• Title/Summary/Keyword: authorization system

Search Result 240, Processing Time 0.033 seconds

Off-label or Unlicensed Drug Prescriptions in Child and Adolescent Psychiatry (소아청소년정신과에서의 허가 초과 및 비승인 약물 처방)

  • Lee, So-Young Irene
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.22 no.2
    • /
    • pp.67-73
    • /
    • 2011
  • The purpose of licensing system is to ensure that the medicines are examined for safety, efficacy and quality. Nevertheless, off-label or unlicensed drug usages in pediatric practice is widespread in Korea and worldwide. Psychotropics are one of the most commonly used off-label or unlicensed drugs. The most valid approach to face this dilemma will be to have more evidences from pediatric pharmacological studies. Clinicians, in addition, need to monitor closely their off-label or unlicensed drug prescriptions to minimize the trial and error in practice. Researchers should publish their experiences and provide guidelines. Pharmaceutical companies, regulatory authorities, and consumer organizations should endeavor altogether for the children's right to get safe and efficacious drugs as adults do. Here, the definition as well as the current status of off-label and unlicensed drug prescriptions will be introduced. Critical issues regarding the off label drugs are discussed. In addition, I will describe the present condition as to the off-label and unlicensed drugs in child and adolescent psychiatry and the authorization process of off-label drug prescription in Korea. Lastly, direction we should like to take in this field will be mentioned.

The study on NMS implementation and management of Packet Core Network (Packet Core Network NMS 구축 및 관리 방안 연구)

  • Park Jong-Hoon;Kim Ji-Sun;Kang Chan-Koo;Yu Jae-Hwang
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.328-333
    • /
    • 2004
  • SK Telecom은 2000년 10월 세계 최초로 기존 IS-95A/B망에서 지원하였던 속도인 14.4Kbps나 56Kbps 보다 훨씬 빠른 최고 144Kbps로 무선인터넷이 가능한 CDMA2000 IX를 상용화 하였다. 또한, 2002년 1월에는 CDMA2000 IX보다 15배 이상 빠른 최대 2.4Mbps가 가능한 동기식 3세대 망인 CDMA2000 IxEV-DO를 세계 최초로 상용화 하였다. 이러한 초고속 무선 인터넷 서비스를 위해서 패킷 데이터 처리에 필수적인 PDSN(Packet Data Serving Node), HA(Home Agent), AAA(Authentication, Authorization and Accounting) 등의 노드들로 구성된 Packet Core Network(이하 PCN)이 도입되었으며, 이에 대한 운용 및 관리 방안이 중요한 issue로 등장하였다. 본 논문에서는 기존의 음성 서비스 관리를 위한 망관리 시스템(Network Management System)과는 다른 개념으로 관리되어야 할 패킷 서비스를 위한 NMS 구축 방안을 제시하고, 필수적인 관리 정보 및 서비스 관리를 위한 방향을 제시한다.

  • PDF

U-Learning of 21 Century University Education Paradigm (21세기 대학교육 패러다임의 U-Learning)

  • Park, Chun-Myoug
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.3 no.1
    • /
    • pp.69-75
    • /
    • 2011
  • This paper presents a model of e-learning based on ubiquitous computing configuration. First of all, we survey the advanced e-learning systems for foreign and domestic universities. Next we propose the optimal e-learning model based on ubiquitous computing configuration. The proposed e-learning model as following. we propose the e-learning system's hardware and software configurations, that are server and networking systems. Also, we construct the proposed e-learning systems's services. There are attendance and absence service, class management service, common knowledge service, score processing service, facilities management service, personal management service, personal authorization issue management service, campus guide service, lecture-hall management service. Then we propose the laboratory equipment management service, experimental materials management service etc. The proposed model of e-learning based on ubiquitous computing configuration will be able to contribute to the next generation university educational paradigm.

  • PDF

An Implementation of the Web Service for Authorization and Speech Recognition in the Mobile Environment (모바일 환경에서 인증과 음성인식을 위한 웹 서비스 구현)

  • Oh Jee-Young;Kim Yoon-Joong;Ko You-Jung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.225-232
    • /
    • 2005
  • A PDA has limitation of storage space and inconvenience of Pen-based equipment to input. To solve these problems, this paper implemented that previous Speech Recognition provides using XML(extensile Markup Language) Web Service and PDA Client is possible to use speech command by request Speech Recognition Web Service. This system consists of Mobile Client and Speech Recognition Web Service Provider. The Mobile Client transmits user information and speech data to the Speech Recognition Web Service Provider using DIME(Direct Internet Message Encapsulation). The Speech Recognition Web Service Provider returns recognition results and user name only to an authorized Mobile Client. So We are able to use speech service without installing Speech Recognition or Speech DB in PDA.

  • PDF

AAA System for PLMN-WLAN Internetworking

  • Janevski Toni
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.192-206
    • /
    • 2005
  • Integration of mobile networks and Internet has started with 2.5 generation of mobile cellular networks. Internet traffic is today dominant traffic type worldwide. The hanger for higher data rates needed for data traffic and new IP based services is essential in the development of future wireless networks. In such situation, even 3G with up to 2 Mbit/s has not provided data rates that are used by Internet users with fixed broadband dial-up or through wired local area networks. The solution to provide higher bit rates in wireless access network has been found in wireless LAN although initially it has been developed to extend wired LAN into wireless domain. In this paper, we propose and describe a solution created for interoperability between mobile cellular network and WLAN. The integration between two networks, cellular and WLAN, is performed on the authentication, authorization, and accounting, i.e., AAA side. For that purpose we developed WLAN access controller and WLAN AAA gateway, which provide gateway-type access control as well as charging and billing functionalities for the WLAN service. In the development process of these elements, we have considered current development stadium of all needed network entities and protocols. The provided solution provides cost-effective and easy-to-deploy PLMN-WLAN Internetworking scenario.

A Study on Certificate-based Personal Authentification System for Preventing Private Information Leakage through Internet (개인정보 유출 피해 방지를 위한 공인인증서 기반 인터넷 개인인증체계 개선 모델에 관한 연구)

  • Lee, Jung-Hyun;Kwon, Hun-Young;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.1-11
    • /
    • 2010
  • Recently, We have many private information leakage cases through internet which cause social problems and it is impossible to change or update the leaked information, it is also used to the third crime such as identity theft, internet fraud. Hackers are interested in stealing private information for making money, in this point private information leakage problems are constantly increased hereafter. In this paper, I surveyed the authorization model on site registration which is currently used in Korea, and the problem of collecting personal identification number, I proposed policy model of useless method of private information, especially leaked information can not be used anymore in internet.

A study on importance of MSDS education (MSDS 교육의 중요성에 관한 연구)

  • Choi, Sung-Jai
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.209-215
    • /
    • 2015
  • Following the semiconductor industry's growing, various types of toxic gases and caustic chemicals, HF(Hydrofluoric acid), HCI (Hydochloric acid), $H_2O_2$ (Hydrogen peroxide), $H_2SO_4$ (Sulfuric acid), and Piranha, were using on the semiconductor manufacturing process. Therefore many gas leakage accidents that produce huge losses of lives were caused by the processes. This research deeply considers two basic solutions that the necessity of MSDS education on university for reducing damage of lives and protecting life from chemical leak accidents such as a HF accident in Gumi, Korea and the use of GHS, REACH and the comprehension of propriety about using MSDS for keeping safety from conflagrations by released poison chemical materials.

Privacy Information Protection Model in e-Healthcare Environment (e-Healthcare 환경 내 개인정보 보호 모델)

  • Kim, Kyong-Jin;Hong, Seng-Phil
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.29-40
    • /
    • 2009
  • The development of information technology such as the internet has brought about rapidly changes the old medical technology, e-Healthcare has been to raise social issue. The e-Healthcare which new turning point of paradigm in the medical information develops the medical policy in Korea and the technology, the prospective of reverse engineering in internet environment is incurring problems such as distribution of critical information and invasion and infringement of privacy, etc. In this research, we suggest the Role Based Access Control System, HPIP-e-Healthcare Privacy Information Protection, for solving above problem. The HPIP is composed 4 mechanisms such as Consolidate User Identity, Hospital Authorization, Medical Record Access Control, Patient Diagnosis and we are also prototyping the HPIP for feasible approach in the real computing environment.

  • PDF

An OTP Authorization System Based on Circular Pattern (원형 패턴 기반의 OTP 인증 시스템)

  • Kim, Ji Eun;Kim, Ho Jun;Park, Soo Hyeon;Hong, Seung Pyo;Song, Yang-Eui;Lee, Yong Kyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.87-90
    • /
    • 2015
  • 기존의 OTP(One-Time Password) 인증 시스템은 OTP 단말을 휴대해야하는 불편함이 있으며 생성한 OTP 값을 그대로 OTP 단말에 출력하기 때문에 주변에 쉽게 노출될 수 있다. 또한, 기존의 9자리 패턴 인식 방법은 같은 패턴 지점을 연속으로 인식시킬 수 없고 패턴을 그리는 경로에 다른 패턴 지점이 포함될 수 있다는 한계가 있어 제한적인 패턴 결과를 가진다. 따라서, 본 논문은 원형 배치된 패턴 지점 기반의 OTP 대칭 값 패턴 인증 시스템을 통해 OTP 단말을 휴대할 필요가 없게 하고, OTP의 각 자리 값을 대칭 값으로 표현함으로써 OTP 값의 노출을 막는다. 또한 모든 OTP 값으로 패턴 인식이 가능하도록 하기 위해 패턴 지점을 원형 배치하는 방법을 제안한다. 이는 직접적으로 OTP 값이 노출될 가능성을 감소시키고, OTP 인증을 위한 패턴 인식에서 패턴 지점을 원형 배치함으로써 모든 OTP 값이 패턴으로 변환될 수 있도록 한다. 본 논문은 패턴 지점의 원형 배치와 대칭 값을 이용한 OTP 인증 시스템을 제안하여 새로운 OTP 인증 방법으로 패턴 인식을 적용할 수 있도록 한다.

A Study of Program Execution Control based on Whitelist (화이트리스트 기반 프로그램 실행 통제 방안 연구)

  • Kim, Chang-hong;Choi, Dae-young;Yi, Jeong-hyun;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.346-349
    • /
    • 2014
  • Currently, the growing cyber threat continues, the damage caused by the evolution of malicious code incidents become more bigger. Such advanced attacks as APT using 'zero-day vulnerability' bring easy way to steal sensitive data or personal information. However it has a lot of limitation that the traditional ways of defense like 'access control' with blocking of application ports or signature base detection mechanism. This study is suggesting a way of controlling application activities focusing on keeping integrity of applications, authorization to running programs and changes of files of operating system by hardening of legitimate resources and programs based on 'white-listing' technology which analysis applications' behavior and its usage.

  • PDF