• Title/Summary/Keyword: access management

Search Result 3,330, Processing Time 0.03 seconds

Prevalence and Management of Venous Rupture Following Percutaneous Transluminal Angioplasty in Dysfunctional Arteriovenous Access: A Comparative Study of Primary Patency Rates with Non-Ruptured Access Circuits (동정맥루 기능 부전에서 경피적 혈관성형술 후 발생한 정맥 파열의 유병률 및 관리: 파열되지 않은 혈관과의 일차 개통 비교 연구)

  • Yoon Soo Park;Seung Boo Yang;Chae Hoon Kang;Dong Erk Goo
    • Journal of the Korean Society of Radiology
    • /
    • v.85 no.4
    • /
    • pp.746-753
    • /
    • 2024
  • Purpose This study aims to evaluate the incidence and management of venous ruptures after percutaneous transluminal angioplasty (PTA) for dysfunctional arteriovenous (AV) access. Materials and Methods From January 1998 to December 2015, 13506 PTA, mechanical thrombectomy, and thrombolysis procedures were performed in 6732 patients. The venous rupture rate following PTA was obtained, and access circuit primary patency (ACPP) was compared according to the etiology (PTA, thrombotic occlusion, and treatment type) of the venous rupture present. Results Venous rupture developed in 604 of the 13506 procedures. Venous ruptures were more frequent in female, AV graft cases, and in cases accompanied by thrombosis. Balloon tamponade was performed in 604 rupture cases, and stents were deployed in 119 cases where contrast extravasation and flow stasis persisted. ACPP was significantly better in the non-ruptured AV access circuits than in the ruptured group. However, AV access type and thrombosis was not associated with primary patency. In ruptured cases, ACPP is 8.4 months for prolonged balloon tamponade and 11.2 months for bare-metal stent insertion, showing statistically significant difference. Conclusion Balloon tamponade and bare-metal stent placement are effective treatment for PTA-induced venous ruptures. In particular, stent placement showed a similar ACPP to that of non-ruptured AV access circuits.

Context-based Dynamic Access Control Model for u-healthcare and its Application (u-헬스케어를 위한 상황기반 동적접근 제어 모델 및 응용)

  • Jeong, Chang-Won;Kim, Dong-Ho;Joo, Su-Chong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.493-506
    • /
    • 2008
  • In this paper we suggest dynamic access control model based on context satisfied with requirement of u-healthcare environment through researching the role based access control model. For the dynamic security domain management, we used a distributed object group framework and context information for dynamic access control used the constructed database. We defined decision rule by knowledge reduction in decision making table, and applied this rule in our model as a rough set theory. We showed the executed results of context based dynamic security service through u-healthcare application which is based on distributed object group framework. As a result, our dynamic access control model provides an appropriate security service according to security domain, more flexible access control in u-healthcare environment.

Role based XML Encryption for Enforcing Access Control Policy (접근제어 정책구현을 위한 역할기반 XML 암호화)

  • Choi Dong-Hee;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.3-15
    • /
    • 2005
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Research area or n security is about Encryption Digital signature, Key management and Access control. until now research on U security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex XML security comes to involve not only network security but also managerial security. Managerial security is guaranteed through access control. But XML Encryption supports simple network security. So it can't support multiple users and multiple access control policies. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can supper multiple authorizations of multiple users with integrating access control. And this can reduce the cost of evaluation process of the existing complicated access authorization with pre-processing.

Assessment and Support Measures of Academic Journals in the National Open Access Platform AccessON

  • Hyekyong Hwang;Eun Jee Lee;Wan Jong Kim;Jin Ho Park
    • Journal of Information Science Theory and Practice
    • /
    • v.12 no.3
    • /
    • pp.75-88
    • /
    • 2024
  • This study aims to assess the maturity of Korean open access (OA) journals using the OA infrastructure provided by the Korea Institute of Science and Technology Information, and develop necessary strategies for future improvement. The assessment model consists of three dimensions, 12 items, and 24 sub-items. The importance of the three dimensions (A: OA policy establishment and disclosure, B: OA sustainability, and C: Journal openness quality) was differentiated by the Analytic Hierarchy Process, and the maturity stages were divided into five levels (Entry, Growth1, Growth2, Maturity1, and Maturity2). The assessment was carried out twice for 100 academic journals. The results indicated that the proportion of journals at or above the Growth1 level increased by 11% to reach 83% during the second assessment phase, which could be owing to the learnings of the first assessment. Following expert consultations on the assessment results, three support measures were identified to activate OA. The first includes OA promotion and education activities, which involve creating standard regulations and guidelines, and advancing educational activities for societies that are either preparing for or currently implementing OA. The second involves providing support for technical aspects, such as identifiers, XMLization, and copyright management, through peer review and OA publishing platforms. The third includes collaborative activities to enhance journal evaluations and the recognition criteria for researchers' achievements in OA journals, and fostering cooperation with national and research and development institutions for financial support.

A Study on the Practice Model for Prescription Information Management of EMR Certification standard - Focus on Data management using SQL - (처방정보관리를 위한 EMR 인증기준의 실습 모델 연구 - SQL을 이용한 데이터 관리 중심 -)

  • Joon-Young Choi
    • Journal of the Health Care and Life Science
    • /
    • v.10 no.1
    • /
    • pp.25-38
    • /
    • 2022
  • In this study, a SQL practice model for understanding EMR certification standards and data management practice for healthcare information managers was presented. This study is to practice prescription information management for the functionality of EMR certification standards through the health and medical information management practice program. The data management practice according to the EMR certification criteria consists of medicaiton master management and medicaiton name inquiry, medicaiton prescription inquiry, previous medication prescription inquiry after converting medical care information, examintaion result inquiry when administering medicine, examination prescription records inquiry. Additionally, dietary prescription records, other prescription records, return reason inquiry when administering medicine is stopped are included. Accordingly, using the prescription management database of the MS-ACCESS-based health care information management education system, a SQL statement was written that can inquire the contents of the prescription information management certification standards. In the EMR certification practice, you can understand the certification standards more easily by directly extracting the query items required by the certification standards using SQL and it will be possible to improve the data management and information generation ability to extract data other than the certification standards.

Design and Implementation of the RDF Web Ontology Access Control Model based on Oracle VPD (오라클 VPD 기반의 RDF 웹 온톨로지 접근 제어 모델의 설계 및 구현)

  • Jeong, Hye-Jin;Jeong, Dong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.53-62
    • /
    • 2008
  • This paper proposes a new implementational model based on the security model of Oracle for Web ontology. Recently, several access control models using relational database security model for access control to Web ontology have been developing, and one of the most representative access control model is the RAC model. However, the RAC model is based on the standard security model, and thus it does not provide a implementational model for practical relational database management systems. In this paper, we propose an implementational model based on Oracle which is widely used and providing various security policies. This paper shows the implementation and experimental evaluation. Especially, the proposed model uses the VPD security model of Oracle and support high application and usability.

  • PDF

Analysis of Crisis and Alternative in Scholarly Information Communication (학술정보 유통위기 및 해소전략의 해부)

  • Yoon, Hee-Yoon
    • Journal of Information Management
    • /
    • v.36 no.1
    • /
    • pp.1-32
    • /
    • 2005
  • The scholarly communication crisis is not a journals crisis, but rather a broader crisis in information communications. It is the loss of access to the scholarly research literature, as the rising cost of STM journal subscriptions far out-strip academic library budgets. Now, the open access as alternatives to traditional journal subscription model are emerging for STM scholarly information. There are basically three forms for OA strategies : Open Access Journals(OAJ), Author Self Archiving(ASA), Academic Institutional Repositories(AIR). This paper describes the current trends and analyses potentially serious limitations and obstacles or various issues of the OA strategies, including the notion of scholarly information as a public good, myths of free access, author pay model, holder of copyright, etc.

Global Dissemination of Domestic Scholarly Journals Using DOI and Open Access (DOI와 오픈액세스를 활용한 학술지의 국제적 이용 활성화 방안)

  • Seo, Tae-Sul;Choi, Hee-Yoon
    • Journal of Information Management
    • /
    • v.42 no.4
    • /
    • pp.1-21
    • /
    • 2011
  • The purpose of this study is to suggest a model for increasing international use of Korean scholarly journals. Recently DOI and open access are remarkable from the standpoint of increasing the opportunity of global exposition and citation of domestic scholarly journal papers. The data used in investigation and analysis were from KAMJE, KISTI, DOAJ and SCIMAGO. The model comprising DOI service and open access is obtained through analyzing DOI and open access utilization models and investigation on both.

A Study of the PMI-based XML Access Control Model in Consideration of the Features of the Public Organization (공공기관의 특성을 고려한 PMI기반의 XML 접근제어 모델에 관한 연구)

  • Cho, Chang-Hee;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.5 no.3
    • /
    • pp.173-186
    • /
    • 2006
  • The local public organizations, to secure the Confidentiality, Integrity, Authentication and Non-Repudiation of cyber administrative environment is giving it a try to consolidate the official documents among them by standardizing all the documents into XML formats together with the establishment of the GPKI(Government Public Key Infrastructure). The Authentication System based on the PKI(Public Key Infrastructure) used by the GPKI, however, provides only the simple User Authentication and thus it results in the difficulty in managing the position, task, role information of various users required under the applied task environment of public organizations. It also has a limitation of not supporting the detailed access control with respect to the XML-based public documents.In order to solve these issues, this study has analyzed the security problems of Authentication and access control system used by the public organizations and has drawn the means of troubleshoot based on the analysis results through the scenario and most importantly it suggests the access control model applied with PMI and SAML and XACML to solve the located problem.

System Access Control Technique for Secure Cloud Computing

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.67-76
    • /
    • 2019
  • Along with the diversification of digital content services using wired/wireless networks, the market for the construction of base systems is growing rapidly. Cloud computing services are recognized for a reasonable cost of service and superior system operations. Cloud computing is convenient as far as system construction and maintenance are concerned; however, owing to the security risks associated with the system construction of actual cloud computing service, the ICT(Information and Communications Technologies) market is lacking regardless of its many advantages. In this paper, we conducted an experiment on a cloud computing security enhancement model to strengthen the security aspect of cloud computing and provide convenient services to the users. The objective of this study is to provide secure services for system operation and management while providing convenient services to the users. For secure and convenient cloud computing, a single sign-on (SSO) technique and a system access control technique are proposed. For user authentication using SSO, a security level is established for each user to facilitate the access to the system, thereby designing the system in such a manner that the rights to access resources of the accessed system are not abused. Furthermore, using a user authentication ticket, various systems can be accessed without a reauthorization process. Applying the security technique to protect the entire process of requesting, issuing, and using a ticket against external security threats, the proposed technique facilitates secure cloud computing service.