• Title/Summary/Keyword: users' rights

Search Result 196, Processing Time 0.021 seconds

Rearrangement of the Designated Area and Modification of Features of Buryeongsa Valley as a Scenic Site (불영사계곡의 명승 지정구역 조정 및 현상변경 방안 연구)

  • Ahn, Seung-Hong;Hong, Youn-Soon;Kim, Hak-Beom
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.37 no.6
    • /
    • pp.48-56
    • /
    • 2010
  • Since ancient times, Korea has been called a land of beauty. Scenic sites under the Cultural Properties Protection Act include picturesque places that are famous for their natural scenic beauty as well as their historical and cultural value. Scenic sites are managed as natural assets to promote their preservation and use. However, the management of scenic sites can produce adverse effects on regional development and ownership rights. Moreover, the purpose of their designation as cultural assets is not fully understood because scenic sites are managed by focusing on restraint on users' act the same as was applied to historic sites. Therefore, the purpose of this study is to protect inhabitants' rights of ownership by arranging the boundaries of designated areas and by providing standard permission for condition changes in the Buryeongsa Valley, which was designated as a Scenic Site in 1979. The results of this study can be summarized as follows: First, arranging the boundaries of the designated area includes the arrangement of the edge lines standardized on the visual range of the mountain ridge, preventing the loss of landscape beauty in the designated district; the internal clearing district focuses on the existing settlement. Gearing the designated areas after the arrangement of the boundaries results in $11,928,932m^2$, 38.6% compared to the existing designated areas. Second, it establishes a 500m buffer zone inside the radius of the boundary of the cultural asset as a standard for condition changes that seriously affect landscape preservation. Third, the standards for permission on building 'height regulations' are divided into flat and gable, according to the roof shape. The adopted standard is 8m high for 2 story flat roofs, and 12m high for 2 story gable roofs.

Redactable Blockchain Based Authority Alteration and Accessn Control System (수정 가능한 블록체인 기반 권한 변경 및 접근 제어시스템)

  • Lee, Yeon Joo;Choi, Jae Hyun;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.513-525
    • /
    • 2022
  • The immutability of blockchain is core elements of security of blockchain and guarantee data integrity. However, the characteristic that the data recoreded once in the blockchain cannot be modified has place for abuse by a specific user. In fact improper contents that is inappropriate to be recorded on the blockchain, such as harmful data and user personal data, is exposed on Bitcoin. As a way to manage improper content existing in the blockchain, there is a redactable blockchain using chameleon hash proposed for the first time by Ateniese. The redactable blockchain meet the right to be forgotten of GDPR by allowing data modification and deletion. Recently, Research on personal data management is being conducted in a redactable blockchain. Research by Jia et al. proposed a model that enables users to manage their personal data in the redactable blockchain. However, semi trusted regulators, which are blockchain participation nodes, have powerful authority in the blockchain, such as modification rights and deprivation of transaction rights for all blocks, which may cause side effects. In this paper, to weaken the authority of regulators in Y. Jia et al., we propose a method of authority subject altering and authority sharing, and propose a redactable blockchain-based authority change and access control system model based on applicable scenarios.

A Study on Effect of Special Transportation System of Disabled Person on Acceptance of Disability and Quality of Life (장애인의 특별교통수단 만족도가 장애수용과 삶의 질에 미치는 영향)

  • Ko, Kwan-Woo;Hwang, Kyung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.4
    • /
    • pp.1963-1970
    • /
    • 2014
  • It is a research study to look at the satisfaction of disabled persons are using a specific transportation system, and displays to see what effect the quality of life and the acceptance of disability. The survey of disabled persons in a moving vehicle assistance support Jeju vulnerable road users, using the final 81. Analysis, STS reason to use that vehicle wheelchair lift is the most common response, STS safety-related satisfaction was highest in the wheelchair. However, satisfaction of convenience associated with the use of the procedure was the lowest. The more stable satisfaction of STS is high, a positive impact on the quality of life(satisfaction and the food, clothing and housing)was confirmed. Therefore, in order to increase the satisfaction of STS and to improve the quality of life, it is necessary to improve the utilization procedures and safe operations and additional support of the wheelchair lift car to ensure rights of mobility.

Design and Evaluation of DRM Model with Strong Security Based on Smart Card (스마트카드 기반의 강한 보안을 갖는 DRM 모델의 설계 및 평가)

  • Park, Jong-Yong;Kim, Young-Hak;Choe, Tae-Young
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.165-176
    • /
    • 2011
  • Recently, digital rights management (DRM) related researches are widely spreading with prosperity of IT industries. The DRM technology protects proprietor of copyright by preventing mischanneling and illegal copy. In this paper, we propose a new DRM model that has an enhanced and efficient protocol based on certificate using smart card. The proposed model overcomes weaknesses of WCDRM model and has following additional advantages: first, copy protection is enhanced by hiding user's specific information from attacker by storing the information within smart card; second, server load for contents encryption is reduced by making clear protocols among author, distributer, certificate authority, and users; third, offline user authentication is guaranteed by combining partial secret values in media players and smart card. Exposure of core information also is minimized by storing them in smart card. In addition, we show that the proposed system is more secure than WCDRM model by comparing various factors of anonymous attackers.

Access Control Policy of Data Considering Varying Context in Sensor Fusion Environment of Internet of Things (사물인터넷 센서퓨전 환경에서 동적인 상황을 고려한 데이터 접근제어 정책)

  • Song, You-jin;Seo, Aria;Lee, Jaekyu;Kim, Yei-chang
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.409-418
    • /
    • 2015
  • In order to delivery of the correct information in IoT environment, it is important to deduce collected information according to a user's situation and to create a new information. In this paper, we propose a control access scheme of information through context-aware to protect sensitive information in IoT environment. It focuses on the access rights management to grant access in consideration of the user's situation, and constrains(access control policy) the access of the data stored in network of unauthorized users. To this end, after analysis of the existing research 'CP-ABE-based on context information access control scheme', then include dynamic conditions in the range of status information, finally we propose a access control policy reflecting the extended multi-dimensional context attribute. Proposed in this paper, access control policy considering the dynamic conditions is designed to suit for IoT sensor fusion environment. Therefore, comparing the existing studies, there are advantages it make a possible to ensure the variety and accuracy of data, and to extend the existing context properties.

Problems with the Right of Publication by the Copyright Law and Some Innovations - Focusing on the Problems of E-books - (저작권법상 출판권의 문제점과 개선방향 -제전자책(e-book)제의 문제점을 중심으로 -)

  • 김기태
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.12 no.2
    • /
    • pp.85-103
    • /
    • 2001
  • Much attention has been paid to the copyright law revised and proclaimed on July 1, 2000 on the ground that the law embraces digital medium environments. The transmission right added to the economic rights takes into account the fact that limitless cyber space represented by the Internet came to be pervasive. This is based on a lot of exhausting conflicts between those with copyrights and Internet users. The area of publication is badly afflicted in this sense, falling into confusion due to the miscomprehension of differences among the right of publication, the right of transmission and the right of reproduction. The term 'e-book' is not covered by relevant laws despite the widespread use of e-books. In this context, this study is designed to point to the necessity of dealing with the right of publication with the problems of the copyright law emphasized and to ask for the aggressive reflection of the concept of digital publication in the future revision of the copyright law.

  • PDF

Understanding Big Data and Utilizing its Analysis into Library and Information Services (빅데이터의 이해와 도서관 정보서비스에의 활용)

  • Lee, Jeong-Mee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.24 no.4
    • /
    • pp.53-73
    • /
    • 2013
  • This study revisits issues for Big data. Three research questions, understanding the concept of Big data, important issues of Big data research and utilization methods for library information services, are explored by the literature and practice reviews. Study results revealed several important issues of Big data including the concept in the context of real world situation, the problems with the accuracy and reliability of the data, privacy and ethical issues, and issues of intellectual property rights. With understanding these issues, a few utilization methods were introduced for Library and Information services. It was included using its analysis for developing vision, adopting Library management, supporting community services, and providing customized information services for various users. The study concluded Big data analysis would effectively provide valid evidences for all those services.

A Study on the Evaluation and Improvement of Building Maintenance System (건물관리제도의 평가 및 개선방안에 관한 연구)

  • Choi, Gul-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.8
    • /
    • pp.3785-3793
    • /
    • 2011
  • The purpose of this study is to devise the overall problems (such as, rights and obligations between users, owners, managers regarding commercial rental buildings, benefit/benefit in return, and the relevant regulations and systems) of the building maintenance system through field surveys, expert interviews, and literature reviews. In this rapidly changing society, there are a huge amount of needs for various reforms which can meet the diversity in each area, so it is greatly important to choose priority for the best improvement for efficient and economic expenses due to limited time, human resources and budgets. In this regard, the study extracted the evaluation elements from the devised problems with the viewpoint of BSC, calculated the weights through application of AHP to the extracted evaluation elements, evaluated the difference between before/after application of weights, and set the status, which makes it possible to realize the effective solutions and the reasonable expenses for all parties. By doing so, it is expected that the building maintenance system which maximizes the value and guarantees the user's convenience with smart functions of the building, will be realized in the near future.

Analysis of Copyright Cases on Archives in National Archives of Korea(NAK) (국가기록원의 소장기록물 저작권 요청 사례 분석)

  • Kim, Joo Yeon;Choi, Jae Hwang
    • Journal of Korean Library and Information Science Society
    • /
    • v.45 no.2
    • /
    • pp.139-157
    • /
    • 2014
  • The National Archives of Korea(NAK) has arranged and operated 'Guidelines on Operating Copyright for Archives' and 'Regulations on Operating Reference Room' to protect the copyright for archives. However, the Guidelines and the Regulations only provide application to the Copyright Act and principles on internal managing copyright without presenting copyright issues for each type of archives. Therefore, additional detailed guidelines have to be arranged for the users to access to copyright issues easily by presenting them the standards of judgement or principles on copyright issues for each type of the archives to facilitate the use of archives collected already. We also need to define the details on Copyright Act and Moral Rights Act to collect archives. This study is an prior analysis for that purpose. Lively discussion and way of operation in an aspect of the copyright in relation to private records should be sought in the future.

Study on Mechanism of Preventing Application Piracy on the Android Platform (안드로이드 어플리케이션 위변조 방지를 위한 방안 연구)

  • Lee, Kwang-Hyoung;Kim, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6849-6855
    • /
    • 2014
  • Recently, with the increasing use of smart phones, security issues, such as safety and reliability of the use of the Android application has become a topic to provide services in various forms. An Android application is performed using several important files in the form of an apk file. On the other hand, they may be subject to unauthorized use, such as the loss of rights and privileges due to the insertion of malicious source code of these apk files. This paper examines the Android environment to study ways to define the threats related to the unauthorized use of the application source code, and based on the results of the analysis, to prevent unauthorized use of the application source code. In this paper, a system is provided using a third body to prevent and detect applications that have been counterfeited or forged illegally and installed on Android devices. The application provides services to existing systems that are configured with only the service server that provides users and applications general, This paper proposes the use of a trusted third party for user registration and to verify the integrity of the application, add an institution, and provide a safe application.