• Title/Summary/Keyword: Access authority

Search Result 243, Processing Time 0.04 seconds

A Study on Suggestion for KCR and KORMARC by Analyzing Work and Expression Element of RDA in MARC (MARC 데이터의 RDA 저작 및 표현형 요소 분석을 통한 한국목록규칙 및 KORMARC의 고려사항)

  • Lee, Mi-Hwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.2
    • /
    • pp.251-272
    • /
    • 2010
  • Resource Description and Access(RDA) was published in 2008, reflecting IFLA IME ICC's International Cataloguing Principles(ICP), conceptual model for cataloging of Functional Requirement for Bibliographic Records(FRBR), and conceptual model for authority data of Functional Requirement for Authority Data(FRAD). Therefore, new tags and fields have been added to MARC21 format, and researches about the prototype have been studied to implement FRBR as envisioned by the new RDA standard. According to the innovative international cataloging environments, KCR and KORMARC must be revised to accommodate RDA description. This study was to grasp occurrence rate of work and expression element of FRBR and RDA among MARC field of Hansung University library and to analyze limitation of MARC data for RDA. Based on this limitations, cataloging rules and tags and fields of KORMARC were suggested to accommodate RDA in national cataloging environment. This study reviewed cataloging rules such like representation, main entry and rule of three, preferred title, types of content, media and carrier. This study is to suggest the consideration of KCR and KORMARC for RDA in Korea.

  • PDF

Detection and Blocking Techniques of Security Vulnerability in Android Intents (안드로이드 인텐트의 보안 취약성 탐지 및 차단 기법)

  • Yoon, Chang-Pyo;Moon, Seok-jae;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.666-668
    • /
    • 2013
  • Recently, the kind and number of malicious code, which operates in Operation System of smart devices, are rapidly increasing along with the fast supplement of smart devices. Especially, smart devices based on Android OS have high potential of danger to expose to malicious code as it has an easy access to system authority. When using intent, the global message system provided from Android, inter approach between applications is available, and possible to access to created data by the device. Intent provides convenience to application development in the aspect of reusability of component however, it could be appointed as a risk element in security-wise. Therefore, if intent is used in malicious purpose, it is easy to lead the condition where is weak on security. That is, it is possible to control as accessing to resources which application is carrying to operate by receiving intents as making smart device uncontrollable or consuming system resources. Especially, in case of system authority is achieved, the risks such as smart device control or personal information exposure become bigger when misusing broadcast intent through malicious code. This paper proposes a corresponding method of security vulnerability of Android intent that monitors the appearance of intent with intent pattern inspection, detects and blocks unidentified pattern intent.

  • PDF

A Dynamic Transaction Routing Algorithm with Primary Copy Authority (주사본 권한을 이용한 동적 트랜잭션 분배 알고리즘)

  • Kim, Ki-Hyung;Cho, Hang-Rae;Nam, Young-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1067-1076
    • /
    • 2003
  • Database sharing system (DSS) refers to a system for high performance transaction processing. In DSS, the processing nodes are locally coupled via a high speed network and share a common database at the disk level. Each node has a local memory and a separate copy of operating system. To reduce the number of disk accesses, the node caches database pages in its local memory buffer. In this paper, we propose a dynamic transaction routing algorithm to balance the load of each node in the DSS. The proposed algorithm is novel in the sense that it can support node-specific locality of reference by utilizing the primary copy authority assigned to each node; hence, it can achieve better cache hit ratios and thus fewer disk I/Os. Furthermore, the proposed algorithm avoids a specific node being overloaded by considering the current workload of each node. To evaluate the performance of the proposed algorithm, we develop a simulation model of the DSS, and then analyze the simulation results. The results show that the proposed algorithm outperforms the existing algorithms in the transaction processing rate. Especially the proposed algorithm shows better performance when the number of concurrently executed transactions is high and the data page access patterns of the transactions are not equally distributed.

A Comparative Study on the Architectural Characteristics of Gunjajeong and Gyejeong (군자정(君子亭)과 계정(溪亭)의 건축특성 비교 연구)

  • Jang, Sun-Joo
    • Journal of the Korean housing association
    • /
    • v.25 no.6
    • /
    • pp.57-66
    • /
    • 2014
  • With regard to the pavilion buildings of Imcheonggak Gunjajeong and Donglakdang Gyejeong that are located within residential areas, this study focused on the construction background, the building owner's circumstances and the location environment of these buildings, and attempted to derive the architectural characteristics presented by these two pavilion buildings and, through this, to grasp the architect's intention of plan. The results of this study are as follows. With regard to Gunjajeong, it could be confirmed that, first, it is located in a propitious site and took the composition that follows the family ritual standards for the family rituals of the scholar-gentry class and opens to visitor access, and second, the floor height of the site and interior space was designed so that Munpilbong on the south and the Sarangchae on the west, and the Sadang on the east can be connected visually, and third, the authority and dignity of the head family were built through the symmetric 丁-shaped plane figure, the wide partition module, the form-centered building, and the hierarchical composition of the roof. On the other hand, with regard to Gyejeong, it could be confirmed that, first, it is located along the stream of Jagye valley that has no mountains in the front and in the back and took the composition that put the name symbolizing Taoist thoughts on the surrounding natural environment and was closed to visitor access but opens to nature, and second, with Jagye and Jagye surroundings as the main landscape, it built the concept of intended landscape that symbolizes the Taoist thoughts by giving names not only simply to the visible objects but also to surrounding rocks, and third, the asymmetric ㄱ-shaped plane composed a yard-centered space rather than emphasizing the shape, and connected the part of the plane with Jagye so as to be embodied as a personal inner self-perfecting place that closely communicates only with nature away from the mundane world.

An Integrated Authentication System for Mobile Codes (이동코드를 위한 통합 인증 시스템)

  • Bae, Seong-Hun;Lee, Su-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.535-542
    • /
    • 2001
  • Mobile codes such as Java, Java-Script, ActiveX, and Script code are loaded into a client system first and then run without any notice to the client user. Executing code by this mechanism may cause various security problems such as flowing out system information, deleting or modifying files, and exhausting system resources. In this paper we propose an integrated authentication system to establish the uniform security countermeasure on various mobile codes. The system helps to solve to problems mentioned above. An integrated authentication system allows to load into an interpreter using ACL (Access Control List) which sets up an access authority to the executable contents and communicates with an interpreter using client/server model.

  • PDF

An Analysis of Usability of the Catalogue in the KCR4 (한국목록규칙 4판에 반영된 목록의 유용성)

  • Lee, Chang-Soo
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.3
    • /
    • pp.137-148
    • /
    • 2005
  • In this paper we outline the evolving process of the cataloguing rules in Korea focused on the standardization. We analyzed the new and updated rules under the KCR4( Korean Cataloguing Rules, 4th edition) in terms of usability of the catalogue. Our findings can be summarized as follows: 1) Since there are the rules of the unlimited number of the statement of responsibility, the access point is expanded and may bring the high searchability as a result, 2) Since the rules of the general material designations are added, the catalogue users may easily identify the material, 3) Since the rules of the material specific details area are added, the catalogue users may easily understand the characteristics and other features of a publication, 4) The KCR4 seems a kind of the integrated cataloguing rules for diverse types of materials including the monographs, 5) Since the rules of choice and forms of the access point treated in the authority control, there seem some Problems in usability of the catalogue, 6) The concept of the uniform heading is eliminated which seems considered only for the convenience of the cataloguers not for usability of the catalogue.

  • PDF

A Specification for Restricted Delegation to suitable on Distributed Computing (분산 컴퓨팅에 적합한 제한적인 위임 명세)

  • Eun Seung-Hee;Kim Yong-Min;Noh Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1015-1024
    • /
    • 2005
  • A delegation of privileges is one of important processes that empower authority to relevant node to process job that user wants in large-stale distributed environment such as Grid Computing. However, existing delegation methods do not give suitable privilege about Job, and do not atomize range of delegation and exists delegation of access privilege for only resources itself that is not delegation about executing process of job itself. Also, they do not apply about process that needs delegation before and after. execution of job such as reservation of system resources or host access before and after execution. Therefore, this paper proposes a method and specification for restricted delegation in distributed environment. Proposed method separates delegation for job side and privilege side, and express specification and procedure of delegation using XML schema and UML and present restricted delegation scenario in distributed computing environment.

Research on the Implementation of the Bilateral Fisheries Order in the East China Sea after Establishing the China-Japan Fisheries Agreement (중·일 어업협정에 따른 양국 어업질서의 이행 실태 진단)

  • KIM, Dae-Young
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.27 no.4
    • /
    • pp.1053-1062
    • /
    • 2015
  • This research assesses the implementation of the bilateral fisheries order of the China-Japan fisheries agreement. After establishment of UNCLOS, the China-Japanese fisheries agreement has played as a basis for the fisheries order in the East China Sea. The China-Japanese fisheries agreement intends that the fisheries industries in China and Japan can utilize the renewable natural resources in the East China Sea. As the EEZ of China overlaps with that of Japanese in the East China Sea, the two countries established the China-Japan Provisional Measure Zone and Middle Zone in the Sea. Even though the three coastal States (e.g. Korea, China, and Japan) in the East China Sea are involved in managing these zones, there has been little effort to coordinate each county's management. Additionally, the Taiwan-Japan fisheries agreement, which is for the area of N $27^{\circ}$, has made costal States to establish and implement united measures to conduct effective fisheries management. Regarding access to the joint fishing zone in EEZ, Chinese fisheries regulations have been enforced in the zone because the fishing capacity of China exceeds all of other countries, reducing the number of fishing licenses and catch quotas. It turned out that a nation that has authority over fisheries resources tends to establish specific conditions of fishing operations to maximize its national interest. In the China-Japan Provisional Measure Zone, Chinese and Japanese authorities have introduced united measures to manage fisheries resources. However, in the Middle Zone between China and Japan, there is no regulation on fishing; both countries' fishing vessels can have free access to the zone. Thus, it is recommended that one should introduce an international fisheries management regime for the Middle Zone. In this regard, Korea should play a leading role in establishing the international management regime because Korea has middle position in terms of geographical standpoint, the degree of dependence on commercial fishing, and its fishing capacity.

An Optimization Model for Railway Slot Allocation Reflecting the Operational Policies (운영 정책을 반영한 철도 슬롯 할당을 위한 최적화 모형 연구)

  • Park, Bum Hwan;Hong, Soon-Heum;Kim, Chung-Soo
    • Journal of the Korean Society for Railway
    • /
    • v.15 no.5
    • /
    • pp.524-530
    • /
    • 2012
  • Recently, open access policy to railway operation has been widely discussed. Compared to the case of Korea, European countries have dealt with this topic over a few decades. The competition on railway slots incurs an important technological problem about how to optimally allocate railway slots requested from RUs to them. In other words, the authority should be able to coordinate the timetables requested from RUs in the non-discriminatory manner. Related with the coordination, compared to the other European countries, which have done many studies and experiments especially on auction mechanisms, Korean railway has paid less attention to this topic and there have not been any related studies. Our study analyses the state-of-the-arts about the railway slot allocation especially focusing on the auction mechanisms and the associated optimization problems. And we suggest a new railway slot allocation mechanism and related optimization model reflecting the adjustment within the tolerance and the operational policies between railway undertakings.

Design of Personal Information Security Model in U-Healthcare Service Environment (유헬스케어 서비스 환경 내 개인정보 보호 모델 설계)

  • Lee, Bong-Keun;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.189-200
    • /
    • 2011
  • With rapid development and contribution of IT technology IT fushion healthcare service which is a form of future care has been changed a lot. Specially, as IT technology unites with healthcare, because delicate personal medical information is exposed and user's privacy is invaded, we need preperation. In this paper, u-healthcare service model which can manage patient's ID information as user's condition and access level is proposed to protect user's privacy. The proposed model is distinguished by identification, certification of hospital, access control of medical record, and diagnosis of patient to utilize it efficiently in real life. Also, it prevents leak of medical record and invasion of privacy by others by adapting user's ID as divided by user's security level and authority to protect privacy on user's information shared by hospitals.