• Title/Summary/Keyword: Permission Management

Search Result 187, Processing Time 0.023 seconds

A Study on the Reconfiguration in the Regulation of Electric Safety Management for the Guarantee of Safety (안전성 확보를 위한 전기안전관리기준의 재설정에 관한 연구)

  • Chung, Jae-Hee
    • Journal of the Korean Society of Safety
    • /
    • v.24 no.6
    • /
    • pp.45-49
    • /
    • 2009
  • This study is to prepare a reasonable basis for the improvement of the electrical safety management regulation. The standards in domestic and foreign countries for the application of new and renewable energy facilities and other devices are analyzed. Other regulations excluding the electrical safety fields and wide surveys are also carried out. Consequently, it is asked that the classification between normal and self electrical facilities should be clear and deregulation for small businesses has to be followed. This study is showed that standards investigates of receiving equipment below 600V above 75kW, eletrical safety manager employment of manufacturing industry and Mid-night electric power. And, it is showed that consignment permission and Consignment inspection periodic relaxation about wind development equipment below 1,000kW, consignment of Technical Development equipment for new and renewable energy below 250kW.

The Characteristics of the Copyright Management for Korean Journals (국내 학술지의 저작권 관리 특성 분석)

  • Joung, Kyoung Hee;Kim, Gyuhwan
    • Journal of the Korean Society for information Management
    • /
    • v.33 no.4
    • /
    • pp.269-291
    • /
    • 2016
  • This study analyzed 1,890 KRF journals to understand the current situation and problems related to copyright management by journal publishers. The results of the study are as follows: 32.6% of journals did not provide any copyright notice, 77.1% of 1,141 journals which gave copyright information with regulation documents did not specify the type of author's property right to be transferred and most of the journals which owned copyright transferred from the author did not specify the permission needed to use their article. This study suggested that journal publishers establish the object and method for distribution of journal articles and then develop and publish their copyright policy suited to their own objective.

A Study on the Implementation Method of Total Water Quality Load Management in Sapkyo Lake Watershed (삽교호수계의 수질총량관리제 시행방안 연구)

  • Yi, Sang-jin;Oh, Hye-jeong;Lee, Eun-hyoung;Jung, Jong-Gwan
    • Journal of Korean Society on Water Environment
    • /
    • v.22 no.5
    • /
    • pp.807-814
    • /
    • 2006
  • Sapkyo Lake Watershed occupies about 19.3% of total area of Chungnam Province, and it is necessary to make a plan of counter-measure for the maintenance of public waterbody sound as well as to ensure water resources due to urbanization and industrialization in this area so densely populated and excessively developed. Conventionally water quality management has been enforced by concentration-based system which is not considered the carrying capacity of receptors, hence there are no proper measures for the prevention of an excessive pollutant load over a waterbody. So even though emission sources abide by the conventional permission regulation, then the quantity of wastewater is increased continuously and encountered water shortage to use finally. Therefore this research focused on the review of introduction of total water quality management system in Sapkyo Lake watershed to maintain public waterbody sound and to ensure water resources. By doing this research in introduction of the system in advance, it can contribute to establish the methodology on systematic water quality management. Also the application of this system in Sapkyo Lake watershed can promote the sustainable development of the area by harmonizing the environment and regional economy ultimately.

Privacy Controller using XACML for Internet Identity Management System (인터넷 Identity 관리 시스템 환경에서 XACML을 이용한 프라이버시 컨트롤러)

  • Roh, Jong-Hyuk;Jin, Seung-Hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7B
    • /
    • pp.438-447
    • /
    • 2007
  • In the Internet, an identity service must to obtain permission from a user to allow them to share data with requesting service. For that, the privacy policy, which reflects legal regulations and preferences made by the user, is needed. Also, the management interface that aids the user to make the privacy policy and the PDP system that makes admission control and policy decisions in response to a request from an entity wanting to access the personal information are needed. In this paper, the privacy controller system model handled under the internet Identity management system environment is proposed. The system has the easy interface of policy generation and the efficient policy decision process. The system applies and modifies to the XACML of OASIS group. We propose that the privacy policy is divided into the three policies, which are the user policy, the domain policy and the basic offering policy. To resolve the collision between the policies, we also propose the collision resolution policy.

A Study of Password Management Methods for System in Access Control (시스템 접근통제를 위한 패스워드 관리 방안에 대한 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.303-306
    • /
    • 2011
  • System solutions for access control to the user's personal when you want to authenticate to the system is used. The valid user is really just a part of authorized users, the suitability of a valid user has been authenticated are not sure whether the problem is the fact. For example, one developer in the Unix operating system can be valid, but do not have permission to access the system should be limited for. In this paper, a single account for multiple users to use the system operational issues to improve the fine-grained delegation of authority, the session audit, the administrator account's policy-based management, with full rights the administrator account of distribution management and auditing the system overall is the study of access control measures.

  • PDF

A COMPARATIVE STUDY ON BLOCKCHAIN DATA MANAGEMENT SYSTEMS: BIGCHAINDB VS FALCONDB

  • Abrar Alotaibi;Sarah Alissa;Salahadin Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.128-134
    • /
    • 2023
  • The widespread usage of blockchain technology in cryptocurrencies has led to the adoption of the blockchain concept in data storage management systems for secure and effective data storage and management. Several innovative studies have proposed solutions that integrate blockchain with distributed databases. In this article, we review current blockchain databases, then focus on two well-known blockchain databases-BigchainDB and FalconDB-to illustrate their architecture and design aspects in more detail. BigchainDB is a distributed database that integrates blockchain properties to enhance immutability and decentralization as well as a high transaction rate, low latency, and accurate queries. Its architecture consists of three layers: the transaction layer, consensus layer, and data model layer. FalconDB, on the other hand, is a shared database that allows multiple clients to collaborate on the database securely and efficiently, even if they have limited resources. It has two layers: the authentication layer and the consensus layer, which are used with client requests and results. Finally, a comparison is made between the two blockchain databases, revealing that they share some characteristics such as immutability, low latency, permission, horizontal scalability, decentralization, and the same consensus protocol. However, they vary in terms of database type, concurrency mechanism, replication model, cost, and the usage of smart contracts.

A User Authentication Model Based on Double Key for Secure Collusion Resistance in the Cloud Environment (클라우드 환경에서 공모 저항을 지원하는 이중 키 기반의 사용자 인증 모델)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.261-273
    • /
    • 2019
  • Recently, with the development of IT technology, there is an increasing interest in cloud services as the number of users using mobile devices such as mobile phones and tablets is increasing. However, there is a need for techniques to control or control various methods of accessing data as the user's service demands increase. In this paper, we propose a dual key based user authentication model that improves the user 's authentication efficiency by using two keys (secret key and access control key) to access the users accessing various services provided in the cloud environment. In the proposed model, the operation process and the function are divided through the sequence diagram of the algorithms (key generation, user authentication, permission class permission, etc.) for controlling the access right of the user with dual keys. In the proposed model, two keys are used for user authentication and service authorization class to solve various security problems in the cloud service. In particular, the proposed model is one of the most important features in that the algorithm responsible for access control of the user determines the service class of the user according to the authority, thereby shortening the management process so that the cloud administrator can manage the service access permission information of the user.

Implementation of FNMS(Fishing Net Management System) based on RFID and GPS (RFID와 GPS 기반 그물관리 시스템 구현)

  • Jang, Doc-Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.4
    • /
    • pp.304-310
    • /
    • 2008
  • Our ocean where three sides are the seas is the state that the environmental pollution damage is serious because of all kinds of wastes. Therefore, environmental pollution will be considerably decreased if we leans forward in the saddle to manage net which is conquering a section equivalent among wastes and will be helpful to marine ecosystem. This study is to develop a fishing net management system identifying nets cast and withdrawn from the vessel The purpose of FNMS is to manage sailing vessels arrival and departure details in order to manage a net abandoned in the ocean, and restrain the occurrence of the wasted net abandoned without permission in the ocean, and prevent environmental pollution and sailing vessels sank in and around the ocean.

  • PDF

IPv6 Address Management System Based on IP Agents (IP Agent 기반 IPv6 주소 관리 시스템)

  • Lee, Dong-Il;Hong, Yoon Hwan;Kim, Myung-Kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1051-1054
    • /
    • 2013
  • Because of the limitations of traditional IPv4 address, the adoption of IPv6 has been accelerated. In IPv6 system, each host can obtain the IP address automatically using auto-configuration functionality, which is one of the features of IPv6. However, the auto-configuration functionality can allow a malicious user to get its IPv6 address and access the network without permission, the IP address management functionality becomes more important than IPv4. In this paper, we propose an IPv6 address management system based on IP agents, which protects the unauthorised users from accessing the network and redirects the web access of those users to a specific web page to induce them to access the network after installing the IP agents.

  • PDF

What Kinds of Lands Have Been Converted into the Urban Uses?: the Characteristics of Urban Land Development in the Case of Daegu Region

  • Kim, Jae-Ik
    • Land and Housing Review
    • /
    • v.3 no.2
    • /
    • pp.111-116
    • /
    • 2012
  • The primary purposes of this study are to identify the characteristics of land development in urban area through GIS and remote sensing techniques and to provide useful implications for urban spatial policy. To perform these tasks, Daegu metropolitan city and its vicinities were selected as a study area, and remote sensing data and attributed data were collected, organized and analyzed. This study focuses on the following three steps. First, it identifies the characteristics of land development in urban areas by utilizing multi-temporal satellite image data (Landsat TM, 1980, 1985, 1990, 1995, 2000 and 2005). Second, it tries to find an answer on a critical question concerning land use conversion, i.e., which land use leads expansion of urban area? Third, it derives implications for urban spatial policies based on these findings. The characteristics of the urban extents tell us that the main land use converted into urban use from non-urban uses is green areas. The public sector, central and local governments, leads the land use conversions of suburban lands as exclusive legal body to issue permission of land use change. Based on these findings, this study concludes that the more systematic and technically advanced management tools should be utilized for more effective spatial management for urban growth.