 통한 수산분야 협력 방향)

  • Park, Seong-Kwae
    • The Journal of Fisheries Business Administration
    • /
    • v.46 no.3
    • /
    • pp.83-101
    • /
    • 2015
  • The main purpose of this study is to explore a way of South-North Korea fisheries cooperation through international organizations under the principles of the Korean peninsula trust process. Considering the government policy toward the North, although some humanitarian aids or cooperations may be plausible with permission of the Ministry of Reunification. direct cooperations between the South and the North Korea must be much limited at leat under the present government. The 5.24 measures taken in 2010 banned in fact all economic/humanitarian cooperations by private sectors and government. Noting the present and the visible future, an important question is whether the North accepts all cooperations including fisheries, bartering giving up nuclear weapon development for the 5.24 measures. It would be a difficult question to be answered, because win-set to both parties is too narrow, so far as there is no change in the South-North conflicting priority policies. If so, one way of implementing South-North fisheries cooperations is to drive forward cooperative programs through UN organizations. Since for instance FAO and WFP secure justification and roles and has a global network, they have sufficient capacity of being abe to organize fisheries experts. If the South can finance the budget necessary for the programs, FAO or WFP would lead the programs through a negotiation with the North. In other words, it is a type of cooperative model that FAO or WFP leads the programs and the South finances. In addition, if World Fisheries University(WFU) is invited to the Republic of Korea, it might make a great contribution to expert exchange of the North.

Comparative Study for the Anesthetic Efficacy between Articaine HCl and Lidocaine HCl during the Surgical Extraction of Bilateral Mandibular Impacted Third Molars (하악 매복 제3대구치 발치 시 Articaine HCl과 Lidocaine HCl의 국소마취 효능에 대한 비교연구)

  • Lee, Won-Young;Seo, Kwang-Suk;Kim, Hyun-Jeong;Yum, Kwang-Won;Park, Chang-Joo
    • Journal of The Korean Dental Society of Anesthesiology
    • /
    • v.4 no.1 s.6
    • /
    • pp.13-16
    • /
    • 2004
  • Background: Articaine, a new amide-type local anesthetic, was recently commercially available in Korea. The purpose of this study was to compare the anesthetic efficacy between articaine HCl and lidocaine HCl for the surgical extraction of bilateral mandibular impacted third molars. Patients and Methods: Forty young and healthy patients with bilateral impacted third molars were selected with permission. Randomly, one side of impacted third molar was operated under local anesthesia using 4% articaine and the other side under 2% lidocaine after 1 or 2 week recovery time. Intraoperative pain was evaluated via 0-10 cm visual analog scale (VAS) by both the patient and operator immediately after the operation. After 1 day and 7 days, the complications of local anesthesia were checked. Results: The pain VAS scores in articaine group, evaluated by both the patient and operator, were lower than those in lidocaine group, but they were not statistically significant (P = 0.44 and 0.54, respectively). The incidence of complications of local anesthesia between articaine and lidocaine was similar. Conclusion: In this study, articaine showed at least equal efficacy compared to lidocaine. The further dose-controlled study with more pharmacokinetic parameters will be needed.

  • PDF

A Scheme for Detecting and Preventing an Unauthorized Device Using Context Awareness and Mobile Device Management (상황 인지 기술과 모바일 단말 관리 기술을 이용한 비인가 단말 탐지 및 차단 기법)

  • Mun, Jiman;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.1-8
    • /
    • 2014
  • This paper proposed a method that prevents data leakage and modulation and detects an unauthorized device by using AP and mobile device. Most of existing method for detecting and preventing an unauthorized device are similar to type of Evil Twin. However, in previous studies can not resolve many security accident and have the problem to cope with effectively security accident on various network. In order to solve these problem, companies prepare security accident through the varies policy and guideline. but It is hard to prevent all security accident because it is consistently increasing everyday. This paper suggests technique of detecting and preventing an unauthorized device using Context Awareness and Mobile Device Management. Firstly, when mobile device go into internal network, server distinguish access permission and authorization of mobile device using acquiring the conetxt information of mobile device. By using this result, server applies the appropriate management technique to the mobile device for leakage and accident of internal network.

Characteristics Type of Vascular Plants in Jeokjabong, Bogil Island(Jeonnam) (보길도(전남) 적자봉 일대의 관속식물상 유형별 특성)

  • Oh, Hyun-Kyung;Beon, Mu-Sup
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.14 no.4
    • /
    • pp.25-40
    • /
    • 2011
  • The vascular plants in Jeokjabong, Bogil Island were listed 350 taxa composed of 89 families, 233 genera, 309 species, 1 subspecies, 36 varieties and 4 forms. Divided into woody plants were 142 taxa (40.6%) and herbaceous plants were 208 taxa (59.4%). Based on the list of rare and endangered species by Korea Forest Service and Korea National Arboretum, 3 taxa were recorded; Celtis choseniana, Asarum maculatum, Rubus sorbifolius, and endemic plants, 10 taxa were recorded; Asarum maculatum, Cephalotaxus koreana, Carpinus coreana, Celtis choseniana, Lespedeza maritima, Indigofera koreana, Dendropanax morbifera, Ligustrum quihoui var. latifolium, Weigela subsessilis, Carex okamotoi, and plant species subject to permission for taking abroad, 4 taxa were recorded; Celtis choseniana, Asarum maculatum, Vaccinium oldhami, Carex okamotoi. Based on the list of floristic regional indicator plants by Korean Ministry of Environment were total 64 taxa (18.3% of all 350 taxa of vascular plants); Ligustrum quihoui var. latifolium in class IV, 19 taxa (Stauntonia hexaphylla, Cinnamomum japonicum, Zanthoxylum ailanthoides, Daphniphyllum macropodum, Centella asiatica, Verbena officinalis, Mitchella undulata, etc.) in class III, 5 taxa (Potentilla dickinsii, Ostericum melanotilingia, Sanicula rubriflora, Caryopteris incana, Teucrium veronicoides) in class II and 39 taxa (Gleichenia dichotoma, Cyrtomium fortunei, Aphananthe aspera, Rubus hirsutus, Meliosma myriantha, Hedera rhombea, Ainsliaea apiculata, etc.) in class I. Based on the list of naturalized plants, 5 families, 17 genera, 20 taxa (Phytolacca americana, Lepidium virginicum, Robinia pseudo-acacia, Verbesina alternifolia, Lolium perenne, etc.) and naturalization rate was 5.7% of all 350 taxa of vascular plants. Hereafter natural ecosystem into disturbance on naturalized plants and legal protection species and rare and endangered species distribute in the Bogil Island, precision investigation after management counterplan of the monitoring a point of view be required.

Phenomenological Study on Aging of Women in 40's and 50's - Applying the Parse's Theory - (40~50대 여성의 "나이 들어감(Aging)"에 대한 현상학적 연구 - Parse 이론을 적용하여 -)

  • Hong, Ju-Eun;Do, Keong-Jin;Ha, Ru-Mee;Jeon, Seok-Bun;Hur, Sung-Soun;Yoo, Eun-Kwang
    • Women's Health Nursing
    • /
    • v.20 no.1
    • /
    • pp.48-61
    • /
    • 2014
  • Purpose: This study was done to explore the essence and meaning of the experience of 'aging', as a process of 40's and 50's women in Korea by applying the Parse's Human Becoming theory (2002). Methods: Data was collected from February to April, 2013, using the phenomenological research method. Data was collected through in-depth informal interview and analyzed following Colaizzi method. After IRB permission and informed consent from the participants, all interviews were recorded with MP3 recorder and transcribed for analysis. Results: Data analysis revealed 112 of meanings, 33 key subject words, 8 subject phrases, and 4 categories. The main themes were elaborated as 'going down' ('Being changed of body and mind', 'Being considered on my identity'), 'going up' ('Being expanded of productive role', 'Being transcendent multi-dimensionally'), 'pausing' ('Becoming more thoughtful about family', 'Looking back'), 'going forward again' ('Age is just a number, 'Contemplating of life and death'). Experiences in aging among women in 40's and 50's enlightened with Parse's theory of Human Becoming in terms of 'going down', 'going up', 'pausing', 'going forward again' appeared simultaneously, rather than consecutively. Conclusion: Women in 40's and 50's require holistic nursing intervention with physical, psychological, socio-economical, and spiritual aspects, rather than focusing on problematic physical symptom relief and prevention of further conditions. It is recommended to develop various nursing intervention considering on different environment, type of experience, and level of human becoming, individually.

Blockchain-based safety MyData Service Model (블록체인 기반 안전한 마이데이터 서비스 모델)

  • Lee, Kwang Hyoung;Jung, Young Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.873-879
    • /
    • 2020
  • The importance of data as a core resource of the 4th industrial revolution is emerging, and companies illegally collect and use personal data. In the financial sector, active research is conducted to safely manage personal data and provide better services using blockchain, big data, and AI technology. In this paper, we propose a system that can safely manage personal data by using blockchain technology, which can be used without changing the existing system. The composition of this system consists of a blockchain, blockchain linkages, a service provider, and a user (i.e., an app). Blockchain can be used regardless of its type and form, and services are provided by classifying blockchains and services in the blockchain linkages. Service providers can access personal data only after requesting and receiving delegated permission from users. Existent MyData services store all data in a user's mobile phone, so information may get leaked due to jailbreaks or rooting. But in the proposed system, personal data are stored in blockchain so information leakage can be prevented. In the future, we will study ways to provide customized services using personal data stored in blockchain.