• Title/Summary/Keyword: 권한 통제

Search Result 172, Processing Time 0.028 seconds

A study on the environment-controlling system by members on the basis of HNS (HNS기반의 구성원별 자동 환경 제어 시스템에 관한 연구)

  • 황선주;조대제;임한규
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.720-723
    • /
    • 2003
  • So far the study of digital home has mainly been made up of the network technology and the sorority system, but the application to consider the discriminatory characteristics of the individual family members has been interested in comparison with the necessity. The system proposed in this study is to get the information of the internal users through the access-controlling system. The controller offers the discriminatory environment by activating the database of the internal users and controls the sub-system of the home-network. The suggested system can automatically offer the discriminatory environment among the family members by limiting TV programs or channels according to the users' age, by offering other internet environment according to the users, by putting restrictions on telephone numbers, or by restricting the settling right of the home-shopping companies.

  • PDF

The DRM System for UCC Rights Protection (UCC 저작권 보호를 위한 DRM 시스템)

  • Yang, Hyung-Kyu;Choi, Jong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.35-39
    • /
    • 2010
  • UCC is a key characteristic of so-called Web 2.0 which encourage the publishing of one's own content and commenting on other people's. Nowadays, UCC has become a widely used. Accordingly, problem of copyright become a issue. In this paper, we propose the DRM system for UCC rights protection. The system solve the copyright problem in UCC. Therefore, UCC creator can exert the right of UCC. In addition, if the problem of copyright occur, we can find the illegal user and call a him to account by CE information which is stored in UCC server and have a property that a manufacture of original contents can control the copyright.

Information Security Research for Smartwork System (Smartwork System을 위한 정보보호연구)

  • Cheon, Jae-Hong;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.323-325
    • /
    • 2016
  • Computing loud arrival times were, important data Clouding and, without being limited to the device, may process the information. Recently, work environment and improved access to Cloud and Mobile, this decision has been made to take effect immediately. However, when such important decisions of the government, the security is required. In this paper, we study the network access and control in IoT, Cloud, Bigdata, Smartwork System applied to Mobile. Study the authentication, authorization, and security for each security level Level of Service to connect to the DB information. Research of this paper will be used as the basis for the information processing and decision-making system design and construction of public institutions and agencies as important information for the protection Smartwork System.

  • PDF

Domestic and Foreign Status of Using MyData and Measures for Vitalization (마이데이터(MyData) 활용의 국내외 현황 및 활성화 방안)

  • Shim, Youn Sook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.553-558
    • /
    • 2020
  • Data has emerged as a key driver of national, corporate and individual competitiveness as a result of the entry into the data economy. The value of personal information is increasing in various fields such as customized services and social problem solving. MyData refers to a new paradigm in which individuals have the authority to manage and control their information and make active decisions on where to use and scope of personal information. MyData, which is emerging as a big topic in the data economy, is a necessary concept in an era when the value of data is important, and related laws and systems should be prepared.

Detection of Internal Illegal Query Using Packet Analysis (패킷 분석을 이용한 내부인 불법 질의 탐지)

  • Jang Gyong-Ohk;Koo Hyang-Ohk;Oh Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.259-265
    • /
    • 2005
  • The purpose of this study is for designing a illegal query detection system using Winpcap library for unauthorized access by internal person. The illegal query detection can be possible detecting the data in out of access control or searching illegal data by plagiarizing other user ID. The system used in this paper collects packets and analyzes the data related to SQL phrase among them, and selects the user's basic information by comparing the dispatch of MAC address and user's hardware information constructed previously. If the extracted information and user's one are different, it is considered as an illegal query. It is expected that the results of this study can be applied to reducing the snaking off unprotected data, and also contributed to leaving the audit records using user's access log which can be applied to the pattern analysis.

  • PDF

Design and Implementation of File Access Control System using Multi PIN and Biometrics based on Java Card (JAVA CARD기반의 생체정보 및 다중PIN을 이용한 파일접근 제어 시스템 설계 및 구현)

  • Gu, Eun-Hee;Shin, In-Chul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1075-1078
    • /
    • 2004
  • 급속한 정보기술 및 인터넷의 발달로 인해 네트워크를 통한 정보의 교류가 활발해지고 온라인 뱅킹 등 전자상거래와 관련된 산업의 규모가 커지면서 정보보안과 휴대용이 용이한 스마트카드는 여러 활용분야에서 사용되고 있다. 계속적인 하드웨어 기술의 발전으로 스마트카드의 표준으로 자리 잡고 있는 자바카드는 스마트카드 플랫폼에 자바의 기술을 접목시킨 것으로써 객체지향 중심의 기법으로 보안상 매우 좋은 이점을 지니고 있다. 또한 특성이 다른 하드웨어에서 같은 동작을 할 수 있는 개방형 운영체제를 가짐으로써 다양한 다수의 응용 프로그램을 수용할 수 있는 유연성을 가지게 한다. 본 논문에서는 이러한 자바카드의 특성을 이용하여 하나의 회원 카드로 다수의 사용자가 사용할 수 있는 접근통제가 가능한 회원카드를 설계하였다. 사용자에게 발급된 하나의 카드에 들어있는 정보를 개인이 아닌 다수의 사용자가 서로 다른 PIN을 이용하여 카드 내에 있는 사용자 정보를 접근하여 개인 정보의 확인, 관리내용 업데이트, 내용에 따른 청구를 카드 하나로 가능하게 하였다. 이때 사용자 인증수단으로 사용되는 PIN의 보안성을 높이기 위해 개인별로 고유한 생체인식의 한 구성요소인 서명 데이터를 이용하여 패스워드가 가지는 보안상의 취약요소를 없애 보다 안전한 사용자 인증을 하고자 한다. 이러한 자바카드의 이용기술과 생체인식 및 다중PIN을 이용한 사용자 인증, 파일의 보안 등급의 차등적인 접근권한을 설계하고 마지막으로 비주얼한 응용프로그램을 구현함으로써 카드를 보다 안전하고 편리하게 사용할 수 있기를 기대한다.

  • PDF

A Study on a Smart Home Access Control using Lightweight Proof of Work (경량 작업증명시스템을 이용한 스마트 홈 접근제어 연구)

  • Kim, DaeYoub
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.931-941
    • /
    • 2020
  • As natural language processing technology using machine learning develops, a Smart Home Network Service (SHNS) is drawing attention again. However, it is difficult to apply a standardized authentication scheme for SHNS because of the diversity of components and the variability of users. Blockchain is proposed for data authentication in a distributed environment. But there is a limit to applying it to SHNS due to the computational overhead required when implementing a proof-of-work system. In this paper, a lightweight work proof system is proposed. The proposed lightweight proof-of-work system is proposed to manage block generation by controlling the work authority of the device. In addition, this paper proposes an access control scheme for SHNS.

A Study on Launching of New Climate System and Greenhouse Gas Emissions Regulations in China's Ports (신기후체제의 출범과 중국 항만의 온실가스 규제에 관한 연구)

  • Kim, Sung-Kuk;Pak, Myong-Sop
    • Journal of Korea Port Economic Association
    • /
    • v.32 no.2
    • /
    • pp.73-90
    • /
    • 2016
  • In Climate change is a global issue that requires global responses. As a key factor in climate change, greenhouse gas (GHG) emissions have attracted increasing attention the international community. One of the crucial global efforts to alleviate climate change is the establishment of an international climate change regime, comprising rules, norms, principles, procedures that are applicable to a wide range of activities. The International Maritime Organization (IMO) received a mandate from the Kyoto Protocol to regulate shipping GHG emissions. However, the IMO Convention and the UN Convention on the Law of the Sea also provide regulations on regarding GHG emissions. To execute its mandate, the IMO has developed various regulatory initiatives. In addition, the Chinese government has declared new regulations which designate parts of its coastal waters as emission control areas (ECA). Owing to the growing recognition of the benefits of ECA, ships, including ocean-going vessels that operate in areas near the Pearl River Delta, Yangtze River Delta, and the Bohai Sea will be obliged to use fuel containing less than 0.5% sulfur. China's shipping industry is playing a growing role in the international shipping market, and its response to these initiatives will have a substantial effect on the future application of these regulations. This study analyzed the GHG mandates of the IMO and the Chinese government, and then examines the main outcomes that have been achieved.

Antecedents of the Independence of Standing Auditor: An Empirical Analysis in the Perspective of Ownership Structure (전문경영인의 지분율과 소유구조상의 특성이 상근감사의 독립성에 미치는 영향에 대한 연구)

  • Lee, Eun-Hwa;Yoo, Jae-Wook
    • Management & Information Systems Review
    • /
    • v.38 no.3
    • /
    • pp.35-53
    • /
    • 2019
  • A standing auditor can perform the monitoring and control activities for the opportunistic behaviors of top manager. However, for this purpose she/he must have the independence from top manager. Thus, this study is designed to analyze the factors that influences the independence of standing auditor. The independence of standing auditor as dependent variable was measured in terms of school and company ties to top manager. The relationship between the shareholding of professional top manager and independence of standing auditor, and the moderating effects of the shareholdings of related-party, institutional investors, and foreign investors were examined by implementing multiple regression and conditional moderating effect analyses. The findings present a negative relationship between the shareholding of professional top managers and the independence of standing auditor. They also reveal a positive moderating effect of the shareholding of related-party on that relationship. On the other hand, the shareholdings of foreign and institutional investors did not significant change the relationship between the shareholding of professional top manager and the independence of standing auditor. The findings imply that professional manager might be able to lower the controlling mechanism by appointing a standing auditor having low independence. Related-party as an internal control mechanism might be beneficial to reduce this effect while institutional investors or foreign investors as an external control mechanisms might not. This is the first study that examine the antecedents of the independence of standing auditor in terms of the characteristics of ownership structure. It provides a guideline for selecting an effective standing auditor with the consideration for ownership structure.

A Study on HCI Design based on Tactical Data Link integrated in KDDX Combat Management System for Korean-Type Mobile Fleet Control (차기구축함 전투관리체계에 통합된 전술데이터링크 기반의 한국형 기동함대 통제 HCI 설계에 관한 연구)

  • Song, Ha-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.482-492
    • /
    • 2019
  • The naval ship consists of a variety of classes, including patrol, frigate, destroyer and landing ship. There are various means of communication between combat ships belonging to the mobile fleet, including voice network, text message network and tactical data link. The operation at the existing mobile fleet level was conducted mainly on voice and text message, and tactical data link were used mainly to share tactical information between combat ships. This study intended to design HCI for commander like as KDDX of fleet level based on tactical data link, a means of communication between ships, to secure operational control of the mobile fleet. Recently, naval ships have been developed in the organization of various sensors, weapons and tactical data links integrated into the combat management system, and this study also designed the HCI based on the tactical data links integrated in the combat management system. The purpose of this study was to secure the operational efficiency of the tactical data link based on the combat management system in operation of the mobile fleet, and to improve the capability of the fleet commander to recognize the battlefield situation awareness.