• Title/Summary/Keyword: Digital Access

Search Result 1,438, Processing Time 0.023 seconds

Medical Information Management Scheme of Healthcare Service Patient through 2-way Access Control (2-way 접근제어를 통한 헬스케어 서비스 환자의 의료 정보 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.185-191
    • /
    • 2016
  • Recently, various medical services are provided with the advance of IT. However, there is a problem that a third party would exploit medical information when the information is sent and received through wired or wireless connection. In this paper, a patient information management scheme using group index information for the third party not to illegally exploit a patient's medical information without his consent is proposed. This proposed scheme creates index information in each hierarchical level to be used with access information so that not only medical staff can have access to patient's medical information hierarchically but also it can manage access level in groups. The scheme aims to enable the medical staff to minimize the time spent to analyze the type of disease and to prescribe for it so that they can improve patients' satisfaction. Plus, the scheme aims to improve work efficiency by minimizing the medical staff's workload according to the authority to access patients' medical information.

CONCEPTUAL MODEL TO MEASURE USER SUCCESS IN THE DIGITAL GOVERNMENT ENVIRONMENT

  • Jung, Jin-Taek
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.405-421
    • /
    • 2004
  • The digital government is one of the most significant areas of study to emerge in information science in the past several years. The digital government is, in broad terms, a computerized system that allows a community of users to obtain a coherent means of access to an organized, electronically stored repository of information and knowledge. The information resources and technologies embodied by the World Wide Web are now accepted ad the primary example of the digital government. The need exists for a means to measure user success in the digital government. Because a digital government environment involves two broad functions?1) information search and retrieval and 2) interactivity with and through the medium-this research posits that measures of both of these functions will show positive correlation with user success.

  • PDF

A Study on Cataloging Digital Resources in Libraries (도서관에서의 디지털 자료 조직 현황과 실태)

  • Rho, Jee-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.4
    • /
    • pp.317-338
    • /
    • 2004
  • This study intends to make a comprehensive inquiry about the present state of digital resources in Korean libraries Emphasis was on analyzing types and characteristics Of digital resources Which libraries have collected, and on surveying how both reasonable and systematic access to theses resources is provided To the end, this study examined 108 university libraries' retrieval mechanism and bibliographic records of digital resources. The result of this study is expected to be utilized in preparing the strategies to overcome the problems and limitations in organizing practices of digital resources.

  • PDF

A study on the implementation of DRM system in digital home networking (디지털 홈네트워킹 환경에서의 DRM 시스템 구축)

  • Kim, Jong-An;Ryu, Jung-Seob;Han, Pyung-Hee;Kim, Jin-Han
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.104-108
    • /
    • 2005
  • Due to the rapid spread of high speed Internet access and the contents digitization, the demand for the copyright protection of digital contents has increased continuously so that the digital rights protection technology becomes one of the inevitable components in the digital content providing services. This paper describes the current trend of DRM(Digital Rights Management) technology and how to implement the system for the protection of digital assets in the digital home networking environment.

  • PDF

Trends in Digital Security Policies and Trade Rules in Major Overseas Countries (디지털 보안에 대한 해외 주요국의 통상 규범 동향)

  • J.E. Kim
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.4
    • /
    • pp.1-11
    • /
    • 2023
  • Trade rules in service and digital sectors mainly focus on reducing regulatory uncertainties by improving transparency and minimizing unnecessary requirements. Recognizing the importance of digital trade rules and trade in information and communication technology (ICT) sectors, governments worldwide have rapidly adopted and expanded rules on free flow of data, personal data protection, electronic authentication, and cybersecurity. On the other hand, advances in technology have led governments to face multiple threats related to cybersecurity, intellectual property (including that related to source code and algorithms), and unauthorized access to proprietary information of their suppliers. This study presents digital trade rules related to digital security emphasizing cybersecurity, source code, and ICT products that use cryptography in different trade agreements. Additionally, it introduces various approaches that major countries are taking to both address digital security issues and seek balance between security enhancement and trade liberalization.

Performance Analysis of ADSL Services for Access Line Characteristics (ADSL서비스의 가입자 선로특성에 따른 성능분석)

  • 김상국;이경근
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.792-802
    • /
    • 2002
  • One of the technologies which accelerate data transmission rate on the Internet is ADSL(Asymmetric Digital Subscriber Line), which enables the fast growth of the information age by providing infrastructures for the high speed Internet access. The network architecture of the ADSL service is the FTTC(Fiber To The Curb) which consists of fiber netwoks and copper based subscriber lines. The ADSL is a technology that utilizes the existing subscriber line efficiently. In the FTTC architecture, the major factors that degrade the quality of the ADSL service are the copper wires in the subscriber loops. This paper examines the characteristics of the subscriber lines that affect the high speed Internet access in deploying the ADSL services and also analyzes the mutual relationships between each line characteristic and its performance.

The Design and Implementation of the Mutual Message Processing between WME Module and MLME Module for Vehicle Communication Technology (차량 통신 기술을 위한 WME 모듈과 MLME 모듈 간의 상호 메시지 처리과정 설계 및 구현)

  • Jang, Chung Ryong;Lee, Dae Sik;Lee, Yong Kwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.63-71
    • /
    • 2013
  • WAVE(Wireless Access for Vehicular Environment) System is a communication technology to monitor system failure and vehicle functions and management services to prevent possible incidents of driving a vehicle. In this paper, we have designed and implemented the mutual message processing through parameter between WME management module that manages WAVE system and MLME that manages the upper layer MAC(Media Access Control) module. Also, in order to verify the validity, we have carried out experiments to compare the speed of data processing by dividing data of 1Mbyte, 2Mbyte, 3Mbyte into the packets of 2KByte and 4KByte. Experiments data processing speed of 2KByte packet were shown about 173.62ms in 1MByte, 2MByte about 352.61ms, 3MByte about 550.13ms and, data processing speed of 4KByte packet, 1MByte approximately 87.56ms, 2MByte about 177.94ms, 3MByte about 277.18ms. Therefore, in WAVE system, the mutual messages processing through the parameters between WME and MLME module can be utilized in the various service of ITS(Intelligent Transportation Systems) depending on the speed of data processing.

A Design of Access Control Method for Security Enhance based Smart Device (스마트 디바이스 기반의 보안성 강화를 위한 접근제어 기법 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Smart devices refer to various devices and control equipment such as health care devices, imaging devices, motor devices and wearable devices that use wireless network communication (e.g., Wi-fi, Bluetooth, LTE). Commercial services using such devices are found in a wide range of fields, including home networks, health care and medical services, entertainment and toys. Studies on smart devices have also been actively undertaken by academia and industry alike, as the penetration rate of smartphones grew and the technological progress made with the fourth industrial revolution bring about great convenience for users. While services offered through smart devices come with convenience, there is also various security threats that can lead to financial loss or even a loss of life in the case of terrorist attacks. As attacks that are committed through smart devices tend to pick up where attacks based on wireless internet left off, more research is needed on related security topics. As such, this paper seeks to design an access control method for reinforced security for smart devices. After registering and authenticating the smart device from the user's smart phone and service provider, a safe communication protocol is designed. Then to secure the integrity and confidentiality of the communication data, a management process such as for device renewal or cancellation is designed. Safety and security of the existing systems against attacks are also evaluated. In doing so, an improved efficiency by approximately 44% compared to the encryption processing speed of the existing system was verified.

Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare (유헬스케어의 무선환경에 적합한 WiMAX 보안 측정 및 분석)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.279-284
    • /
    • 2013
  • Wireless access network section needs strong security which supports high data rate and mobility not to invade patient's privacy by exposing patient's sensitive biometric from automatic implantable device that is adapted to u-healthcare service. This paper builds test bed and performs assessment and measurement of security ability of WiMAX network to transmit and receive mobile patient's biometric by building WiMAX network in wireless access network not to expose paitne's biometirc at wireless access network section to the third person. Specially, this paper compares and assesses data security, MAC control message security, handover conection delay, and frame loss and bandwidth of ECDH at the layer of WiMAX security compliance, WiMAX MAC IPSec, and MAC.

Authentication and Trust Relationship Chaining for Resource Sharing Community (자원 공유 커뮤니티를 위한 인증 기술과 신뢰관계사슬)

  • Kim, Jeong Gon;Kim, Shin Kon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.55-69
    • /
    • 2010
  • This article proposed the authentication protocol for peer-to-peer resource sharing community. The proposed protocol does not require a priori information for generating and exchanging authentication key. Also this protocol can provide the delicate access control by allowing the user(authenticator) to assign the trust level to the authentication supplicant, which can be used to decide if the resource providing node will accept the resource sharing request from a resource requesting node. Trust Relationship Chaining provides the environment where trust levels (included in the trust table) of nodes in the resource sharing community are propagated among nodes when trust tables are exchanged between two nodes engaged in mutual authentication process and authentication refresh so that any two nodes which are not directly mutual-authenticated can assign the trust level each other for the access control for resource sharing. In the proposed protocol a node can implements the authentication refresh continuously to verify the effectiveness of authentication after mutual authentication so that the authentication of new node or authentication revocation(effectiveness cancellation) of the departed node can be propagated to the all the nodes in RSC and eventually safe resource sharing community is configured.