• Title/Summary/Keyword: access policy

Search Result 1,258, Processing Time 0.026 seconds

A Study on the Open Access Policy to Public Funded Research Articles (공공기금으로 작성된 논문의 오픈액세스 정책에 관한 연구)

  • Joung, Kyoung-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.1
    • /
    • pp.207-227
    • /
    • 2010
  • This paper studied on the open access to public funded research articles in Korea. The 18% of articles published in the journals of the Korea Research Foundation was the output of research that received public fund. The field of engineering science had the most number of public funded articles and the most frequently supported funding agency was the KRF. But most of the public funded articles in Korea has been serviced through the commercial DBs, whereas the small number of articles serviced freely through the Korea Research Memory and NTIS. This paper proposed that the KRF will have to develop the open access policy focus on the engineering science.

Dynamic Spectrum Access Using Belief Vector Tracking Method for Other Competing Secondary Users (다른 이차사용자의 신뢰 벡터를 추적하여 이차사용자 사이의 충돌을 줄이기 위한 동적 스펙트럼 접속 방식)

  • Lee, Yutae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2547-2552
    • /
    • 2013
  • To achieve better performance in dynamic spectrum access networks, each secondary user tracks channels and chooses a good channel to transmit its packet. When all secondary users adopt the same dynamic spectrum access policy, they have similar channel information, which leads secondary users to choose the same channel and more collisions among them. To relieve this problem, we propose an access policy using belief vector tracking method for other competing secondary users. Simulation results are provided to show that the proposed policy yields better performance than the existing policies which do not take into account what other secondary users are doing.

An Efficient Privacy Preserving Method based on Semantic Security Policy Enforcement (의미적 보안정책 집행에 의한 효율적 개인정보보호 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.173-186
    • /
    • 2013
  • New information technologies make it easy to access and acquire information in various ways. However, It also enable powerful and various threat to system security. To challenge these threats, various extended access control methods are being studied. We suggest a new extended access control method that make it possible to conform to security policies enforcement even with discrepancy between policy based constraints rules and query based constraints rules via their semantic relationship. New our approach derives semantic implications using tree hierarchy structure and coordinates the exceed privileges using semantic gap factor calculating the degree of the discrepancy. In addition, we illustrate prototype system architecture and make performance comparison with existing access control methods.

A Novel Access Point Selection Policy for Load Balancing in IEEE 802.11 WLANs (IEEE 802.11 WLANs 환경에서 핫스팟의 혼잡을 분산하는 AP 선택정책)

  • Lee, Kwang-Gyo;Choi, Chang-Yeol
    • Journal of Industrial Technology
    • /
    • v.28 no.A
    • /
    • pp.105-111
    • /
    • 2008
  • A typical AP (Access Point) selection policy is to select an AP based on the received signal strength indicator (RSSI), ignoring its load. If multiple stations are deployed densely at a particular area, a typical AP selection policy will bring about the overall network throughput degradation. This paper proposes a novel AP selection policy taking into consideration not only signal strength of the APs but also AP loads to avoid Hotspot congestion. An experiment on Alinker implementing proposed AP selection policy, demonstrates that the proposed policy achieves close to optimal load balancing and grants the maximum transmission rate to stations in comparison with SSF (Strongest-Signal-First) and LLF (Least-Loaded-First).

  • PDF

A Study on the Open Access Policy of Scholarly Journals Publishing Research Papers Funded by Korean Government (공공연구기금 논문성과물 게재 학술지의 오픈액세스 정책에 대한 연구)

  • Min, Yoonkyung;Cha, Mikyeong
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.1
    • /
    • pp.155-176
    • /
    • 2017
  • This study analyzes the open access policies of major scholarly journals that have large number of publicly funded articles, for the purposes of expanding and facilitating the public access. Eighteen scholarly journals in Korea and abroad were selected based on the number of published publicly funded articles through a survey of dissemination of publicly funded journal articles via information from NTIS. The open access policies of the selected journals were analyzed by 5 categories including codification of OA related policy, copyrights, reuse rights, self archiving policy, free access. As a result, this research proposed several considerations for establishing national policies for the collection and distribution of the publicly funded research products.

Minimization of Security Policies in Database Security System applying Role-Based Access Control (역할기반 접근 제어를 적용한 데이터베이스 보안 시스템에서의 보안 정책 최소화)

  • Jung Min-A;Lee Kwang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1364-1370
    • /
    • 2005
  • There are many security models for database systems using policy-based access control. RBAC (Role-based Access Control) is used for complementing MAC (Mandatory Access Control) and DAC (Discretionary Access Control) and is for performing flexibly security policies meet applied environment. We implemented the database security system that applies DAC, MAC, and RBAC to meet security requirements of users. However, security policies are constructed redundantly whenever security policies are needed to each user in this system. Even though the proposed security system can flexibly control more complicated 'read' access to various data sizes for individual users, it is obvious that there is a possibility that a new policy can be a duplication of existing policies. In this paper, we introduce the problem of policy duplication and propose the policy management module. With this proposed module, constructed policies are checked for duplication and deleted or merged with existing policies.

Effective Access Control Mechanism for Protection of Sensitive Personal Information (민감한 개인정보 보호를 위한 효율적인 접근제어 기법)

  • Mun, Hyung-Jin;Kim, Ki-Soo;Um, Nam-Kyung;Li, Yong-Zhen;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7C
    • /
    • pp.667-673
    • /
    • 2007
  • In order to provide the efficient personalized services, the organizations and the companies collect and manage the personal information. The stored data have some slight differences among each subject. Even though the same attribute information leaks out, the personal privacy violation is different according to personal sensitivity. However, currently the organizations or the companies protect all the information as the same level. This paper reflects the sensitive attribute information of the information subject to each personal policy by the encrypting techniques. And then we propose a policy-based access control mechanism for the personal information which strictly prevents unauthorized information users from illegally accessing the personal information. In the proposed mechanism, the individuals' personal information which is encrypted with different keys is stored into the database. For the access control, information subjects set up their own access control policy for their sensitive personal information. Then it is possible to control the information access by providing the information to the information users according to personal and organizational privacy policy.

Market Access Approach to Urban Growth

  • MOON, YOON SANG
    • KDI Journal of Economic Policy
    • /
    • v.42 no.3
    • /
    • pp.1-32
    • /
    • 2020
  • This paper studies urban growth in Korean cities. First, I document that population growth patterns change over time and that the current population distribution supports random urban growth. I confirm two empirical laws-Zipf's law and Gibrat's law-both of which hold in the period of 1995-2015, but do not hold in the earlier period of 1975-1995. Second, I find a systematic employment growth pattern of Korean cities in spite of the random population growth. I examine market access effects on employment growth. Market access, a geographical advantage, has a significant influence on urban employment growth. The market access effect is higher in the Seoul metropolitan area than in the rest of the country. This effect is stronger on employment growth in the manufacturing industry compared to employment growth in the service industry. These results are robust with various checks (e.g., different definitions of urban areas). The results here suggest that policymakers should consider geographical characteristics when they make policy decisions with respect to regional development.

A Distributed Fog-based Access Control Architecture for IoT

  • Alnefaie, Seham;Cherif, Asma;Alshehri, Suhair
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4545-4566
    • /
    • 2021
  • The evolution of IoT technology is having a significant impact on people's lives. Almost all areas of people's lives are benefiting from increased productivity and simplification made possible by this trending technology. On the downside, however, the application of IoT technology is posing some security challenges, among them, unauthorized access to IoT devices. This paper presents an Attribute-based Access Control Fog architecture that aims to achieve effective distribution, increase availability and decrease latency. In the proposed architecture, the main functional points of the Attribute-based Access Control are distributed to provide policy decision and policy information mechanisms in fog nodes, locating these functions near end nodes. To evaluate the proposed architecture, an access control engine based on the Attribute-based Access Control was built using the Balana library and simulated using EdgeCloudSim to compare it to the traditional cloud-based architecture. The experiments show that the fog-based architecture provides robust results in terms of reducing latency in making access decisions.

A Study on the Operational Model for Open Access Based e-Journal Subscription of University Library (대학도서관의 오픈액세스 기반 전자저널 구독을 위한 운영모델 연구)

  • Kang, Jeong Won;Kim, Hyun-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.35 no.3
    • /
    • pp.123-145
    • /
    • 2018
  • In this study, we investigated the problems of existing e-journal subscriptions caused by open access of e-journals faced by university libraries. To solve these problems, we proposed an operational model for open access based subscription. The proposed operational model, which adapts the four concepts of subscription model, system, policy, and operation interpreted according to reality, applies open access on the premise of rational subscription of electronic journals. The proposed operational model was constructed based on national support, comprehensive operation, open access based model, and cooperation system. In particular, it emphasized the need for stable and continuous access to scholarly information through national support policy. The proposed operational model can be used as a basic data for the realization and research of open access in the domestic environment.