• Title/Summary/Keyword: Access System

Search Result 6,593, Processing Time 0.037 seconds

A Design and Implementation of DRM System by Applying System Authentication Method (시스템 인증기법을 적용한 DRM 시스템 설계 및 구현)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.177-184
    • /
    • 2009
  • The digital contents distribution system via network provides comfortability, usability, and diversified functions to content's users. However, for the characteristic of easy access of digital contents, the copyright infringements and indiscreet contents distribution are realized in this days. In other words, any users with the authentication key can access to copyright contents with any restrictions. To solve this problems, we proposed a user authentication mechanism which prevent indiscreet access to the digital content by using user system information. Also, to provide safe distribution of digital content, we used user's unique content authentication key.

Packet Scheduling Algorithm Considering a Minimum Bit Rate for Non-realtime Traffic in an OFDMA/FDD-Based Mobile Internet Access System

  • Kim, Dong-Hoi;Ryu, Byung-Han;Kang, Chung-Gu
    • ETRI Journal
    • /
    • v.26 no.1
    • /
    • pp.48-52
    • /
    • 2004
  • In this letter, we consider a new packet scheduling algorithm for an orthogonal frequency division multiplexing access/frequency division duplex (OFDMA/FDD)-based system, e.g., mobile broadband wireless access or high-speed portable internet systems, in which the radio resources of both time and frequency slots are dynamically shared by all users under a proper scheduling policy. Our design objective is to increase the number of non-realtime service (e.g., WWW) users that can be supported in the system, especially when the minimum bit rate requirement is imposed on them. The simulation results show that our proposed algorithm can provide a significant improvement in the average outage probability performance for the NRT service, i.e., significantly increasing the number of NRT users without much compromising of the cell throughput.

  • PDF

Blockchain-Based Access Control Audit System for Next Generation Learning Management (차세대학습관리를 위한 블록체인 기반의 접근제어 감사시스템)

  • Chun, Ji Young;Noh, Geontae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.351-356
    • /
    • 2020
  • With the spread of COVID-19 infections, the need for next-generation learning management system for undact education is rapidly increasing, and the Ministry of Education is planning future education through the establishment of fourth-generation NEIS. If the fourth-generation NEIS System is well utilized, there are advantages such as providing personalized education services and activating the use of educational data, but a solution to the illegal access problem in an access control environment where strict authorization is difficult due to various user rights. In this paper, we propose a blockchain-based access control audit system for next-generation learning management. Sensitive personal information is encrypted and stored using the proposed system, and when the auditor performs an audit later, a secret key for decryption is issued to ensure auditing. In addition, in order to prevent modification and deletion of stored log information, log information was stored in the blockchain to ensure stability. In this paper, a hierarchical ID-based encryption and a private blockchain are used so that higher-level institutions such as the Ministry of Education can hierarchically manage the access rights of each institution.

A Study on the Realization of Digital Multimedia Broadcast Receiving System using Conditional Access System (제한수신시스템을 적용한 디지털 멀티미디어방송 수신시스템 구현에 관한 연구)

  • Kim, Young-Bin;Ryu, Kwang-Ryol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.340-343
    • /
    • 2005
  • A realization for digital multimedia receiving system using Conditional Access System is presented in this paper. The key word for descrambling is make from smart card and Conditional Access System, a Stabilization is grow up in the method. It is possible to decoding that of average 15 fame/second of H.264 video format and that 24Khz${\sim}$48Khz audio sample rate using dual processor that of high performance DSP and RISC. This system is evaluated correct descrambling procedure in test stream added that signed user data.

  • PDF

Policy System of Data Access Control for Web Service (웹 서비스를 위한 데이터 접근 제어의 정책 시스템)

  • Jo, Sun-Moon;Chung, Kyung-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.11
    • /
    • pp.25-32
    • /
    • 2008
  • Access control techniques should be flexible enough to support all protection granularity levels. Since access control policies are very likely to be specified in relation to document types, it is necessary to properly manage a situation in which documents fail to be dealt with by the existing access control policies. In terms of XML documents, it is necessary to describe policies more flexibly beyond simple authorization and to consider access control methods which can be selected. This paper describes and designs the access control policy system for authorization for XML document access and for efficient management to suggest a way to use the capacity of XML itself. The system in this paper is primarily characterized by consideration of who would exercise what access privileges on a specific XML document and by good adjustment of organization-wide demands from a policy manager and a single document writer.

A Study on Improving Access & Retrieval System of the National Library of Korea Subject Headings (국립중앙도서관 주제명표목표 검색 시스템 개선 방안에 관한 연구)

  • Baek, Ji-Won;Chung, Yeon-Kyoung
    • Journal of the Korean Society for information Management
    • /
    • v.31 no.1
    • /
    • pp.31-51
    • /
    • 2014
  • This study aims to suggest several improvement strategies for the access and retrieval system of National Library of Korea Subject Headings (NLKSH). For this purpose, first of all, the access and retrieval systems in five selected subject headings were examined. Second, focus group interviews and system analysis were conducted to reveal the current condition and suggest the future development strategies. Third, IFLA's Guidelines for Subject Access in National Bibliographies and FAST application cases were analyzed to suggest implications on the improvement strategies. Upon these analysis, recommendations for improving access and retrieval systems of the NLKSH were proposed in four areas as follows: functionalities, interfaces, queries, and other front-end features.

Economic Justification of the Internet Access Management (인터넷 차단 시스템의 경제성 분석에 대한 연구)

  • Kim, Sang-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.269-278
    • /
    • 2005
  • To justify the economic impacts of the internet access management is a purpose of this paper. Previous researches on economic justification were reviewed and the internet access management system. sniffer, and firewall were implemented to monitor real-time sessions and to record blocked attempts. This paper suggests the impact factors and measurement methods to justify the economic values of the internet access management system. Finally, this paper Proves that the overall impacts of the internet access management system have a Positive value because filtering mechanisms cause users to lose a small number of URLs including useful information and to diminish refreshment but save users from various risk points and enhance labor productivity.

  • PDF

신규 가입자망 기술의 경제성 평가를 위한 망 구조모형과 그 응용

  • 류태규;이정동;김태유
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2000.11a
    • /
    • pp.45-67
    • /
    • 2000
  • Broadband access technologies plays an important role in the national information infrastructure. In the evolution path of the information infrastructure, the relative economics of alternative access technology is the most critical determining factor. In this paper, we discuss the economics of local loop access technologies of existing technologies, such as, ADSL, HFC, and new PLC. To do this, we suggest appropriate configuration of access network system and its associated numerical equations. To modelize access network system and drive the numerical equations, we consider the DS (Double Star) and the T&B (Tree & Brench) architecture and analyse the adequate block diagram of each access system for each technology We introduce the density of subscriber as a key variable and the equation of allocating optimal number of cell in a service area. We analyze the relative economics of local loop architecture in two different situations, that is, urban and rural. From the empirical implementation, we found that for the case of urban area, where the cost of cable and infrastructure is not necessary, there is not much difference in the cost per one subscriber. However, for the case of rural region, we found that there is remarkable difference in the cost per one subscriber among technologies. Therefore we conclude that the economics of local loop architecture is depend on the density of subscriber and existing network infrastructures. we hope that this paper contribute to the optimal technology selection of consmer, technology Providers, and government.

  • PDF

Role based access control of healthcare information system for Mobile environments (모바일 환경에 적합한 헬스 케어 정보 시스템에서의 역할기반 접근제어)

  • Lee You-Ri;Park Dong-Gue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.119-132
    • /
    • 2005
  • The health care system revolutionized by the use of information and communication technologies. Computer information processing and electronic communication technologies play an increasingly important role in the area of health care. We propose a new role based access control model for pervasive health care systems, which changed location, time, environment information. Also our model can be solved the occurrence of an reduction authority problem to pervasive health care system at emergency environment. We propose a new role based access control model for pervasive health care systems, which combines role-to-role delegations, negative permission, context concept and dynamic context aware access control. With out approach we aim to preserver the advantages of RBAC and offer groat flexibility and fine-grained access control in pervasive healthcare information systems.

  • PDF

Interference Pattern Analysis in the Optical CDMA system using the SCAE and SCAD (SCAE와 SCAD를 이용한 광 CDMA시스템에서 간섭패턴 분석)

  • Kang, Tae-Gu;Choi, Jae-Kyong;Park, Chan-Young;Choi, Young-Wan
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.37 no.1
    • /
    • pp.44-51
    • /
    • 2000
  • We have analyzed optical matched filters considering the third order signals in the optical code division multiple access (CDMA) system based on optical series coupler access encoder (SCAE) and series coupler access decoder (SCAD). In previous studies, the performance evaluation of the optical CDMA system using SCAE and SCAD was not sufficiently accurate because they analyzed system performance only considering the first order signals. Since optical SCAE and SCAD intrinsically have high order signals of various patterns as the number of coupler increases, they change auto- and cross-correlation intensities. Thus, it is necessary to investigate properties of the third order signals so that we may analyze the exact performance of system. In this paper, we mathematically interpret the optical signals up to the third order, and analyzed the effects of th third order signals on auto- and cross-correlation intensities. In result, as ${\alpha}$(coupling coefficient) value increases, the intensity of the third order signals increases. It is found that the peak to side-lobe ratio considering the third order signals is degraded by 3.75 dB at N(coupler number)=5 and ${\alpha}$=0.5. Also if threshold value in receiver is set by main-lobe peak of the first order signals, it is found that the number of users in an optical CDMA system is limited because the intensity peak of side-lobes is raised by the third order signals.

  • PDF