• Title/Summary/Keyword: permission

Search Result 735, Processing Time 0.024 seconds

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

A Research on Mobile Malware Model propagated Update Attacks (변조 업데이트를 통해 전파되는 모바일 악성어플리케이션 모델 연구)

  • Ju, Seunghwan;Seo, Heesuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.47-54
    • /
    • 2015
  • The popularity and adoption of smart-phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. The fluidity of application markets complicate smart-phone security. There is a pressing need to develop effective solutions. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smart-phone application. Now, the analytical methods used mainly are the reverse engineering-based analysis and the sandbox-based analysis. Such methods are can be analyzed in detail. but, they take a lot of time and have a one-time payout. In this study, we develop a system to monitor that mobile application permissions at application update. We had to overcome a one-time analysis. This study is a service-based malware analysis, It will be based will be based on the mobile security study.

The Development and Contents of Young Children's Verbal Communication with Teachers (교사에 대한 유아의 언어 커뮤니케이션의 내용분석 및 발달적 변화)

  • Hyun, Jung Hwan
    • Korean Journal of Child Studies
    • /
    • v.29 no.1
    • /
    • pp.49-61
    • /
    • 2008
  • This study explored the contents of young children's verbal communications with their teachers in play situations. Participants were 2- to 6-year-old children. Results of observations showed 10 different verbal categories : making demands, asking questions, boasting, complementing the teacher, gaining recognition from the teacher, telling tales, explaining, making suggestions, asking permission, and insisting on one's own way. The five categories most frequently observed in older children were demanding, asking questions, boasting, explaining, and insisting on one's own way. Teachers were advised to prepare to respond more effectively to the variety of young children's verbal communication with their teachers.

  • PDF

A Classification Methodology of Structural Types of RC Buildings for Improving Seismic Fragility Functions (지진취약도 함수 개선을 위한 철근콘크리트 건물의 구조 유형 분류 방안)

  • Kim, Taewan
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.24 no.6
    • /
    • pp.285-292
    • /
    • 2020
  • The methodology classifying structural types of concrete buildings in the existing seismic fragility functions is too simple to estimate the fragility of existing residential buildings and neighborhood living facilities, especially those below five stories. Their structural types are dependent on information contained in the building register such as main use, total floor area, story, permission date, and first story floor area of the individual building. All of this information is not considered for classifying types in the existing functions; therefore, the goal of this study was to suggest a methodology that classifies structural types of concrete buildings by utilizing such information. The results of this study showed that the suggested methodology can classify structural types better than the existing methodology. Nevertheless, there is still a need to simplify the methodology because fragility estimation demands quickness rather than accuracy.

A Study of Low Flux Hemodialysis Noncompliance Indicators and Discriminant Standards, Development of Hemodialysis Noncompliance Measurement - Brief Form(HNCM-BF) (저효율 혈액투석 불이행 측정 도구 개발)

  • Hur, Jung
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.13 no.4
    • /
    • pp.462-472
    • /
    • 2007
  • Purpose: Purpose of the this study is to define the hemodialysis noncompliance Indicators and discriminant standards levels for low Flux Hemodialysis patients and development of Hemodialysis noncompliance measurement - brief form. Method: Data was collected from 269 hemodialysis patients. To establish the hemodialysis noncompliance Indicators and to discriminate standards, 13 hemodialysis nurses and 2 nephrology doctors are participated in professional group. To verify the indicators and discriminant standards, data was ananlyzed by the canonical discriminant analysis method using by SAS 8.3 program. Result: 4 Indicators- interdialysis weight gain(IWG); average of recent 4weeks, serum phophate level, skipping of hemodialysis and hemodialysis time shortening without permission- of hemodialysis noncompliance are established and discriminant standards are developed. Discriminant ability of these 4 noncompliance indicators is 99.7%(p=.000). Hemodialysis noncompliance measurement - brief form has 96.3% discriminant accuracy. Conclusion: Hemodialysis noncompliant patients have high risks. It means that special intervention to noncompliance is needed. Also continuous and objective assessment and standards of noncompliance are needed.

  • PDF

Student Nurses' Experiences in nursing Practice of Surgical Ward (간호대학생의 외과병동 실습 경험)

  • KIM, Jeong-Soo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.27 no.5
    • /
    • pp.1221-1228
    • /
    • 2015
  • The purpose of this study was to describe and understand experiences of surgical ward practice in nursing students. The interview data were collected from 9 nursing students and analyzed by using descriptive phenomenology of Colazzi. The procedural steps was that described the phenomenon of interest, collected participants' descriptions of the phenomenon, extracted the meaning of significant statement, organized the meaning into them clusters, wrote exhaustive descriptions and then incorporated data into categories. The essential meanings of surgical ward practice experiences of nursing students were as following; 'Permission of direct nursing practice', 'Professionality of nursing domain', 'Serving as a stepping stone of patients' nursing', and 'Sense of achievement to participating nursing'. The results of this study would provide for basic data of surgical ward practice program and have important implication for understanding field practice in nursing. So would contribute to develop nursing practice curriculum.

The Who and What of Children Who Use Negative Social Power : An Ethnographic Study (유아들의 사회적 힘의 부정적 사용 양상 및 특성)

  • Park, Sung Joo;Hong, Yong Hee
    • Korean Journal of Child Studies
    • /
    • v.23 no.5
    • /
    • pp.105-121
    • /
    • 2002
  • This ethnographic study investigated aspects of negative social power in 4-year-old children and characteristics of the children who use it. The negative use of social power included taking the possessions of peers without permission, ignoring classroom rules, controlling, rejecting, and threatening others. Most children who abused social power behaved as controllers and were popular children or had a following within the group. They were physically superior to peers, of competitive disposition, and had a well-developed capacity for verbal expression; they were self-centered and had a high level of cognitive ability. Further areas for ethnographic research into the nature of the negative use of social power in young children include training in perspective taking, age differences, and factors that contribute to the development of negative social power in young children.

  • PDF

Maternal Conversation Style and Communicative Intent of Young Children during Free Play (자유놀이 상황에 나타난 어머니의 대화 양식과 유아의 의사소통 의도)

  • Sung, Miyoung
    • Korean Journal of Child Studies
    • /
    • v.24 no.5
    • /
    • pp.77-89
    • /
    • 2003
  • The relationship of communicative intent of infants and the conversation style of mothers were investigated with 20 mothers and their 2- and 3-year old children. They conversed in naturalistic settings while playing with Lego blocks. Cluster analyses revealed 2 maternal styles: a conversation-eliciting and a directive style. Children of conversation-eliciting mothers provided more information than those of directive mothers. Children of directive mother requested more permission than those of conversation-eliciting mothers. Implications of these two maternal styles for children's communicative abilities were discussed.

  • PDF

A study on the Experience of the Life of Caregivers with Mentally Ill Children. (정신질환자 가족의 경험에 관한 연구)

  • 이경순
    • Journal of Korean Academy of Nursing
    • /
    • v.27 no.4
    • /
    • pp.953-960
    • /
    • 1997
  • The purpose of this study was to explore and describe the experience of caregivers with mentally ill children. The sample consists of 4 participants who care for their children with mentally ill. They were asked open-ended questions in order for them to talk about their experiences. With permission of the subjects, the interviews were recorded and transcribed. The methodology utilized was the Colaizzi's phonomenological approach. The interview data was organized by themes into 5 categories anguish, positive emtion, maturation, acceptance of the disease, and seeking information. These 5 themes were further categorized into 4 main groups : emotional impact, spiritual maturation, adapting to the illness, and seeking support needs. The results of this study have clinical and theoretical implications not only for psychiatric nursing in Korea but also for all clinicians working with the families of the mentally ill.

  • PDF

Design of Integrated Role-Based Access Control Model (통합 직무기반 접근제어 모델 설계)

  • 박진호;안성진
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.1-7
    • /
    • 2001
  • This paper design a role-based access control model that can resolves the complicated problems of access control requirements. In this paper, we designed an access control model which can control a permission making use up role-based access control, can guard the confidentiality, integrity and availability of information and can control illegal information flow. The designed access control model can protect resources from unauthorized accesses based on the role, multi-level security policies of security level, integrity level and ownership.

  • PDF