• Title/Summary/Keyword: access management

Search Result 3,330, Processing Time 0.025 seconds

A Study on Protection and Disclosure of Presidential Records (대통령기록의 보호와 공개를 둘러싼 쟁점과 제도적 과제)

  • Kim, You-Seung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.2
    • /
    • pp.7-30
    • /
    • 2013
  • The study aims at providing alternative strategies for ongoing issues concerning presidential records. It reviews a history of legislation about presidential records management and discusses issues on protection and disclosure of access-restricted presidential records. Four major issues-presidential records' category, management authority, designated representative, and production control-are argued. As a result, this study proposes solutions to guarantee the independence of presidential records management agency and to innovate a presidential records management process.

A Study on Smart Korean Cattle Livestock Management Platform based on IoT and Machine Learning (IoT 및 머신러닝 기반 스마트 한우 축사관리 플랫폼에 관한 연구)

  • Park, Jun;Kim, Jun Yeong;Kim, Jeong Hoon;Bang, Ji Hyeon;Jung, Se Hoon;Sim, Chun Bo
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.12
    • /
    • pp.1519-1530
    • /
    • 2020
  • As livestock farms grow in size, the number of breeding individuals increases, making it difficult to manage livestock. Livestock farms require an integrated management system such as a monitoring system, an access control system, and an abnormal behavior detection system to manage livestock houses. In this paper, a smart korean cattle livestock management system using IoT and AI technology was proposed for livestock management in livestock farms. The smart korean cattle farm management system consists of a monitoring and control system, a vehicle access management system, and an abnormal cattle behavior detection system. It is expected that this will help manage large-scale livestock houses, and additional research is needed to improve the performance of abnormal behavior detection in the future.

Provision of a Novel Unlicensed Access Relay Station in IEEE 802.16-based Broadband Wireless Access Networks (IEEE 802.16 기반의 무선 액세스 망에서 Unlicensed 대역 액세스 릴레이에 대한 설계)

  • Choi, W.;Shon, T.S.;Choi, H.H.;Lee, Y.
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.169-177
    • /
    • 2007
  • Existing wireless access (mobile) routers are based commonly on the network address and port translation (NAPT) technique which permits simultaneously sharing a subscriber's connection to the network with multiple users. However, the NAPT architecturally makes the users invisible on the network side, thus becoming a user-oriented connection technique. In this paper, we propose a novel service provider-oriented unlicensed nomadic access relay station (WiNNERS) for helping wireless broadband network service providers to make their business more lucrative by accommdating unlicensed band users as subscribers into their network. The WiNNERS offers service providers the capability to directly manage each of the unlicensed band users at the network side. This direct management allows the service providers to flexibly and simply handle QoS, access control, and billing for each user. In order to distinguish each of the unlicensed band users the WiNNERS constructs a virtual tunnel from each user's terminal to the network access router using connection identifiers which is defined for service flow management within the WiBro system, Consequently, our proposed service provider-oriented relay station can be included into the WiBro network system with minimum modifications.

A Study on the IT R&D Emerging Technology Detection through Knowledge Map: Focus on Access Network Field (지식맵을 활용한 IT R&D 유망영역 탐색: 가입자망 분야를 중심으로)

  • Lee, Woo-Hyoung;Jung, Ji-Bum;Lee, Seong-Hwi
    • Information Systems Review
    • /
    • v.10 no.2
    • /
    • pp.1-19
    • /
    • 2008
  • The purpose of this research is to schematize and suggest the new trends of study and changing aspects of science and technology hidden in a bibliographical phenomenon of documentation to researchers and policy-makers all through the Knowledge Map. The field of study to be analyzed in this research is the Access Network field. The reason why this field has been selected as the main target of study is that the Access Network field is economically important and characterized by its wide sphere where a variety of fields are interconnected. In addition, it is important to measure the applied as well as fundamental aspects of technology by using bibliographical method and technique. Knowledge Map successfully visualizes the inter-relations of the keywords and sub-fields of Access Network. The importance of visualizing methods in the convincing presentation of results has not been sufficiently understood in the past. Knowledge Map opens a new opportunity for cartography of science and information visualization. The Knowledge Map results have produced a great deal more than statistical artifact. We aimed to exploit the visualization effect of the Knowledge Maps to the aid of searchers in Access Network domain, and the results are quite encourging.

Implementation of Subcontract Management System Using Intranet (인트라넷을 이용한 외주 관리 시스템 구현)

  • 하태룡;박주철;민상규
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.59-71
    • /
    • 1999
  • In this paper, we present implemetnations of subcontract management system using intranet. Subcontract management is including the support functions such as process control, official documents exchange, and transmission of subcontract management policy carried out by a big companys subcontract management department. By the use of the developed system, both big company and subcontract company are expected to have benefits from a consistent management of information and a strong access function through the internet. Also, it will reduce time lag ocurred a legacy management between two companies in the past.

  • PDF

A Study of Network 2-Factor Access Control Model for Prevention the Medical-Data Leakage (의료 정보유출 방지를 위한 네트워크 이중 접근통제 모델 연구)

  • Choi, Kyong-Ho;Kang, Sung-Kwan;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.341-347
    • /
    • 2012
  • Network Access Control system of medical asset protection solutions that installation and operation on system and network to provide a process that to access internal network after verifying the safety of information communication devices. However, there are still the internal medical-data leakage threats due to spoof of authorized devices and unauthorized using of users are away hours. In this paper, Network 2-Factor Access Control Model proposed for prevention the medical-data leakage by improving the current Network Access Control system. The proposed Network 2-Factor Access Control Model allowed to access the internal network only actual users located in specific place within the organization and used authorized devices. Therefore, the proposed model to provide a safety medical asset environment that protecting medical-data by blocking unauthorized access to the internal network and unnecessary internet access of authorized users and devices.

A study on the transformation of the fisheries relations in accordance with the changes in Japan and Russia Fisheries Agreement (일본과 러시아 간 어업질서의 재편에 따른 양국 어업관계의 변모)

  • Kim, Dae-Young
    • The Journal of Fisheries Business Administration
    • /
    • v.46 no.2
    • /
    • pp.93-110
    • /
    • 2015
  • This research examined the transformations of the fisheries relations between Japan and Russia since the establishment of the Exclusive Economic Zone (EEZ) system. The author reviewed the transformations with investigation on mutual fishing access to EEZ including salmon & trout catches. The Japan-Russia fisheries relations have evolved through multiple developmental stages, which include mutual fishing access to EEZ, the reductions of a fishing quota to balance catches of the nations, provision of financial and technical support, and a payment system of EEZ fishing access fee. The Japanese salmon industry also has done similar practices, continuing to catch salmon and trout in the Russian EEZ. Additionally, Japan and Russia have attempted to develop joint fisheries projects and to assure fishing operation safety around Kuril Islands. The case of Japan-Russia mutual fishing access shows that a country that has authority over crucial fisheries resources tends to establish specific conditions of mutual fishing access so that it maximizes its national interest. Thus, this case gives us implication what could be future directions of Korea-China-Japan multinational fishing access. The principle of same number of fishing vessels and quantities of catches has worked in existing mutual fishing access to EEZ among Korea, China, and Japan. However, it is expected that a nation that is endowed with abundant fisheries resources would limit counterpart's fishing access to its EEZ. Therefore, Korean fisheries administration should prepare for all possible situations like a dramatic cut in fishing quota and the termination of fishing access. International fisheries cooperation and payment of fishing access could be viable options for such a situation.

Development of Security Metric of Network Access Control (네트워크 접근제어 시스템의 보안성 메트릭 개발)

  • Lee, Ha-Yong;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.219-227
    • /
    • 2017
  • Network access control should be able to effectively block security threats to the IT infrastructure, such as unauthorized access of unauthorized users and terminals, and illegal access of employees to internal servers. From this perspective, it is necessary to build metrics based on relevant standards to ensure that security is being met. Therefore, it is necessary to organize the method for security evaluation of NAC according to the related standards. Therefore, this study builds a model that combines the security evaluation part of ISO / IEC 15408 (CC: Common Criteria) and ISO 25000 series to develop security metric of network access control system. For this purpose, we analyzed the quality requirements of the network access control system and developed the convergence evaluation metric for security of the two international standards. It can be applied to standardization of evaluation method for network access control system in the future by constructing evaluation model of security quality level of network access control system.

Current treatment status and medical costs for hemodialysis vascular access based on analysis of the Korean Health Insurance Database

  • Lee, Hyung Seok;Ju, Young-Su;Song, Young Rim;Kim, Jwa Kyung;Choi, Sun Ryoung;Joo, Narae;Kim, Hyung Jik;Park, Pyoungju;Kim, Sung Gyun
    • The Korean journal of internal medicine
    • /
    • v.33 no.6
    • /
    • pp.1160-1168
    • /
    • 2018
  • Background/Aims: The Republic of Korea is a country where the hemodialysis population is growing rapidly. It is believed that the numbers of treatments related to vascular access-related complications are also increasing. This study investigated the current status of treatment and medical expenses for vascular access in Korean patients on hemodialysis. Methods: This was a descriptive observational study. We inspected the insurance claims of patients with chronic kidney disease who underwent hemodialysis between January 2008 and December 2016. We calculated descriptive statistics of the frequencies and medical expenses of procedures for vascular access. Results: The national medical expenses for access-related treatment were 7.12 billion KRW (equivalent to 6.36 million USD) in 2008, and these expenses increased to 42.12 billion KRW (equivalent to 37.67 million USD) in 2016. The population of hemodialysis patients, the annual frequency of access-related procedures, and the total medical cost for access-related procedures increased by 1.6-, 2.6-, and 5.9-fold, respectively, over the past 9 years. The frequency and costs of access care increased as the number of patients on hemodialysis increased. The increase in vascular access-related costs has largely been driven by increased numbers of percutaneous angioplasty. Conclusions: The increasing proportion of medical costs for percutaneous angioplasty represents a challenge in the management of end-stage renal disease in Korea. It is essential to identify the clinical and physiological aspects as well as anatomical abnormalities before planning angioplasty. A timely surgical correction could be a viable option to control the rapid growth of access-related medical expenses.

A Study on Architecture of Access Control System with Enforced Security Control for Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 보안통제가 강화된 접근제어 시스템 설계에 관한 연구)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.71-81
    • /
    • 2008
  • In the paper, we designed a context aware task-role based access control system(CAT-RACS) which can control access and prevent illegal access efficiently for various information systems in ubiquitous computing environment. CAT-RACS applied CA-TRBAC, which adds context-role concept for achieve policy composition by context information and security level attribute to be kept confidentiality of information. CA-TRBAC doesn't permit access when context isn't coincident with access control conditions, or role and task's security level aren't accord with object's security level or their level is a lower level, even if user's role and task are coincident with access control conditions. It provides security services of user authentication and access control, etc. by a context-aware security manager, and provides context-aware security services and manages context information needed in security policy configuration by a context information fusion manager. Also, it manages CA-TRBAC policy, user authentication policy, and security domain management policy by a security policy manager.