All Issue

2019 Vol.7, Issue 3 Preview Page

Research Article

30 September 2019. pp. 161-168
Abstract
여러 분야에서 MRA(Metadata Registry Acess) 기반의 레거시 시스템들이 개발되었다. 그러나 구축된 MRA 레거시 시스템들은 표준을 엄격하게 준수하지 않아 메타데이터 간 충돌 문제가 발생한다. 메타데이터 표준 권고안인 ISO/IEC 11179에서는 표준적인 접근 보호 방법을 제공하지 않아 여러 가지 문제점을 초래한다. 일반적으로 SQL/MRA은 검색 및 매칭 기능만 지원할 뿐 MRA의 유효한 생성 및 안전한 보호 접근을 위한 연산을 지원하지는 않는다. 본 논문에서는 XMDR 기반의 시스템들에 안전하고 쉬운 접근제어를 보장하는 방법으로 PMCL을 제안한다. PMCL은 ISO/IEC 11179에 정의된 사용자 그룹의 역할과 권한을 미리 정의하여 사용자를 사용자 그룹에 할당한다. 이 기법은 편이성과 보안성을 증대시킬 수 있다.
The Legacy systems based on MRA have been developed in various areas. However, already existing MRA legacy systems do not strictly comply with the standard, resulting in conflicts between metadata. The metadata standard recommendation, ISO/IEC 11179, does not provide a standard guideline protection method. So there are many problems. In general, SQL/MRA only supports search and match functions, but does not support operations for effective creation and secure protection access of MRA. In this paper, PMCL is proposed as a way to ensure safe and easy access control for XMDR-based systems. PMCL assigns users to user groups by predefining the roles and privileges of the user groups defined in ISO/IEC 11179. This technique can increase ease and security.
References
  1. Ngouongo, Sylvie Mn, and Jürgen Stausberg. “Integration of classifications and terminologies in Metadata registries based on ISO/IEC 11179.” MIE. 2011.
  2. Gates, Ray. “Introduction to MDR-Tutorial on ISO/IEC 11179.” Metadata Open Forum. Vol. 2004. 2004.
  3. Lee, Jong-Sub, and Seok-Jae Moon. “Collaboration System using Agent based on MRA in Cloud.” International Journal of Applied Engineering Research 12.20 (2017): 9955-9959.
  4. Bindra, Leepakshi, et al. “Decentralized access control for smart buildings using metadata and smart contracts.” Proceedings of the 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems. IEEE Press, 2019.10.1109/SEsCPS.2019.00013
  5. Keck, Kevin D., and John L. McCarthy. “XMDR: Proposed Prototype Architecture Version 1.01.” (2005).
  6. Jung, Kye-Dong, Seok-Jae Moon, and Jin-Mook Kim. “Data access control method for multimedia content data sharing and security based on XMDR-DAI in mobile cloud storage.” Multimedia Tools and Applications 76.19 (2017): 19983-19999.10.1007/s11042-016-4016-8
  7. Centonze, Paolina, et al. “Security and Privacy Frameworks for Access Control Big Data Systems.” CMC-COMPUTERS MATERIALS & CONTINUA 59.2 (2019): 361-374.10.32604/cmc.2019.06223
  8. Gola, Jessica, et al. “Objective microstructure classification by support vector machine (SVM) using a combination of morphological parameters and textural features for low carbon steels.” Computational Materials Science 160 (2019): 186-196.10.1016/j.commatsci.2019.01.006
  9. Ing, Edsel, et al. “Support Vector Machines and logistic regression to predict temporal artery biopsy outcomes.” Canadian Journal of Ophthalmology 54.1 (2019): 116-118.10.1016/j.jcjo.2018.05.006
  10. 30851764
  11. Iranmehr, Arya, Hamed Masnadi-Shirazi, and Nuno Vasconcelos. “Cost-sensitive support vector machines.” Neurocomputing 343 (2019): 50-64.10.1016/j.neucom.2018.11.099
  12. Saunders, Craig, et al. “Support vector machine-reference manual.” (1998).
Information
  • Publisher :The Society of Convergence Knowledge
  • Publisher(Ko) :융복합지식학회
  • Journal Title :The Society of Convergence Knowledge Transactions
  • Journal Title(Ko) :융복합지식학회논문지
  • Volume : 7
  • No :3
  • Pages :161-168