• Title/Summary/Keyword: 개인정보관리모델

Search Result 349, Processing Time 0.025 seconds

Permission Authentication Model on IoT Platforms (사물인터넷 플랫폼에서 권한 인증 모델)

  • Lee, Se-Hoon;Moon, Hyo-Jae;Lee, Sang-Min;Koh, Hee-Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.139-140
    • /
    • 2017
  • 현재 사물인터넷 시장이 커져감에 따라 사물인터넷 보안위협도 증가하고 있다. 시중의 가정이나, 회사 등에서 사용하는 사물인터넷 플랫폼은 사용자 개개인에 대해 각 장치의 제어권한을 설정할 수 없다. 이로 인해 보안사고, 자원낭비 등 여러 문제가 발생할 가능성이 높다. 본 논문에서는 관리자가 사용자 개개인에게 각 장치의 제어 권한을 설정하고, 인증을 거친 사용자가 장치를 쉽게 제어할 수 있는 사물인터넷 플랫폼에서 활용할 수 있는 권한 인증 모델을 제시한다.

  • PDF

A Design and Implementation of the Efficient Student Management System Using Image (이미지를 이용한 효율적인 학생관리 시스템의 설계 및 구현)

  • Kim, Young-Man;Song, Dong-Young;Oh, Youn-Ju;Youn, Sung-Dae
    • Annual Conference of KIPS
    • /
    • 2002.04b
    • /
    • pp.1029-1032
    • /
    • 2002
  • 오늘날 학생들의 사고 방식이나 가치관은 과거와 달리 그 양상이 매우 다양하고 개성이 강하며 개인차 또한 심한 편이다. 그러므로 학생관리의 성패는 학생에 대한 보다 정확한 정보의 수집과 적재적소에의 이용이라고 볼 때, 필요한 정보를 적기에 추출하기에는 상당한 어려움이 따르는 게 현실이다. 본 논문에서는 학생 생활지도 및 진로지도에 활용할 수 있는 이미지를 이용한 효율적인 학생관리 시스템의 설계 및 모델을 제시하고자 한다. 제안한 시스템은 검색 대상의 부분적 정보인 신체적인 특징 등의 조합과 같은 비정형화된 데이터를 가지고 검색이 가능하며, 쉽고 빠르게 또한 정확한 결과를 도출한다. 학생에 관한 데이터를 새로이 생성하는 것이 아니라 데이터베이스 구축 시 기존의 학교종합정보관리시스템(C/S)의 데이터를 이용함으로써 보다 효율성을 높였다.

  • PDF

A Method for Calculating Exposure Risks of Privacy Information based on Website Structures (웹사이트의 구조를 고려한 개인정보 노출 위험도 계산 기법)

  • Lee, Sue Kyoung;Son, Jin Sik;Kim, Kwanho
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.1
    • /
    • pp.1-14
    • /
    • 2016
  • This research proposes a method that aims to evaluate the risk levels of websites based on exposure risks of privacy information. The proposed method considers two aspects as follows. First, we define the risk levels of each privacy information according to its own inherent risk. Second, we calculate the visiting probability of a webpage to measure the expected of the actual exposure of privacy information on that webpage. In this research, we implemented an system to prove that automatically collects websites and calculates their risk levels. For the experiments, we used a real world dataset consisting of a total of websites for 4 categories such as university, bank, central government agency, and education. The experiment results show that the websites in the bank category are relatively well managed, while the others are needed to cope with the exposure of privacy information. Finally, the proposed method in this research is expected to be further utilized in establishing a priority-based approach to alleviate of the privacy information exposure problems.

Proposal for a Custody and Federated Service Model for the Decentralized Identity (분산 ID 보관 및 연계 서비스 모델 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.513-525
    • /
    • 2020
  • Until today, the personal information of subjects has been centralized in many companies or institutions. However, in recent days, the paradigm has gradually changed in the direction that subjects control their personal information and persue their self-sovereignty. Globally, individual data sovereignty is strengthened by the European Union's General Data Protection Regulation(GDPR) and the US California Consumer Privacy Act(CCPA). In Korea, a few alliances consist of various companies are creating technology research and service application cases for decentralized ID service model. In this paper, the current decentralized ID service model and its limitations are studied, and a improved decentralized ID service model that can solve them is proposed. The proposed model has a function of securely storing decentralized ID to the third party and a linkage function that can be interoperated even if different decentralized ID services are generated. In addition, a more secure and convenient model by identifying the security threats of the proposed model and deriving the security requirements, is proposed. It is expected that the decentralized ID technology will be applied not only to the proof of people but also to the device ID authentication management of the IoT in the future.

Analyzing Government Policy Frameworks for Promoting Adoption and Diffusion of IPTV Services (IPTV 서비스의 수용과 확산을 위한 정부 정책 프레임워크 분석)

  • Seo, Hyun-Sik;Kim, Jun-Ho;Lee, Bong-Gyou
    • Journal of Internet Computing and Services
    • /
    • v.11 no.5
    • /
    • pp.37-58
    • /
    • 2010
  • This study analyzes appropriate government policy frameworks for promoting IPTV industry by studying the way of adoption and diffusion of IPTV services. Until recently, most researches on government policies for technology adoption have focused on the personal context. This research adopts two theories, i.e., innovation characteristics theory for personal context and implementation process theory for organizational context. It also hypothesizes that the innovation characteristics more influence on the behavioral intention for usage new media in the level of personal innovativeness is high. Moreover, in the level of expectancy for diffusion policy is high, the implementation of IPTV services more influences on the behavioral intention. The results by statistical analysis, it is found that the higher the level of personal innovativeness is, and the higher the level of expectancy for diffusion policy is, the more behavioral intention will be influenced by the characteristics of innovation and implementation of IPTV service. Thus it is important for government agencies to find the way to facilitate personal innovativeness as well as expectancy for diffusion policy.

A Study on the Sustainable Tourism Destination Management Plan using LBS (LBS를 이용한 지속가능한 관광지 관리방안에 관한 연구)

  • Park, Jae-Wan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.447-451
    • /
    • 2017
  • This study proposes a new model of tourism destination management based on the tourism management program using information and communication technology provided by LBS. The personalized tourist information service can enhance the satisfaction of tourists. Sustainability can be expanded through management based on the capacity of the tourism destination. Increased satisfaction leads to more diverse tourism activities. Various tourism activities increase the consumption expenditure, which satisfies the local tourism destination management purpose. The tourism destination management plan of the central and local governments is a comprehensive system in which detailed policy support plans are formulated from the perspective of the three requirements for sustainability-economic, socio-cultural, and environmental-and concerned parties are connected and resources are supported through detailed processes in which the sources of disparities in accessibility are identified and the roles are delegated at the national, community, and regional levels.

Study for IPTV based NGN applying Identity management apply (NGN 기반 IPTV 서비스에서의 IdM의 적용방안)

  • Lee, Young-Pyo;Park, Jun-Su;Kim, Hee-Dong;Jang, Jae-Young
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.301-304
    • /
    • 2009
  • 현재의 IPTV 시비스는 VoD+PPV와 같이 단순한 형태로 서비스를 제공하고 있다. IPTV 서비스 사업자들은 IPTV의 새로운 수익모델인 양방항성 통신특성에 최적화된 서비스를 제공해야 한다. 양방향 통신의 대표적인 서비스로는 T-commerce가 있다. T-commerce 서비스 제공시 IPTV 가입자의 정보가 제3의 서비스 사업자로 전송되기 때문에 개방된 IP망에서 가입자의 정보가 전송되므로 개인정보보호의 중요성이 커지게 될 것이다. 양방향 서비스를 제공하면서 개인정보보호를 유지하는 방안으로 ID를 통합적으로 관리하는 기술인 IdM(Identity Management)을 IPTV에 적용하는 방안이 고려되고 있다. 본 논문에서는 NGN(Next Generation Network)기반 IPTV의 IdM 적용방안에 대해 기술한다.

  • PDF

A Preliminary Research on the Impact of Perception of Personal Information Leakage Incidents on the Behavior of Individual Information Management in the Mobile Banking Contexts (모바일 뱅킹 이용자의 개인정보 유출사고 인지가 개인정보관리 준수행동에 미치는 영향에 대한 사전 연구)

  • Kim, Jungduk;Lim, Se-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.735-744
    • /
    • 2016
  • Recently, personal information leakage incidents with increased usage of mobile services are increasing. Personal information leakage incidents can have a significant impact on an individual's mobile banking services. Accordingly, we examine relationships among individual's psychological characteristics, intention and behavior regarding compliance in an individual's perception on personal information leakage incidents in mobile banking contexts. In this study, for explaining our research model and understanding with personal psychology and behavior in mobile banking contexts, we adopted two theories, theory of interpersonal behavior and stimulus-response theory. We collected the 55 data using online surveyor and then analyzed structural equation model in order to find causal relationships among research variables. The results of this study should be useful to the mobile banking services companies in promoting service users to follow the information privacy policies.

Design and Implementation of the Chronic Disease Management Platform based on Personal Health Records (개인건강기록 기반 만성질환 관리 플랫폼의 설계 및 구현)

  • Song, Je-Min;Lee, Yong-Jun;Nam, Kwang-Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.1
    • /
    • pp.47-62
    • /
    • 2012
  • To propagate clinical disease management service, there should be built a ecosystem where service developers, service providers, device suppliers closely cooperate for u-Health platform. However, most u-Health platform is difficult to build an effective ecosystem due to the lack of secure and effective PHR(Personal Health Record) management, the lack of personalized and intelligent service, difficulties of N-screen service. To solve these problems we suggest the CDMP(Chronic Disease Management Platform) architecture. The CDMP is a software platform that provides the core functions to develop the chronic disease management services and performs a hub function for the link and integration rbetween various services and systems. CDMP is SOA based platform that enables a provision of reusability, expansibility and it provides open API where everybody can share information, contents and services easily. CDMP supports the multi platform system foN-screen service and the self management functions via SNS. In this paper, we design and implement the CDMP including PHR service based on hybrid data model for privacy preservation. Experiment results prove the effectiveness of hybrid model-based PHR service.

The Study on the Implementation Approach of MLOps on Federated Learning System (연합학습시스템에서의 MLOps 구현 방안 연구)

  • Hong, Seung-hoo;Lee, KangYoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.97-110
    • /
    • 2022
  • Federated learning is a learning method capable of performing model learning without transmitting learning data. The IoT or healthcare field is sensitive to information leakage as it deals with users' personal information, so a lot of attention should be paid to system design, but when using federated-learning, data does not move from devices where data is collected. Accordingly, many federated-learning implementations have been developed, but detailed research on system design for the development and operation of systems using federated learning is insufficient. This study shows that measures for the life cycle, code version management, model serving, and device monitoring of federated learning are needed to be applied to actual projects and distributed to IoT devices, and we propose a design for a development environment that complements these points. The system proposed in this paper considered uninterrupted model-serving and includes source code and model version management, device state monitoring, and server-client learning schedule management.