• Title/Summary/Keyword: Permission Management

Search Result 187, Processing Time 0.024 seconds

Privacy Preserving Keyword Search with Access Control based on DTLS (프라이버시를 보호하는 접근제어가 가능한 키워드 검색 기법)

  • Noh, Geon-Tae;Chun, Ji-Young;Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.35-44
    • /
    • 2009
  • To protect sensitive personal information, data will be stored in encrypted form. However in order to retrieve these encrypted data without decryption, there need efficient search methods to enable the retrieval of the encrypted data. Until now, a number of searchable encryption schemes have been proposed but these schemes are not suitable when dynamic users who have the permission to access the data share the encrypted data. Since, in previous searchable encryption schemes, only specific user who is the data owner in symmetric key settings or has the secret key corresponding to the public key for the encrypted data in asymmetric key settings can access to the encrypted data. To solve this problem, Stephen S. Yau et al. firstly proposed the controlled privacy preserving keyword search scheme which can control the search capabilities of users according to access policies of the data provider. However, this scheme has the problem that the privacy of the data retrievers can be breached. In this paper, we firstly analyze the weakness of Stephen S. Yau et al.'s scheme and propose privacy preserving keyword search with access control. Our proposed scheme preserves the privacy of data retrievers.

A Study on The Problem of The Revised Security Industry Law and Improvement Plan (개정 경비업법의 문제점과 개선방안에 관한 연구)

  • Park, Hyung-Sik
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.129-135
    • /
    • 2013
  • The revised security industry law revised 17 provisions among 31 provisions in order to root out the violent event. The main contents of the revised security industry law is the intensitfication of the required condition of permission, intensitfication of the obligation, management strengthening of the public resentment of group field, official, reason of expansion of the expenses instructor and guard, dress and equipment, vehicle, intensitfication of the managing director, intensitfication of the punishment, and etc. However, there is the problem including the putting under an obligation of the arrangement new appointment education, cause provider punishment of the service company violence, awareness of the police to the security company, excessive regulation, intensification of punishment problem, supervision power intensitfication of the revised security industry law is excessive the police, and etc. The individual responsibility education completion method and public resentment of group field in addition to is thought in order to solve this that exclusion of the prior education obligation, revision of the security industry law, burden on tax payers of the extra charge, punishment of the violence request contract trader, introduction of the guard qualification certificate system, and etc. are needed.

A Study On Automatic Control Sector Hand-off Algorithm For Air Traffic Control System Automation (항공관제 시스템 자동화를 위한 자동 관제권 이양 알고리즘 연구)

  • Kim, Yong-Kyun;Won, In-Su;Yun, Jun-Chol;Park, Hyo-Dal
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.489-494
    • /
    • 2010
  • According to the recent increase in air traffic more efficient air traffic control automation is required. Aeronautical traffic environment is different from the common traffic environment since it exist controller for control of aircraft And controller have to control jurisdiction hand-off by manual when aircraft move to the other sector. This paper proposes the automatic control jurisdiction hand-off algorithm for efficient air traffic flow management. It is sector distinction algorithm that aircraft move sector to the other sector it recognized sector and then give permission to authorized controller. As a simulation result, so unlilke simply manual control sector hand-off of existing algorithm. we confirmed that proposed algorithm in this paper can do air traffic control more efficiently by performing automatic aircraft. control sector hand-off.

RBAC-based Trust Negotiation Model for Grid Security (그리드 보안을 위한 역할 기반의 신뢰 협상 모델)

  • Cho, Hyun-Sug;Lee, Bong-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.455-468
    • /
    • 2008
  • In this paper, we propose FAS model for establishing trust based on digital certificates in Grid security framework. The existing RBAC(Role Based Access Control) model is extended to provide permissions depending on the users‘ roles. The FAS model is designed for a system independent integrated Grid security by detailing and extending the fundamental architecture of user, role, and permission. FAS decides each user’s role, allocates access right, and publishes attribute certificate. FAS is composed of three modules: RDM, PCM, and CCM. The RDM decides roles of the user during trust negotiation process and improves the existing low level Grid security in which every single user maps a single shared local name. Both PCM and CCM confirm the capability of the user based on various policies that can restrict priority of the different user groups and roles. We have analyzed the FAS strategy with the complexity of the policy graph-based strategy. In particular, we focused on the algorithm for constructing the policy graph. As a result, the total running time was significantly reduced.

An Analysis on the Status of Inappropriate Material Posting and Personal Information Exposure in Elementary Schools' Web Sites (초등학교 홈페이지에서의 불건전 정보 유통 및 개인정보 노출 실태 분석)

  • Kim, Min-Ki
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.4
    • /
    • pp.489-500
    • /
    • 2004
  • In this paper, an investigation on internet safety of 244 national or public elementary schools' web sites was performed with two points of view : inappropriate material posting and personal information exposure. The investigation results showed that obscene materials and commercial advertisements were uploaded into the bulletin board(67.2%) and students' personal information such as photograph, address, telephone number were exposed(87.3%). Most of the inappropriate materials were posted by auto-register programs. This problem was occurred due to reckless bulletin board opening and inappropriate management. On the contrary, personal information was exposed by teachers and students. They didn't not care about their personal information. It shows the fact that they have not recognized the danger of personal information exposure. Therefore managing real-name membership and enforcing permission to bulletin board were required to construct and use a safe school web site. Teachers have to understand not only negative effects appeared in a school web site but also latent dangerous factors.

  • PDF

A Formal Specification of Role Graph Model Increasing Integrity (무결성이 강화된 역할 그래프 모델의 정형적 명세)

  • Choi EunBok;Lee HyeongOk
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1620-1629
    • /
    • 2004
  • The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control(RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, We present the role graph model which enhanced flexibility and integrity to management of many access permission. Also, In order to represent those rule and constraints clearly, formal descriptions of role assignment rule and constraints in Z language are also given.

  • PDF

A Study on the Management of the Branch and the Publish of Socialist News Magazines (일제하 사회주의 잡지의 발행과 지국운영에 관한 연구)

  • Kim, Moon-Jong
    • Korean journal of communication and information
    • /
    • v.40
    • /
    • pp.7-44
    • /
    • 2007
  • This study aims to review the socialist news magazines between 1925 and 1936 under the Japanese regime, then to analyze how they published and how they managed the branch. The socialist magazines appeared legally and officially right after the 3 1 movement when the ownership and publishing of newspapers and news magazines was partially allowed. However, there were many obstacles because the permission by the Japanese regime was a result of deceptive cultural policy. The Japanese government more sensitively responded to the socialists' related news stories rather than other types of publications. Due to over-censorship and financial difficulty, the life time of most socialists' news magazines was very short. However, these news magazines did play an important role to disseminate socialism. In doing so, because the news magazines were a part of social movements, the delivery network was also maintained based on social movements.

  • PDF

The Sexual Experiences of the Mentally Disabled based on the Grounded Theory (정신장애인의 성경험에 대한 근거이론적 접근)

  • Choi, Je-Woo;Oh, Geum-Sook
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.427-436
    • /
    • 2016
  • This study attempts to suggest a theoretical basic frame that is needed for nursing intervention regarding the sexual experiences of the mentally disabled. The data were collected through a series of interviews with 14 participants. With permission of the mentally disabled, the interviews were recorded and transcribed. The data were analyzed using the framework of grounded theory mapped out by Strauss & Corbin(1998). The following 3 theories were confirmed on the basis of repetitive relations: becoming nest type, exercising self-restraint type, getting tangled type. Therefore, it is necessary to develop a realistic sex education that is relevant to hospital, community mental health center, and culture. The nurse is required to activily participate in educating the mentally disabled with a diverse approach to instill and nurture the sober perspective about sex such as the pleasure, life, intimacy based on sexual equality.

Research Analysis on User's Acceptability of Digital Contents Distribution among Individuals (개인 간 저작물 유통을 위한 사용자의 수용성 조사 분석)

  • Sohn, Bang Yong;Suh, Hye Sun
    • Journal of Digital Convergence
    • /
    • v.14 no.1
    • /
    • pp.211-217
    • /
    • 2016
  • There have been gradually established paid using system on contents, such as sound source, webtoon etc, with which licences are systematically managed. However, rampant free sites still mostly relying on advertising revenue make difficulties on lots of contents developers and obstruct the protection of their resonable right. In this situation, we need systematic measures to protect copyright of authors and to maximize use of contents of users. Therefore, it is important to handle the convenience of digital contents distribution and the diversity of contents license(differentiating permission rate according to user's purpose, scope, service period etc), based on the need of contents users. This paper implies to guideline to install contents distribution platform of individuals and to apprehend the need and acceptability of users in order to activate digital contents transaction on individuals.

Encapsulation of SEED Algorithm in HCCL for Selective Encryption of Android Sensor Data (안드로이드 센서 정보의 선택적 암호화를 지원하는 HCCL 기반 SEED 암호의 캡슐화 기능 연구)

  • Kim, Hyung Jong;Ahn, Jae Yoon
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.73-81
    • /
    • 2020
  • HCCL stands for Heterogenous Container Class Library. HCCL is a library that allows heterogeneous types of data to be stored in a container as a single record and to be constructed as a list of the records to be stored in database. With HCCL, encryption/decryption can be done based on the unified data type. Recently, IoT sensor which is embedded in smartphone enables developers to provide various convenient services to users. However, it is also true that infringement of personal information may occur in the process of transmitting sensor information to API and users need to be prepared for this situation in some sense. In this study, we developed a data model that enhances existing security using SEED cryptographic algorithms while managing information of sensors based on HCCL. Due to the fact that the Android environment does not provide permission management function for sensors, this study decided whether or not to encrypt sensor information based on the user's choice so that the user can determine the creation and storage of safe data. For verification of this work, we have presented the performance evaluation by comparing with the situation of storing the sensor data in plaintext.