• Title/Summary/Keyword: role model

Search Result 7,187, Processing Time 0.036 seconds

A Study on the New Manager Model in Service Economy Era (서비스경제시대의 신경영자 모델 연구)

  • Kim, Hyunsoo
    • Journal of Service Research and Studies
    • /
    • v.10 no.3
    • /
    • pp.1-22
    • /
    • 2020
  • This study was conducted to derive the new manager model in service economy era. It was logically explained that the modern economic society is different from the existing economic society, the modern organization that is the subject of management is different from the existing organization, and the tasks required by management are different from the existing tasks. It suggested the managerial model required for new managers. According to the proposed manager's model, the tasks required of new managers and essential qualities as managers to perform the tasks were presented. It suggested the role model that managers with required qualities should play. The role of a manager who becomes one with customers, the role of a manager who controls even his irrationality, the role of a manager who combines discernment and indiscriminateness, a flexible leadership role that combines charisma and tenderness, an administrator role that embraces regulations and non-regulations, and vision and non-vision. We derived the role of a manager who manages management, and a manager role model that utilizes both competition and non-competition. The managers engage in two opposing roles and perform management activities in a spiral dialectical cycle that develops while resolving the contradictions of each role. The method of embracing the two opposing parties internally and externally and the dialectical management execution process according to the change of the space-time axis were presented by borrowing the models of The Book of Change. Future research needs an empirical analytical study on this new Model. There is a need for studies that expand this study and develop it into a practical model and verify it in an analytical way.

A Design of Role-Based Access Control Model (직무기반 접근제어 모델 설계)

  • Lee, Ho;Chung, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.1
    • /
    • pp.60-66
    • /
    • 2001
  • We designed a role-based access control model that can resolve the complicated tasks of control requirements. The designed access control model can control permissions efficiently use of a role-based access control. It guarantees the confidentiality integrity and availa information making use of identity-based and rule-based access controls. It can also centre information flow. Our access control model protects resources from unauthorized accesses b multi-level security policies such as role, security level, integrity level and ownership.

  • PDF

Design of Integrated Role-Based Access Control Model (통합 직무기반 접근제어 모델 설계)

  • 박진호;안성진
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.1-7
    • /
    • 2001
  • This paper design a role-based access control model that can resolves the complicated problems of access control requirements. In this paper, we designed an access control model which can control a permission making use up role-based access control, can guard the confidentiality, integrity and availability of information and can control illegal information flow. The designed access control model can protect resources from unauthorized accesses based on the role, multi-level security policies of security level, integrity level and ownership.

  • PDF

FuRBAC : Function-Unit Delegation On Role-Based Access Control Model (FuRBAC 모델 : 권한위임이 기능단위로 설정 가능한 역할 기반 접근제어 모델)

  • Choi, Jun-Young;Cho, Nam-Deok;Yun, E.Joong
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.1-9
    • /
    • 2006
  • With role-based access control, access decisions are based on the roles that individual users have as part of an organization. In this paper, we propose a new RBAC model that a user delegate a permission to another user with function-unit for practical organization. A function-unit delegation is more safe than existing delegations on RBAC model. And FuRBAC model has a authentication to supervise security problems.

  • PDF

Permission-Based Separation of Duty Model on Role-Based Access Control (역할기반 접근제어 환경에서 접근권한 기반의 임무분리 모델)

  • Oh Se-Jong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.725-730
    • /
    • 2004
  • Separation of Duty(SOD), with delegation, is one of important security principles in access control area. The role-based access control model adopts SOD principle, but it has some problems; SOD concept is inconsistent with role hierarchy, permissions that have no relation with SOD may be restricted, and delegation may violate SOD. We propose permission-based SOD model on role-based access control. We establishes SOD as a set of permissions instead of role level SOD. Furthermore we propose a principle of role activation. It solves SOD problems of RBAC and supports easy implementation of SOD policy.

A Formal Specification of Role Graph Model Increasing Integrity (무결성이 강화된 역할 그래프 모델의 정형적 명세)

  • Choi EunBok;Lee HyeongOk
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1620-1629
    • /
    • 2004
  • The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control(RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, We present the role graph model which enhanced flexibility and integrity to management of many access permission. Also, In order to represent those rule and constraints clearly, formal descriptions of role assignment rule and constraints in Z language are also given.

  • PDF

The Influence of Gender Schema on Children's Memory and Preference for Gender Related Tasks (아동의 성 도식과 성관련 과제의 기억 및 선호)

  • Chung, Soon Hwa;Chung, Ock Boon
    • Korean Journal of Child Studies
    • /
    • v.15 no.1
    • /
    • pp.37-53
    • /
    • 1994
  • The primary purpose of this study was to investigate the validity of a component model of gender role and differences in children's gender concepts with age and sex. The secondary purpose was to investigate the relationship between children's gender schema and memory as well as preference for gender related task. 181 children were interviewed about gender concepts and gender related tasks. Results indicated that three dimensions of the component model (i. e., gender label-component links, within-component links, between-component links) were significantly related to each other. The mean scores of gender role knowledge and attitude were different with age but not with sex. The results of the regression analysis showed that children's age, sex, and gender role attitude explained both memory and preference for gender related tasks. The component model had better explanatory power than the simple model. The findings of the present study suggest that children's gender concepts are better described in terms of the component model than the simple model and may contribute to a theoretical rationale for gender schema theory.

  • PDF

The Model of Conflict Detection between Permission Assignment Constraints in Role-Based Access Control (RBAC 에서 권한 할당 제약사항들 간의 충돌 탐지 모델)

  • Im Hyun-Soo;Cho Eun-Ae;Moon Chang-Joo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.51-55
    • /
    • 2005
  • Assuring integrity of permission assignment (PA) constraints is a difficult task in role-based access control (RBAC) because of the large number of constraints, users, roles and permissions in a large enterprise environment. We provide solutions for this problem using the conflict concept. This paper introduces the conflict model in order to understand the conflicts easily and to detect conflicts effectively. The conflict model is classified as a permission-permission model and a role-permission model. This paper defines two type conflicts using the conflict model. The first type is an inter-PA-constraints (IPAC) conflict that takes place between PA constraints. The other type is a PA-PAC conflict that takes place between a PA and a PA constraint (PAC) Also, the conditions of conflict occurrence are formally specified and proved. We can assure integrity on permission assignment by checking conflicts before PA and PA constraints are applied.

  • PDF

Context awareness Access Control for Ubiquitous Environment (유비쿼터스 환경을 위한 상황 인식 접근제어)

  • Shin, Dong-Wook;Hwang, Yu-Dong;Park, Dong-Gue
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.5
    • /
    • pp.470-482
    • /
    • 2008
  • This paper propose role base access control model that use context information for ubiquitous environment. Concept of access control that use context information assigns permission that can approach in some information or object in part. And do so that can assigned user in part to it and acquire permission. So it can approach in information or object. Therefore, user approaches in information or object in assigned role, and the role that is allocated ro own is having. So, do so that can secure information or utilization of object safety. Proposa1 model investigated lacking restriction item in GEO-RBAC model. So, it considered that present new restriction condition and role conflict in various case. Also, to GEO-RBAC model proposed suitable model, analyzed old model's advantage, shortcoming. And it presented proposal model to GEO-RBAC because improving this.

  • PDF

The Government's Role Model for The Effective Adoption of The UIT (유비쿼터스 정보기술의 효과적 도입을 위한 정부역할 모형)

  • Kim, Tae-Jin
    • Spatial Information Research
    • /
    • v.18 no.4
    • /
    • pp.55-64
    • /
    • 2010
  • Since 2004, as Ubiquitous Information Technology that is new information technology paradigm has emerged, the necessity of government's role has been raised. In order to understand the government's role model for the effective use of the Ubiquitous Information Technology, this article closely analysed the process of the information policy in Korea. To accomplish these purpose the literature review and the exploratory research were used. The intent of this study was to analyze the government's role in the process of the information policy. Following are the major findings of this study. First. the government's role in driving the new information policy must be considered for the effective adopt and diffusion of the new information technology'. Second, three stages(adopt, diffusion, evaluation) are considered in the process of Korea information policy. Third, the revised government's role model is needed for the effective use of the new information technology in the future. In this study, I suggested the revised government's role model, that is consist of four stages. plan. adopt. diffusion, and performance and evaluation stage.