• Title/Summary/Keyword: Access authority

Search Result 243, Processing Time 0.026 seconds

A Study on the Structure of Headings in Authority Records (전거레코드 표목의 구조화 연구 - 인명과 단체명 전거레코드의 표목을 중심으로 -)

  • Kim, Tae-Soo;Kim, Lee-Kyum;Lee, Hye-Won;Kim, Yong-Kwang;Park, Zi-Young
    • Journal of Information Management
    • /
    • v.40 no.3
    • /
    • pp.1-21
    • /
    • 2009
  • This study aims to suggest some idea for construction of headings in authority records to improve conventional method for authority control. The reference structure between established form and other forms was replaced by the link structure based on access points and adopting standard authority numbers was considered. Additional elements such as work information to distinguish homonym and notational system of the headings to promote sharing of authority records were also addressed. Authority records management system was constructed to test structure of headings suggested in this study, too. Through this research, we confirmed that management, identification, and sharing of authority records were considerably improved compared with the conventional authority control system.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

A Study on Developing a Name Access Point Control System to Improve the Performance of Information Retrieval from Institutional Repositories (기관 리포지터리의 검색기능 향상을 위한 인명 접근점제어 시스템 구축 연구)

  • Kim, Mi-Hyang;Kim, Tae-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.3
    • /
    • pp.125-146
    • /
    • 2010
  • This study developed a name access point control system for better performance of information retrieval from institutional repositories, which are equipped with authorgenerated metadata processes for self-archiving. In developing name access point control data for the system, the primary data were created from the existing authority. However, unlike the existing authority data, the primary data did not use any authority forms. Instead, the data utilized all the forms provided by the resources as access points. Specifically, field of activity(subject) and title information on authorship were used to distinguish between persons who have the same name. The result showed that the system improved the performance of the information retrieval. The system has been also expected to be utilized over other metadata provided by libraries, in addition to the institutional repositories, in order to provide better quality information.

자동화 목록에서의 전거통제

  • 도태현
    • Journal of Korean Library and Information Science Society
    • /
    • v.18
    • /
    • pp.217-243
    • /
    • 1991
  • Authority control enables us to retrieve information accurately by coordination and cross reference of headings. It is considered that authority control is needed in machine readable catalogs as well as in conventional catalogs. Taylor, Maxwell and Frost divided automated authority control systems into major vendor and network systems then available into two groups. The first group was defined as a system that processes a library's machine readable catalogs on the tape against an automated authority file. The second group offers an online access to catalogs and authority records. This group was further subdivided into linked or integrated systems and unlinked systems. If authority work is shared with many libraries the costs can be considerably reduced and the quality of catalog data base can be controled by standardization of headings used in participating libraries. The NACO is a project for sharing of authority records started in 1977 by L.C. And LSP furthers the ability to share authority records. A project as the NACO is necessary not only in America but also in the other countries The responsible organizations for national bibliographies of the countries must take much interest in these matters.

  • PDF

A Study on the Development Plan for Nationwide Authority Control System based on National Authority Sharing System (국가전거공동활용시스템 기반의 국가 전거제어 체계 발전방안에 관한 연구)

  • Mihwa Lee;Sung Sook Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.1
    • /
    • pp.25-44
    • /
    • 2023
  • This study was to prepare a development plan for nationwide authority control system based on national authority sharing system of NLK through the survey targeting on libraries which do not participate in the system. Six plans were suggested to establish a nationwide authority control system based on this survey. First, an authority data construction module and a module linked to the national authority sharing system should be developed. Second, describing external identifiers such as ISNI to the national authority sharing system is to provides reliability of data and to utilizes to build linked data. Third, it is necessary to prepare strategies for promoting the national authority sharing system and diversifying services. Fourth, both authority establishment and non-establishment show difficulties and diversity in the selection and description of authorized access point, so it is necessary to prepare rules related to authorized access points. Fifth, since the data described in authority records is not enough, it is necessary to improve and upgrade authority records by using bibliographic records. Sixth, it is necessary to educate librarians about the necessity and function of authority control. As such, this study is meaningful in that it investigated the current status and requirements of libraries that do not participate in the nationwide authority system and sought ways to establish a nationwide cooperative authority control system.

A Comparative Study on Authority Records for Korean Writers Among Countries (한국인 저자 전거에 관한 국가간 비교 연구)

  • Kim, Song-Ie;Chung, Yeon Kyoung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.1
    • /
    • pp.379-403
    • /
    • 2015
  • Name Authority Control is useful not only to manage author information but also to gather other names of authors in order to provide access points in libraries and other institutes. The purpose of this study is to find problems through comparing and analyzing Literature Translation Institute of Korea Author Database, Korean name authority records of national libraries in the U. S., Japan and Korea. The results of the study are as follows. First, Literature Translation Institute of Korea Author Database missed some useful information about Korean writers in translated books in other countries. Second, the name authority file of Library of Congress and National Diet Library did not include the variant names, dates of authors' birth and death date, and filled out incorrect variant names with some birth and death dates. Third, English and Chinese character variants of Korean authors were not found in the National Library of Korea. To solve these problems, revisions of Korean author database, open access to National Library of Korea name authority file, and a strong participation of VIAF were suggested.

An Access Control Model For The Authority Filtering in the Distributed Environment (분산환경에서의 권한필터링을 위한 접근제어 모델)

  • Min, Byong-Seok;Cho, Tae-Kyung;Shim, Won-Bo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.2
    • /
    • pp.250-256
    • /
    • 2007
  • Role-based Access Control (RBAC) model appears to be the most appropriate technique for access control to minimize the errors likely to occur in managing users and network resources. In this paper, we introduced the Work-concept RBAC model that is the result of the Work concept imported to the role based access control model. Using our extended access control model a user could select a work which is more abstract and more inclusive concept than role to do his work. Additionally even if the user has an authority through selecting a work, if a user has no relation to his assigned job, it will be automatically prohibited.

  • PDF

A Study on Developing and Applying Access Point Control System Using SRU Protocol (SRU 프로토콜을 이용한 접근점제어 시스템의 구축과 활용에 관한 연구)

  • Lee, Ji-Won;Kim, Tae-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.1 s.55
    • /
    • pp.229-248
    • /
    • 2005
  • This study proposes a national cooperative model of access point control, that enables local systems to utilize national access point control record, without creating their own authority records. In order to applying this model, a client/server system is developed using SRU (Search and Retrieve URL Service) protocol. The suggested access point control system will be a cost-effective and time-saving model for the local system, and will be more flexible and extensible with concept of access point control, XML record format and SRU protocol.

Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System

  • Zhang, Wei;Wu, Yi;Xiong, Hu;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.302-322
    • /
    • 2021
  • In the system of ciphertext policy attribute-based encryption (CP-ABE), only when the attributes of data user meets the access structure established by the encrypter, the data user can perform decryption operation. So CP-ABE has been widely used in personal health record system (PHR). However, the problem of key abuse consists in the CP-ABE system. The semi-trusted authority or the authorized user to access the system may disclose the key because of personal interests, resulting in illegal users accessing the system. Consequently, aiming at two kinds of existing key abuse problems: (1) semi-trusted authority redistributes keys to unauthorized users, (2) authorized users disclose keys to unauthorized users, we put forward a CP-ABE scheme that has authority accountability, user traceability and supports arbitrary monotonous access structures. Specifically, we employ an auditor to make a fair ruling on the malicious behavior of users. Besides, to solve the problem of user leaving from the system, we use an indirect revocation method based on trust tree to implement user revocation. Compared with other existing schemes, we found that our solution achieved user revocation at an acceptable time cost. In addition, our scheme is proved to be fully secure in the standard model.

The Design for Security System of Linux Operating System (리눅스 운영체제를 위한 보안 시스템 설계)

  • Park, JinSeok;Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.35-42
    • /
    • 2010
  • This paper reviews the current studies about the current secure OS, security module and SELinux, and suggests Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. First, during the user authentication process, it distinguishes the access permission IP and separates the superuser(root)'s authority from that of the security manager by making the users input the security level and the protection category. Second, when the subjects have access to the objects through security authority inheritance of subjects and objects, the suggested system carries out the access control by comparing the security information of the subjects with that of the objects. Third, this system implements a Reference Monitor audit on every current events happening in the kernel. As it decides the access permission after checking the current MAC security attributes, it can block any malicious intrusion in advance. Fourth, through the real-time audit trailing system, it detects all activities in the operating system, records them in the database and offers the security manager with the related security audit data in real-time.

  • PDF