• Title/Summary/Keyword: access management

Search Result 3,330, Processing Time 0.031 seconds

A Study on Decision Making Process of System Access Management (시스템 접근관리에 대한 의사결정 프로세스 연구)

  • Cho, Young-Seok;Im, Jong-In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.225-235
    • /
    • 2015
  • Recently, the administration and supervision of Information Security Certification and Security Inspection has been enforced but information leakage and security accidents by insiders are increasing consistently. The security accidents by insiders ran to 21% in 2010, by the 2011 Cyber Security Watch Survey. The problem is that immediate recognition is difficult and stopgap measure is mostly adopted without company's external notice apprehensive for cost increase or credit drop in case of internal security accidents. In the paper, we conducted the regression study on security access management then proposed the standard process available for other systems and businesses sites. It can be very useful for many companies to investigate, analyze and improve the problem of security management conveniently.

A Framework for Web Log Analysis Using Process Mining Techniques (프로세스 마이닝을 이용한 웹 로그 분석 프레임워크)

  • Ahn, Yunha;Oh, Kyuhyup;Kim, Sang-Kuk;Jung, Jae-Yoon
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.25-32
    • /
    • 2014
  • Web mining techniques are often used to discover useful patterns from data log generated by Web servers for the purpose of web usage analysis. Yet traditional Web mining techniques do not reflect sufficiently sequential properties of Web log data. To address such weakness, we introduce a framework for analyzing Web access log data by using process mining techniques. To illustrate the proposed framework, we show the analysis of Web access log in a campus information system based on the framework and discuss the implication of the analysis result.

The Design of License Agent Rights Protection (디지털 저작권 보호를 위한 라이센스 에이전트의 설계)

  • 이광형;이근왕;김희숙
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.275-282
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PBD security method real time action monitoring for user, data security for itself.

  • PDF

Implementation of a Prototype of Remote Contents Management System using Web Services (웹 서비스를 이용한 콘텐츠 원격 관리 시스템 프로토타입 구현)

  • Yim, Jaegeol;Lee, Kangjai
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.25-34
    • /
    • 2013
  • One of the most typical examples of convergence is IPTV, a convergence of broadcast and telecommunication. Demand for IPTV has been increased so rapidly that a new TV set, called a smart TV, has appeared. One of the most important factors for IPTV business success is content. If an IPTV station provides popular content and subscribers can conveniently watch it then the station has a good chance of success. Therefore, the content management module is extremely important component of IPTV systems. In the current IPTV systems, operators must be present at the office to access a Content Management System(CMS). We implement a web CMS so that the operators can access the CMS anytime and anywhere as long as they are connected to Internet.

An Effective View Management in a Mediator System for the Integration of Heterogeneous Distributed Database (미디에이터 시스템에서의 이질 분산데이타베이스의 통합을 위한 효율적인 뷰관리 방법)

  • Joo, Kil-Hong;Lee, Won-Suk
    • Journal of KIISE:Databases
    • /
    • v.28 no.4
    • /
    • pp.620-632
    • /
    • 2001
  • This paper proposes a mediator system which can provide a view management function in the today's heterogeneous computing environment including operating system database management systems and other software. while most mediators use view modification mechanism only, the use of view materialization is also considered in this research. In order to optimize the management cost for materialized views the proposed method applies a decay factor for modeling the access behaviors of views In other words, the most recently access pattern gets the highest attention in the optimization process all the necessary it with the CORBA.

  • PDF

A Study of Public Records Management Act: Legal Status of the National Archives of Korea and Right to Know (『공공기록물 관리에 관한 법률』의 제정 의의와 개선방안 - 국가기록원의 위상과 국민의 알권리를 중심으로 -)

  • Kim, You-Seung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.8 no.1
    • /
    • pp.5-25
    • /
    • 2008
  • This article reviews the current Public Records Management Act which revised in October 2006 and put in force in April 2007. Since Public Records Management Act has been enacted in 1999, the external development of record management is significant. The Road Map for Record Management Reform in 2005 and the Information Strategy Project in 2006 are prime examples. However, our legal system concerning record management is still posing a number of problems, ranging from issues about objects and definitions of record management to issues of access. These issues have been subject to serious critics from various stakeholders, including civil organizations and academics. The article analyses a legal status of the National Archives of Korea and issues concerning access to current and archival records. As a result of the discussion, the article provides alternative plans.

A study on the construction of records management criteria (기록관리기준 조사 및 작성에 관한 연구)

  • Lee, Mi-young
    • The Korean Journal of Archival Studies
    • /
    • no.15
    • /
    • pp.185-218
    • /
    • 2007
  • With the reform of records management law, the organization should manage a new criteria scheme of record management based on business task and process. The new criteria scheme includes business explanation, preservation period, cause of setting up preservation period and opening information, access authority, keeping records or not. In the past, there were also some regulations and criteria but, records management criteria should be managed systematically and rationally than past in electronic environment. In this study, some previous cases about records management criteria constructing and operating were introduced first. And various characters about records management criteria were reviewed after that, process sample and methodology were proposed for construction of each criteria. If the records management criteria were constructed properly according to goals and objectives of records management and the results were managed through electronic system, the consistency of records management will be kept well and value changes of business and records will be reflected dynamically.

Perceptions of Researchers on Cooperative Utilization of Research Outcomes (R&D 성과물 공동활용에 대한 연구자들의 인식에 관한 연구)

  • Chang, Durk-Hyun;Roh, Ryu-Ha;Lee, Soo-Sang
    • Journal of Information Management
    • /
    • v.39 no.4
    • /
    • pp.1-20
    • /
    • 2008
  • The purpose of this study is to scrutinize the copyright issue under Open Access environment. A survey has been carried out to investigate researchers' awareness and recognitions about such issues. For this, bioinformatics researchers were selected and surveyed. Descriptive statistics method is employed for analysis of collected data. The findings of this study summarized as follow. (1) Although the researchers regarded the Open Access a positive initiative, the perceptions about open access were very low. (2) The researchers demanded possession of copyright depending on type of research information. (3) Many agencies did not required the transfer of copyright to the researcher. Thus, there is a possibility of dispute regarding copyright issues between researchers and agencies. (4) The researchers are willing to participate in open access activity on the assumption that their study is used in legitimate objective. On the basis of these findings, suggestions are added in as an impetus to lower the barrier against a copyright and higher the approach to information seekers and information providers.

Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system (유닉스 시스템에서 다양한 접근제어 정책을 이용한 커널 수준의 자동 암호화 기법)

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.387-396
    • /
    • 2003
  • Many studies have been done on secure kernel and encryption filesystem for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policy like ACL, MAC, RBAC and so on, but cannot protect user or system data from stealing backup media or disk itself. In addition to access control policy, there are many studies on encryption filesystem that encrypt file data within system level. However few studies have been done on combining access control policy and encryption filesystem. In this paper we proposed a new encryption filesystem that provides a transparency to the user by integrating encryption service into virtual filesystem layer within secure kernel that has various access control policies. Proposed encryption filesystem can provide a simple encryption key management architecture by using encryption keys based on classes of MAC policy and overcome a limit of physical data security of access control policy for stealing.

Real-Time File Access Event Collection Methodology for Zero Trust Environment (제로 트러스트 환경의 실시간 파일 접근 이벤트 수집 방법에 관한 연구)

  • Han, Sung-Hwa;Lee, Hoo-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1391-1396
    • /
    • 2021
  • The boundary-based security system has the advantage of high operational efficiency and easy management of security solutions, and is suitable for denying external security threats. However, since it is operated on the premise of a trusted user, it is not suitable to deny security threats that occur from within. A zero trust access control model was proposed to solve this problem of the boundary-based security system. In the zero trust access control model, the security requirements for real-time security event monitoring must be satisfied. In this study, we propose a monitoring method for the most basic file access among real-time monitoring functions. The proposed monitoring method operates at the kernel level and has the advantage of fundamentally preventing monitoring evasion due to the user's file bypass access. However, this study focuses on the monitoring method, so additional research to extend it to the access control function should be continued.