• Title/Summary/Keyword: protection management

Search Result 3,016, Processing Time 0.028 seconds

The Design of License Agent Rights Protection (디지털 저작권 보호를 위한 라이센스 에이전트의 설계)

  • 이광형;이근왕;김희숙
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.275-282
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PBD security method real time action monitoring for user, data security for itself.

  • PDF

Design & Implementation of DRM System for End-to-end Content Protection (End-to-end 콘텐츠 보호를 위한 DRM 시스템 설계 및 구현)

  • Jeong Yeon-Jeong;Yoon Ki-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.35-44
    • /
    • 2006
  • Current technologies on digital rights management (DRM) have focused on security and encryption as a means of solving the issue of unauthorized copying, that is, locking the content and limiting its distribution to only purchasers. But, illegal content copy should be protected not only from purchasers but also from other principals such as media distributors and content providers. In this paper, we designed and implemented end-to-end digital lights management system that can cover a content protection on the overall value-chains of content distribution. Proposed system provides content protection and secure management of digital rights in creator, provider, and distributor like in purchaser. Accordingly it can provide an environment protecting each principal's digital rights and prohibiting illegal usage of content.

A Study on Privacy Protection Technology based on Blockchain and Zero Knowledge Proof (블록체인과 영지식 증명에 기반한 프라이버시 보호 기술 연구)

  • Kwang Kyu Lee
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.95-102
    • /
    • 2023
  • As the utilization value of personal information increases, discussions on how to provide personal information are active, but information required by institutions to utilize personal information is being exposed more than necessary. Therefore, personal privacy protection is essential to overcome the problems and limitations of personal information protection. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and demonstrates the excellence of personal information by implementing the Smart Personal Information Provision System (SPIPS) in the PBFT consensus algorithm through experiments.

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

QUALITY MANAGEMENT SYSTEM FOR NUCLEAR EDUCATION CENTRES

  • Sadagopan, Geetha;Kim, Hyunkee;Son, Miyeon
    • Journal of Radiation Protection and Research
    • /
    • v.37 no.4
    • /
    • pp.173-176
    • /
    • 2012
  • Quality Management is a recent phenomenon. This is applied to products or services, with an objective to deliver high quality, reliable, worthy, enduring, product or service. The process is considered to have four main components: quality planning, quality control, quality assurance and quality improvement. Focusing on quality control and quality assurance leads to achieving quality management or ensures that an organization or product is consistent. In this paper, the applicable international standard for learning services and for the organization for education and training (learning service provider) is discussed and also the procedure to implement the management system.

Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment (네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

Management of Woopo Wetland Ecosystem Using GIS (GIS를 이용한 우포늪 생태계 관리)

  • Yoo, Hwan-Hee;Kim, Jong-oh;Lim, Seoung-Ho
    • Journal of Wetlands Research
    • /
    • v.1 no.1
    • /
    • pp.51-59
    • /
    • 1999
  • As important ecological systems, wetlands contribute a wide array of biological, social. and economic benefits. However, wetlands are lost until the present, primarily due to human induced land-use conversions. Society is placing demands for the efficient preservation and management on Woopo wetland as the first largest wetland in Korea. GIS(Geographic Information System) is a rapidly developing technology for handling, analyzing, and modeling ecological information on wetlands. In the paper, Woopo Wetland Management System has been developed by using Desktop GIS and Internet GIS technology to embrace major functions: information query and browsing, spatial searching on map, and rule-based analysis. As a menu-driven system, these functions are designed to be implemented through customized menus. The developed system is expected to be used for the effective publicity service as well as the professional management of Woopo.

  • PDF

A Rectifying Inspection Plan Giving LTPD Protection for Destructive Testing (파괴검사시(破壞檢査時)의 계수선별형(計數選別型) LTPD 보증(保證)샘플링 검사방식(檢査方式))

  • Yu, Mun-Chan
    • Journal of Korean Society for Quality Management
    • /
    • v.15 no.1
    • /
    • pp.68-75
    • /
    • 1987
  • A rectifying inspection plan is considered for the case of destructive testing. Screening inspection for rejected lots is performed by some nondestructive testing which is prone to misclassification errors. Apparent defectives found in the screening process is replaced with apparent good items. The plan provides LTPD protection on each individual lot while the sum of the cost of testing and the cost due to producer's risk at process average quality is minimized. A brief discussion on average outgoing quality is also given.

  • PDF

FIRE PROTECTION FOR PETROCHEMICAL PLANT

  • Suh, Jung-H.
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 1997.11a
    • /
    • pp.244-251
    • /
    • 1997
  • Since 1970s, The Petrochemical Industry in Korea has grown rapidly by the successful economic growth. While the process became larger and more complex, hazardous chemicals have been used in large quantity, Therefore, the risk of a major accident such as fire, explosion and toxic material release has been increased. Korea has been ranked the fifth in petrochemical product capacity worldwide, also required to meet international standards on process safety management. Fire Protection System integral part of safely management in Petrochemical Plants, will be reviewed.

  • PDF

A Tabu Search Method for K-anonymity in database privacy protection

  • Run, Cui;Kim, Hyoung-Joong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.990-992
    • /
    • 2011
  • In this paper, we introduce a new Tabu method to get K-anonymity character in database information privacy protection. We use the conception of lattice to form the solution space for K-anonymity Character and search the solution area in this solution space to achieve the best or best approach modification solution for the information in the database. We then compared the Tabu method with other traditional heuristic method and our method show a better solution in most of the cases.