• Title/Summary/Keyword: policy information model

검색결과 2,144건 처리시간 0.035초

Application Design and Execution Framework in Role-Based Access Control Systems (역할기반 접근통제 시스템에서 응용 프로그램의 설계 및 시행지원 프레임워크)

  • Lee, Hyeong-Hyo;Choe, Eun-Bok;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • 제6권11호
    • /
    • pp.3020-3033
    • /
    • 1999
  • Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RBAC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is needed that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

  • PDF

A Research on the Elements of Digital Collection Development Policy (디지털 장서개발정책 기본요소 연구)

  • Chang, D.H.;Seo, Tae-Sul
    • Journal of Korean Library and Information Science Society
    • /
    • 제40권3호
    • /
    • pp.97-117
    • /
    • 2009
  • Collection Development Policy(CDP) is the master plan for managing libraries and information centers through which the features and categories of collections are defined and sorted. The National Digital Library therefore needs to determine its manifest principles based on CDP regarding the magnitude of acquisition, the acquisition priority and the magnitude of purchases. This paper pertains to the principal model for NDL Collection Development Policy as a primer for establishing NDL Collection Development Policy in order to illustrate essential elements of national collection development policy and provide general guidelines for NDL Collection Development Policy. To propose an independent Collection Development Policy appropriate for NDL by analyzing cases in digital resource development policies. To guide establishing principles for determining the types and magnitude of NDL collection acquisition, prioritizing acquisition, making decisions on purchase magnitude and licensing. To identify the essential elements in systematic development of national digital information resources; and to propose a model for NDL's CDP accordingly.

  • PDF

Trusted Information Sharing Model in Collaborative Systems (협업 환경 내 신뢰할수 있는 정보 공유 모델)

  • Hong, Seng-Phil;Kim, Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • 제8권1호
    • /
    • pp.99-113
    • /
    • 2007
  • In the rapidly changing e-business environment, organizations need to share information, process business transactions, and enhance collaborations with relevant entities by taking advantage of the various technologies. However, there are always the security issues that need to be handled in order for the e-business operations to be run efficiently. In this research, we suggest the new security authorization model for safety flexible supporting the needs of e-business (e-marketplace) in an organization. This proposed model provides the scalable of access control policy among multi-domains, and preservation of flexible authorization management in distributed system environments. For servers to take the access control policy and enforcement decisions, we also describe the feasible authorization architecture is concerned with how they might seek advice and guideline from formal access control model.

  • PDF

A Lattice-Based Role Graph Security Model ensuring Confidentiality and Integrity (비밀성과 무결성을 보장하는 격자개념의 역할그래프 보안 모델)

  • Choi, Eun-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • 제14권6호
    • /
    • pp.91-98
    • /
    • 2009
  • In this paper, this model ensures confidentiality and integrity of mandatory access cotrol policy which based on fuzzy function with importance of information. And it solves authorization abuse problem through role graph creation algorithm and flowing policy that security grade is applied. Because this model composes role hierarchy which bind similar role concept to apply to commercial environment, it has expansile advantage by large scale security system as well as is easy that add new role.

Policy-Based Security Management Model for Efficient Security Policy Management in Large-Scale Network (대규모 네트워크 망에서 효율적인 보안정책관리를 위한 정책기반 보안관리모델)

  • Hwang, Yoon-Cheol;Um, Nam-Kyeong;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제28권1B호
    • /
    • pp.87-93
    • /
    • 2003
  • As Information Security Technology has become rather transparent, wide, and integrated than in part, exclusive, and separated, A necessity of the study about integrating the separated distributed security systems into one module, has grown However, there is no integrated framework which can manage all separate security systems as one integrated one yet. Accordingly, we propose a new policy based network admirustrative model in this paper which can integrate individual security systems and distributed control way into one effectively.

A Study on the Success Factors of Government Remote Service (GVPN) from the Perspective of Information System Success Model and Technology Acceptance Model (정보시스템 성공모형과 기술수용 모형 관점에서 정부원격근무서비스(GVPN) 성공요인에 관한 연구)

  • Lee, Won Suk;Jang, Sang-hyun;Kim, Yeong-dae;Shin, Yongtae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2020년도 추계학술발표대회
    • /
    • pp.494-497
    • /
    • 2020
  • 코로나19 팬데믹으로 사회적 거리 두기가 확산됨에 따라 원격근무가 확산되면서 정부기관에서도 지난 3월부터 재택근무가 시작되어 현재도 일정 수준을 유지하고 있다. 따라서 비대면 시대의 원격근무 본격적인 확산에 대비해, 정보시스템 성공모형과 기술수용모형을 기반으로 정부기관에서 재택근무 시 필수적으로 사용하고 있는 정부원격근무서비스인 Government Virtual Private Network의 품질요인이 이용자 만족도에 미치는 영향 등을 분석하여 개선방안 마련에 기여하고자 한다.

A Study on Improving Subway Crowding Based on Smart Card Data : a Focus on Early Bird Policy Alternative (교통카드 자료를 활용한 지하철 혼잡도 개선 연구 : Early Bird 정책대안을 중심으로)

  • Lee, Sang Jun;Shin, Sung Il
    • Journal of Information Technology Services
    • /
    • 제19권2호
    • /
    • pp.125-138
    • /
    • 2020
  • Currently, subway crowding is estimated by observing a specific point at specific hours once or twice every 1 or 2 years. Given the extensive subway network in Seoul Metropolitan Area covering 588 stations, 11 lines and 80 transfer stations as of 2017, implementing crowding mitigation policy may have its limitations due to data uncertainty. A proposal has recently been made to effectively use smart card data, which generates big data on the overall subway traffic related to an estimated 8 million passengers per day. To mitigate subway crowding, this study proposes two viable options based on data related to smart card used in Seoul Metropolitan Area. One is to create a subway passenger pattern model to accurately estimate subway crowding, while the other is to prove effectiveness of early bird policy to distribute subway demand that is concentrated at certain stations and certain time. A subway passenger pattern model was created to estimate the passenger routes based on subway terminal ID at the entrance and exit and data by hours. To that end, we propose assigning passengers at the routes similar to the shortest routes based on an assumption that passengers choose the fastest routes. In the model, passenger flow is simulated every minute, and subway crowding level by station and line at every hour is analyzed while station usage pattern is identified by depending on passenger paths. For early bird policy, highly crowded stations will be categorized based on congestion level extracted from subway passenger pattern model and viability of a policy which transfers certain traveling demands to early commuting hours in those stations will be reviewed. In particular, review will be conducted on the impact of policy implemented at certain stations on other stations and lines from subway network as a whole. Lastly, we proposed that smart card based subway passenger pattern model established through this study used in decision making process to ensure effective implementation of public transport policy.

Applied Method of Privacy Information Protection Mechanism in e-business environments (e-Business 환경 내 개인정보 보호 메커니즘적용 방안)

  • Hong, Seng-Phil;Jang, Hyun-Me
    • Journal of Internet Computing and Services
    • /
    • 제9권2호
    • /
    • pp.51-59
    • /
    • 2008
  • As the innovative IT are being developed and applied in the e-business environment, firms are recognizing the fact that amount of customer information is providing care competitive edge. However, sensitive privacy information are abused and misused, and it is affecting the firms to require appropriate measures to protect privacy information and implement security techniques to safeguard carparate resources. This research analyzes the threat of privacy information exposure in the e-business environment, suggest the IPM-Trusted Privacy Policy Model in order to resolve the related problem, and examines 4 key mechanisms (CAM, SPM, RBAC Controller, OCM) focused on privacy protection. The model is analyzed and designed to enable access management and control by assigning user access rights based on privacy information policy and procedures in the e-business environment. Further, this research suggests practical use areas by applying TPM to CRM in e-business environment.

  • PDF

A Study on Modeling a Unified Policy Information Service System in Korea (정책정보통합서비스시스템 구축 모형에 관한 연구)

  • Hong, Hyun-Jin;Noh, Young-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • 제42권1호
    • /
    • pp.95-125
    • /
    • 2008
  • Despite huge significance of public policy information to a country and its people, it seems that Korean government lacks a nationwide service that specializes in managing those information. Nowadays the organization of the central government is very complicated and the amount of information and data they are producing is massively growing. Naturally, without any advanced knowledge, it is not easy to find the information you want from the government information service. Besides, government publications are scattered and not under control of unified collection. This study suggests an efficient policy information service model that can i) provide stepping stones for a competent knowledge-based government by providing necessary information for policy-making process in government ministries and public organizations, ii) build national policy information infrastructure by incorporating policy-related information dispersed over different ministries, and iii) identify new approaches to improve policy information services.

Analysis and Forecasting of Diffusion of RFID Market in Korea (국내 RFID 시장의 확산 분석 및 예측 모형)

  • Son, Dongmin;Moon, Seonghyeon;Jeong, Bongju
    • Journal of Korean Institute of Industrial Engineers
    • /
    • 제40권4호
    • /
    • pp.415-423
    • /
    • 2014
  • In recent decades, RFID (Radio Frequency IDentification) technology has been recognized as one of the most core competencies in implementing ubiquitous society. However, Korea has not seen good success in diffusion of RFID even though Korean government continues funding many projects to diffuse the technology in industries. Most previous researches overestimate the growth of Korean RFID market in contrary to real market situation. This study aims to analyze the Korean RFID market and find a reasonable forecasting model for it. Our experimental results show that Bass forecasting model provides the more realistic estimates than any other models and the analyses of forecasting error provide useful information for the better forecasting. We also observed that government policy plays a crucial role in the diffusion of RFID technology in Korea.