• Title/Summary/Keyword: 3-Party Communication

Search Result 114, Processing Time 0.022 seconds

User Privacy Security Scheme using Double Replication Key in the Cloud Environment (클라우드 환경에서 이중 복제 키를 사용한 사용자 프라이버시 보호 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.9-14
    • /
    • 2018
  • Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.

A Study on Trusteeship Reports of Dong-a Ilbo (동아일보의 신탁통치 왜곡보도 연구)

  • Kim, Dong-Min
    • Korean journal of communication and information
    • /
    • v.52
    • /
    • pp.135-153
    • /
    • 2010
  • Dong-a Ilbo tried to assume leadership of opinion in preceding the movement against the trusteeship as a mouthpiece for the Han-Min Party. Dong-a Ilbo was to try to promote the atmosphere of anti-trusteeship=anti-communism=anti-Soviet Union, distorting the decision of a conference of three foreign affairs ministers in Moscow. It was not an incorrect report, but the false report. As a result, the formula of an anti-trusteeship=anti-Soviet Union=anti-communism=patriotism, and a pro-trusteeship=pro-Soviet Union=pro-Communism=traitor was formed. And the important problems of land reform and pro-Japanese‘ clearance were missing. Historically, political newspapers had appeared in the periods of very important political change. Political newspapers played a role as mouthpiece for political party or group. Dong-a Ilbo was such a political newspaper. It was that Dong-a Ilbo tried to change the social atmosphere in preceding the movement against the trusteeship as a mouthpiece for the Han-Min Party. And history was distorted.

  • PDF

Access Control Protocol for Privacy Guarantee of Patient in Emergency Environment (응급 상황에서 환자의 프라이버시를 보장하는 속성기반 접근 제어 프로토콜)

  • Jeong, Yoon-Su;Han, Kun-Hee;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.279-284
    • /
    • 2014
  • Recently, m-health care is be a problem that the patient's information is easily exposed to third parties in case of emergency situation. This paper propose an attribute-based access control protocol to minimize the exposure to patient privacy using patient information in the emergency environment. Proposed protocol, the patient's sensitive information to a third party do not expose sensitive information to the patient's personal health information, including hospital staff and patients on a random number to generate cryptographic keys to sign hash. In addition, patient information from a third party that is in order to prevent the illegal exploitation of the patient and the hospital staff to maintain synchronization between to prevent the leakage of personal health information.

Audience's Boycott Movement to the Korean Press in the Early 1920s (1920년대 초반의 신문불매운동 연구)

  • Chae, Baek
    • Korean journal of communication and information
    • /
    • v.22
    • /
    • pp.249-272
    • /
    • 2003
  • This study discusses on the historical origin of audience's boycott movement to the Korean press. Two historical cases of audience's boycott movement in the early 1920s were analyzed in this study. The first boycott was resolved by the counterforce to the public funeral of Yunsik Kim in February of 1922. This case can be estimated as the historical origin of audience's boycott movement in the Korean media history. The second case was carried out by the National Convention of the Youth Parties in March of 1923. The target of these two cases were The Dong-A Ilbo. And these boycott movement were caused by the conflict and competition between nationalists and socialists in the national independence movement. These two parties were incompatible in the ideology and method of national independence struggle. In the course of their conflict and competition for the initiative socialist party resolved and carried out the boycott movement to The Dong-A Ilbo, because it was regarded as the advocate of the nationalist party.

  • PDF

Interpreting Discourse Metaphors in Media: Focusing on News Coverage of Election Campaign

  • Ban, Hyun;Noh, Bokyung
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.104-110
    • /
    • 2022
  • This paper aims to analyze discourse metaphors by paying attention to Seoul mayoral by-election, mainly focusing on election campaign and its related news articles. The 2021 Seoul mayoral by-election was held because the former mayor died in an apparent suicide after he was accused of years of sexual harassment to a former secretary. But in the run-up to the by-election, the newly coined word 'alleged victim' from the ruling party caused a big controversy because the party attempted to deny the authenticity of the secretary's claim by calling her "an alleged victim," instead of "a victim" to defend the former mayor who is a member of the ruling party, implying that the woman's claim is just an allegation with no proof. Thus, this paper has analyzed how news stories were reported with regard to the word 'alleged victim' poser on news stories in two Korean quality newspapers, a conservative newspaper (Chosun Ilbo) and a liberal newspaper (Hankyoreh) from March 1 to April 1, 2021 and analyzed them with the framework of Lakoff and Johnson's Conceptual Metaphor Theory(1980). The findings are as follows: (i) the conservative newspaper reports this issue much more than the liberal newspaper; (ii) both quality newspapers follow the metaphor principles by Conceptual Metaphor Theory; (iii) the conservative newspaper is more likely to follow the Strick Father model (a conservative model) while the liberal newspaper is to follow the Nurturant Parent model (a liberal model), thus indicating that each newspaper's ideology is well represented by the models of Conceptual Metaphor Theory

The Comparison of Food Culture between Korea and Japan through Korean Communication Facilities and Japanese Envoys, Agasang.Subaesang.Kwaban of the Choson Dynasty through the Dinner Party in Thusima Island (조선통신사(朝鮮通信使) 및 일본사신(日本使臣)을 통해서 한(韓).일(日)간의 음식문화(飮食文化)의 비교와 , 대마도에서의 연회(宴會)를 통해서 본 조선왕조(朝鮮王朝)의 수배상(壽杯床).과반(果盤).아가상(阿架床) 고(考))

  • Kim, Sang-Bo
    • Journal of the Korean Society of Food Culture
    • /
    • v.14 no.2
    • /
    • pp.115-129
    • /
    • 1999
  • The following demonstrates similarities between Japanese and Korean food culture. The facts have been discovered through the examination of records kept by Korean Communication Facilities and Japanese Envoys. Both countries used the numbers 7, 5, 3, in food treats. Both demonstrated Da do(茶道) style during banquet. Japanese Na-ra-dae(奈良臺) is similar to Korean Sue-bae-sang(壽杯床). Both countries had a Kan-ban(decorative table, 看盤) and Mi-soo(wine and someatables, 味數) during banquet. The composition of the table may be the same for both Korean Geo-sick-oh-kwa-sang and Japanese 3Jeup(soups) 15Che(dishes). Agasang is a Kan-ban(decorative table) of Choson's Da-do(茶道) style.

  • PDF

Prevent Illegal Access Control for Secure Healthcare System (불법적인 접근 제어 방지를 위한 안전한 헬스케어 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Moon, Yong-Hyuk;Cho, Dong-Sub
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.3
    • /
    • pp.657-663
    • /
    • 2010
  • Today, rapid evolution of Internet makes various types of services in ubiquitous environment are intelligent and active. As a result, user's demand on high quality of life increases and health care service based on ubiquitous environment draws a lot of attention. However, user's private information used for health care service is illegally distributed and exposed, causing serious individual and social problems. Therefore, this thesis is intended to suggest a secure health care service to prevent unauthorized third party's access and to protect user's privacy in health care systems. The proposed scheme establishes a session key through communication channel between health care system and user based on explicit mutual authentication and provides secure communication and access control, improving security as one of the leading health care systems.

Attribution of Responsibility, Risk Perception, and Perceived Corporate Social Responsibility in Predicting Policy Support for Climate Change Mitigation: Evidence from South Korea

  • Bumsub Jin
    • Asian Journal for Public Opinion Research
    • /
    • v.11 no.3
    • /
    • pp.182-200
    • /
    • 2023
  • A recent nationwide survey reported that South Koreans perceive large corporations as the party that should be the most responsible for tackling climate change. This public opinion result offers insight into the argument that defining who is responsible for the climate change issue can guide campaigners and policymakers in designing effective communication strategies. This study examines how attributing responsibility to large corporations can affect behavioral intention to support government policy and regulation via a moderated mediation model of the perceived risk of climate change and corporate social responsibility (CSR). A nationwide online survey of 295 South Koreans was conducted. The findings reveal an indirect effect of responsibility attribution on behavioral intention through risk perception. Moreover, perceived CSR moderated the causal link between risk perception and behavioral intention, such that South Koreans reported higher levels of behavioral intention when they reported higher CSR. However, perceived CSR failed to moderate the indirect effect. These findings have implications for communication processes and policymaking to address climate change problems in South Korea.

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment (모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.205-211
    • /
    • 2015
  • Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

A Study on Security System of Document Image using Mixing Algorithm (합성 방식을 이용한 문서 화상의 보안 체계 연구)

  • 허윤석;김일경;박일남
    • The Journal of Information Technology
    • /
    • v.2 no.2
    • /
    • pp.89-105
    • /
    • 1999
  • In this paper, we present a countermeasure for a various trouble occurred in secure communication of document image. We Propose a security system for transmission of document image using mixing algorithm that the third party cannot conceive secure transmission of information instead of existing scheme which depend on crypto-degree of security algorithm, itself. For this, RM, DM and RDM algorithm for mixing of secure bits are proposed and applied to digital signature for mixing for secure document and mixing for non-secure document by secure document. Security system for document image involves not only security scheme for document image transmission itself, but also digital signature scheme. The transmitter embeds secretly the signatures onto secure document, embeds it to non-secure document and transfers it to the receiver. The receiver makes a check of any forgery on the signature and the document. Because the total amount of transmitted data and the image quality are about the same to those of the original document image, respectively, the third party cannot notice the fact that signatures and secure document are embedded on the document image. Thus, the probability of attack will be reduced.

  • PDF