• Title/Summary/Keyword: 안전속성

Search Result 363, Processing Time 0.025 seconds

Improved Two-Party ID-Based Authenticated Key Agreement Protocol (개선된 두 참여자간 식별자 기반 인증된 키 동의 프로토콜)

  • Vallent, Thokozani Felix;Kim, Hae-Jung;Yoon, Eun-Jun;Kim, Hyunsung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.595-604
    • /
    • 2013
  • Devising a secure authenticated key agreement (AKA) protocol for two entities communicating over an open network is a matter of current research. McCullagh et al. proposed a new two-party identity-based AKA protocol supporting both key escrow and key escrow-less property instantiated by either in a single domain or over two distinct domains. In this paper, we show that their protocol over two distinct domains suffers from masquerading attack and therefore does not satisfy the claimed security. The attack is made possible due to the lack of sufficient authentication of entity and integrity assurance in the protocol. We then propose an efficient verifiable key agreement protocol by including signature primitive in the authentication procedure to solve the problem of McCullagh et al.'s protocol.

Police Networks for Criminal Intelligence Functions: Based on Informal Social Network Analysis (경찰 범죄정보 수집 활동의 관계망 분석: 비공식적 사회연결망 분석을 중심으로)

  • Choi, Yeong Jin;Yang, Chang Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.448-459
    • /
    • 2020
  • Recently, the necessities of gathering, producing, and sharing criminal information are critically important as intelligence functions of police agencies to improving public safety and national security. However, the inadequacies and barriers within which police agencies have in regard to intelligence functions impede criminal information gathering, intelligence producing within their agency, and intelligence sharing with other agencies. In this study, we analyzed informal networks constructed from a survey dataset of information and intelligence sharing among officers in police agencies. The results revealed the different structural properties of intelligence networks between police agencies. We did find that officers with high indegree and outdegree in a network played critical role on the dynamics and degree of intelligence gathering and assessment responsibilities. Finally, we could find evidence that the potential role of intermediary triggered relational dynamics for developing and sharing critical information among all police agencies.

Consumer's Recognition on Naturally-Grown Forest Products (자연산 임산물에 대한 소비자 인식)

  • Min, Kyung-Taek;Koo, Ja-Choon;Kim, Myeong-Eun
    • Journal of Korean Society of Forest Science
    • /
    • v.104 no.4
    • /
    • pp.668-676
    • /
    • 2015
  • The objective of this paper is to elicit some policy implications to promote agroforestry in South Korea from the consumers' perspective. We conducted internet survey to 640 urban households about the recognition of forest farming products. Consumers purchased forest farming products for their nutrition, medical function, and safety and regarded them as higher quality than crops cultivated from agricultural land. Consumers preferred forest farming products but revealed no difference in recognition of naturally-grown products. Consumers buying forest products prioritize the quality and medical function among attributes. Among consumers as their income increases, they regard naturally grown products more important than price and freshness. Therefore, to promote agroforestry in South Korea, certification for naturally-grown products to win the consumers' trust and the $6^{th}$ industrialization by combining experience and green tourism program must be considered.

A Study on the Evaluation of the Logistics Service Quality of Container Terminal Operators (컨테이너터미널 운영사의 물류서비스 품질 평가에 관한 연구)

  • Park, Eun-Kyoung;Kim, Hyun-Duk;Lee, Kwang-Bae
    • Journal of Korea Port Economic Association
    • /
    • v.25 no.1
    • /
    • pp.47-62
    • /
    • 2009
  • The paper attempts to identify the Logistics Service Duality of Container Terminals and to test the model by using of the Analytic Hierarchy Process(AHP). Also, the research assess the practical competitiveness of Container Terminals in Kwangyang by Fuzzy technique. To conclude, we can make the following observations: (1) we classifies the Logistic Service Quality into five attributes such as Tangibility, Reliability, Responsiveness, Assurance, Empathy, (2) Assurance is drawn to the most important attribute, (3) There is a significant disparity between the operators and the users in the relative importance of the Logistics Service Quality Attributes of Container Terminal, (4) In the result of analysis of the terminals' competitiveness, C Terminal is extracted as the most superior operator. In Addition, we hope to provide useful contribution to increase Gwangyang container terminal's competitiveness and offer some insight in further research.

  • PDF

Data Anonymity Decision (데이터 익명화 결정 기법)

  • Jung, Min-Kyoung;Hong, Dong-Kweon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.2
    • /
    • pp.173-180
    • /
    • 2010
  • The research of the preserving privacy of sensitive information has been popular recently. Many researches about the techniques of generalizing records under k-anonymity rules have been done. Considering that data anonymity requires a lot of time and resources, it would be important to decide whether a table is vulnerable to privacy attacks before being opened in terms of the improvement of data utilization as well as the privacy protection. It is also important to check to which attack the table is vulnerable and which of anonymity methods should be applied in the table. This paper describe two possible privacy attacks based upon related references. Also, we suggest the technique to check whether data table is vulnerable to any attack of them and describe what kind of anonymity methods should be done in the table. The technique we suggest in this paper can also be applied for checking the safety of anonymity tables in which insert or delete operations occurred as well from privacy attacks.

An Implementation of an ENC Representation System which meets S-52 presentation specification and S-57 transfer standards (S-52 표현사양 및 S-57 교환표준을 만족하는 전자해도 표현 시스템 구현)

  • 서상현;이희용
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.146-150
    • /
    • 1999
  • On the advent of digital era, ECDIS has emerged as a new navigation aid that should result in significant benefits to safe navigation. More than simply a graphics display, ECDIS is a new concept navigation system capable of providing integrated information of geographical and texual data. As an official vector data for ECDIS, ENC consists of spatial and feature data to describe objects in form of points, lines and areas. IHO published International Standards for ENC, such as S-52(Specification for Chart Content and Display Aspects of ECDIS and S-57(IHO Transfer Standard for Digital Hydrographic Data). This paper deals with the implementation of an EUC representation system which meets S-52 presentation specification and S-57 transfer standards by analyzing S-57 data structures and converting then to an appropriate internal data structures and representing them onto screen adopting S-52 presentation specification.

  • PDF

A Study on Service-based Secure Anonymization for Data Utility Enhancement (데이터 유용성 향상을 위한 서비스 기반의 안전한 익명화 기법 연구)

  • Hwang, Chikwang;Choe, Jongwon;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.681-689
    • /
    • 2015
  • Personal information includes information about a living human individual. It is the information identifiable through name, resident registration number, and image, etc. Personal information which is collected by institutions can be wrongfully used, because it contains confidential information of an information object. In order to prevent this, a method is used to remove personal identification elements before distributing and sharing the data. However, even when the identifier such as the name and the resident registration number is removed or changed, personal information can be exposed in the case of a linking attack. This paper proposes a new anonymization technique to enhance data utility. To achieve this, attributes that are utilized in service tend to anonymize at a low level. In addition, the anonymization technique of the proposal can provide two or more anonymized data tables from one original data table without concern about a linking attack. We also verify our proposal by using the cooperative game theory.

Construction of a Knowledge Schema for Food Additive Information Using Ontology (온톨로지를 이용한 식품첨가물 정보 지식의 구축)

  • Kim, Eun-Kyoung;Kim, Yong-Gi
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.27 no.1
    • /
    • pp.42-49
    • /
    • 2017
  • Studies for efficient information retrieval and reuse of information resources using the ontology techniques are being in progress in various fields. In this paper, we build an ontology to provide a food additive information for consumers given by the KFDA and food safety information portal. Food additives were represented in OWL based knowledge using $Prot{\acute{e}}g{\acute{e}}$. We defined Class, Property, Relationships for providing food additives names, origins, purposes and basic information. In order to retrieve the information of the food additive, we built 679 instances with an ontology, and confirmed the results through DL Query queries. We can expect that the food additives ontology shown in this paper will help the integration and improvement of the information retrieval systems of the related fields in future.

Drivers' Satisfaction of Protected/Permitted Left Turn(PPLT) Signal Operation (보호/비보호 좌회전 신호운영(PPLT) 만족도 분석)

  • Jang, Tae-Youn;Oh, Do-Hyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.14 no.1
    • /
    • pp.46-56
    • /
    • 2015
  • The purpose of this study is to find out the effectiveness of drivers' satisfaction over protected and permissive left-turn (PPLT) traffic signal operation. A structural equation model was established for analyzing the effectiveness of various drivers' factors (e.g., personal characteristics, driving attitude, expectation to PPLT, etc.) on the PPLT preference based on questionnaire survey. As a result, the analysis is satisfied with the critical values, such as Q value, RMR, GIF, AGIF, and NFI. The study reveals that PPLT preference increases in case of driver who is male with long social carrier related to transportation affaire and long driving experience without traffic accident involvement. Moreover, PPLT preference increases as the expectation of PPLT to improvement of traffic safety, traffic operation, and traffic environment increases. Therefore, it is recommended that the PPLT should be preferentially operated in urban area of less traffic accidents and the promotion of PPLT be actively conducted for positive effectiveness.

A Study on Securing the Quality of Trusted Digital Records as Evidence: Focusing on Analysis of Quality Concept and Requirements for Records and Evidence Respectively Covered in Records Management and Judicial Domain (증거로서 신뢰할 수 있는 전자기록의 품질 확보방안 연구 - 기록관리영역과 사법영역에서 다루는 기록과 증거의 품질 개념과 요건 분석을 중심으로 -)

  • Lee, Gemma;Oh, Kyung-Mook
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.217-246
    • /
    • 2021
  • This study aimed to analyze the quality concepts and requirements of digital records as evidence and to find an implication to develop requirements for trusted digital records with securing authoritative qualities. To this end, this study compared requirements of records domain linking records process, records metadata and records systems with judicial domain on digital evidence, and identified the records requirements to secure the legal admissibility linking records and judicial domain. This study analyzed the relationship of quality concepts between digital records and digital evidence, found the legal admissibility is highly related to the reliability, and derived that it needs the measure to secure the reliability at the stage of records creation and capture. To prove authenticity of digital evidence, this study identified importance of records process, records metadata and records system, and proposed the necessity of measurement to secure records' evidence.