• Title/Summary/Keyword: Document Access Control

Search Result 65, Processing Time 0.029 seconds

An Integrated Authentication System for Mobile Codes (이동코드를 위한 통합 인증 시스템)

  • Bae, Seong-Hun;Lee, Su-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.535-542
    • /
    • 2001
  • Mobile codes such as Java, Java-Script, ActiveX, and Script code are loaded into a client system first and then run without any notice to the client user. Executing code by this mechanism may cause various security problems such as flowing out system information, deleting or modifying files, and exhausting system resources. In this paper we propose an integrated authentication system to establish the uniform security countermeasure on various mobile codes. The system helps to solve to problems mentioned above. An integrated authentication system allows to load into an interpreter using ACL (Access Control List) which sets up an access authority to the executable contents and communicates with an interpreter using client/server model.

  • PDF

CDSS enabled PHR system for chronic disease patients (만성 질병환자를 위한 CDSS를 적용한 PHR 시스템)

  • Hussain, Maqbool;Khan, Wajahat Ali;Afzal, Muhammad;Ali, Taqdir;Lee, Sungyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1321-1322
    • /
    • 2012
  • With the advance of Information Technology (IT) and dynamic requirements, diverse application services have been provided for end users. With huge volume of these services and information, users are required to acquire customized services that provide personalized information and decision at particular extent of time. The case is more appealing in healthcare, where patients wish to have access to their medical record where they have control and provided with recommendation on the medical information. PHR (Personal Health Record) is most prevailing initiative that gives secure access on patient record at anytime and anywhere. PHR should also incorporate decision support to help patients in self-management of their diseases. Available PHR system incorporates basic recommendations based on patient routine data. We have proposed decision support service called "Smart CDSS" that provides recommendations on PHR data for diabetic patients. Smart CDSS follows HL7 vMR (Virtual Medical Record) to help in integration with diverse application including PHR. PHR shares patient data with Smart CDSS through standard interfaces that pass through Adaptability Engine (AE). AE transforms the PHR CCR/CCD (Continuity of Care Record/Document) into standard HL7 vMR format. Smart CDSS produces recommendation on PHR datasets based on diabetic knowledge base represented in shareable HL7 Arden Syntax format. The Smart CDSS service is deployed on public cloud over MS Azure environment and PHR is maintaining on private cloud. The system has been evaluated for recommendation for 100 diabetic patients from Saint's Mary Hospital. The recommendations were compared with physicians' guidelines which complement the self-management of the patient.

A Exploratory Study on R&D Strategies Industrial Technology Security (산업기술 보호를 위한 기술적 보안의 탐색적 연구)

  • Kim, Kyung-Kyu;Choi, Seo Yun;Hur, Sunghye
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.120-125
    • /
    • 2009
  • To enhance international competitiveness through the protection of cutting-edge industrial technology, it is essential to establish the policy for strengthening ability to develop industrial security technology and raising international competitiveness. In this study we investigated and analysed not only the ecumenic trend but also the present condition, then we executed the deduction of the industrial security technology development program in a aspect of government and analysed the current status of the technical security technology for developing security technology and increasing leaks of the advanced industrial technology.

  • PDF

A Study on the based on FRAD Conceptual Model based Authority Data Scheme for Academic Papers (FRAD 개념 모형 기반의 학술논문 전거데이터 구조에 관한 연구)

  • Lee, Seok-Hyoung;Kwak, Seung-Jin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.3
    • /
    • pp.235-257
    • /
    • 2011
  • In this study, we proposed the FRAD concept model of authority data schema for author, organization and journal titles included in the academic papers. Academic information includes author names, affiliations, publishers, journals and conferences. They are used as access points, and there are multiple relationships among these entities. It is expected that the use of authority data for academic information based on FRAD conceptual model could improve more accurate retrieval of information, systematic management of academic information, and various forms of knowledge representation. In this study, our entity-relationship authority data will be linked to the document, and included the several properties and relationship to identify the object.

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

Voice Activity Detection Algorithm using Wavelet Band Entropy Ensemble Analysis in Car Noisy Environments (문서 편집 접근성 향상을 위한 음성 명령 기반 모바일 어플리케이션 개발)

  • Park, Joo Hyun;Park, Seah;Lee, Muneui;Lim, Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.11
    • /
    • pp.1342-1352
    • /
    • 2018
  • Voice Command systems are important means of ensuring accessibility to digital devices for use in situations where both hands are not free or for people with disabilities. Interests in services using speech recognition technology have been increasing. In this study, we developed a mobile writing application using voice recognition and voice command technology which helps people create and edit documents easily. This application is characterized by the minimization of the touch on the screen and the writing of memo by voice. We have systematically designed a mode to distinguish voice writing and voice command so that the writing and execution system can be used simultaneously in one voice interface. It provides a shortcut function that can control the cursor by voice, which makes document editing as convenient as possible. This allows people to conveniently access writing applications by voice under both physical and environmental constraints.

A Study on Security Models Access Control XML Document for Performance RBAC (RBAC 기법의 성능을 고려한 XML 문서 접근제어 보안모델에 관한연구)

  • Kim, Moon-Seok;Lee, Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1226-1229
    • /
    • 2007
  • XML(eXtensible Markup Language)은 문서구조나 내용, 스타일의 자유로운 표현, 웹상에서 구조화된 문서의 전송이 가능하도록 설계된 표준 마크업 언어로, HTML에 비해 인터넷상에서의 정보 및 문서교환, 정보 검색 둥 이 편리한 장점을 갖는다. 그러나 XML 데이터가 방대해지고 복잡해짐에 따라 접근제어 정책을 규정하고 수행하기 위한 모델과 메커니즘의 필요에 따라 RBAC를 기반으로 하는 모델과 메커니즘에 대한 연구가 이루어지고 있다. 그러나 기존 연구들은 개념적 모델들 위주로 연구의 초점이 되어 있어 실제 모델 구현 시 시간적 공간적 오버헤드가 발생하는 단점이 있다. 따라서 본 연구에서는 XML 문서의 RBAC 기법을 기반으로 하는 노드의 권한 정보를 가지고 있는 접근 권한 트리 모델을 제안하였다. 이를 이용하여 노드권한에 모든 정보를 저장하고 권한을 가지는 구성요소에 접근할 경우나 권한을 추가로 부여하는 경우에 XML 엘리먼트, 속성, 링크 등의 세부요소에 대한 권한 체크 시간을 감소시켜 사용자에게 빠른 뷰를 제공할 수 있는 성능이 우수한 모델을 제시 하고자 한다.

Methodology for the Global Youth Tobacco Use Survey (GYST), Vietnam, 2014

  • Kim, Bao Giang;Hoang, Van Minh;Phan, Thi Hai;Doan, Thu Huyen;Luong, Ngoc Khue;Nguyen, Thuy Linh;Nguyen, Tuan Lam;Pham, Thi Quynh Nga;Luu, Ngoc Hoat
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.sup1
    • /
    • pp.11-15
    • /
    • 2016
  • Viet Nam is a country with the highest rate of adult male smokers in the world. In 2010, the percentage of adult male smokers was 47.4%. Each year in Viet Nam, there are 40,000 lives lost from tobacco-related diseases. The Global Tobacco Youth Survey is an international standardized survey that has been conducted in more than 140 countries. To provide evidence for tobacco control, Viet Nam already conducted two rounds of GYTS in 2003 and 2007. The GYTS in 2014 is the survey's third iteration. This paper aims to document key methodological details and socio-demographic characteristics of the respondents included in the 2014 GYTS in Viet Nam. This survey followed international protocol and was conducted in 13 provinces representative of 6 geographical regions. A total of 3,430 school children, aged 13 to 15 years used a standardized answer sheet to answer 76 questions about seven tobacco-related topics, including prevalence of tobacco use, environmental tobacco smoke, access and availability, media and advertisement, cessation, knowledge and attitudes, tobacco-related school curriculum. This GYTS provides valid and reliable data for monitoring tobacco use among youth in Vietnam and is recommended to be regularly repeated.

Prevention Methods for the Leakage and Crime of Industrial Technique in South Korea: Focused on the CPTED (한국 산업기술 유출 및 범죄 방지 방안: 환경설계를 통한 범죄예방을 중심으로)

  • Lee, Tae-Young;Sung, Yong-Eun
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.151-160
    • /
    • 2015
  • According to the document from the National Industrial Security Center in 2015, from 2003 to 2014 the disclosure number of industrial spy in South Korea was 438, and the damages due to the industrial technology leakages amounted 50 trillion won annually. Because the industrial technology leakage exercises great influence on the enterprises and the country. countermeasures against industrial technology leakages should be established. Therefore, the purpose of this research is to suggest measures preventing industrial technology leakages and related crimes in enterprises by applying the Crime Prevention Through Environmental Design(CPTED) technique. This research analyzed the recent technology leakage cases and used an analysis of literature research. From the result of this research, we suggested 1) Access Control, 2) Surveillance Enhancement, 3) Territoriality of Reinforcement, and 4) Activity Support by applying the CPTED technique for preventing industrial technology leakages. The limitations of this research and the recommendations for future research were discussed at the last part of this research.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.