• Title/Summary/Keyword: Usage Control Model

Search Result 192, Processing Time 0.023 seconds

RFID Access Control Using Extended Usage Control Model (확장된 사용 제어 모델을 이용한 RFID 접근 제어)

  • Shin, Woo-Chul;Yoo, Sang-Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.127-144
    • /
    • 2007
  • This paper describes an Security Manager that integrally manages the Information Service related to RFID middleware, Object Name Service, and Web Service for upper level applications. In order to provide the access control of distributed RFID objects, Single-Sign-On has been implemented by extending existing UCON (Usage Control) model and SAML (Security Assertion Markup Language) assertions. The security technology of distributed RFID systems can be included in middleware and protect RFID information. In the future, it can be also applied to ubiquitous sensor networks.

  • PDF

A Usage Control Model based on Context-Awareness for Mobile Devices (휴대 단말기를 위한 상황인식 기반 사용제어 모델)

  • Chang, Hye-Young;Noh, Jin-Uk;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.1
    • /
    • pp.63-70
    • /
    • 2008
  • As the number of cell phone users become growing, some researchers have presented that the imprudent use of mobile phones exerts harmful influence on electronic devices such as medical appliances, takeoff and landing system of aircraft. In this paper, we propose a usage model based on context-awareness which can be applied to mobile devices. The model controls the usage of both mobile devices themselves and mobile contents according to some context information like location, time, the circumference noise, etc. The proposed usage control model includes a dynamic role-based access control approach. To show the effectiveness of the proposed model, we have implemented a prototype system on an embedded board and PC server, and evaluated the performance of the system.

The Effects of Training for Computer Skills on Outcome Expectations , Ease of Use , Self-Efficacy and Perceived Behavioral Control

  • Lee, Min-Hwa
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1996.10a
    • /
    • pp.29-48
    • /
    • 1996
  • Previous studies on user training have largely focused on assessing models which describe the determinants of information technology usage or examined theeffects of training, on user satisfaction, productivity, performance and so on. Scant research efforts have been made, however, to examine those effects of training by using theoretical models. This study presented a conceptural model to predict intention to use information technology and conducted an experimentto understand how training for computer skill acquisition affects primary variables of the model. The data were obtained from 32 student subjects of an experimental group and 31 students of a control group, and the information technology employed for this study was a university's electronic mail system. The study results revealed that attitude toward usage and perceived behavioral control helped to predict user intentions ; outcome expectations were positively related to attitude toward usage ; and self-efficacy was positively related to perceived behavioral control. Thd hands-on training for the experimental group led to increases in perceived ease of use, self-efficacy and perceived behaviroal control. The changes in those variables suggest more causal effects of user training than other survey studies.

A study on improvement of policing perfomance by usage parameter control in asynchronous transfer mode networks (ATM망에서 사용자 변수 제어에 의한 감시 성능 개선에 관한 연구)

  • 한길성;오창석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.6
    • /
    • pp.1480-1489
    • /
    • 1996
  • In ATM networks there are two methods in traffic control as schemes advancing the quality of service. One is reactive control after congestion and the other which is generally recommended, is preventive control before congestion, including connection admission control on call leel and usage parameter control, network parameter control, priority control and congestion control on cell level. In particular, usage parameter control is required for restricting the peak cell rate of bursy tracffic to the parameter negotiated at call set-up phase since the peak cell rate significantly influences the network quality of service. The scheme for progressing quality of service by usage parameter control is themethod using VSA(Virtual Scheduling Algorlithm) recommended ITU-T. The method using VSSA(Virtual Scheduling Suggested Algorlithm) in this paper is suggested by considering cell delay variation and token rate of leaky bucket, compared VSA and VSANT(Virtual Scheduling Algolithm with No Tolerance) with VSSA which polices violated cell probability of conformed peak cell rate and intentionally excessive peak cell rate. VSSA method using IPP(Interruped Poisson Process) model of input traffic source showed more quality of service than VSA and VSANT methods as usage parameter control because the suggested method reduced the violated cell probability of contformed peak cell rate and intentionally excessive peak cell rate.

  • PDF

The Effects of Training for Computer Skills on Outcome Expectations, Ease of Use, Self-Efficacy and Perceived Behavioral Control

  • Lee, Min-Hwa
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 1996.11a
    • /
    • pp.29-48
    • /
    • 1996
  • Previous studies on user training have largely focused on assessing models which describe the determinants of information technology usage or examined the effects of training on user satisfaction, productivity, performance, and so on. Scant research efforts have been made, however, to examine those effects of training by using theoretical models. This study presented a conceptual model to predict intention to use information technology and conducted an experiment to understand how training for computer skill acquisition affects primary variables of the model. The data were obtained from 32 student subjects of an experimental group and 31 students of a control group, and the information technology employed for this study was a university's electronic mail system. The study results revealed that attitude toward usage and perceived behavioral control helped to predict user intentions; outcome expectations were positively related to attitude toward usage; and self - efficacy and perceived behavioral control. The changes in those variables suggest more causal effects of user training than other survey studies.

  • PDF

Consumption of Counterfeit Luxury Fashion Products Based on the Theory of Planned Behavior (계획된 행동이론을 적용한 명품 복제품의 사용과 재구매 행동에 관한 연구)

  • Jang, Jae Im;Choo, Ho Jung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.39 no.3
    • /
    • pp.433-445
    • /
    • 2015
  • This study examines factors that influence consumer behavior regarding the usage intentions and repurchasing behavior of counterfeits. Based on the Theory of Planned Behavior by Ajzen (1991), this study looks at the impact of attitude, subjective norm, perceived behavioral control, as well as the moral norm of consumers about intentions to use and repurchase counterfeits. An online survey was conducted on males and females over the age of 20 with previous experiences of purchasing counterfeits; subsequently, 209 responses were collected and analyzed. The covariance structure model was used to analyze the data in order to measure the factors that influence the usage of counterfeits and repurchasing behavior. The results show that attitude, subjective norm, and perceived behavioral control have significantly positive effects on usage intentions, while moral norm has a significantly negative effect on usage intentions. Usage intentions also have a significantly positive effect on repurchasing behavior and confirmed that usage intentions functions as the mediator. The variables that influence usage intentions are attitude, perceived behavioral control, moral norm, and subjective norm, in descending order. Consumer attitudes towards counterfeits is a major factor that influences usage intentions. Therefore, ethical problems should be emphasized to encourage a negative attitude towards counterfeits. This study identifies an important aspect to show that usage intentions toward counterfeits, and not purchasing intentions, influences repurchasing behavior. Findings are significant in that they reveal the role of the moral norm variable added to the TPB model.

A Study on the Traffic Controller of ATM Call Level Based on On-line Learning (On-line 학습을 통한 ATM 호레벨 트래픽 제어 연구)

  • 서현승;백종일;김영철
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.115-118
    • /
    • 2000
  • In order to control the flow of traffics in ATM networks and optimize the usage of network resources, an efficient control mechanism is necessary to cope with congestion and prevent the degradation of network performance caused by congestion. To effectively control traffic in UNI(User Network Interface) stage, we proposed algorithm of integrated model using on-line teaming neural network for CAC(Call Admission Control) and UPC(Usage Parameter Control). Simulation results will show that the proposed adaptive algorithm uses of network resources efficiently and satisfies QoS for the various kinds of traffics.

  • PDF

The Effects of Training for Computer Skills on Outcome Expectations, Ease of Use, Self-Efficacy and Perceived Behavioral Control

  • Lee, Min-Hwa
    • The Journal of Information Systems
    • /
    • v.5
    • /
    • pp.345-371
    • /
    • 1996
  • Previous studies on user training have largely focused on assessing models which describe the determinants of information technology usage or examined the effects of training on user satisfaction, productivity, performance, and so on. Scant research efforts have been made, however, to examine those effects of training by using theoretical models. This study presented a conceptual models to predict intention to use information technology and conducted an experiment to understand how training for computer skill acquisition affects primary variables of the model. The data were obtained from 32 student subjects of an experimental group and 31 students of a control group, and the information technology employed for this study was a university electronic mail system. The study results revealed that attitude toward usage and perceived behavioral control helped to predict user intentions ;; outcome expectations were positively related to attitude toward usage ; and self-efficacy was positively related to perceived behavioral control. The hands-on training for the experimental group led to increases in perceived ease of use, self-efficacy and perceived behavioral control. The changes in those variables suggest more causal effects of user training than other survey studies.

  • PDF

An Extended Role-based Access Control Model with Privacy Enforcement (프라이버시 보호를 갖는 확장된 역할기반 접근제어 모델)

  • 박종화;김동규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8C
    • /
    • pp.1076-1085
    • /
    • 2004
  • Privacy enforcement has been one of the most important problems in IT area. Privacy protection can be achieved by enforcing privacy policies within an organization's data processing systems. Traditional security models are more or less inappropriate for enforcing basic privacy requirements, such as privacy binding. This paper proposes an extended role-based access control (RBAC) model for enforcing privacy policies within an organization. For providing privacy protection and context based access control, this model combines RBAC, Domain-Type Enforcement, and privacy policies Privacy policies are to assign privacy levels to user roles according to their tasks and to assign data privacy levels to data according to consented consumer privacy preferences recorded as data usage policies. For application of this model, small hospital model is considered.

VLSI implementation of Usage Parameter Control Based on Cell Loss Priority (셀손실 우선순위 기반의 사용 변수제어의 VLSI 구현)

  • 권재우;조태경;최명렬
    • Proceedings of the IEEK Conference
    • /
    • 2000.11b
    • /
    • pp.196-199
    • /
    • 2000
  • In this paper has studied an enhanced usage parameter control algorithm, which is one of the preventive traffic control method in ATM networks. The proposed algorithm is based on the CLP(Cell Loss Priority) bit in the ATM cell header. This algorithm can eliminate the measurement phasing problem in cell conformance testing in ATM networks. The proposed algorithm can minimize the cell loss ratio of high priority cell(CLP = 0) and resolve the burstiness of eel]s which may be generated in the multiplexing and demultiplexing procedure. For the performance evaluation, we have simulated the proposed algorithm with discrete time input traffic model and the results show that the performance of the proposed algorithm is better than that of ITU-T usage parameter control algorithm.

  • PDF