• Title/Summary/Keyword: Digital Access

Search Result 1,442, Processing Time 0.026 seconds

The Design of a Multimedia Data Management and Monitoring System for Digital Rights Protection using License Agent (라이선스 에이전트를 이용한 디지털 저작권 보호를 위한 멀티미디어 데이터 관리 및 감시 시스템의 설계)

  • Park, Jae-Pyo;Lee, Kwang-Hyung;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.281-292
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical Issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

A Label Graph Based Verifiable Secret Sharing Scheme for General Access Structures

  • Hsu, Ching-Fang;Zeng, Bing;Cheng, Qi
    • Journal of Communications and Networks
    • /
    • v.15 no.4
    • /
    • pp.407-410
    • /
    • 2013
  • Secret sharing is that a dealer distributes a piece of information (called a share) about a secret to each participant such that authorized subsets of participants can reconstruct the secret but unauthorized subsets of participants cannot determine the secret. In this paper, an access structure can be represented by a label graph G, where a vertex denotes a participant and a complete subgraph of G corresponds to a minimal authorized subset. The vertices of G are labeled into distinct vectors uniquely determined by the maximum prohibited structure. Based on such a label graph, a verifiable secret sharing scheme realizing general access structures is proposed. A major advantage of this scheme is that it applies to any access structure, rather than only structures representable as previous graphs, i.e., the access structures of rank two. Furthermore, verifiability of the proposed scheme can resist possible internal attack performed by malicious participants, who want to obtain additional shares or provide a fake share to other participants.

Design and Implementation of a SDR-based Digital Filter for CDMA Systems

  • Yu, Bong-Guk;Bang, Young-Jo;Kim, Dae-Ho;Lee, Kyu-Tae;Ra, Sung-Woong
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.2
    • /
    • pp.59-66
    • /
    • 2008
  • In this study, Software Defined Radio (SDR) technology-based digital filterbank architecture applicable to a multiple-channel processing system such as a wireless mobile communication system using Code Division Multiple Access (CDMA) technology is proposed. The technique includes a micro-processor to redesign Finite Impulse Response (FIR) filter coefficients according to specific system information and to download the filter coefficients to one digital Band Pass Filter (BPF) to reconfigure another system. The feasibility of the algorithm is verified by computer simulation and by implementing a multiple-channel signal generator that is reconfigurable to other system profiles, including those of a Wideband Code Division Multiple Access (WCDMA) system and a CDMA system.

  • PDF

A Study on the Retrieval Systems for Digital Information Resources : Focused on the University Libraries in Busan, Ulsan, Gyeongnam Districts (전자정보자원의 검색시스템에 관한 연구 - 부산.울산.경남지역 대학도서관을 중심으로 -)

  • Doh, Tae-Hyeon
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.4
    • /
    • pp.261-281
    • /
    • 2008
  • This study surveyed the retrieval systems for digital information resources of the university libraries in Busan, Ulsan, Gyeongnam districts and the vendors. Kinds of access points and retrieval conditions (Boolean logic, methods of index term identification, and particularities of the retrieval) of the libraries' systems are various and different to each other. Access points of the vendors' systems are unessentially various and different to each other, but the retrieval conditions are rather elaborated. Upon the result the suggestions for the standardization of digital information retrieval system are offered.

  • PDF

Digital Watermarking Scheme Adopting Variable Spreading Sequence in Wireless Image Transmission (무선 이미지 전송에서 가변확산부호를 적용한 Digital Watermarking 기법)

  • 조복은;노재성;조성준
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.109-112
    • /
    • 2002
  • In this paper, we propose the efficient digital watermarking scheme to transmit effectively the compressed medical image that embedded with watermarking data in mobile Internet access channel. The wireless channel error based on multiple access interference (MAI) is closely related to the length of spreading sequence in CDMA system. Also, the fixed length coded medical image with watermark bit stream can be classified by significance of source image. In the simulation, we compare the peak signal to noise ratio (PSNR) performance when the watermarked image with a simple symbol and when the watermarked image with a text file is transmitted using variable length of spreading sequences in case of limited length of spread sequence.

  • PDF

An Empirical Study on E-learning Participation Affected by Flow Experience and Internet Addiction (플로우 경험과 인터넷 중독이 이러닝 참여에 미치는 영향)

  • Lee, Ju-Yang;Jang, Phil-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.341-346
    • /
    • 2012
  • This paper reports the findings of research into the effect of flow experience and internet addiction on e-learning participation. The total number of access, playing time of contents and lag time (time between content upload and first access) were investigated as e-learning participation by analyzing web log data. The paper also examines the relationship between academic achievement and e-learning participation. The results suggest that the flow experience significantly correlates with all variables related with e-learning participation and internet addiction significantly correlates with lag time. It is found that female students significantly access more, longer and have shorter lag time than their male counterparts. It also suggest total number of access, lag time and gender difference have significant effect on academic achievement.

A Study on the Cost Analysis and Survivability of the All Optical Access Network Design using WGR (WGR을 사용한 완전 광 가입자망 설계의 경제성 비교 및 생존성에 관한 연구)

  • Choe, Han-Gyu;Gang, An-Gu;Jo, Gyu-Seop
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.3
    • /
    • pp.132-139
    • /
    • 2002
  • The implementation of passive optical network in the access network will result in design of the network that have characteristics of broadband, long distance transmission, transparency. Particularly, optical technologies of WDM and WGR have made a new access network of WDM-PON. This paper proposes the algorithm that determines structural elements of a survivable optical access network, and simulates the cost of various scheme of proposed network architectures. Our results show that multistage star is the most cost effective scheme than the other architectures and show that network architecture designed by proposed algorithm provides survivability with single link and 1st node failure.

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

Design and Implementation of Multi-mode Mobile Device for supporting License Shared Access (면허기반 주파수 공동 사용을 위한 멀티모드 단말기 설계 및 구현)

  • Jin, Yong;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.81-87
    • /
    • 2016
  • Recently, as the heterogeneous network (HetNet) has been deployed widely to support various kinds of Radio Access Networks(RANs) with a combination of Macro, Pico, and/or Femto cells, research and standardization efforts have been very active regarding the concept of Licensed Shared Access (LSA) for supporting spectrum sharing. In order for a mobile device to efficiently support the spectrum sharing, the mobile device shall be reconfigurable, meaning that its radio application code has to be adaptively changed in accordance with the hopping of desired spectral band. Especially, Working Group 2 (WG2) of Technical Committee (TC) Reconfigurable Radio System (RRS) of European Telecommunications Standards Institute (ETSI) has been a main driving force for developing standard architecture for Multi-mode Mobile Device (MD) that can be applied to the LSA system. In this paper, we introduce the Multi-mode MD architecture for supporting LSA-based spectrum sharing. An implementation of a test-bed of Multi-mode MD is presented in order to verify the feasibility of the standard MD architecture for the purpose of LSA-based spectrum sharing through various experimental tests.

The Impact of YouTube Creator Characteristics and Channel Access Factors on Users' Continuous Viewing Intentions: An Application of the Extended Technology Acceptance Model (확장된 기술수용모형을 적용한 유튜브 크리에이터 특성과 채널 접근 요인이 사용자 지속 시청 의도에 미치는 영향)

  • Jae Hee Cho;Sang Hyeok Park;Seung Hee Oh
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.3
    • /
    • pp.1-18
    • /
    • 2024
  • This study analyzed the impact of YouTube creator characteristics and channel access factors on the intention to continue watching content, noting that the development of the digital media environment has diversified media audiences' content preferences and access routes. Specifically, we analyzed the effects of YouTube creator trustworthiness, attractiveness, familiarity, and social influence, as well as the effects of recommendation services on perceived usefulness, perceived ease, and perceived enjoyment. The study found that creator credibility and recommendation service had a positive impact on the perceived usefulness of content, while intimacy and charm were important factors in increasing the easy of use and playfulness of content. These perceived usefulness, ease, and playfulness also had a strong positive impact on users' intention to continue watching the channel. This suggests that trust and intimate relationships with creators and appropriate content recommendations play an important role in increasing user satisfaction and channel persistence. The significance of this study's analysis of creator and channel access factors based on the extended technology acceptance model is that it shows the potential for extending and applying the existing technology acceptance model to the digital content environment.