• Title/Summary/Keyword: access management

Search Result 3,330, Processing Time 0.031 seconds

User Dynamic Access Control Mechanism Using Smart Contracts in Blockchain Environment (블록체인 환경에서 스마트 컨트랙트를 활용한 사용자 동적 접근제어 메커니즘)

  • Cho, Do-Eun
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.46-57
    • /
    • 2021
  • Recently, research has been actively conducted to utilize blockchain technology in various fields. In particular, blockchain-based smart contracts are applied to various automation systems that require reliability as they have the characteristics of recording data in a distributed ledger environment to verify the integrity and validity of data. However, blockchain does not provide data access control and information security because data is shared among network participants. In this paper, we propose a user dynamic access control mechanism utilizing smart contracts in blockchain environments. The proposed mechanism identifies the user's contextual information when accessing data, allocating the user's role and dynamically controlling the data access range. This can increase the security of the system and the efficiency of data management by granting data access dynamically at the time of user authentication, rather than providing the same services in roles assigned to each user group of the network system. The proposed mechanism is expected to provide flexible authentication capabilities through dynamic data access control by users to enhance the security of data stored within blockchain networks.

Access Control of XML Object Using Role Hierarchy and Cryptographic Key Assignment Scheme (역할 계층과 암호학적인 키 할당 기법을 이용한 XML 객체의 접근제어)

  • Bae Kyoung-Man;Kim Jong-Hoon;Ban Yong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.93-103
    • /
    • 2005
  • As the usage of XML documents increases the requirement of security for XML documents is growing. Especially it is very important to solve the problem of access control to XML object which shares in the environment where various users connect to each others. In this paper, we propose the access control model and mechanism which is combined with role hierarchy in the RBAC and hierarchical key derivation/assign method for the access to XML object. So we implement the access control mechanism by including hierarchical key derivation method. The technique, we proposed, gives not only the benefit in management which RBAC provides in access control to XML objects, but also it ran help derive a lower layer key from the higher layer user's. This feature decrease the number of keys managed in each role hierarchy in comparison with previous methods.

A Study on the Theoretical Frameworks and the Implementation Effects of the Fishery Closures as Multi-strategical Measures of Fisheries Management (어업관리 휴어제의 이론체계와 도입 타당성 및 기대효과에 관한 연구)

  • Lee Sang-Go
    • The Journal of Fisheries Business Administration
    • /
    • v.37 no.2 s.71
    • /
    • pp.33-59
    • /
    • 2006
  • This study describes approaches to fisheries management that restrict access by fishers to an area in some way. When fishery closure is established as a technical conservation measure it is a form of input control as a Korea fisheries management system. There are many compelling reasons why a fisheries manager should seriously consider closed areas and/or time restrictions, either as a complement to other measures or as the primary facet of the Korean fisheries management strategy. Fishery closures have been shown to be effective in many fisheries and are an important tool in the management armoury. In many respects justifications for their use and the process of implementation are likely to be relatively straightforward compared to permanent area closures. From a Korean fisheries management perspective, the benefits that flow from fishery closures are usually less easy to predict than for other management measures. Moreover, even if one accepts that implementation of fisherg clossures will provide higher production levels in adjacent fished areas, the potential benefits may often be in danger of being largely dissipated. If, for example, the fishery remains open access, the increased production is likely to attract new entrants into the fishery, thereby driving it back towards bioeconomic equilibrium. From a Korean wider fisheries conservation perspective, however, fishery closures have important and clearly defensible roles to play and some form of zoning arrangement will often effectively serve conservation values. Given the increasing trend towards the establishment of national networks of fisherg closures, it seems likely that fisheries managers throughout the world will need to ensure that they are familiar with the issues surrounding these approaches. The importance of being explicit about the goals for fishery closures in Korea have been continually emphasised throughout this study. There may, of course, be multiple justifications for the measure, in which case it is important to try and specify them in order of priority.

  • PDF

The Current State of Foreign Transition to Open Access Journal Publishing in the Field of HSS (해외 인문사회과학 학술지 오픈액세스 전환 동향 연구)

  • Lee, Jae Yun;Joung, Kyoung Hee
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.3
    • /
    • pp.301-326
    • /
    • 2020
  • This study analyzed recent cases of transition to open access(OA) journals in humanities and social sciences(HSS) in foreign countries to find a way to transition to OA journals in Korea. Ling OA and UP led by researchers, OLH and KU led by libraries, S2O led by publishers and L+F model led by funders and libraries were analyzed. Programs by national funding agencies such as the Norwegian Research Council, Canada Social Sciences and Humanities Research Council, Austrian Science Fund, and Swiss Academy of Humanities and Social Sciences were also reviewed. Based on the results of the analyses, this study suggests for transition in Korean HSS field as follows; 1) transitions to open access journals in HSS should be supported at national level 2) the stakeholder in scholarly communications such as the nation, universities, libraries, research funders, scholarly societies etc has their own role in the transition but funders and libraries are the most important in financial support for open access publishing 3) but the financial support for the first stage of the transition should be done at national level 4) and open access journal publishing consortium comprised of libraries and information service institutions in the public sector such as KERIS, KISTI and the national library should be established 5) non commercial publishing platforms for scholarly societies should be developed and distributed.

On The Full-Text Database Retrieval and Indexing Language

  • Chang, Hye-Rhan
    • Journal of the Korean Society for information Management
    • /
    • v.4 no.1
    • /
    • pp.24-46
    • /
    • 1987
  • The recent growth of full-text database operations has brought new opportunities for subject access. The fundamental problem of subject access in the online environment is the indexing language and technology. The purpose of this paper is to identify the characteristics and capabilities of full-text retrieval as compared to traditional bibliographic retrieval. Retrieval performance of indexing languages, full-text systems features achieved so far, and the new role of a controlled vocabulary, are examined. This paper also includes a review of the research on full-text retrieval performance.

  • PDF

A Study on Secure Cooperative Caching Technique in Wireless Ad-hoc Network (Wireless Ad-hoc Network에서 보안 협력 캐싱 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.91-98
    • /
    • 2013
  • Node which plays the role of cache server does not exist in the wireless ad-hoc network consisting of only mobile nodes. Even if it exists, it is difficult to provide cache services due to the movement of nodes. Therefore, the cooperative cache technique is necessary in order to improve the efficiency of information access by reducing data access time and use of bandwidth in the wireless ad-hoc network. In this paper, the whole network is divided into zones which don't overlap and master node of each zone is elected. General node of each zone has ZICT and manages cache data to cooperative cache and gateway node use NZCT to manage cache information of neighbor zone. We proposed security structure which can accomplish send and receive in the only node issued id key in the elected master node in order to prepare for cache consistent attack which is vulnerability of distributed caching techniques. The performance of the proposed method in this paper could confirm the excellent performance through comparative experiments of GCC and GC techniques.

A study on the insurance harriers of the leading countries in OECD (OECD 주요국가(主要國家)의 보험장벽(保險障壁)에 관한 연구(硏究))

  • Yun, Yeung-Jin
    • Management & Information Systems Review
    • /
    • v.1
    • /
    • pp.309-331
    • /
    • 1997
  • When the international insurance market is expected to change rapidly, the insurance barriers of some key countries in OECD have been studied. Many foreign insurers within the U.S. can enjoy national treatment in their market access, establishement and operations. but it can be viewed as an easy country to access and operate when we understand socio-cultural surroundings more deeply than their laws and regulations Japan, our neighbourhood is seeking the liberalization in the provision of international insurance services by the new insurance law in 1996. However, its main barriers are the official gazette and rules of the administrative authorities. EU, after the intergation, is running after the supervision of home country, to say nothing of the liberalization and the deregulation. The particular protectionist measure might be justified by the corresponding rationale.

  • PDF

A Design of General Communication Protocol for Online Game (온라인 게임을 위한 범용 통신 프로토콜 설계)

  • 두길수;정성종;안동언
    • Proceedings of the IEEK Conference
    • /
    • 2001.06c
    • /
    • pp.233-236
    • /
    • 2001
  • When we execute a online game in the network, a lots of game informations and user informations are transfered between game server and game clients. This information has deferent data structure and communication protocol. So, game developers will be design the communication protocols and packet structures after analyze the game. And, they will be design the database for user management. It will be lots of overload to the game developers. From a user point of view, they must be register to each game server to use several games. It is a undesible operation for the game users. This problems are solved by using the communication server which operates commonly with several game servers. Game providers can get the benefit of multiple access of users and get freedom from user management. Game users can access the several games which connected to communication server by register the communication server only. In this paper we design the communication packet and propose a communication protocol which operates on the communication server described previous.

  • PDF

A Method for Data Access Control and Key Management in Mobile Cloud Storage Services (모바일 클라우드 스토리지 서비스에서의 데이터 보안을 위한 데이터 접근 제어 및 보안 키 관리 기법)

  • Shin, Jaebok;Kim, Yungu;Park, Wooram;Park, Chanik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.6
    • /
    • pp.303-309
    • /
    • 2013
  • Cloud storage services are used for efficient sharing or synchronizing of user's data across multiple mobile devices. Although cloud storages provide flexibility and scalability in storing data, security issues should be handled. Currently, typical cloud storage services offer data encryption for security purpose but we think such method is not secure enough because managing encryption keys by software and identifying users by simple ID and password are main defectives of current cloud storage services. We propose a secure data access method to cloud storage in mobile environment. Our framework supports hardware-based key management, attestation on the client software integrity, and secure key sharing across the multiple devices. We implemented our prototype using ARM TrustZone and TPM Emulator which is running on secure world of the TrustZone environment.

A Key Management Scheme for IPTV CAS in DOCSIS 3.0 Security System (DOCSIS 3.0 보안 시스템 기반 IPTV CAS를 위한 키 관리 기법)

  • Koo, Han-Seung;Lee, Jin-Hwan;Song, Yun-Jeong;Kwon, O-Hyung;Lee, Soo In
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.4
    • /
    • pp.207-217
    • /
    • 2008
  • A novel scheme is presented for Traffic Encryption Key (TEK) rekeying with low communication overhead for an Internet Protocol television (IPTV) conditional access system over Data-Over-Cable Service Interface Specifications (DOCSIS) 3.0. The proposed scheme utilizes the DOCSIS system synchronization for periodic TEK rekeying instead of a conventional TEK rekeying negotiation process. Analysis shows that the communication overhead is only 0.012 Kbps when TEK rekeying frequency is 1 second.

  • PDF