• 제목/요약/키워드: Cyber Identity

검색결과 98건 처리시간 0.023초

사이버대학생과 일반대학생의 사회복지 현장실습성과 및 전문직 정체성에 영향을 미치는 요인 (Factors Influencing on the Field Education Outcomes and Professional Identity of Social Welfare in Cyber University and Ordinary University Students)

  • 최은희
    • 한국콘텐츠학회논문지
    • /
    • 제11권12호
    • /
    • pp.475-485
    • /
    • 2011
  • 본 연구는 사이버대생과 일반대생의 사회복지 현장실습성과와 전문직 정체성에 영향을 미치는 요인을 비교하여 현장실습의 질을 제고하기 위한 각 학교의 개입지점을 찾고자 한다. 연구결과, 사이버대생의 현장 실습성과가 일반대생보다 유의미하게 더 높게 나타났으며, 사이버대생의 현장실습성과에는 수퍼비전, 학교 요인이, 일반대생은 전공만족도, 수퍼비전과 학교요인이 영향을 미치는 요인으로 나타났다. 전문직 정체성에는 사이버대생의 경우 전공만족도, 수퍼비전, 학교요인이, 일반대생은 전공만족도, 수퍼비전이 영향을 미쳤다. 이에 실습 수퍼바이저는 분명한 역할과 체계적인 지도를 제공하고, 학교는 학생들의 전공만족도를 높이기 위한 노력과 함께 예비사회복지사로서의 자질을 향상시킬 수 있는 사전 사후실습지도가 필요하다.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability

  • Ki, Ju-Hee;Hwang, Jung-Yeon;Nyang, Dae-Hun;Chang, Beom-Hwan;Lee, Dong-Hoon;Lim, Jong-In
    • ETRI Journal
    • /
    • 제34권2호
    • /
    • pp.235-244
    • /
    • 2012
  • An identity-based strong designated verifier signature scheme provides restricted verifiability only for a verifier designated by a signer and proper privacy for the signer. In this paper, we show that strong designated verifier signature schemes do not satisfy the self-unverifiability requirement in the sense that not only exposure of the verifier's secret key but also of the signer's secret key enables an attacker to verify signatures, which should have been the exclusive right of the verifier. We also present a generic method to construct a strong identity-based designated verifier signature scheme with self-unverifiability from identity-based key encapsulation and identity-based key sharing schemes. We prove that a scheme constructed from our method achieves unforgeability, non-transferability, and self-unverifiability if the two underlying components are secure. To show the advantage of our method, we present an example that outputs short signatures and we analyze its performance.

가상공간에서의 디지털 카메라 소비자의 자기표현과 의사소통 :문화기술적 방법을 이용하여 (Digital Camera Consumers' Self-Expression and Communication in Cyberspace Using Ethnographic Interviews)

  • 이미혜;윤정혜
    • 가정과삶의질연구
    • /
    • 제25권2호
    • /
    • pp.71-87
    • /
    • 2007
  • It is necessary to understand a self-expression and communication in cyberspace using digital photography We have studied the digital camera consumer's self-expression and communication skills and strategy through ethnographic interviews. In this study, we have used ethnographic interviews of 7 informants who had personal web site and are using digital cameras. As a result, It has turned out that informants expressed their self taking pictures of their daily life, friends, and family. Also they imply meaning and feeling in the pictures that had been taken to express their lives. The communication in cyberspace has turned out that informants communicate with other people with digital pictures to show their life. They communicated each other and give information. It means that they made information by themselves to give and share with other people as prosumer. Digital photography to express themselves and communicate in cyberspace enhanced human relationship that had made in cyber space. And it helps to form their self identity. They express their cyber identity with digital photography and it is similar to their self identity that expresses in real life.

디지털 신뢰 사회 실현을 위한 디지털 아이덴티티 동향 (Digital Identity Trend for Digital Trust Society)

  • 권동승;이현;박종대
    • 전자통신동향분석
    • /
    • 제34권3호
    • /
    • pp.114-124
    • /
    • 2019
  • The Internet was designed for machines, not humans, and hence, nobody owns a digital identity. Instead, a digital identity is rented from a website and an application. This lack of unique and secure digital identities has resulted in confusion in the online/cyber world. Digital identities pose one of the oldest and most difficult problems with regard to the Internet. There is still no way to use digital credentials to prove, own, and control an online identity, namely a self-sovereign identity, in the same manner we do in the offline world, particularly without a trusted third party. This article discusses the current open standards for digital identities, proposes solutions pertaining to digital identities in the future, and introduces the concept of a blockchain-based self-sovereign digital identity without the need of trusted third parties.

디지털시대 패션에 나타난 사이버페미니즘 연구(제1보) -사이버하위문화 스타일을 중심으로- (A Study of Cyberfeminism in fashion in the digital era -Focused on cybersubculture style (Part I)-)

  • 김현수;양숙희
    • 한국의류학회지
    • /
    • 제27권11호
    • /
    • pp.1229-1240
    • /
    • 2003
  • The purpose of this study was to review such results of the scientific and technological development as women's changed status, sexual identity and their views of physique in the cyber space based on cyber feminists' theories, and thereby, examine the concept of space during the medieval age, and then, the fundamental spiritual concept involving the fetishism of women's body as sexual objects in the materialistic space of the digital age in terms of the consciousness of trend or supra-sensual perceptions, and thereby, review the effect of the cyber terrorism and violence on the fashion in sub-cultural terms. Some researchers distinguish psychedelic styles from cyberdelic ones to assume such psychiatric visions as psychedelic fashion characterized by resistance and delinquency-cyber punk fashion, cyber hippie fashion, cyborg fashion- and then, define them all as cyber resistant culture fashion or as a sub-cultural style of the cyber culture. As a result, it was found that human bodies are being encoded with the networks, various cyber characters or avatars are emerging, while human bodies are being distorted or exaggerated with human beings and machines being imploded.

청소년의 SNS중독과 현실공간 및 가상공간에서의 자아정체감의 관계 (Association Between the Addiction of SNS and Ego-Identity of Youth's in Both Reality and Cyber Space)

  • 신혜선;윤석희
    • 디지털융복합연구
    • /
    • 제15권8호
    • /
    • pp.225-234
    • /
    • 2017
  • 본 연구는 남녀 청소년을 대상으로 SNS중독상태, 현실공간 및 가상공간의 자아정체감의 상태를 확인하고, SNS중독여부와 현실공간 및 가상공간에서의 자아정체감 사이의 관계를 규명하고자 시행되었다. 연구대상자 중 남성이 여성보다 SNS사용 시간이 더 많았고, SNS친구 수가 많을수록 SNS 사용을 더 많이 하는 것으로 나타났다. 현실과 가상공간에서의 자아정체감 하위 영역 상관관계에서는 대부분의 영역에서 정의 상관관계를 보였으며, 현실공간 자아정체감과 SNS중독의 각 하위 영역과도 모든 영역에서 정의 상관관계를 보였다. 그러나 SNS중독과 가상공간 자아정체감의 영역에서는 주도성을 제외한 나머지 영역에서 음의 상관관계를 나타내었다. 이를 통하여 SNS중독 대상자들에 대한 교육과 관리가 필요하며, 현실공간 및 자아정체감의 각 하위영역별로 대상자들을 중재할 수 있는 프로그램이 개발되어야 할 것이다.

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages

  • Yang, Haomiao;Kim, Hyunsung;Li, Hongwei;Yoon, Eunjun;Wang, Xiaofen;Ding, Xuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권10호
    • /
    • pp.2544-2560
    • /
    • 2013
  • As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.