• 제목/요약/키워드: subject access

검색결과 372건 처리시간 0.025초

대학도서관 온라인 주제가이드의 현황과 개선방안에 관한 연구 (A Study on the Current State of Online Subject Guides in Academic Libraries)

  • 김수정
    • 정보관리학회지
    • /
    • 제29권4호
    • /
    • pp.165-189
    • /
    • 2012
  • 본 연구는 국내 대학도서관 웹사이트를 조사하여 온라인 주제가이드의 현황을 분석하고 개선 방안을 제언하였다. 조사된 100개 대학 중 14개 대학만이 온라인 주제가이드를 제공하고 있는 것으로 나타나 국내 온라인 주제가이드의 구축은 초기 단계인 것으로 나타났다. 온라인 주제가이드들은 내용 구성면에서 볼 때 접근성, 포맷의 일관성, 자원통합성 영역은 우수한 것으로 평가되었으나 주제 다양화, 이용자 교육, 검색 영역에서 낮은 수준에 머물러 있는 것으로 나타났다. 향후 온라인 주제가이드가 지향해야 할 방향은 신속한 정보자원으로의 접근, 주제 특화된 이용자 교육, 사서와의 원활한 커뮤니케이션을 제공하는 원스탑(one-stop) 서비스가 되어야 할 것이다.

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF

기록물관리기관의 열람환경 운영에 관한 연구 (A Study on Enhancing Accessibility to the National Archives)

  • 이숙희
    • 기록학연구
    • /
    • 제10호
    • /
    • pp.65-111
    • /
    • 2004
  • In the modern society, Archives are an available subject to the people of a nation and it is indispensable to build and appropriate access environment in order to connect the users and the registered records stored in the facilities. Specially, the Closed Shelves Access system, based on the notion of "a Policy of Archives Preservation", needs to be fully equipped with an access environment more adequate to its necessities. Hence, this study has analyzed all sorts of environments-institutional, organizational, human, physical and intellectual- from a general perspective in order to activate users to read the archives and based on this, the objective of the research is in proposing a program that effectively provides archives to the users and provides the basis for putting into practice an active access environment. The use of archives is the fountainhead in order to preserve archives. By using the archives, the meaning of preserving them is maximized. Whether these archives may be used or not will depend on the quality of information and the advancement of the access environment. Therefore, in order to motivate users to access the archives, first of all the facilities and the archivists must establish norms regarding the access, based on statutes and once they have been settled, they should provide other changes such as ; the development and fixation in the organization's structure, the education of specialized human labor, the expansion of physical space and the facilities and diverse positive services.

Resources for assigning MeSH IDs to Japanese medical terms

  • Tateisi, Yuka
    • Genomics & Informatics
    • /
    • 제17권2호
    • /
    • pp.16.1-16.4
    • /
    • 2019
  • Medical Subject Headings (MeSH), a medical thesaurus created by the National Library of Medicine (NLM), is a useful resource for natural language processing (NLP). In this article, the current status of the Japanese version of Medical Subject Headings (MeSH) is reviewed. Online investigation found that Japanese-English dictionaries, which assign MeSH information to applicable terms, but use them for NLP, were found to be difficult to access, due to license restrictions. Here, we investigate an open-source Japanese-English glossary as an alternative method for assigning MeSH IDs to Japanese terms, to obtain preliminary data for NLP proof-of-concept.

미국(美國) 통일(統一)컴퓨터정보거래법(情報去來法)(UCITA)의 적용범위(適用範圍)에 관한 소고(小考) (A study on the Scope of UCITA)

  • 한병완
    • 무역상무연구
    • /
    • 제19권
    • /
    • pp.169-190
    • /
    • 2003
  • Uniform Computer Information Transactions Act (UCITA) for e-commerce in non-UCC and non-UETA transactions, promulgated in 1999. The Act Drafted by the National Conference of Commissioners on Uniform State Laws. UCITA applies to contracts to license or buy software, contracts to create computer programs, contracts for on-line access to databases and contracts to distribute information over the Internet. UCITA does not apply to goods such as television sets, stereo equipment, airplanes or traditional books and publications. Goods generally remain subject to UCC Article 2 or Article 2A. Many transactions may include more than computer information. If that transaction covers non-goods subject matter, UCITA applies only to the part of the transaction which is computer information and other law applies to the other subject matter. In the event the other subject matter is goods, UCC Article 2 or 2A applies to the goods subject matter and UCITA applies to the computer information part. UCITA is coordinated with existing Articles 2 and 2A, so coverage of each to part of the transaction will be facilitated. With respect to other subject matter (primarily services) UCC Articles 2 and 2A have worked in mixed transactions with the common law applicable to the services.

  • PDF

안전한 XML 접근 제어의 정책 설계에 관한 연구 (A Study on Policy Design of Secure XML Access Control)

  • 조선문;주형석;유원희
    • 한국콘텐츠학회논문지
    • /
    • 제7권11호
    • /
    • pp.43-51
    • /
    • 2007
  • 접근 제어 기법은 아주 작은 단위의 보호 수준을 지원할 만큼 충분히 유연해야 한다. 또한 접근 제어 정책은 문서 타입과 관련하여 명세될 가능성이 매우 높으므로 문서가 기존의 접근 제어 정책에 의해 다루어지지 않는 상황을 적절하게 관리해야 한다. 기존의 접근 제어는 HTML의 근본적인 한계 때문에 정보 구조와 의미론을 충분히 고려하지 못하였다. 또한 XML 문서에 대한 접근 제어는 읽기 실행만을 제공하며, 복잡한 권한의 평가 과정 때문에 시스템 성능이 저하되는 문제점이 존재한다. 이러한 문제점을 해결하기 위해 본 논문에서는 미세 접근 제어가 가능한 XML 접근 제어 관리 시스템을 설계한다. 접근 제어 시스템을 개발함에 있어 어떤 권한부여를 명세하고 어떤 접근 제어를 실행해야 하는가와 관련하여 XML 문서 권한부여 주체와 객체 정책에 관하여 기술한다.

Comparison of User-generated Tags with Subject Descriptors, Author Keywords, and Title Terms of Scholarly Journal Articles: A Case Study of Marine Science

  • Vaidya, Praveenkumar;Harinarayana, N.S.
    • Journal of Information Science Theory and Practice
    • /
    • 제7권1호
    • /
    • pp.29-38
    • /
    • 2019
  • Information retrieval is the challenge of the Web 2.0 world. The experiment of knowledge organisation in the context of abundant information available from various sources proves a major hurdle in obtaining information retrieval with greater precision and recall. The fast-changing landscape of information organisation through social networking sites at a personal level creates a world of opportunities for data scientists and also library professionals to assimilate the social data with expert created data. Thus, folksonomies or social tags play a vital role in information organisation and retrieval. The comparison of these user-created tags with expert-created index terms, author keywords and title words, will throw light on the differentiation between these sets of data. Such comparative studies show revelation of a new set of terms to enhance subject access and reflect the extent of similarity between user-generated tags and other set of terms. The CiteULike tags extracted from 5,150 scholarly journal articles in marine science were compared with corresponding Aquatic Science and Fisheries Abstracts descriptors, author keywords, and title terms. The Jaccard similarity coefficient method was employed to compare the social tags with the above mentioned wordsets, and results proved the presence of user-generated keywords in Aquatic Science and Fisheries Abstracts descriptors, author keywords, and title words. While using information retrieval techniques like stemmer and lemmatization, the results were found to enhance keywords to subject access.

로그 분석을 통한 네이버 이용자의 디렉토리 접근 행태에 관한 연구 (Directory Access Behavior of the NAVER users via Log Analysis)

  • 배희진;이준호;박소연
    • 한국도서관정보학회지
    • /
    • 제35권1호
    • /
    • pp.1-17
    • /
    • 2004
  • 대다수의 웹 검색 포탈들은 인터넷 상의 정보들을 주제별로 분류한 디렉토리 서비스를 제공하며, 이러한 디렉토리들에 대한 접근 과정을 기록한 로그는 이용자의 실제 디렉토리 접근 행위를 사실적으로 반영한다. 본 연구는 디렉토리 서비스 이용자들의 다양한 디렉토리 접근 행태를 파악하기 위해 네이버에서 생성된 디렉토리 접근 로그들을 분석하였다. "세션"을 한 명의 이용자가 단일한 정보 요구를 지니고 디렉토리들을 접근한 일련의 과정으로 정의한 후, 본 연구에서는 전체 세션들을 정보 획득까지의 경로에 따라 여섯 가지 유형으로 분류하는 방법론을 개발하였다. 또한 세션 유형별 디렉토리 접근 빈도, 세션 내 항해 길이, 세션 내 주제에 대한 분석 결과를 제시하였다. 본 연구의 결과는 보다 효과적인 디렉토리 서비스 구축을 위한 근거로서 활용될 것으로 기대된다. 것으로 기대된다.

  • PDF

Performance Analysis of Large CDMA Random Access Systems with Retransmission Diversity over Fading Channels

  • Yu, Kai;Sun, Yi;Fan, Pingzhi;Lei, Xianfu;Shu, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권4호
    • /
    • pp.509-528
    • /
    • 2010
  • The random access systems, with retransmission diversity (RD) employment, over large random spreading code division multiple access (CDMA) channel subject to fading is investigated, under the assumption of infinite number of users and infinite spreading gain with their ratio converging to a constant. The low bound of the signal to interference and noise ratio (SINR) is shown to converge almost surely to a constant. The throughput, spectrum efficiency and energy efficiency in the dominating systems are obtained. The analytical results are confirmed by simulations. We find that in high traffic loads the throughput with fading is higher than that without. When the energy efficiency increases, the spectrum efficiency tends to two contrary values due to SNR increases or decreases. For the ordinary stable systems, the stability region is shown to shrink as the traffic increases and enlarge with RD employment.

확장 멀티캐스트를 이용한 다중레벨 전자상거래 보안에 관한 연구 (A Study on the Multilevel Electronic Commerce Security using Scalable Multicast)

  • 서장원
    • 한국전자거래학회지
    • /
    • 제7권1호
    • /
    • pp.66-74
    • /
    • 2002
  • Through the increment of requirement for EC(Electronic Commerce) oriented communication services, security multicast communications is becoming more important. However, multicast to EC environment is much different from unicast concept most network security protocols. On the network security, using mandatory access control of multilevel architecture which assigns a specific meaning to each subject, so we accomplish access control. In this way, access control security based on the information security level is proposed. A security protocol based on the architecture proposed in this paper would be utilized in security multicast communications, group key management service and leveled security service through multilevel EC security policy, Also we discuss and propose the security level scaleability and key management method on the network.

  • PDF