• Title/Summary/Keyword: Permission

Search Result 733, Processing Time 0.029 seconds

A MATHEMATICAL MODEL FOR HISTORY-BASED ACCESS CONTROL

  • Kim, Hee-Young
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.8 no.1
    • /
    • pp.11-30
    • /
    • 2004
  • Access Control is one of essential branches to provide system's security. Depending on what standards we apply, in general, there are Role-based access control, History-based access control. The first is based on subject's role, The later is based on subject's history. In fact, RBAC has been implemented, we are using it by purchasing some orders through the internet. But, HBAC is so complex that there will occur some errors on the system. This is more and more when HBAC is used with other access controls. So HBAC's formalization and model which are general enough to encompass a range of policies in using more than one access control model within a given system are important. To simplify these, we design the mathematical model called non-access structure. This Non-access structure contains to historical access list. If it is given subjects and objects, we look into subject grouping and object relation, and then we design Non-access structure. Then we can determine the permission based on history without conflict.

  • PDF

Development of Removable-Strand Compression Anchor (압축형 제거 앵커의 개발 및 성능 평가)

  • 김낙경;김성규
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2001.03a
    • /
    • pp.339-346
    • /
    • 2001
  • For temporary excavation support in private land area, the strand of ground anchor should be removed In order to get permission to install anchors. The extractable or removable-strand compression anchor system was developed and evaluated by a series of pull-out load tests. Anchor pull-out tests were performed on seven instrumented full-scale low-pressure grouted anchors installed in weathered soil at the Geotechnical Experimentation Site at Sungkyunkwan University, Four anchors are the compression type anchors and three are the tension anchors. Performance test, creep test, and long term relaxation test were performed and presented. Load distributor was developed in order to distribute large compressive stresses in grout.

  • PDF

An Analysis of Nurses' Behavior for Politeness in Cancer Patient-Centered Conversation (암 환자 중심의 대화를 위한 간호사의 공손 언어행위 분석)

  • Lee, Hwa-Jin
    • Korean Journal of Adult Nursing
    • /
    • v.20 no.5
    • /
    • pp.743-755
    • /
    • 2008
  • Purpose: The purpose of this study was to describe and to analyze real conversation about polite behavior of nurses in cancer units. Methods: This study was conducted using a Brown & Levinson(1987) theory to analyze the polite behavior of nurses in cancer units. Five nurses who participated in this research gave permission to be videotaped. The data was collected from January to February, 2006. Results: Polite behavior of nurses in cancer units consisted of greetings, emotional support, open questions and indirect direction. And impolite behavior of nurses in cancer units was using the medical terminology, repetition of direct speech acts and task-oriented conversation. Conclusion: This study suggests polite behavior strategies for effective nursing conversation with cancer patients. Therefore, the findings may provide basic raw materials for educational programmes and intervention studies.

  • PDF

A Study on Plagiarism Detection and Document Classification Using Association Analysis (연관분석을 이용한 효과적인 표절검사 및 문서분류에 관한 연구)

  • Hwang, Insoo
    • The Journal of Information Systems
    • /
    • v.23 no.3
    • /
    • pp.127-142
    • /
    • 2014
  • Plagiarism occurs when the content is copied without permission or citation, and the problem of plagiarism has rapidly increased because of the digital era of resources available on the World Wide Web. An important task in plagiarism detection is measuring and determining similar text portions between a given pair of documents. One of the main difficulties of this task is that not all similar text fragments are examples of plagiarism, since thematic coincidences also tend to produce portions of similar text. In order to handle this problem, this paper proposed association analysis in data mining to detect plagiarism. This method is able to detect common actions performed by plagiarists such as word deletion, insertion and transposition, allowing to obtain plausible portions of plagiarized text. Experimental results employing an unsupervised document classification strategy showed that the proposed method outperformed traditionally used approaches.

Internet Governance and Users (인터넷 거버넌스와 이용자)

  • Kim, Borami
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.95-100
    • /
    • 2013
  • Having taken actions for 2 years, Net Neutrality User Forum has realized Net Neutrality as a international issue of future Internet. Although the Internet design principle (layering, module, IP protocol) has enabled the end users to communicate each other without any additional permission or interference, in the reality, the end users have been tracked by both companies and governments, and the communications could be blocked, or restricted by surveillance devices, such as DPI, which could change the whole Internet design principle. Given that the Internet is a large community of the equal end-users based on end-to-end principle, it's essentially the issues of the whole Internet users, rather than of one nation, and we should focus on developing the transparent and participatory ways in Internet governance. The current Internet governance discussion have taken placed in ICANN, IGF, etc., in bottom-up processes of multistakeholderism to reflect the views of end-users. However there have been the controversial issues in Internet Governance, such as the position of government as a stakeholder, global north-south problem, transparency, so we have faced the debate on the new or evolving frame of Internet governance.

  • PDF

Stiffness change measurement for subgrade soils at freezing and thawing using impact resonance test (충격공진시험을 이용한 노상토의 동결.융해시 강성도 변화 측정)

  • Lee, Jae-Hoan;Kweon, Gi-Chul
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.03a
    • /
    • pp.686-691
    • /
    • 2009
  • Damage due to frost action in pavement structure system is creating either frost heave or stiffness-weakening of subgrade soil follow melting. The formation of ice lenses requires a frost-susceptible soil, freezing temperatures, and continuous water supply. Eliminating one of these conditions suffices to significantly reduce the intensity of frost action. It is important to know characteristics of subgrade soil in frost susceptibility or decide degree of freezing permission. Also, study on the stiffness variation of subgrade soil during freezing and thawing cycle is very important. In this study, Impact resonance test for subgrade soil at freezing and thawing confirms that is applied for.

  • PDF

A Study on the Improvement System for Apartment Remodeling (아파트먼트 리모델링 활성화를 위한 제도개선방안 연구)

  • Yoo Kang-Sic;Park Su-Yeon
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2005.11a
    • /
    • pp.171-175
    • /
    • 2005
  • Various acts, regulations and rules on the Apartment remodelling are established in Korea. Because, of these acts, reconstruction of Apartment is restrained and on the contrary Remodelling of Apartment is cumins issue. But, because of agreement of all resident for Apartment remodelling and a rule for the development restrict permission, extension of apartment is actually impracticable. Therefore, various regulations on the remodelling is investigated, problems on the current remodelling system are analysed, and improving system for activating apartment remodeling is suggested in this study.

  • PDF

Performance Improvement of TH PPM UWB-IR System with CCI Canceller in Multi-User Interference Environment (다중 사용자 간섭 환경에서 CCI Canceller를 채용한 TH PPM UWB-IR 시스템의 성능 개선)

  • Lee Yang-Sun;Kang Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.5 no.3
    • /
    • pp.171-175
    • /
    • 2004
  • In this paper, We applied CCI canceller to remove multi-user interference in co-channel environment and improved performance of TH PPM UWB-IR system. As a result, We could get reception performance that data transmission of high speed is available in small reception power applying CCI canceller. Also, We could get permission available channel capacity to maximum access number 40 in high speed transmission environment more than 100Mbps.

  • PDF

A Study Regarding Current Usage of Ha-Taedok Method in Korean Pediatrician (소아 전문 한의사를 대상으로 실시한 하태독법의 인식 및 사용실태 조사)

  • Jeong, Min Jeong
    • The Journal of Pediatrics of Korean Medicine
    • /
    • v.28 no.2
    • /
    • pp.88-102
    • /
    • 2014
  • Objectives This study is to know the current usage of Ha-Taedok Method in Korean pediatrician. Methods 69 questionnaires were statistically analyzed by using PASW Statistics 18. Results 55 Korean Medicine doctors knew Ha-Taedok Method, but only 2 doctors were using Ha-Taedok Method in their practice. The doctors tend not to use Ha-Taedok Method because it was hard to get permission from the patient's caregiver. 11 Korean Medicine doctors used Ha-Taedok Method to their own children though. The pediatricians felt satisfied from the effect of Ha-Taedok Method especially because it can prevent from disease. They reported no side effect and adverse effect. Coptidis Rhizoma is a preferred herb to use along with Ha-Taedok Method. For a better result from Ha-Taedok Method, it is recommended to start within 3 days old of patient. Conclusions Ha-Taedok Method may be effective as preventive method.

Design of Role-Based Access Control Model for Protecting the Medical Information (의료 정보 보호를 위한 역할기반 접근 제어 모델 설계)

  • 노승민;이수철;황인준;박상진;김현주
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.358-360
    • /
    • 2004
  • 환자의 의료 및 질환정보는 개인의 프라이버시에 관련되므로 민감하게 취급되어야 하는 정보이다. 이러한 의료 및 질환정보의 유출은 환자의 사회적인 고립뿐 아니라 환자의 생명도 위협하게 되므로 철저한 보안이 필요하다. 따라서, 의료진, 환자, 일반인 등의 사용자 식별을 통한 진료 기록의 접근 통제 및 사용 권한에 따른 정보의 암호화 수준과 해당 정보에 대한 역할 기반의 접근 제어(Role-Based Access Control)를 제공해야 한다. 또한, 환자 자신으로 하여금 자신의 의료 및 질환정보에 대한 다른 사람의 접근권한을 줄 수 있으며, 그 외의 대부분의 접근 권한들은 Role-Permission Broker를 통해서 제어될 수 있다. 본 논문은 RBAC 모델을 현재의 의료 및 질환 정보 관리에 적용시켜 각 정보 개체들과 사용자간의 효율적인 역할 분담과 정보 보호를 추구한다. 이러한 방식은 현재의 의료 및 질환정보 관리 체계를 개선할 것으로 기대한다.

  • PDF