• Title/Summary/Keyword: policy information model

Search Result 2,144, Processing Time 0.028 seconds

Privacy Controller using XACML for Internet Identity Management System (인터넷 Identity 관리 시스템 환경에서 XACML을 이용한 프라이버시 컨트롤러)

  • Roh, Jong-Hyuk;Jin, Seung-Hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7B
    • /
    • pp.438-447
    • /
    • 2007
  • In the Internet, an identity service must to obtain permission from a user to allow them to share data with requesting service. For that, the privacy policy, which reflects legal regulations and preferences made by the user, is needed. Also, the management interface that aids the user to make the privacy policy and the PDP system that makes admission control and policy decisions in response to a request from an entity wanting to access the personal information are needed. In this paper, the privacy controller system model handled under the internet Identity management system environment is proposed. The system has the easy interface of policy generation and the efficient policy decision process. The system applies and modifies to the XACML of OASIS group. We propose that the privacy policy is divided into the three policies, which are the user policy, the domain policy and the basic offering policy. To resolve the collision between the policies, we also propose the collision resolution policy.

Study of US/EU National Innovation Policies Based on Nanotechnology Development, and Implications for Korea

  • Lim, Jung Sun;Shin, Kwang Min;Yoon, Jin Seon;Bae, Seoung Hun
    • Journal of Information Science Theory and Practice
    • /
    • v.3 no.1
    • /
    • pp.50-65
    • /
    • 2015
  • Recently US/EU governments are utilizing nanotechnology as a key catalyst to support national innovation policies with economic recovery goals. US/EU nano policies have been serving as a global model to various countries, including Korea. So the authors initially seek to understand US/EU national innovation policy interconnections, and then find the role of nanotechnology development within. To strengthen national policy coherence, nanotechnology development strategies are under evolution as an innovation catalyst for promoting commercialization. To strategically support nano commercialization, EHS (Environmental, Health, Safety) and informatics are invested as priority fields to strengthen social acceptance and sustainability of nano enabled products. The current study explores US/EU national innovation policies including nano commercialization, EHS, and Informatics. Then obtained results are utilized to analyze weaknesses of Korean innovation systems of connecting creative economy and nanotechnology development policies. Then ongoing improvements are summarized focusing on EHS and informatics, which are currently prominent issues in international nanotechnology development.

A Study on the Development of Evaluation Model for Selecting a Standard for DITA using AHP (AHP를 이용한 국방정보기술표준 선정 평가 모델 개발에 관한 연구)

  • Kim, Ja-Hee;Kim, Woo-Je;Cho, Hyun-Ki;Lee, Eun-Young;Seo, Min-Woo
    • IE interfaces
    • /
    • v.25 no.1
    • /
    • pp.96-105
    • /
    • 2012
  • Recently, the interoperability has become more important to enhance the net-centric capabilities of the warfighter. DITA (Defense Information Technical stAndard) is the set of IT standards for improving interoperability, scalability, effectiveness, and efficiency. In this paper, we analyzed the standardizing process to derive the selection criteria and structurized the derived selection criteria using the KJ (Kawakita Jiro) method. Finally, we developed an evaluation model for selecting a standard for DITA using AHP (Analytic Hierarchy Process). As a result, we present eight selection criteria (maintainability, trend, stability, portability, effect of other standard, constraint of the network, and applicability to the systems). We also applied some examples that several IT standards to our selection model for validating the model. We expect our model to help to decide objectively whether the new standard can be listed in DITA.

The Impact of Nonconforming Items on (s, S) Inventory Model with Customer Order Reservation and Cancellation

  • Takemoto, Yasuhiko;Arizono, Ikuo
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.2
    • /
    • pp.72-79
    • /
    • 2009
  • The ultimate goal of inventory management is to decide the timing and the quantity of ordering in response to uncertain demands. Recently, some researchers have focused upon an impact of distortions in the information, e.g., customer order cancellation, on an economical inventory policy. The customer order cancellation is considered a kind of distortions in demands, because a demand that is eventually cancelled is equivalent to a phony demand. Also, there are some additional distortions in the inventory information. For instance, the procurement of suppliers may include some nonconforming items as a result of imperfect production and inspection by the suppliers, and/or damage in transit. The nonconforming item should be considered a kind of distortions in the inventory information, because the nonconforming item is equivalent to a phony stock. In this article, we consider an inventory model under the situation that customers can cancel their orders and the procurement of suppliers may include some nonconforming items. Then, we introduce the customer order reservation into the inventory model for the purpose of avoiding the costly backlogs, because the customer order reservation gives retailers a period to fulfill customer's requests. We formulate a periodic review (s, S) inventory model and investigate the economical operation under the situation mentioned above. Further, through the sensitivity analysis, we show the impact of these distortions and the effect of the customer order reservation on the inventory policy.

Developing Information Security Management Model for SMEs: An Empirical Study (중소기업 정보보호관리 모델의 개발: 실증 연구)

  • Lee, Jung-Woo;Park, Jun-Gi;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.15 no.1
    • /
    • pp.115-133
    • /
    • 2005
  • This study is to develop an information security management model(ISMM) for small and medium sized enterprises(SMEs). Based on extensive literature review, a five-pillar twelve-component reference ISMM is developed. The five pillars of SME's information security are: centralized decision making, ease of management, flexibility, agility and expandability. Twelve components are: scope & organization, security policy, resource assessment, risk assessment, implementation planning, control development, awareness training, monitoring, change management, auditing, maintenance and accident management. Subsequent survey designed and administered to expose experts' perception on the importance of these twelve components revealed that five out of tweleve components require relatively immediate attention than others, especially in SME's context. These five components are: scope and organization, resource assessment, auditing, change management, and incident management. Other seven components are policy, risk assessment, implementation planning, control development, awareness training, monitoring, and maintenance. It seems that resource limitation of SMEs directs their attention to ISMM activities that may not require a lot of resources. On the basis of these findings, a three-phase approach is developed and proposed here as an SME ISMM. Three phases are (1) foundation and promotion, (2) management and expansion, and (3) maturity. Implications of the model are discussed and suggestions are made for further research.

PERFORMANCE OF MYOPIC POLICY FOR MULTI-CHANNEL DYNAMIC SPECTRUM ACCESS NETWORKS

  • Lee, Yutae
    • East Asian mathematical journal
    • /
    • v.30 no.1
    • /
    • pp.23-29
    • /
    • 2014
  • To solve inefficient spectrum usage problem under current static spectrum management policy, various kinds of dynamic spectrum access strategies have appeared. Myopic policy, which maximizes immediate throughput, is a simple and robust strategy with reduced complexity. In this paper, we present a simple mathematical model to evaluate the saturation throughput and medium access delay of a myopic policy in the presence of multiple channels.

An Investigation of the Factors that Influence the Compliance to Information Security Policy: From Risk Compensation Theory (정보보안 정책 준수에 영향을 미치는 요인: 위험보상이론 관점에서)

  • Yim, Myung-Seong;Han, Kun Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.153-168
    • /
    • 2013
  • Information security has been a major concern in organizations. The longstanding question of how to improve employees security behaviors and reduce human errors remains unanswered and requires further exploration in the information security domain. To do this, we propose a risk compensation theory-based model and examine the model. Research results shows that the relationships between information security countermeasures and information security compliance intention of employees are moderated by system vulnerability. However, the finding is contrary to the previously held risk compensation assumption and deserve further study. In addition, system quality does not play a moderator role in the relationship. Conclusions and implications are discussed.

Optimal Software Release Policy for Random Cost Model

  • Kim, Hee-Soo;Shin, Mi-Young;Park, Dong-Ho
    • Communications for Statistical Applications and Methods
    • /
    • v.12 no.3
    • /
    • pp.673-682
    • /
    • 2005
  • In this paper, we generalize the software reliability growth model by assuming that the testing cost and maintenance cost are random and adopt the Bayesian approach to determine the optimal software release time. Numerical examples are provided to illustrate the Bayesian method for certain parametric models.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

A Study on the Factors affecting on Codependency. -Focusing on Double ABCX Model-

  • Ju, Sunyoung;Yang, Seongkwan;Park, Hwieseo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.117-124
    • /
    • 2017
  • The purpose of this study was to examine the factors influencing on Codependency of college students from Double ABCX model. This study examined the mediating relationship between boundary ambiguity, internal working model and psychological maladjustment, and then examined the moderating effects of Self-esteem, Social support and World view orientation. This study also examined the relationships of codependency with gender, enonomic level in college students. The results of the study are as follows. First, this study showed that codependency was related to economic level of college students. But it has not significant relationship with gender. Second, the moderating effects of Self-esteem, Social support and World view orientation was not significant. Third, mediating effects of Codependency on Boundary ambiguity, Internal working model and Psychological maladjustment were significant. This study suggested some theoretical and policy implications basing on this analytical results.