• Title/Summary/Keyword: Digital Access

Search Result 1,432, Processing Time 0.03 seconds

A Study on Access Control running on Distance Environment for Computer-Based Integrated Multimedia (컴퓨터 기반의 통합 멀티미디어를 위한 원격 환경 상에서 접근 제어에 관한 연구)

  • Kim, Soon-Gohn;Ko, Eung-Nam
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.173-177
    • /
    • 2015
  • This paper proposed an access control for computer-based integrated multimedia running on shepherd and SIP(Session Initiation Protocol). But, conventional framework for access control SIP environment has not yet fully progressed a shepherd and an access control for computer-based integrated multimedia running on SIP(Session Initiation Protocol). Session management include function of session creation, session end, late comer process, and access control. Therefore, this paper described access control based on a shepherd and SIP environment to maintain good session condition.

A Study on Composition and Utilization of Digital Literacy Education elements Using Open Contents (오픈 콘텐츠를 활용한 디지털 리터러시 학습 요소 구성과 활용)

  • Hong, Myunghui;Lee, Soonyoung
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.6
    • /
    • pp.711-721
    • /
    • 2018
  • The development of artificial intelligence technology and the shift to a software-driven society are raising the need for digital literacy education on how to access, understand, use, create and share new open content in a variety of sustainable open content. At this point in time, this paper defines the digital literacy as the subliteracy concept for data, tools, and device elements. It is defined as a concept that includes cognitive and non-cognitive abilities and is stratified by computer literacy, ICT literacy, and information literacy. Open content is also defined as teaching-learning materials that can be used and shared freely by anyone, such as the Open Education Resource (OER) and the Open Access movement. Based on the two definitions, a three-step strategy for digital literacy education was developed to select open content in the digital environment, followed by a digital literacy education plan, and finally, an education frame to foster digital literacy capabilities.

Digital Library in the Notion of Publishing, II : Practical Design of the Hybrid Digital Library (출판기능이 부여된 디지털도서관 II - 하이브리드 디지털도서관의 모형 설계 -)

  • Chung, Jun Min
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.4
    • /
    • pp.109-128
    • /
    • 2014
  • A digital library could be understood as not a part of information cycling, but whole process of information production, circulation and reproduction. This study suggests that a digital library should be a creator as which it is publishing, circulating, and re-producing the information resources. Therefore, the role of intrinsic DRM (Digital Resources Management) can be interpreted as a digital library. Open access model have been already adopted to many university libraries, many university libraries are publishing free access online research resources by themselves. Also, research collection based on cloud computing can be extended to networked research collection and share with other university libraries. These evidences show future library can be the digital library with online and open accessible publishing function.

Analysis of dCollection License System based on the Case Study of Digital Rights Management System for Open Access (오픈액세스를 위한 저작권관리시스템 사례 연구를 통한 dCollection 라이선스관리시스템 분석)

  • Park Mi-Sung
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.4
    • /
    • pp.255-284
    • /
    • 2005
  • In this paper, we have made an analysis of dCollection license system and have presented the development subject based on various case study of digital rights Management( DRM ) under domestic and abroad Open Access circumstances. For this study, fist we made an investigation into the concept and the technical component of the copyright, license and DRM that act as obstacle to open access. It is hoped that the first study will be able to help people better understand the relationship between the related technique and Open Access System. Second we analyzed Creative Commons, RoMEO, Dspace system as abroad cases and Kyungpook National University's DRM system and Seoul National University's DRM system as domestic cases for copyright protection under open access circumstances. finally we will face up to the domestic open access reality and plan the future by presenting the development subject through dCollection license system analysis.

  • PDF

Realization of Fractal/Angle Multiplexing using X-Y Galvano Mirrors and Evaluation of Random Access Performance in Holographic Digital Data Storage (X-Y 갈바노 미러를 이용한 홀로그래픽 저장 장치의 프랙탈/각 다중화 구현 및 임의 탐색 성능의 평가)

  • Choi, Jin-Young;Lee, Jae-Sung;Kim, Sang-Hoon;Kim, Jang-Hyun;Yang, Hyun-Seok;Park, No-Cheol;Park, Young-Pil;Park, Joo-Youn
    • Transactions of the Society of Information Storage Systems
    • /
    • v.2 no.1
    • /
    • pp.43-49
    • /
    • 2006
  • Fractal/angle multiplexing is a $LiNBO_3$ crystal using a X-Y Galvano mirror, and the random access concept in fractal/angle multiplexing are discussed in this paper. First, the brief introduction of the designed holographic digital data storage system is presented. Then, the average access time concept for the storage system is newly defined, and the comparison of the average access time between the holographic storage and a conventional optical disk is performed. Second, the basic simulation and experiment to find the X-Y Galvano mirror dynamics are conducted. From this analysis, we find that the average access time in our HDDS which has 6 degree scan angle is about 5 msec. This result is very high performance when it compared with the average access time of a conventional optical disk. Finally, some recording results using fractal/angle multiplexing are presented, then, the relationship between bit error rate and angle mismatch for the each multiplexing are discussed.

  • PDF

A study on the smart band, technologies, and case studies for the vulnerable group. - The Digital Age and the Fourth Industrial Revolution.

  • YU, Kyoungsung;SHIN, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.182-187
    • /
    • 2022
  • This study aims to study non-rechargeable wrist-type smart bands for those vulnerable to the digital environment. The transition to the digital age means improving the efficiency of human life and the convenience of management. In the digital age, it can be a very convenient infrastructure for the digital generation, but otherwise, it can cause inconvenience. COVID-19 is spreading non-face-to-face culture. The reality is that the vulnerable are complaining of discomfort in non-face-to-face culture. The core of the digital environment is smartphones. Digital life is spreading around smartphones. Technology that drives the digital environment is the core technology of the Fourth Industrial Revolution. The technologies are lot, big data, Blockchain, Smart Mobility, and AI. Related technologies based on these technologies include digital ID cards, digital keys, and nfc technologies. Non-rechargeable wrist-type smart bands based on related technologies can be conceptualized. Through these technologies, blind people can easily access books and manage their ID cards conveniently and efficiently. In particular, access authentication is required wherever you go due to COVID-19, which can be used as a useful tool for the elderly who feel uncomfortable using smartphones. It can also eliminate the inconvenience of the elderly finding or losing their keys.

RCBAC(Relationship-Content based Access Control) Model for User Privacy Protection of Digital Contents in Web 2.0 Environment (웹 2.0 환경에서 사용되는 디지털 컨텐츠의 사용자 프라이버시 보호를 위한 RCBAC 모델)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha;Kim, Jeong-Dong;Kang, Dong-Su;Baik, Doo-Kwon
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.697-705
    • /
    • 2008
  • The recent web technology has been developed by three mainsprings which include integration, virtualization, and socialization. The web technology provides the increment of the social networking ability. However it deepens the exposure of privacy about personal information as more complicating and difficult problems. Representatively, it is impossible to define and manage the specific relation, so the personal information and interest can be inferred from collecting and summarizing the contents. Also, there are some problems that it is hard to construct the information owner's own social network. Thus this paper proposes the RCBAC(Relationship-Content based Access Control) Model which applies both the concepts of Relationship and Content Semantic to the existing access control methods to protect the user's own digital contents in web 2.0 environment. This method prevents privacy such as personal inclination from being exposed and enables to define and manage the specific relation. By doing this the information owners can construct their social network. This social network can be applied and extended to web contents.

  • PDF

A Study on An Architecture of the Security improved Document DRM for preventing Information Leakage in Military Information System Environment (국방 정보시스템 환경에서 정보유출 방지를 위한 보안성이 강화된 문서 DRM 설계에 관한 연구)

  • Eom, Jung Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.41-49
    • /
    • 2011
  • We designed a security improved document DRM for protecting document based military information which is transmitted in the military information system environment. The user should be could not access document which not related to his/her role and duty, and must view the only document appropriate for his/her role and security level according to the security level of document. We improved the security of document DRM by adding to the access control module in DRM server. Our system allows operation mode authorizations for the document, considering the user's role & security level and the security level of document. And it prevents indiscriminate access to the document and damage the confidentiality and integrity of information.

A Study on the Realization of Digital Multimedia Broadcast Receiving System using Conditional Access System (제한수신시스템을 적용한 디지털 멀티미디어방송 수신시스템 구현에 관한 연구)

  • Kim, Young-Bin;Ryu, Kwang-Ryol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.340-343
    • /
    • 2005
  • A realization for digital multimedia receiving system using Conditional Access System is presented in this paper. The key word for descrambling is make from smart card and Conditional Access System, a Stabilization is grow up in the method. It is possible to decoding that of average 15 fame/second of H.264 video format and that 24Khz${\sim}$48Khz audio sample rate using dual processor that of high performance DSP and RISC. This system is evaluated correct descrambling procedure in test stream added that signed user data.

  • PDF

The Design of License Agent Rights Protection (디지털 저작권 보호를 위한 라이센스 에이전트의 설계)

  • 이광형;이근왕;김희숙
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.275-282
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PBD security method real time action monitoring for user, data security for itself.

  • PDF