• Title/Summary/Keyword: 제안 주체

Search Result 739, Processing Time 0.03 seconds

Security Problems for Ubiquitous Computing Frameworks (편재 컴퓨팅 기반에서의 보안 문제)

  • Kim, Hyung-Chan;Shin, Wook;Lee, Dong-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.895-898
    • /
    • 2002
  • 현재 활발하게 진행되고 있는 편재 컴퓨팅을 위한 기반에 대한 연구들은, 문맥-인식(Context-Aware) 어플리케이션 및 이를 지원하는 서비스 컴포넌트들을 기반으로 하는 능동 공간(Active Spaces, Smart Spaces)[1][2]을 규모 있게 구현할 수 있도록 해준다. 이러한 기반들의 근간에는 편재 컴퓨팅 디바이스들간의 통신을 위한 분산 서비스가 자리잡게 되며, 환경 내에 있는 주체들과 객체들간의 상호 작용이 이러한 분산 서비스를 통하여 이루어진다. 본 논문에서는 능동 공간을 위한 기반에 대한 설명과 이와 관련한 연구들을 소개하고 공간 내에 있는 주체와 객체들 사이에서 일어날 수 있는 보안 문제에 대한 고려사항을 살펴본다. 또한 편재 컴퓨팅 환경 기반의 보안 서비스를 위한 인증 및 접근 통제 컴포넌트를 제안한다.

  • PDF

Influencer Attribute Decision-Making based on Principal Component Analysis (주성분분석 기반 인플루언서 속성 의사결정 기법)

  • Kim, Minwoo;Park, JeongRyeon;Park, Jiwon;Oh, Hayoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.672-674
    • /
    • 2019
  • SNS를 사용하는 것에 익숙한 Z세대가 소비의 주체가 됨에 따라 기업 안에서 SNS를 이용한 인플루언서 마케팅의 비중이 급증하고 있다. 하지만, 마케팅의 주체가 되는 인플루언서를 결정하는 방식이 체계화되지 못하였고 기업 내에서의 휴리스틱한 판단에 의존하고 있다. 따라서 본 논문에서는 성공적인 마케팅을 위해 기존의 전통적인 방식에 의거한 의사결정 조건 및 유의미한 상관관계의 분석과 더 나아가 판매하고자 하는 상품 및 서비스의 적합한 인플루언서를 추천하는 인플루언서 기반 실시간 마케팅 솔루션을 제안한다.

Theoretical Exploration of Migrant Women's Location as Multicultural Borderers: Conceptual Application of Borderlands, Intersectionality, and Transposition to the Feminist Migration Study (다문화경계인으로서 이주여성들의 위치성에 대한 이론적 탐색: '경계지대,' 억압의 '교차성,' '변위' 개념에 대한 검토 및 적용)

  • Jung, Hyunjoo
    • Journal of the Korean Geographical Society
    • /
    • v.50 no.3
    • /
    • pp.289-303
    • /
    • 2015
  • This paper is an introductory research to theorize women migrants' positionality in the era of globalization and the feminization of migration. It particularly examines three recent theoretical approaches within feminist studies and their application to the feminist migration study. Migration means a process of continuous negotiations of one's social and material positions within ever changing relations and situations through crossing various borders including national boundaries. Women migrants face multifaceted oppressions due to gendered relation and greater challenges to transform their identities. They embody politics of location through migration. The paper revolves around theories that explore a potential of feminist subjectivation of marginalized women such as female migrants through their identity negotiation and transformation. The theories in questions are Borderlands and the New Mestiza introduced by Gloria $Anzald{\acute{u}}a$, Intersectionality of oppressions, and Transpositions and the Nomadic Subjects by Rosi Braidotti who borrowed the theories of Deleuze and Guattari through feminist critiques. These theories all represent power relations and subject transformations through spatial metaphors. rough spatialized understandings, the paper proposes interlocking relations among space, gender and migration, and explores conceptual tools as well as epistemological insights for Korean migration study.

  • PDF

The New Framework for Taxonomy of Business Caused by Cyber Space Marketization and Its Application (공간시장화에 따른 새로운 비즈니스 분류 프레임워크의 제안과 적용)

  • 이홍길;이재원;류형근
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2003.05a
    • /
    • pp.291-297
    • /
    • 2003
  • The aim of this research is to propose new framework for taxonomy of various business and its concept, due to the changes in market space. This framework is three-dimension cubic model, based on three concepts, business layer(BL), value chain(VC), and Real/Virtual(R/V) that symbolizes real environment and virtual(or cyber) space. And we showed that this framework is able to describe all expected(or existed) business types in certain industry by the combinations of BL-VC-R/V on three dimension. In addition, we suggested new definition of e-business and e-Logistics from view of BL-VC-R/V. In order to test availability, this framework was applied for logistics related business. and classified typical business types existed (or expected) in logistics area.

  • PDF

The New Framework for Taxonomy of Business Caused by Cyber Space Marketization and Its Application (공간시장화에 따른 새로운 비즈니스 분류 프레임워크의 제안과 적용)

  • Lee, Hong-Girl;Lee, Jae-Won;Ryu, Hyung-Geun
    • Journal of Navigation and Port Research
    • /
    • v.27 no.4
    • /
    • pp.389-395
    • /
    • 2003
  • The aim of this research is to propose new framework for taxonomy of various business and its concept. due to the changes in market space. This framework is three-dimension cubic model based on three concepts, business layer(BL), value chain(VC), and Real/Virtual(R/V) that symbolizes real environment and virtual (or cyber) space. We showed that this framework is able to describe all expected(or existed) business types in certain industry by the combinations of BL-VC-R/V on three dimension. In addition, we suggested new definition of e-business and e-Logistics from view of BL-VC-R/V. In order to test availability of framework, this framework was applied for logistics related business, and we classified typical business types existed (or expected) in logistics area.

Study on Methodology of Collecting Realtime File Access Event Information (실시간 파일 접근 이벤트 정보 수집 방법에 관한 연구)

  • Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.447-448
    • /
    • 2021
  • The boundary-based security architecture has the advantage of easy deployment of security solutions and high operational efficiency. The boundary-based security architecture is easy to detect and block externally occurring security threats, but is inappropriate to block internally occurring security threats. Unfortunately, internal security threats are increasing in frequency. In order to solve this problem, a zero trust model has been proposed. The zero trust model requires a real-time monitoring function to analyze the behavior of a subject accessing various information resources. However, there is a limit to real-time monitoring of file access of a subject confirmed to be trusted in the system. Accordingly, this study proposes a method to monitor user's file access in real time. To verify the effectiveness of the proposed monitoring method, the target function was verified after the demonstration implementation. As a result, it was confirmed that the method proposed in this study can monitor access to files in real time.

  • PDF

Study on Zero Trust Architecture for File Security (데이터 보안을 위한 제로 트러스트 아키텍처에 대한 연구)

  • Han, Sung-Hwa;Han, Joo-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.443-444
    • /
    • 2021
  • Security threats to information services are increasingly being developed, and the frequency and damage caused by security threats are also increasing. In particular, security threats occurring inside the organization are increasing significantly, and the size of the damage is also large. A zero trust model has been proposed as a way to improve such a security environment. In the zero trust model, a subject who has access to information resources is regarded as a malicious attacker. Subjects can access information resources after verification through identification and authentication processes. However, the initially proposed zero trust model basically focuses on the network and does not consider the security environment for systems or data. In this study, we proposed a zero trust-based access control mechanism that extends the existing zero trust model to the file system. As a result of the study, it was confirmed that the proposed file access control mechanism can be applied to implement the zero trust model.

  • PDF

The Distributed Authentication and Key Exchange Protocols for Smartcard (스마트카드에 적용가능한 분산형 인증 및 키 교환 프로토콜)

  • Oh Heung-Ryongl;Yoon Ho-Sun;Youm Heung-Youl
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.17-30
    • /
    • 2005
  • A PAK(Password-Authenticated Key Exchange) protocol is used as a protocol to provide both the mutual authentication and allow the communication entities to share the session key for the subsequent secure communication, using the human-memorable portable short-length password, In this paper, we propose distributed key exchange protocols applicable to a smartcard using the MTI(Matsumoto, Takashima, Imai) key distribution protocol and PAK protocol. If only one server keeps the password verification data which is used for password authentication protocol. then It could easily be compromised by an attacker, called the server-compromised attack, which results in impersonating either a user or a server, Therefore, these password verification data should be distributed among the many server using the secret sharing scheme, The Object of this paper Is to present a password-based key exchange protocol which is to allow user authentication and session key distribution, using the private key in a smartcard and a password typed by a user. Moreover, to avoid the server-compromised attack, we propose the distributee key exchange protocols using the MTI key distribution protocol, And we present the security analysis of the proposed key exchange protocol and compare the proposed protocols with the existing protocols.

  • PDF

An Oblivious Transfer containing Non-Repudiation Capability (부인봉쇄 기능을 갖는 불확정 전송)

  • Kim, Sang-Chun;O, Yeong-Sil;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.3
    • /
    • pp.333-340
    • /
    • 1999
  • 이 논문에서는 송수신 부인봉쇄와 내용은닉 서명의 기본 개념과 공평한 비밀정보 교환을 위한 프로토콜인 불확정 전송 프로토콜에 대하여 소개하였다. Lein등이 제안한 검증 가능한 불확정 전송 프로토콜은 대화형 전송 방식을 사용하기 때문에 통신량이 많이 발생한다. 이러한 문제를 해결하기 위하여 M.Bellare & S. Micali가 제안한 비대화형 불확정 전송을 확장하여 믿을 수 없는 두 통신 주체간에 안전하게 비밀 정보를 전송할수 있고 , 송수신자간의 단 한번의 통신으로 이루어지는 검증 가능한 비대화형 불확정 전송 프로토콜을 제안하고, 추후 송수신 사실의 부인에 대한 문제가 발생할 경우 이를 중재할 수 있는 새로운 송수신 부인봉쇄 기능을 갖는 검증 가능한 비대화형 불확정 전송 프로토콜을 제안한고, 제안한 프로토콜에 대하여 안전성을 분석하였다.

Attributed-based Encryption and Access Control Mechanism in Cloud Computing Environments (클라우드 컴퓨팅 환경에서 속성 기반 암호화 및 접근 제어 기법)

  • Kang, Yong-Hyeog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.263-264
    • /
    • 2016
  • 클라우드 컴퓨팅은 장점으로 인해 대중화되고 있지만, 자신의 자원에 대한 제어를 클라우드 제공자에게 의존하는 문제가 있다. 이러한 클라우드 시스템의 보안 문제를 해결하기 위해 암호화 기법을 이용한 다양한 기법들이 제안되었으나 확장성 문제로 인해, 아직도 많은 기법들이 제안되고 있다. 본 논문에서는 속성 기반(attribute-based) 접근 제어 기법에서 사용되는 속성을 이용하여 속성을 기반으로 하는 암호화 기법을 제안한다. 이를 위해 XACML를 통해 주체 및 자원과 환경 속성을 표현하며 인증과 권한 검증을 위한 메시지 교환을 위해 SAML 기술을 제안한다. 이를 통해 속성으로 표현된 암호화된 자원에 대한 접근 제어 방법을 제안한다.