• Title/Summary/Keyword: Permission

Search Result 735, Processing Time 0.026 seconds

Development and Validation of Safety Performance Evaluation Scenarios of Autonomous Vehicle (자율주행 안전성 평가 시나리오 개발 및 검증)

  • Chae, Heungseok;Jeong, Yonghwan;Lee, Myungsu;Shin, Jaekon;Yi, Kyongsu
    • Journal of Auto-vehicle Safety Association
    • /
    • v.9 no.1
    • /
    • pp.6-12
    • /
    • 2017
  • Regulation for the testing and operation of automated vehicles on public roadways has been recently developed all over the world. For example, the licensing standards and the evaluation technology for automated vehicles have been proposed in California, Nevada and EU. But specific safety evaluation scenarios for automated vehicles have not been proposed yet. This paper presents safety evaluation scenarios for extraordinary service permission of automated vehicles on highways. A total of seven scenarios are selected in consideration of safety priority and real traffic situation. Six scenarios are relevant with lane keeping and one scenario is relevant with lane change. All scenarios are developed based on existing ADAS evaluation scenarios and repeated simulation of automated vehicle algorithm. Safety evaluation factors as well as scenarios are developed. The safety factors are based on existing ADAS ISO requirements, ADAS safety factors and current traffic regulations. For the scenarios, a hunter vehicle is needed in addition to automated vehicle evaluated. The hunter vehicle performs multiple roles like preceding vehicle, cut-in vehicle and so on. The hunter vehicle is also automated vehicle equipped with high performance GPS, radar and Lidar. All the scenarios can be implemented by driving a lap on a KATRI ITS test track. These scenarios and safety evaluation factors are investigated via both a computer simulation and an experimental vehicle test on the test track. The experimental vehicle test was conducted with two automated vehicles, which are the evaluated vehicle and the hunter vehicle.

A Study on the Permission Method of Personal Mobility Device (PMD) on Sidewalk (보도에서의 개인교통수단 통행 허용 방안에 대한 연구)

  • Kim, Youngmin;Kim, Jisoo;Moon, Byeongsup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.5
    • /
    • pp.88-99
    • /
    • 2018
  • In Korea, there is no clear regulation about right of way (ROW) for personal mobility device (PMD). So it is now illegal to use PMD in a space other than roadway. PMD has an advantage of being able to travel a long distance to move on foot with a relatively high speed, so it seems to spread widely in the near future. In this study, we'd like to establish the permission criteria for PMD in sidewalk, with the performance factors of the PMD. We review the cases of ROW of PMD in some foreign countries, and the performance standards for similar products that are currently allowed to use in the sidewalk or used in the sidewalk. Based on the maintenance standards for the sidewalk, we establish criteria to select the PMD moving means that can be used in sidewalk.

Design and Implementation of Role Assignment Protocol for Active Role Assignment and Passive Role Assignment (능동적 역할 할당과 수동적 역할 할당을 수행하는 역할 할당 프로토콜의 설계 및 구현)

  • 나상엽;김점구
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.111-117
    • /
    • 2004
  • In distributed-computing environments, there is a strong demand for the authentication and the access control of distributed-shared resources. I have presented role-based access control (RBAC) concept that is in the spotlight recently. RBAC model shows the standardized access control of complicated organization's resources. In RBAC, senior role has junior role's permission by virtue of role hierarchy. But, junior role cannot perform the permission, which is granted to the senior or other role groups. Inheritances of permissions in role hierarchies are static. In order to tackle this problem, I propose a dynamic role assignment, which classified into passive role assignment and active role assignment, and design dynamic role assignment protocol and implement role assignment server.

  • PDF

Designing SMS Phishing Profiling Model (스미싱 범죄 프로파일링 모델 설계)

  • Jeong, Youngho;Lee, Kukheon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.293-302
    • /
    • 2015
  • With the attack information collected during SMS phishing investigation, this paper will propose SMS phishing profiling model applying criminal profiling. Law enforcement agencies have used signature analysis by apk file hash and analysis of C&C IP address inserted in the malware. However, recently law enforcement agencies are facing the challenges such as signature diversification or code obfuscation. In order to overcome these problems, this paper examined 169 criminal cases and found out that 89% of serial number in cert.rsa and 80% of permission file was reused in different cases. Therefore, the proposed SMS phishing profiling model is mainly based on signature serial number and permission file hash. In addition, this model complements the conventional file hash clustering method and uses code similarity verification to ensure reliability.

Performance Analysis of Multimedia CDMA Mobile Communication System Considering Diverse Qos Requirements (멀티미디어 CDMA 이동통신 시스템에서의 다양한 QoS 요구조건을 고려한 성능 분석)

  • Kim, Baek-Hyun;Shin, Seung-Hoon;Kwak Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1B
    • /
    • pp.1-12
    • /
    • 2002
  • In the multimedia CDMA mobile communication service, it is required to support various applications, such as voice, video, file transfer, e-mail, and Internet access, with guaranteed QoS. In the mixed traffic environment ,which consists of voice, stream data, and packet data, we analyze the network where preemptive priority is granted to delay-intolerant voice service and a buffer is offered to delay-tolerant stream data service. And, for best-effort packet data service, the access control by transmission permission probability is applied to obtain prominent throughput. To analyze the multimedia CDMA mobile communication system, we build a 2-dimensional markov chain model about prioritized-voice and stream data services and accomplish numerical analysis in combination with packet data traffic based on residual capacity equation.

Efficient RBAC based on Block Chain for Entities in Smart Factory (스마트 팩토리 엔터티를 위한 블록체인 기반의 효율적인 역할기반 접근제어)

  • Lee, YongJoo;Lee, Sang-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.69-75
    • /
    • 2018
  • The key technology of Industry 4.0, Smart factory is evaluated as the driving force of our economic development hereafter and a lot of researches have been established. Various entities including devices, products and managers exist in smart factory, but roles of these entities may be continuous or variable and can become extinct not long after. Existing methods for access control are not suitable to adapt to the variable environment. If we don't consider certain security level, important industrial data can be the targets of attacks. We need a new access control method satisfying desired level of efficiency and security without excessive system loads. In this paper, we propose a new RBAC-PAC which extend AC defined for PKC to the authority attribute of roles. We distribute PACs for roles through block chain method to provide the efficient access control. We verified that RBAC-PAC is more efficient in the smart factory with large number of entities which need a frequent permission update.

The forestry-related legal system and permission procedure of forestation business in Indonesia (인도네시아의 산림 관련 법체계 및 조림사업 허가 절차)

  • Yeom, In-Hwan;Kweon, Hyeong-Keun;Lee, Joon-Woo;Kim, Se-Bin;Park, Gwan-Soo;Han, Man-Seong
    • Korean Journal of Agricultural Science
    • /
    • v.38 no.3
    • /
    • pp.421-428
    • /
    • 2011
  • Of the countries where Korea has advanced for overseas afforestation investments, Indonesia might be the most important country. As the end of 2010, nine Korean companies have been implementing afforestation projects in Indonesia, covering a total area of one hundred and fifty thousand hectares roughly. Following the Memorandum Of Understanding (MOU) on afforestation investment covering five hundred thousand hectares (A/R CDM / industrial afforestation) signed between Korea and Indonesia, the two countries concluded in 2009 an additional MOU covering two hundred thousand hectares for biomass afforestation, thus securing a total afforestation area of seven hundred thousand hectares. Further it was guaranteed that afforestation license would have validity for maximum 95 years, which laid the foundation for long-term stable investments for afforestation projects. Forest law of Indonesia consists of Presidential decree and Governmental decree as superior regulations and Minister's decree as subordinate regulations, being made up of total 17 chapters. Forestry Minister's decree was amended at end of last year, as regards license for exploitation of timber and forestry products in afforestation area. In the past, such license to develop and use timber and forestry products had been granted under Forestry Minister's decree No. P 11 / Menhut-II / 2008. After the amendment in 2010, however, the ground was shifted to Forestry Minister's decree No. P 50 / Menhut-II / 2010, trimming the procedure to obtain afforestation license into a little simplified one.

The Legal Sociological Study on the Reality of Civil Mediation and it's Activating Policy - in Jurisdiction of Gwangju & Chonnam District Court - (민사조정의 운영실태와 그 활성화방안에 관한 법사회학적 연구 - 광주 및 전남지역의 법원을 중심으로 -)

  • Oh, Dae-Sung
    • Journal of Arbitration Studies
    • /
    • v.17 no.2
    • /
    • pp.189-219
    • /
    • 2007
  • Mediation is type of intervention in which the disputing parties accept the offer of the judge or a third party to recommend a solution for their controversy. Mediation differs from arbitration in being a voluntary resolution rather than a judicial procedure. Thus, the parties to the dispute are not bound to accept the mediator's recommendation. Resort to mediation has become increasingly frequent for civil disputes. Mediation has been successful in many cases of civil conflict. Mediation has become increasingly important for monetary disputes as well, particularly in damage cases. While most people consider mediation a far superior experience to court, everything I tell you a mediator should not do is something that at least one mediator I have dealt with has done to a client. In theory, a mediator should never share anything you tell him or her without your permission. In theory a mediator should not "spring" evaluations on anyone in a mediation without your permission (e.g. a mediator should never say "your case is worth \OOOO and I just told the other side that). In theory a mediator should not browbeat or threaten you. At the end, usually about 55% of the time with a good mediator in Kwangju Appellate Court in 2003, the parties reach an agreement that is in their best interests. If they decide to sign off on a signed agreement, the signed agreement is binding. I obviously feel mediation is a very good thing and the numbers and surveys bear me out. This article is written about how mediation is proceeded, what is the realities, what is the problem and what is the activating way. For this study, I research with legal sociological approach using Korean Judicial Year Boot judicial document and my experience as meditator in Kwangju District Court.

  • PDF

Mother's Personal Variables in Multicultural Family on Home Environment (다문화가족 자녀 어머니의 개인변인에 따른 가정환경)

  • Oh, Seong-Sook;Lee, Eun-Kyoung
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.714-725
    • /
    • 2013
  • The purpose of this study was to investigate language receptive characteristics of children with multicultural families in according to living areas. The subjects were 132 mother with children for living multicultural families 3 to 6 years old. The results were as follows. First, the differences of home environment on nationality, all variables were significant differences on emotional atmosphere, experience's variety, and play data in statistically. Second, the differences of home environment on age all variables were significant differences on permission, independent's upbringing emotional atmosphere, experience's variety and physical environment in statistically. Third, the differences of home environment on educational background, all variables were significant differences on predictable environments, developmental stimulation, quality of language environments, permission, independent's upbringing emotional atmosphere, experience's variety, physical environment and play data in statistically. Fourth, the differences of home environment on communication method in home, all variables were significant differences in statistically as communication(general korean) they use in home. Fifth, the differences of home environment on occupation existence, all variables were not significant differences in statistically.

Role-Based Delegation Model Using Available Time (가용 시간을 이용한 역할 기반 위임 모델)

  • Kim, Kyoung-Ja;Chang, Tae-Mu
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.65-72
    • /
    • 2007
  • The existing RBAC models are not sufficient for managing delegations or separation of roles. Researches have been done on RBDM(Role Based Delegation Model) that deal with delegating role or permission to other users. In this paper, we divide the delegated roles into two groups: periodic and temporary delegation roles. When a role is delegated, a time period is assigned together, which is used to revoke the permission of delegated role automatically. In our model, the role of monotonic delegation by an original user can be revoked at any time in case of malicious use by the delegated user. The contribution of our model is that the malicious use of delegated role can be prohibited and security vulnerability in the role hierarchy due to role delegations can be alleviated. The proposed model, T RBDM(Time out Based RBDM) is analyzed and compared with the conventional models, such as RBDM0, RBDM1 and PBDM. Our model shows an advantage over other models in terms of security robustness.