• 제목/요약/키워드: Computer Access and Use

검색결과 662건 처리시간 0.024초

Reliability and Validity of the CAP for Computer Access Assessment of Persons with Physical Disabilities

  • Jeong, Dong-Hoon
    • The Journal of Korean Physical Therapy
    • /
    • 제27권1호
    • /
    • pp.30-37
    • /
    • 2015
  • Purpose: The purpose of this study was to develop a computer access assessment tool for persons with physical disabilities and to evaluate reliability and validity. Methods: We developed a computerized Computer access Assessment Program (CAP) through many kinds of literature review and tools analysis for evaluation of computer access, task analysis of fundamental input devices operation and expert review. The CAP data were obtained from 105 normal university students and 16 students with physical disabilities. The test items of CAP are composed of four timed mouse tasks, four timed keyboard tasks, and a timed scanning task. Thus, the software measures user performance in skills needed for computer interaction, such as keyboard and pointer use, navigating through menus, and scanning. To determine the validity of these measurements, we compared data on CAP reports to a Compass report. Compass software allows an evaluator for assessment of an individual's computer input skills. Results: Results of this study showed that the CAP had high internal consistency, reliability of test-retest, concurrent validity, and convergent validity. Conclusion: Therefore, the CAP is appropriate for evaluation and determination of computer access skill of persons with physical disabilities. It is possible to get clear quantitative data on performance when providing computer access services if you can use the CAP data. Using this quantitative evidence, insights can be gained into the specific nature of any difficulties experienced by persons with physical disabilities and find wise solutions.

온라인목록(Online Public Access Catalog : OPAC) 이용의 편이도에 관한 연구 (A Study of the Use of Online Public Access Catalogs)

  • 노문자
    • 한국문헌정보학회지
    • /
    • 제19권
    • /
    • pp.151-188
    • /
    • 1990
  • The aims of automation efforts in libraries are the rationalization of interval work and improvement of user services. After a period of exclusive internal computer utilization, later voluntary contact with the computer (e.g., circulation control with self services), patrons of American libraries now have to go to a computer terminal if they want certain information. Online public access catalogs(OPAC) have been used in American libraries since the end of the seventies. But OP AC are accepted by patron only if they have a useful and flexible user interface. This paper briefly describes the use of online catalogs in different type of libraries, categories of user (user, non-user), aspect of catalog use in context with computer experience etc. The disscussion then focuses on the characteristics of the final report of online catalog use study of Council on Library Resources and user problems in searching, as reported in many other catalog use studies.

  • PDF

Access Right Assignment Mechanisms for Secure Home Networks

  • Kim, Tiffany Hyun-Jin;Bauer, Lujo;Newsome, James;Perrig, Adrian;Walker, Jesse
    • Journal of Communications and Networks
    • /
    • 제13권2호
    • /
    • pp.175-186
    • /
    • 2011
  • The proliferation of advanced technologies has been altering our lifestyle and social interactions-the next frontier is the digital home. Although the future of smart homes is promising, many technical challenges must be addressed to achieve convenience and security. In this paper, we delineate the unique combination of security challenges specifically for access control and consider the challenges of how to simply and securely assign access control policies to visitors for home devices and resources. We present a set of intuitive access control policies and suggest four access control settings based on our in-person interview results. Furthermore, we propose the automated Clairvoyant access right assignment (CARA) mechanism that utilizes home owners' social relationship to automatically deduce to which class a visitor belongs. The combination of CARA and the suggested mapping provides a promising first step for home policy assignment such that nonexpert home owners can let visitors use their home network with confidence. We anticipate that future research can build on our proposed mechanisms to provide confidence to non-expert home owners for letting visitors use their home network.

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권11호
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.

Assessment and Access Control for Ubiquitous Environments

  • Diep, Nguyen Ngoc;Lee, Sung-Young;Lee, Young-Koo;Lee, Hee-Jo
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.1107-1109
    • /
    • 2007
  • Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are inadequate for the increased flexibility and performance that ubiquitous computing environment requires because such systems can not utilize effectively all benefit from this environment. In this paper, we propose a solution based on risk to make use of many context parameters in order to provide good decisions for a safety environment. We design a new model for risk assessment in ubiquitous computing environment and use risk as a key component in decision-making process in our access control model.

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

  • Zhang, Lejun;Zou, Yanfei;Yousuf, Muhammad Hassam;Wang, Weizheng;Jin, Zilong;Su, Yansen;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권5호
    • /
    • pp.1634-1652
    • /
    • 2022
  • Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.

연변 조선족아동의 미디어환경 및 미디어이용실태와 이중언어발달 (The media environment, media use, and bilingual development among Korea-Chinese children in Yanji, China)

  • 박혜원;원영미;이귀옥
    • 대한가정학회지
    • /
    • 제42권1호
    • /
    • pp.181-195
    • /
    • 2004
  • The purpose of the study was to explore the degree of children's access to media and the relationship between the use of media and language development of Korean-Chinese bilingual children in Yanji, China. Questionnaires were answered by 258 4th graders and their parents. The results showed that the children had an access to a variety of media. The children's use of language(Korean/ Chinese) differed to the type of media: they had more access to Korean language in the use of newspapers/magazines, books, and radio, and to Chinese language in the use of computer. They had comparatively a balanced access to Korean/chinese language in the use of TV. Stepwise regression analyses revealed that the children's access to Chinese language in the use of media, proficiency of a parent's Chinese language, and a parent's affection were related to proficiency of the children's Chinese language. Implications are derived from the use of media in development of bilingualism.

직무기반 접근제어 모델 설계 (A Design of Role-Based Access Control Model)

  • 이호;정진욱
    • 한국컴퓨터정보학회논문지
    • /
    • 제6권1호
    • /
    • pp.60-66
    • /
    • 2001
  • 본 논문에서는 접근제어 요구 사항의 복잡한 문제를 해결하기 위한 직무기반 접근제어 모델을 설계하였다. 본 논문에서 설계한 접근제어 모델은 직무기반 접근제어를 이용하여 권한을 효과적으로 통제하고, 신분 및 규칙기반 접근제어를 이용하여 정보의 비밀성, 무결성 및 가용성의 보장과 불법적인 유통을 방지할 수 있다. 설계된 접근제어 모델은 직무, 보안등급, 무결성 등급 및 소유권 등의 다단계 보안 정책을 기반으로 하여 자원에 대한 불법적인 접근을 방어 할 수 있다

  • PDF

Light-weight Preservation of Access Pattern Privacy in Un-trusted Storage

  • Yang, Ka;Zhang, Jinsheng;Zhang, Wensheng;Qiao, Daji
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제2권5호
    • /
    • pp.282-296
    • /
    • 2013
  • With the emergence of cloud computing, more and more sensitive user data are outsourced to remote storage servers. The privacy of users' access pattern to the data should be protected to prevent un-trusted storage servers from inferring users' private information or launching stealthy attacks. Meanwhile, the privacy protection schemes should be efficient as cloud users often use thin client devices to access the data. In this paper, we propose a lightweight scheme to protect the privacy of data access pattern. Comparing with existing state-of-the-art solutions, our scheme incurs less communication and computational overhead, requires significantly less storage space at the user side, while consuming similar storage space at the server. Rigorous proofs and extensive evaluations have been conducted to show that the proposed scheme can hide the data access pattern effectively in the long run after a reasonable number of accesses have been made.

  • PDF

Universal Description of Access Control Systems

  • Karel Burda
    • International Journal of Computer Science & Network Security
    • /
    • 제24권8호
    • /
    • pp.43-53
    • /
    • 2024
  • Access control systems are used to control the access of people to assets. In practice, assets are either tangible (e.g. goods, cash, etc.) or data. In order to handle tangible assets, a person must physically access the space in which the assets are located (e.g. a room or a building). Access control systems for this case have been known since antiquity and are based either on mechanical locks or on certificates. In the middle of the 20th century, systems based on electromagnetic phenomena appeared. In the second half of the same century, the need to control access to data also arose. And since data can also be accessed via a computer network, it was necessary to control not only the access of persons to areas with data storage, but also to control the electronic communication of persons with these storage facilities. The different types of the above systems have developed separately and more or less independently. This paper provides an overview of the current status of different types of systems, showing that these systems are converging technologically based on the use of electronics, computing and computer communication. Furthermore, the terminology and architecture of these systems is expanded in the article to allow a unified description of these systems. The article also describes the most common types of access control system configurations.