• Title/Summary/Keyword: access management

Search Result 3,303, Processing Time 0.026 seconds

Estimating the access demand funciton of the celluar communication service (셀룰러 통신 서비스의 수요 함수 추정)

  • 이영용;강국창;오형식
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.04a
    • /
    • pp.324-327
    • /
    • 1996
  • In this paper, the affecting factors of the access demand for the cellular service are derived, and the access demand function of the cellular service is estimated. The results obtained in this study are as follows: First, the price (access charge) and the income elasticities of cellular services there exists a network externality in cellular communication services. Third, the technological capability of the service provider has played an essential role in expanding the size of subscribers. Fourth, the access demand of cellular communication service is not sensitive to the usage charge. According to the above results, it can be inferred that if the access charge is lowered, the number if subscribers will increase to the critical mass, and then the cellular communication market will grow up to a saturation point naturally.

  • PDF

Pricing Strategy for Access Charge of IPTV Network : A Dynamic Analysis (IPTV 망 임대의 가격책정 전략 : 동태적 분석)

  • Kim, Dong-Hee;Cha, Jeong-Hyun;Oh, Jung-Suk;Kim, Soo-Wook
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.35 no.3
    • /
    • pp.45-58
    • /
    • 2010
  • Due to rapid developments of IT technologies, convergence services like IPTV (Internet protocol television) are shown up. Even though expert and customer had great expectations for this innovative service, commercialization was delayed for years by the legal dispute between industry players. One of the biggest problems was that whether internet backbone providers have to share their internet network backbone with IPTV service providers (which don't have network backbone) or not. As other countries, Korean government set the rules that ISP have to offer indiscriminate access to other IPTV service provider. At the same time, internet backbone providers can charge access charge based on cost by way of compensation. Thus access charge is very critical to the IPTV industry players. The objective of this paper is to provide model that can calculate the reasonable access charge by system dynamics, based upon real data in Korean telecommunication industry.

An Implementation Method of Improved Document DRM for Preventing Information Leakage using RBAC Approach (RBAC을 이용한 정보유출 방지를 위한 보안성이 강화된 문서 DRM 구현)

  • Choi, Young Hyun;Eom, Jung Ho;Chung, Tai Myoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.57-66
    • /
    • 2011
  • We implemented the document DRM applying role based access control(RBAC) mechanism for preventing the information leakage of a document which is transmitted in network environment. It must prevent to access document not related to user role and duty, and must allow operation to document for improving security, considering user role and security level according to a document importance. We improved the security of document DRM by adding to the access control module applying RBAC for satisfying security requirements. Though the user access document, our system allows operation authorizations to document by the user's role & security level and the security attribute of RBAC. Our system prevents indiscriminate access to the documents by user who is not associated with the role, and prevents damage the confidentiality and integrity.

Editor's Perceptions and Attitudes Toward Open Access Publishing (오픈액세스출판에 대한 학술지 편집인의 인식 연구)

  • Joung, Kyoung-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.4
    • /
    • pp.183-200
    • /
    • 2011
  • This study surveyed editors of 309 gratis open access journals in Korea in order to examine the reason why they decided to open their journals to the public on the Web. Also this study examined their perceptions and attitudes toward open access publishing. The main reasons of open access publishing in Korea were expansion of free use, increasing citation, and international trends regarding open access in their scholarly fields. Also, 65% of all respondents were aware of the concepts of open access, and 75% supported open access. The reasons of supporting open access were sharing of research results with the public, increasing the availability of peer researchers, and enhancing journal reputations.

Role-Behavior Based Access Control on Mobile Agent System for Workflow Management System (워크플로우 응용을 위한 이동 에이전트 시스템에의 역할-행위 기반 접근통제 적용)

  • Shin, Wook;Lee, Dong-Ik;Yoon, Seok-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.11-28
    • /
    • 2000
  • In these days it is rapidly increasing that multi-user, multi-layered commercial software developments for companies or public institutions. Security services are necessary for most of systems and the access control service is the essential of security services. Current access control methods that are used as access control policies are classified as Discretionary Access Control Mandatory Access Control and Role Based Access Control. However there are some inefficiencies when those methods are applied to current multi-user, multi-layered systems. Therefore it is required that a new access control method that takes complex system resources into account from the side of policy. In this paper extending previous Role Based of 'Behavior' and a basic model of the method. And we simply implement the method on the mobile agent based workflow management system that is a representative example of multi-user. multi-layered softwares and shows implementation results to tap possibilities of real-world application.

Improvement of Access Control at Partially Grade-Separated Intersection (단순입체교차 도로의 진출입로 설치 금지구간 개선방안)

  • Kim, Young-Jin;Kim, Jin-Uk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.725-733
    • /
    • 2018
  • With urbanization projects involving trunk roads progressing, many simple interchanges, which separate passing traffic into the main traffic and access subtraffic, are being constructed to maximize the traffic capacity. Under the current Road Connection Rule, the access-prohibited section in an interchange is determined based on the access lane and limit distance in the complete interchange road, but separate criteria for the simple interchange are not defined. This may cause confusion in the Road Management Office's determination of the access-prohibited section in the simple interchange, or lead to the application of the criteria for the access-prohibited section in the complete interchange without considering the features of such interchange. This study conducted a comparative analysis of the domestic and overseas systems related to the installation of access section in trunk roads, such as general national roads. This paper presents a survey of the methods for applying the access-prohibited section in the interchange along with the actual cases and proposes improvement measures for a rational calculation of the access prohibited installation section in the simple interchange to minimize the downsides associated with the application of the extremely strict criteria. The proposed road connection rule improvement measures based on the consideration of the purpose of installing the simple interchange and on the consideration the features of the simple interchange are expected to prevent administration confusion by the field road management offices as well as the waste of unnecessary efforts and costs by petitioners so they can boost the service satisfaction for people and the administrative reliability.

The Access Control Platform of the IoT Service Using the CapSG (CapSG를 이용한 IoT 서비스 접근제어 플랫폼)

  • Kim, Jin-Bo;Jang, Deresa;Kim, Mi-Sun;Seo, Jae-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.337-346
    • /
    • 2015
  • There is great need for efficient user rights management method to provide a flexible service on variety protocols, domains, applications of IoT environments. In this paper, we propose a IoT service platform with CapSG to provide efficient access control for IoT various services of the environment. CapSG uses a token including authentication and access rights to perform authentication and access control service entity providing services. In addition, the generated token for service management, delegation, revocation, and provides a function such as denied. Also, it provides functions such as generation, delegation, disposal and rejection for service token management. In this paper, it provides the flexibility and efficiency of the access control for various services require of the IoT because of it is available to access control specific domain service by using the token group for each domain and is designed to access control using specific service token of tokens group.

Multimedia Ad Hoc Wireless LAMs with Distributed Channel Allocation Based on OFDM-CDMA (OFDM-CDMA에 기반을 둔 분산 채널 할당 구조를 갖는 멀티미디어 Ad Hoc 무선 LAM에 관한 연구)

  • Yang, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.965-972
    • /
    • 2005
  • We propose a new resource management scheme, Distributed Channel Allocation Protocol (DCAP), for multimedia Ad Hoc Wireless LANs (AWLANS). This scheme implements a Qualify-of-Service (QoS) providing distributed resource management on the Orthogonal Frequency Division Multiplexing-Code Division Multiple Access (OFDM-CDMA) channel architecture. According to the performance evaluation results for MPEG traffic sources, DCAP can be a good choice of resource management scheme for AWLANs supporting multimedia services on the Broadband Wireless Access(BWA)-type physical layer.

A Case Study on Metadata Management for User Access to Data Warehouse - Suggestions about metadata management using K-bank case - (사용자의 데이터 웨어하우스 접근과 활용을 위한 메타데이터 관리 사례 - K 은행 사례를 통한 메타데이터 관리의 시사점 -)

  • Kim, Gi-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.225-233
    • /
    • 2007
  • This paper uses the taxonomy of 3 metadata schema(extraction metadata, warehouse, metadata, and user access metadata) to investigate how to manage metadata and what metadata to manage in data warehouse. In particular, this paper focuses on two kinds of metadata(warehouse metadata and user access metadata) and studies a case about metadata management in a real business world

  • PDF

Authenticated IGMP for Controlling Access to Multicast Distribution Tree (멀티캐스트 분배트리 접근제어를 위한 Authenticated IGMP)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.3-17
    • /
    • 2007
  • Receiver access control scheme is proposed to protect multicast distribution tree from DoS(Denial-of Service) attack induced by unauthorized use of IGMP(Internet group management protocol), by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP(Content Provider), NSP(Network Service Provider), and group members.