• Title/Summary/Keyword: subject access

Search Result 372, Processing Time 0.023 seconds

Extended Role Based Access Control Model with Multilevel Security Control (다단계 보안통제가 가능한 확장된 역할기반 접근통제 모델)

  • Kim, Hak-Beom;Hong, Gi-Yung;Kim, Dong-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1886-1902
    • /
    • 2000
  • RBAC(Role Based Access Control) is an access control method based on the user's roles and it provides more flexibility and applicability on the various computer and network security fields than DAC(Discretionary Access Control) or MAC(Mandator Access Control). In this paper, e newly propose ERBAC\ulcorner(Extended RBAC\ulcorner) model by considering subject's and object's roles and security levels for roles additionally to RBAC\ulcorner model which is firstly proposed by Ravi S. Sandhu as a base model. The proposed ERBAC\ulcorner model provides finer grained access control with multilevel security on he base of subject and object level than RBAC\ulcorner model.

  • PDF

Sensitive Personal Information Protection Model for RBAC System (역할기반 접근제어시스템에 적용가능한 민감한 개인정보 보호모델)

  • Mun, Hyung-Jin;Suh, Jung-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.103-110
    • /
    • 2008
  • Due to the development of the e-commerce, the shopping mall such as auction collects and manages the personal information of the customers for efficient service. However, because of the leakage of the Personal information in auction, the image of the companies as well as the information subjects is damaged. Even though the organizations and the companies store the personal information as common sentences and protect using role based access control technique, the personal information can be leaked easily in case of getting the authority of the database administrator. And also the role based access control technique is not appropriate for protecting the sensitive information of the information subject. In this paper, we encrypted the sensitive information assigned by the information subject and then stored them into the database. We propose the personal policy based access control technique which controls the access to the information strictly according to the personal policy of the information subject. Through the proposed method we complemented the problems that the role based access control has and also we constructed the database safe from the database administrator. Finally, we get the control authority about the information of the information subject.

  • PDF

Subject Approach to Information Retrieval with Special Reference to Bengali Documents: A Critical Study

  • Halder, Sambhu Nath
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.3
    • /
    • pp.51-68
    • /
    • 2020
  • The library provides its services to satisfy the user's approach. Naturally, the development of library services may determine by considering the satisfaction of users. It traces users' perceptions regarding subject access highlighting problems in the retrieval of Bengali documents by subject. This study has designed to assess users' attitudes towards the retrievals of Bengali documents in OPAC through subject headings. For a collection of data, a representative sample has drawn from a large and heterogeneous population consisting of users in university libraries of West Bengal using a stratified sampling technique. Subsequently, under each of the universities, users' community was stratified into students, research scholars, and faculty members. Under each stratum, the sample selected on a random basis. The users met personally to collect relevant data, while they came to the library and went on to search OPAC. A structured schedule, prepared for the purpose, was presented before library users and consequently, interviews and interpretations recorded systematically. In this manner, several factors have identified concerning subject searching and retrieval performance for Bengali documents. This study explores the access using subject headings in multilingual information retrieval systems. Moreover, the suitability of subject headings for retrieval of Bengali resources has ascertained from the users' point of view. The findings demand standard principles and rules for the construction of Bengali subject headings to maintain uniformity and consistency.

A Study on a Design of Subject Classification Schemes for Internet Bookstores (인터넷 서점의 주제별 분류체계 설계에 관한 연구)

  • Chung, Yeon-Kyoung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.35 no.3
    • /
    • pp.17-34
    • /
    • 2001
  • It is very important to organize materials at intemet bookstores. It is time for us to develop a subject classification scheme as a tool for increasing the effectiveness of information retrieval with ease of subject access. The purpose of this study is to examine the subject features of internet bookstores in order to suggest the effective design of the subject scheme for them. Nine internet bookstore websites are analyzed at the aspect of the subject classification of the materials. Based upon the results of this study, an effective subject classification for internet bookstores is suggested to provide a better subject access.

  • PDF

A Study on the Library of Congress's Subject Headings as an Information Access Point (정보의 접근점으로서 미국의회도서관 주제명 표목에 관한 연구)

  • Chung, Yeon-Kyoung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.2
    • /
    • pp.51-72
    • /
    • 2010
  • The purpose of this study is to explore usefulness of the Library of Congress Subject Headings(LCSH)for librarians as an information access point. Sixty four librarians at the University of Washington(UW)and 67 librarians from the Council on East Asian Libraries(CEAL) participated through web surveys about LCSH and 9 librarians from UW and 10 librarians from CEAL joined in-depth interviews and e-mail correspondences. It was concluded that LCSH was very useful for finding other related materials as a subject access point. However, there were two necessary improvements recommended for the LCSH. First of all, in aspect of terminology, subject headings should be more familiar to the public with currency and show clear definitions and relationships. Second, with regard to the structure of LCSH, it should have simplicity, ease of use, and consistency when using combinations of subject headings. Since many other countries are using or adapting LCSH, its effect can be very strong. Therefore, the meaning of "Tok Island (Korea)" as well as diplomatic and scholarly efforts with sensing movements of other countries.

Subject Searching Using Controlled Vocabulary Versus Uncontrolled Vocaburary in Online Catalog System: Focusing on Multilingual Environment

  • Choi, Hee-Yoon
    • Journal of Information Management
    • /
    • v.26 no.2
    • /
    • pp.61-79
    • /
    • 1995
  • The purpose of this paper is to investigate search efficiency of controlled vocabulary versus uncontrolled vocabulary subject access in online catalog systems. The question of the effectiveness of controlled versus uncontrolled vocabulary in information retrieval has been raised in many literatures. A debate continues in the Library and Information Science Professions over the relative merit, appropriateness, and efficiency of uncontrolled vocabulary subject access in online catalog systems. Actually users used to combine uncontrolled vocabulary subject searching with controlled vocabulary subject searching. But the success of user's subject search depends on his choice of search terms. Also the technical developments that facilitate cooperation among information services in general make it increasingly possible for such cooperation to take place on an international level. In this study, several common types of vocabularies on online catalog systems are described and compared, especially usages of vocabularies in multilingual environment are analyzed.

  • PDF

Role Based Access Control Model contains Role Hierarchy (역할계층을 포함하는 역할기반 접근통제 모델)

  • 김학범;김석우
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.49-58
    • /
    • 2002
  • RBAC(Role Based Access Control) is an access control method based on the application concept of role instead of DAC(Discretionary Access Control) or MAC(Mandatory Access Control) based on the abstract basic concept. Model provides more flexibility and applicability on the various computer and network security fields than the limited 1functionality of kernel access control orginated from BLP model. In this paper, we propose $ERBAC_0$ (Extended $RBAC_0$ ) model by considering subject's and object's roles and the role hierarchy result from the roles additionally to $RBAC_0$ base model. The proposed $ERBAC_0$ model assigns hierarchically finer role on the base of subject and object level and provides flexible access control services than traditional $RBAC_0$ model.

  • PDF

Extended Role Based Access Control Model (확장된 역할기반 접근통제 모델)

  • 김학범;홍기융;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.47-56
    • /
    • 1999
  • RBAC(Role Based Access Control) is an access control method based on the user's roles and it provides more flexibility and applicability on the various computer and network security fields than DAC(Discretionary Access Control) or MAC(Mandatory Access Control). In this paper, we newly propose ERBAC$_{0}$(Extended RBAC$_{0}$) model by considering subject's and object's roles additionally to REAC$_{0}$ model which is firstly proposed by Ravi S. Sandhu as a base model. The proposed ERBAC$_{0}$ model provides finer grained access control on the base of subject and object level than RBAC$_{0}$ model.

A Study on Authentication and Authorization on Entity in Grid (Grid 환경에서 엔티티 인증과 권한부여에 관한 연구)

  • Kug, Joung-Ook;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.273-280
    • /
    • 2003
  • When an existing user authorization systems in Grid access many user to local system and subject DN (Distinguished Name) in a user-proxy authenticate and ID in local system is one-to-one mapping, they have difficulties in ID management, memory resource management and resource management. At this, a variety of subject DN is shared of one local ID in an existing Grid. But this faces many difficulties in applying all requirements for many Grid users. Thus, we suppose user authorization system based on a certificate not them based on ID in this paper. That is, we add user's access level to extension field in a certificate, and make a supposed authorization system decide access limitation level on resources instead of an existing ID mapping methods.

DDC in DSpace: Integration of Multi-lingual Subject Access System in Institutional Digital Repositories

  • Roy, Bijan Kumar;Biswas, Subal Chandra;Mukhopadhyay, Parthasarathi
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.7 no.4
    • /
    • pp.71-84
    • /
    • 2017
  • The paper discusses the nature of Knowledge Organization Systems (KOSs) and shows how these can support digital library users. It demonstrates processes related to integration of KOS like the Dewey Decimal Classification, $22^{nd}$ edition (DDC22) in DSpace software (http://www.dspace.org/) for organizing and retrieving (browsing and searching) scholarly objects. An attempt has been made to use the DDC22 available in Bengali language and highlights the required mechanisms for system-level integration. It may help a repository administrator to build an IDR (Institutional Digital Repository) integrated with SKOS-enabled multilingual subject access systems for supporting subject descriptors based indexing (DC.Subject metadata element), structured navigation (browsing) and efficient searching.