• Title/Summary/Keyword: database access

Search Result 873, Processing Time 0.028 seconds

Construction of Retrieval-Based Medical Database

  • Shin Yong-Won;Koo Bong-Oh;Park Byung-Rae
    • Biomedical Science Letters
    • /
    • v.10 no.4
    • /
    • pp.485-493
    • /
    • 2004
  • In the current field of Medical Informatics, the information increases, and changes fast, so we can access the various data types which are ranged from text to image type. A small number of technician digitizes these data to establish database, but it is needed a lot of money and time. Therefore digitization by many end-users confronting data and establishment of searching database is needed to manage increasing information effectively. New data and information are taken fast to provide the quality of care, diagnosis which is the basic work in the medicine. And also It is needed the medical database for purpose of private study and novice education, which is tool to make various data become knowledge. However, current medical database is used and developed only for the purpose of hospital work management. In this study, using text input, file import and object images are digitized to establish database by people who are worked at the medicine field but can not expertise to program. Data are hierarchically constructed and then knowledge is established using a tree type database establishment method. Consequently, we can get data fast and exactly through search, apply it to study as subject-oriented classification, apply it to diagnosis as time-depended reflection of data, and apply it to education and precaution through function of publishing questions and reusability of data.

  • PDF

The Development of a Database for Self Health Management - Focusing on the Soojichim (Koryo Hand Therapy) - (자가 건강관리를 위한 데이터베이스 시스템 구축에 관한 연구 - 수지침요법을 중심으로 -)

  • Choung, Hye-Myoung
    • Journal of Korean Public Health Nursing
    • /
    • v.20 no.2
    • /
    • pp.195-206
    • /
    • 2006
  • Purpose: As Koryo Hand Therapy is generally referenced by a manual, we made a database system to ease. Method: Using the basic theory of Koryo Hand Therapy with the System Development Life Cycle (SDLC), we tested, analyzed, designed and implemented the system and constructed a database system with MS Access according to the symptoms. Results: We constructed the database system of Handing and the symptoms of Koryo Hand Therapy in 3 parts (Basic Data Management, Disorder Therapy Management, Report) for easy management. This database system will be useful for general users to protect, promote and measure their health. The structured database system was valued on the basis of the students basic knowledge of Koryo Hand Therapy. As a result, 80% of the respondents answered that the "system is well structured", 78% that "it's convenient to search", and 87% that "it's helpful for self health management". Conclusion: These study results provides people with information on the basic treatment of symptoms for the self health protection and promotion with Koryo Hand Therapy by constructing a database.

  • PDF

A Method for Access Control on Uncertain Context (불확정 상황정보 상에서의 접근제어 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.215-223
    • /
    • 2010
  • New information technologies make it easy to access and acquire information in various ways. However, It also enable powerful and various threat to system security. The prominent database technology challenging these threats is access control. Currently, to keep pace with the new paradigms, new extended access control methods are challenged. We study access control with uncertain context. With respect to access control, it is possible that there is a discrepancy between the syntactic phrase in security policies and that in queries, called semantic gap problem. In our semantic access control, we extract semantic implications from context tree and introduce the measure factor to calculate the degree of the discrepancy, which is used to control the exceed privileges.

How librarians really use the network for advanced service (정보봉사의 증진을 위한 사서들의 네트워크 이용연구)

  • 한복희
    • Journal of Korean Library and Information Science Society
    • /
    • v.23
    • /
    • pp.1-27
    • /
    • 1995
  • The purpose of this study is twofold: to investigate into general characteristics of the networks in Korea as a new information technology and to discuss general directions of development of the use of the Internet. This study is designed to achieve the purpose by gathering and analysing data related to the use of Internet of librarians those who work in public libraries and research and development libraries and university libraries. The major conclusions made in this study is summarized as follows. (1) From this survey, received detailed response from 69 librarians, the majority (42) from research and development libraries. The majority (56) were from Library and Information Science subject area, half of them (37) hold advanced degrees. (2) Majority (40) have accessed Internet for one year or less, 9(17%) respondents for two years, 17(32%) spend every day Internet related activity. (3) 44.9% of the respondents taught themselves. 28.9% learned informally from a colleague. Formal training from a single one-hour class to more structured learning was available to 30.4%. (4) The most common reason respondents use the Internet are to access remote database searching(73.9%), to communicate with colleagues and friends and electronic mail(52.2%), to transfer files and data exchange(36.2%), to know the current research front(23.2%). They search OPACs for a variety of traditional task-related reasons(59.4%) and to see what other libraries are doing with their automated systems(31.9%). (5) Respondents for the most part use the functions : WWW (68. 1%), E-Mail(59.4%), FTP(52.2%), Gopher(34.8%), Wais(7.2%). (6) Respondents mentioned the following advantages : access to remote log-in database, an excellent and swift communications vehicle, reduced telecommunication cost, saving time. (7) Respondents mentioned the following disadvantages : low speed of communication, difficult of access to the relevant information and library materials, and shortage of database be distributed within Korea.

  • PDF

CoDes: A Real-Time Collaborative Design System (실시간 원격 협력 설계 시스템 -CoDes)

  • Yang, S.;Choi, Y.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.5 no.1
    • /
    • pp.42-49
    • /
    • 2000
  • This paper presents a solid modeling system that enables real time co-operative modeling and discussion on m between geographically separated designers. The modeling system is implemented using CORBA architecture and integrated in WWW with Java technology. The server objects use a commercial solid modeling kernel to provide modeling features and access database including product model data. The client is implemented using Java2 platform so that enables end-users access the system with web-browsers.

  • PDF

Enhanced Role-Based Access Control Administration Tool

  • Yenmunkong, Burin;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1360-1364
    • /
    • 2004
  • This paper propose an extended model for role-permission assignment based on locations called "Enhanced Role-Based Access Control (ERBAC03)". The proposed model is built upon the well-known RBAC model. Assigning permissions to role is considered too complex activity to accomplish directly. Instead we advocate breaking down this process into a number of steps. The concept of jobs and tasks is specifically introduced to facilitate role-permission assignment into a series of smaller steps. This model is suitable for any large organization that has many branches. Each branch consists of many users who work in difference roles. An administration tool has been developed to assist administrators with the administration of separation of duty requirements. It demonstrates how the specification of static requirements can be done based on "conflicting entities" paradigm. Static separation of duty requirements must be enforced in the administration environment. Finally, we illustrate how the ERBAC03 prototype is used to administer the separation of duty requirements.

  • PDF

A Study on Development of PC-based Wireless Data Access System (PC 기반 양방향 무선데이터 시스템 개발에 관한 연구)

  • Joo, Jong-Hyuk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.3
    • /
    • pp.115-120
    • /
    • 2005
  • In this paper, we propose a personal-computer-based wireless data access system, which use DS/SS(Direct Sequence Spread Spectrum) method and the ISM band of 2.44GHz radio frequency. By applying hi-directional transmission between wireless handy terminals and PCs or servers, it can be easily connected with any kinds of database systems such as Oracle, MS-SQL and MS-ACCESS. Therefore, it could be economically adopted as peripheral equipments for ERP or SCM systems.

Access Control using Attribute Certificates in Distributed System (분산시스템에서의 속성인증서를 이용한 접근통제방안)

  • Kim, Ji-Hong;Park, Chong-Hwa;Hwang, Tae-Hyun
    • The Journal of Information Technology
    • /
    • v.6 no.1
    • /
    • pp.107-115
    • /
    • 2003
  • With the development of Information Communication Technique, electronic commerce is widely used in internet using public key certificates. And the study for access control in database system is also progressed actively. In this paper, we analyze access control mechanism using attribute certificated and we propose new access mechanism in distributed system using attribute certificates.

  • PDF

User-Level Delegation in Role-Based Access Control Model (역할기반 접근제어에 기초한 사용자 수준의 위임 기법)

  • 심재훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.49-62
    • /
    • 2000
  • Role-Based Access Control(RBAC) has recently received considerable attention as a alternative to traditional discretionary and mandatory access control to apply variant organizations function hierarchy of commercial or govemment. Also RBAC provides a delegation that is one of control principles in organization. In general delegation occurring in real organization is performed by an user giving permissions to another user. But, RBAC cannot implement these user-level delegation correctly. And delegation result in security problem such as destroying separation of duty policy information disclosure due to inappro-priate delegation. Besides security adminsitrator directly deals with that problem. In this thesis we suggests some methods that is created by the user.

A Study on Database Authentication System in Middleware (미들웨어상에서 데이터베이스 인증시스템에 관한 연구)

  • 최진탁
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.24 no.66
    • /
    • pp.27-35
    • /
    • 2001
  • The Gateway Server Authorization System(GSAS) presented in this thesis is a database authorization system. GSAS is responsible for user\`s authorization, and privilege management, audit service. Only users that are filtered in GSAS can access the DBMS(Data Base Management System) through middleware. GSAS is located at the DBMS and already contains an authorization record for user accessing a specific DBMS. GSAS on consists of several components, namely an authorization manager, a privilege manager, and an audit manager. As an authorization manager and a privilege manager can only approve a pass at the same time, a user can get accessibility for DBMS.

  • PDF