• Title/Summary/Keyword: Authority Records

Search Result 175, Processing Time 0.023 seconds

An Intelligent Multi-agent System for Efficient Gate Operation in a Container Terminal

  • Yoo, Dong-Ho;Choi, Hyung-Rim;Park, Byung-Joo;Kang, Moo-Hong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.371-376
    • /
    • 2006
  • Recently the container volume in the global trade is steadily increasing. In an effort to cope with this trend, major ports of the world are stepping up the introduction of high-tech equipments, trying to establish a highly efficient information system, and improving the internal work processes of their container terminals. For speedy and effective cargo handling, they are making every effort in the diverse fields. The purpose of this study aims at developing an intelligent multi-agent system for the gate work of a container terminal, which is the place of authority transfer in a container terminal. The agent system suggested in this study has made a comparison between COPINO information by TOS (Terminal Operating System) and information on containers and trucks recognized at the gate passage, checking up their efficiency, and performing the function of controlling outside truck's input-output. Also, based on the records of outside truck's gate passage, some gates can be operated flexibly, consequently enhancing the efficiency of the gate function. The results of job performance will immediately be notified to the customers and terminal managers, thus helping them make decisions speedily.

  • PDF

The Definitions of Security Requirements for Control Access on the Step of Analysis (분석단계에서 접근 통제의 보안 요건 정의)

  • Shin, Seong-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.11
    • /
    • pp.97-103
    • /
    • 2014
  • The access control means the process to record and manage access restrictions and permits for protecting information in records. This paper emphasizes the control of access and authorization based on the roles and the data using activities of users as task performers. Also, it requires to gain the necessary approval in advance for important tasks such as mass inquiry and change on important information to influence the very existence of the whole organization. And then, it suggests that it is necessary to control some session of information with non-activity for certain time. Generally, this paper is to explain security elements of access control through various cases.

Effective Management Methods of the 7 Physical Education Curriculum (제7차 체육과 교육과정의 효과적 운영 방안)

  • Kim, Young-Sik;Lee, Yeon-Sook
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.4
    • /
    • pp.157-169
    • /
    • 2003
  • This research was intended to have a grasp of the problems in physical education curriculum, After making an alternative plans of effective management. those were integrated and analyzed their own relations on the purpose of suggesting alternative plans to foster professionality of physical education teacher in order to improve real class of physical education. For this purpose, I referred to sundry records related with instruction of physical education teacher and also conducted a survey with 10 interviews such as researchers of central government education administration, and school commissioners in the ministry's provincial offices of education, professors in the university of pre-teacher training, and teachers involved in physical education. The conclusions were as follows; Physical education curriculum should be organized to reduce and diversify of the sport contents in various levels. Also, it should instruct students based on physical educational knowledge, and it is made up to know the achievement of goals through evaluation tools and development of rules having propriety and reliability. Such a physical educational curriculum developed from real class should inform continuously throughout the Ministry of Education & Human Resources Development and educational organization of physical education teachers and network of the school and mass media. So, it makes most people's recognition raise up, and we need discretionary authority of physical education teacher about time allocation of 45 minutes or 50 minutes for variety of lessons. And we need systematic installation such as reorganization of completion field in level of school.

  • PDF

Efficacy of Development Control as a Tool for Monitoring Building Developments in Kenya

  • Omollo, Wilfred Ochieng
    • Journal of Construction Engineering and Project Management
    • /
    • v.9 no.1
    • /
    • pp.1-17
    • /
    • 2019
  • This study examined the efficacy of development control in the monitoring of building developments in Kenya, a case study of Kisii Town. It focused on the extent to which the 1968 Building Code was enforced by the County Government of Kisii in an attempt to promote quality assurance. The target population comprised 7,430 residential developments from where a sample size of 364 was proportionately and randomly drawn. Research findings indicated that 39% of developers were unaware that their developments should have been inspected during construction. Similarly, awareness of building inspection significantly predicted if developers issued Notices of Inspection to the planning authority to facilitate inspections. Consequently, developers who were unaware that their building constructions required inspection were 99.9% less likely to issue such notices. Moreover, developers who did not obtain development permission were correspondingly 99.9% less likely to issue Inspection Notices. As a result, those who did not issue Notices of Inspection were 99.8% less likely to have their buildings inspected during construction due to lack of records indicating when such constructions had commenced. The study concludes that although the County Government of Kisii is lawfully mandated to monitor building developments in Kisii Town, the function is not well executed. This gap affords developers with an opportunity of not conforming to the approved building plans.

A Study on the Blockchain based Knowledge Sharing Platform (블록체인 기반의 지식공유 플랫폼 연구)

  • Kim, Hyeob
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.95-109
    • /
    • 2022
  • A blockchain based platform can ensure data integrity, reliability, and security by applying distributed processing and encryption technology for transaction records. In the existing knowledge sharing platform, the created knowledge could not be shared or utilized sufficiently due to information asymmetry and centralization. However little research has been done so far on this area. In this study, we will examine case studies and development potentials for blockchain based knowledge sharing platforms based on previous studies of blockchain technology, token economy, knowledge sharing, motivation theory, and social exchange theory. Blockchain based platforms can contribute to the activation of knowledge sharing, by resolving information asymmetry, simplifying unnecessary work procedures through unified knowledge sharing flow and excluded centralization of authority by decentralization, and strengthening access and utilization of the knowledge produced by the platform.

Robust and Auditable Secure Data Access Control in Clouds

  • KARPAGADEEPA.S;VIJAYAKUMAR.P
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.95-102
    • /
    • 2024
  • In distributed computing, accessible encryption strategy over Auditable data is a hot research field. Be that as it may, most existing system on encoded look and auditable over outsourced cloud information and disregard customized seek goal. Distributed storage space get to manage is imperative for the security of given information, where information security is executed just for the encoded content. It is a smaller amount secure in light of the fact that the Intruder has been endeavored to separate the scrambled records or Information. To determine this issue we have actualize (CBC) figure piece fastening. It is tied in with adding XOR each plaintext piece to the figure content square that was already delivered. We propose a novel heterogeneous structure to evaluate the issue of single-point execution bottleneck and give a more proficient access control plot with a reviewing component. In the interim, in our plan, a CA (Central Authority) is acquainted with create mystery keys for authenticity confirmed clients. Not at all like other multi specialist get to control plots, each of the experts in our plan deals with the entire trait set independently. Keywords: Cloud storage, Access control, Auditing, CBC.

A Study on the System of Confidential Record Management of the USA (미국의 비밀기록관리제도에 관한 연구 -대통령의 행정명령(EO)을 중심으로-)

  • Kim, Geun Tae
    • The Korean Journal of Archival Studies
    • /
    • no.59
    • /
    • pp.159-206
    • /
    • 2019
  • This study aims to analyze the details of the executive order of the president of the United States, which have been developed in the country's administrative system to institutionalize the guarantee of the people's right to know the classified records, as well as to protecting national secrets. This study also aims to present any implications for the development of the classified record management system of Korea. To this end, the previously issued EO concerning the classified records management were reviewed in terms of its classification, safeguard, and declassification. The analysis results showed that the EO by the president established and prescribed the special access program for national secrets, the system to exempt and suspend the automatic declassification, and the sanctions for protecting national secrets. The EO also established and prescribed the appointment system for the person with the authority to classify record, automatic declassification program, and Mandatory declassification review system, as well as the procedures for historical researcher and certain former government personal to access the classified records with the purpose of guaranteeing people's right to know. As a result, this study identified implications for the development of Korea's classified record management system, as follows : First, it is necessary to restructure the current classified record management system, by changing the operations that is dependent on the director of the National Intelligence Service to the one that is dependent on the President. Second, it is necessary to legislate a separate special law for the classified record management system. Third, a standing supervisory body should be established for the integrated management and for the consistent and routine supervision of the classified record management. Fourth, it is necessary to establish procedures to further review the classification of classified record to correct the defects of the current classification system, which has been abused and mismanaged by the national agencies and organizations that produce classified record.

Expanding User Types for Utilizing Certified e-Document Authorities (공인전자문서보관소의 이용 활성화를 위한 사용자 유형 확대방안)

  • Song, Byoungho
    • The Korean Journal of Archival Studies
    • /
    • no.30
    • /
    • pp.175-204
    • /
    • 2011
  • Electronic records are generated not only in public sector but also in private sector. Records will be used across the public-private boundary. The Certified e-Document Authorities(CeDAs) may keep electronic documents in private sector for preservation and evidence, like the official Record Management Systems for Public sector. A CeDA is the Trusted Third Party (TTP) as a business to be entrusted and proof interchanging documents between parties. This CeDA system could be sustainable only if the CeDA earn the enough sales through enough uses. And yet, all the eight CeDA companies have not had enough users. How to utilize CeDAs is one of the hot issues in this area. In this paper, We analyze the threat to trustworthiness of CeDA due to payment of only one party among others, and describe the difficulty in use of CeDA for an individual user. These things make CeDAs cannot have enough users. To do address these, We expand the boundary of relevant parties for a document, present a delegate-establishing option under a joint name, show the needs of identifying and notifying minimum relevant parties, and suggest the proxy parties to help the individual users.

Improving Archival Descriptive Standard Based on the Analysis of the Reviews by Archival Communities on RiC-CM Draft (RiC에 대한 기록공동체의 리뷰를 통해 본 기록물 기술표준 개선을 위한 제안)

  • Park, Ziyoung
    • The Korean Journal of Archival Studies
    • /
    • no.54
    • /
    • pp.81-109
    • /
    • 2017
  • This study suggests an analysis of the reviews provided by international archival professionals on the RiC-CM draft published by ICA EGAD. Some implications for the Korean archival management environment were also suggested. Some professional reviews were accessible through the internet. Italian archival professionals held workshops at various levels for the analysis and discussion of the draft. Duranti, the project director of InterPARES, also gave opinions about the draft in cluding the perspective of digital preservation. In the review of Artefactual, the draft was discussed in terms of system implementation. Reed, the director of Recordkeeping Innovation, also gave a feedback based on the record management experiences in Australia. Some implications can be suggested based on these professional opinions. First, we should try to build a test bed for the adoption of RiC to archival description in the Korean environment. Second, a minimum level of data elements that can secure authenticity and integrity will also be needed. Third and lastly, rich authority data for agents and functions related to archival records and records groups are essential to take full advantage of the standard.

The Awareness and the Challenges about Protection and Access Control of Record (기록정보의 안전한 보호와 접근통제에 관한 인식과 과제)

  • Lim, Mi-Hyun;Yim, Jin-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.1
    • /
    • pp.191-219
    • /
    • 2021
  • The development of IT technology that has come to symbolize the fourth industrial revolution, the introduction of online government, and the change in environment has caused radical changes in record management. Most public institutions under the government make use of information systems that are objects of information protection such as electronic document system, document management system, and Onnara system. Further, protection and access control of record information through physical environment and electronic system in a user-centered record management environment is an essential component. Hence, this study studies how professional records management professionals in public institutions recognize safe protection and access management of record information, deriving areas that require improvement and providing a discussion and suggestions to bring about such improvement. This study starts by examining laws and policies on information protection in Korea, analyzing items on access control to compare them with laws and policies, as well as the current situation on records management and derive implications. This study is meaningful in that it aims to substantialize records management by suggesting areas of improvement necessary for the protection and management of record information in public institutions and providing professionals with tangible authority and control.