• Title/Summary/Keyword: permissions

Search Result 91, Processing Time 0.028 seconds

Establishing of Fishing Bank GIS System (어장도 지리정보시스템 구축)

  • Kim, Jin-Kwang;Choi, Kap-Jun;Lee, Young-Jo;Song, Seung-Hyun;Kim, Jang-Ryul
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.2
    • /
    • pp.47-54
    • /
    • 2010
  • Today, administration management of fishing industry is formed by paper documents. So, it is suffered damage and loss concern by the long-term storage. when the new informations is renewed, much of manpower and time are wasted also. In addition, it has caused confusion to by used coordinate system which is not been consistent. To build a national standardized information system of fishing banks, in this study, fishing map DB and system based on GIS is constructed for fishery right area of JeollaNamdo (Mokpo city and other 14 counties) which has 55% of fishing permissions of Korea. Then administration management of fishing industry is constructed computerization for the user that business processing and for fishermen to improve their convenience. Also, It will be possible to link another system.

Proposal on an Idle Service for Efficiently Managemental Short Message Service (효율적인 SMS 관리를 위한 대기 화면 서비스 제안)

  • Jeon, Hye-Kyoung;Chung, Soo-Jin;Han, Seung-Jin;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.8
    • /
    • pp.74-80
    • /
    • 2008
  • Various mobile contents have been developed with the spread of cellular phones. Above all things, nowadays, an idle application services are developed through competition in mobile phone manufacturers and mobile communication companies. In this paper, we propose that the idle application with text message service is easy to receive and edit. It is complement to function of SMS in use and can be effective information managing method, for example, it arrays messages and uses diary feature to set permissions when it send and receive standardized text message. We expect that proposed service will be adopted without additional cost in wireless units.

A Study of Analysis of Hacking Attacks on Cyber Terrorism and Prognostic Analysis of Phenomena (사이버테러에 대한 해킹공격 분석과 전조 현상 분석)

  • Noh, Jung Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.123-126
    • /
    • 2013
  • Access control system, when operating the infrastructure manager and the permissions for the user to clearly define the terminology that is. Various IT incidents still happening frequently occur, and these incidents in order to prevent the situation of access control is needed. In this study, the Copy command by hackers hacking incidents, such as walking dangerous limits for instructions attacks in advance, and also the internal administrator accident accidental limit command to walk off the risk in advance and even if the incident occurred access to the command history log and post it as evidence through the analysis techniques that can be utilized are described.

  • PDF

Detection of Android Apps Requiring Excessive Permissions (과도한 권한을 요구하는 안드로이드 앱 탐지)

  • Bae, Gyeongryoon;Lee, Yonjae;Kim, Euiyeon;Tae, Gyubin;Kim, Hyung-Jong;Lee, Hae Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.79-80
    • /
    • 2018
  • 안드로이드 운영체제는 앱을 설치하거나 실행할 때 사용자가 해당 앱이 요청하는 권한들을 승인하도록 하고 있으나, 일반적인 사용자들은 이를 주의 깊게 확인하지 않고 승인하는 경우가 많으며, 과도한 권한들을 요구하는 앱의 실행은 프라이버시 침해 문제로 이어질 수 있다. 본 논문에서는 제공하는 기능들에 비해 과도한 권한들을 요구하는 안드로이드 앱들을 탐지하는 모델을 제안한다. 먼저 손전등, 다이어리, 지불(페이) 및 채팅 앱 207개를 대상으로 요구하는 권한들을 조사하여 정리하였다. 조사 결과를 기준으로 설치 또는 실행하려는 앱이 어느 정도의 권한들을 요구하는지 가늠할 수 있다. 설치된 앱들의 요구 권한들을 조회할 수 있는 앱 프로토타입을 개발하였으며, 향후 모델의 구체화 및 검증을 거쳐, 프로토타입에 적용할 계획이다.

  • PDF

The study of Using in Combination with Constitutional Medicines in Sasang Constitutional Medicine (사상체질별(四象體質別) 약물(藥物)의 이용(泥用)에 관한 문헌적(文獻的) 연구(硏究) - "동의수세보원(東醫壽世保元)" 갑오본(甲午本)과 신축본(辛丑本)을 중심으로 -)

  • Kim, Myung-Gune;Park, Seong-Sik
    • Journal of Sasang Constitutional Medicine
    • /
    • v.17 no.1
    • /
    • pp.33-44
    • /
    • 2005
  • 1. Objectives The purpose of this study is to analysis that one's constitutional medicine can be used as another's medicine or not. Using the results of this study, it will improve to understand sasang constitutional medicine. 2. Methods In Lee Je-Ma's writings - GaboGubon ${\ulcorner}$Dongyi Suse Bowon${\lrcorner}$ and ShinChukbon ${\ulcorner}$Dongyi Suse Bowon${\lrcorner}$-, I analysis that one's constitutional medicine can be used as another's medicine. 3. Results and conclusions 1) In early stages of Lee Je-Ma's writings, there are several cases that one's constitutional medicines could be used as another's. But as days goes by, there are lesser cases that one's constitutional medicines could be used as another's. 2) In Lee Je-Ma's writings, there are few mixing of medicines with other constitutions. But, that have no fIxed standards such as book kind, constitution and others. 3) In Lee Je-Ma's writings, there are some mixing of medicine with other constitutions in cases of imperfections, experiences and modifications. 4) In Lee Je-Ma's writings, there are not permissions mixing of medicine with other constitutions in cases of side effects, obstructions and efficiencies.

  • PDF

A Study on Fruits Characteristics of the Chosen Dynasty through the Analysis of Chosenwangjoeshirok Big Data (빅데이터 분석을 통한 조선시대 과실류 특성 연구)

  • Kim, Mi-Hye
    • Journal of the Korean Society of Food Culture
    • /
    • v.36 no.2
    • /
    • pp.168-183
    • /
    • 2021
  • Using the big data analysis of the Choseonwangjosilrok, this research aimed to figure out the fruits' types, prevalence, seasonal appearances as well as the royalty's perspective on fruits during Choseon period. Choseonwangjosilrok included nineteen kinds of fruits and five kinds of nuts, totaling 1,601 cases at 72.8% and 533 cases at 24.2% respectively. The text recorded fruits being used as: tributes for kings, gifts from kings to palace officials, tomb offerings, county specialties, trade goods or gifts to the foreign ambassadors, and medicine ingredients in oriental pharmacy. Seasonally the fruits appeared demonstrating an even distribution. Periodic characteristics were observed in decreasing quantity chronologically. From fifteenth century to nineteenth century, the fruits with timely features were seen: 804 times at 36.6%, 578 times at 26.3%, 490 times at 22.3%, 248 times at 11.3%, and 78 times at 3.5% respectively. In fifteenth century: citrons, quinces, pomegranates, cherries, permissions, watermelons, Korean melons, omija, walnuts, chestnuts, and pine nuts appeared most frequently. In sixteenth century: pears, grapes, apricots, peaches, and hazelnuts appeared most frequently. In seventeenth century: tangerines and dates appeared most frequently. In eighteenth century, trifoliate orange was the most frequently mentioned fruit.

Enabling Dynamic Multi-Client and Boolean Query in Searchable Symmetric Encryption Scheme for Cloud Storage System

  • Xu, Wanshan;Zhang, Jianbiao;Yuan, Yilin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1286-1306
    • /
    • 2022
  • Searchable symmetric encryption (SSE) provides a safe and effective solution for retrieving encrypted data on cloud servers. However, the existing SSE schemes mainly focus on single keyword search in single client, which is inefficient for multiple keywords and cannot meet the needs for multiple clients. Considering the above drawbacks, we propose a scheme enabling dynamic multi-client and Boolean query in searchable symmetric encryption for cloud storage system (DMC-SSE). DMC-SSE realizes the fine-grained access control of multi-client in SSE by attribute-based encryption (ABE) and novel access control list (ACL), and supports Boolean query of multiple keywords. In addition, DMC-SSE realizes the full dynamic update of client and file. Compared with the existing multi-client schemes, our scheme has the following advantages: 1) Dynamic. DMC-SSE not only supports the dynamic addition or deletion of multiple clients, but also realizes the dynamic update of files. 2) Non-interactivity. After being authorized, the client can query keywords without the help of the data owner and the data owner can dynamically update client's permissions without requiring the client to stay online. At last, the security analysis and experiments results demonstrate that our scheme is safe and efficient.

Masked Face Recognition via a Combined SIFT and DLBP Features Trained in CNN Model

  • Aljarallah, Nahla Fahad;Uliyan, Diaa Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.319-331
    • /
    • 2022
  • The latest global COVID-19 pandemic has made the use of facial masks an important aspect of our lives. People are advised to cover their faces in public spaces to discourage illness from spreading. Using these face masks posed a significant concern about the exactness of the face identification method used to search and unlock telephones at the school/office. Many companies have already built the requisite data in-house to incorporate such a scheme, using face recognition as an authentication. Unfortunately, veiled faces hinder the detection and acknowledgment of these facial identity schemes and seek to invalidate the internal data collection. Biometric systems that use the face as authentication cause problems with detection or recognition (face or persons). In this research, a novel model has been developed to detect and recognize faces and persons for authentication using scale invariant features (SIFT) for the whole segmented face with an efficient local binary texture features (DLBP) in region of eyes in the masked face. The Fuzzy C means is utilized to segment the image. These mixed features are trained significantly in a convolution neural network (CNN) model. The main advantage of this model is that can detect and recognizing faces by assigning weights to the selected features aimed to grant or provoke permissions with high accuracy.

A Flexible Attribute-based RBAC Model

  • Kim, Si-Myeong;Han, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.131-138
    • /
    • 2022
  • In this paper, we propose an FA-RBAC (FA-RBAC) model based on flexible properties. This model is assigned attribute-role-centric, making it easy to manage objects, as efficient as access control, and as the network environment changes, it can provide flexible access control. In addition, fine-grained permissions and simple access control can be achieved while balancing the advantages and disadvantages of the RBAC and ABAC models, reducing the number of access control rules by combining static attribute-based roles and dynamic attribute-based rules, and verifying the validity and performance benefits of the proposed model through comparison analysis and simulation.

Android Botnet Detection Using Hybrid Analysis

  • Mamoona Arhsad;Ahmad Karim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.704-719
    • /
    • 2024
  • Botnet pandemics are becoming more prevalent with the growing use of mobile phone technologies. Mobile phone technologies provide a wide range of applications, including entertainment, commerce, education, and finance. In addition, botnet refers to the collection of compromised devices managed by a botmaster and engaging with each other via a command server to initiate an attack including phishing email, ad-click fraud, blockchain, and much more. As the number of botnet attacks rises, detecting harmful activities is becoming more challenging in handheld devices. Therefore, it is crucial to evaluate mobile botnet assaults to find the security vulnerabilities that occur through coordinated command servers causing major financial and ethical harm. For this purpose, we propose a hybrid analysis approach that integrates permissions and API and experiments on the machine-learning classifiers to detect mobile botnet applications. In this paper, the experiment employed benign, botnet, and malware applications for validation of the performance and accuracy of classifiers. The results conclude that a classifier model based on a simple decision tree obtained 99% accuracy with a low 0.003 false-positive rate than other machine learning classifiers for botnet applications detection. As an outcome of this paper, a hybrid approach enhances the accuracy of mobile botnet detection as compared to static and dynamic features when both are taken separately.