• Title/Summary/Keyword: DB Protection

Search Result 81, Processing Time 0.028 seconds

Antidiabetic and Beta Cell-Protection Activities of Purple Corn Anthocyanins

  • Hong, Su Hee;Heo, Jee-In;Kim, Jeong-Hyeon;Kwon, Sang-Oh;Yeo, Kyung-Mok;Bakowska-Barczak, Anna M.;Kolodziejczyk, Paul;Ryu, Ok-Hyun;Choi, Moon-Ki;Kang, Young-Hee;Lim, Soon Sung;Suh, Hong-Won;Huh, Sung-Oh;Lee, Jae-Yong
    • Biomolecules & Therapeutics
    • /
    • v.21 no.4
    • /
    • pp.284-289
    • /
    • 2013
  • Antidiabetic and beta cell-protection activities of purple corn anthocyanins (PCA) were examined in pancreatic beta cell culture and db/db mice. Only PCA among several plant anthocyanins and polyphenols showed insulin secretion activity in culture of HIT-T15 cells. PCA had excellent antihyperglycemic activity (in terms of blood glucose level and OGTT) and HbA1c-decreasing activity when compared with glimepiride, a sulfonylurea in db/db mice. In addition, PCA showed efficient protection activity of pancreatic beta cell from cell death in HIT-T15 cell culture and db/db mice. The result showed that PCA had antidiabetic and beta cell-protection activities in pancreatic beta cell culture and db/db mice.

sDBMS for Hacking Prevention on Based PMI for Contents Protection in Web Environment (Web 환경에서 컨텐츠 보호를 위한 PMI 기반의 해킹방지 sDBMS)

  • Ryoo Du-Gyu;Kim Young-Chul;Jun Moon-Seog
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.5
    • /
    • pp.679-690
    • /
    • 2005
  • Business model in Web environments is usually provided by multimedia data. Information exchange between users and service providers should be made in encrypted data. Encrypted data are secure from being hacked. Application of DB encryption is a main technology for contents protection. We have applied the access control based on RBAC and prevented the unauthorized users from using the contents. In this paper, we propose a new DB encryption scheme which uses RHAC and digital signature based on PMI.

  • PDF

sDBMS for Hacking Prevention Based on PMI for Web Contents Protection (Web컨텐츠 보호를 위한 PMI 기반의 해킹방지 sDBMS)

  • Eyoo, Du-Gyu;Jun, Mun-Suk
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.8
    • /
    • pp.829-840
    • /
    • 2004
  • Business model in Web environments is usually provided by digital data. Information exchange of users and service providers should be performed by encryted data. Encrypted protection. In this paper, We have prevented using contents by users is not accessed based on RBAC. in this paper, We propose a new DB encryption scheme which use RBAC and digital signature based on PMI.

  • PDF

Whole body hypoxic preconditioning-mediated multiorgan protection in db/db mice via nitric oxide-BDNF-GSK-3β-Nrf2 signaling pathway

  • Li, Yuefang;Huang, Yan;Cheng, Xi;He, Youjun;Hu, Xin
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.25 no.4
    • /
    • pp.281-296
    • /
    • 2021
  • The beneficial effects of hypoxic preconditioning are abolished in the diabetes. The present study was designed to investigate the protective effects and mechanisms of repeated episodes of whole body hypoxic preconditioning (WBHP) in db/db mice. The protective effects of preconditioning were explored on diabetes-induced vascular dysfunction, cognitive impairment and ischemia-reperfusion (IR)-induced increase in myocardial injury. Sixteen-week old db/db (diabetic) and C57BL/6 (non-diabetic) mice were employed. There was a significant impairment in cognitive function (Morris Water Maze test), endothelial function (acetylcholine-induced relaxation in aortic rings) and a significant increase in IR-induced heart injury (Langendorff apparatus) in db/db mice. WBHP stimulus was given by exposing mice to four alternate cycles of low (8%) and normal air O2 for 10 min each. A single episode of WBHP failed to produce protection; however, two and three episodes of WBHP significantly produced beneficial effects on the heart, brain and blood vessels. There was a significant increase in the levels of brain-derived neurotrophic factor (BDNF) and nitric oxide (NO) in response to 3 episodes of WBHP. Moreover, pretreatment with the BDNF receptor, TrkB antagonist (ANA-12) and NO synthase inhibitor (L-NAME) attenuated the protective effects imparted by three episodes of WBHP. These pharmacological agents abolished WBHP-induced restoration of p-GSK-3β/GSK-3β ratio and Nrf2 levels in IR-subjected hearts. It is concluded that repeated episodes of WHBP attenuate cognitive impairment, vascular dysfunction and enhancement in IR-induced myocardial injury in diabetic mice be due to increase in NO and BDNF levels that may eventually activate GSK-3β and Nrf2 signaling pathway to confer protection.

A Proposal of Personal Information DB Encryption Assurance Framework (개인정보 DB 암호화 검증 프레임웍 제안)

  • Ko, Youngdai;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.397-409
    • /
    • 2014
  • According to the Personal Information Protection Act(PIPA) which is legislated in March 2011, the individual or company that handles personal information, called Personal information processor, should encrypt some kinds of personal information kept in his Database. For convenience sake we call it DB Encryption in this paper. Law enforcement and the implementation agency accordingly are being strengthen the supervision that the status of DB Encryption is being properly applied and implemented as the PIPA. However, the process of DB Encryption is very complicate and difficult as well as there are many factors to consider in reality. For example, there are so many considerations and requirements in the process of DB Encryption like pre-analysis and design, real application and test, etc.. And also there are surely points to be considered in related system components, business process and time and costs. Like this, although there are plenty of factors significantly associated with DB Encryption, yet more concrete and realistic validation entry seems somewhat lacking. In this paper, we propose a realistic DB Encryption Assurance Framework that it is acceptable and resonable in the performance of the PIPA duty (the aspect of the individual or company) and standard direction of inspection and verification of DB Encryption (the aspect of law enforcement).

Analysis and Technical Consideration for the Rules on Television White Space (TVWS 대역 규정에 관한 분석 및 기술적 고려)

  • Kim, Young-Soo;Cho, Sang-In;Jeong, Byung-Jang
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.8
    • /
    • pp.923-933
    • /
    • 2012
  • In this paper, we propose the technical considerations for the rules on television white space(TVWS), that becomes a center of public notice, in terms of incumbent services protection, technical requirements of television band devices (TVBDs) and administration of TV band databases. The basic idea behind the proposed method is based on the perfect protection of incumbent services such as digital television and wireless microphone. It has been found that FCC's approach has the advantage that a list of available channels and transmission power are provided for TVBDs faster than Ofcom's approach that requires DB to perform the algorithm for determining frequencies and transmission power for TVBDs everytime DB is asked from TVBDs.

Data Fragmentation Protection Technique for the Performance Enhancement of DB-Based Navigation Supporting Incremental Map Update (점증적인 맵 갱신을 지원하는 DB 기반 내비게이션의 성능 향상을 위한 데이터 단편화 방지 기법)

  • Kim, Yong Ho;Kim, Jae Kwang;Jin, Seongil
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.3
    • /
    • pp.77-82
    • /
    • 2020
  • Most of the navigation in the vehicle has been developed based on a complex structure of PSF(Physical Storage Format) files, making it difficult to support incremental map updates. DB-based navigation is drawing attention as a next-generation navigation method to solve this problem. In DB-based navigation that supports incremental map updates, data fragmentation due to continuous map data updates can increase data access costs, which can lead to a decrease in search performance. In this paper, as one of the performance enhancement methods of DB-based navigation that supports incremental map updates, data fragmentation prevention techniques were presented and the performance improvement effect was verified through actual implementation.

A Study on Data Protection and Performance Analysis by Cryptographic Algorithm in MongoDB Environment (MongoDB 환경에서의 데이터보호 및 암호알고리즘별 성능분석에 대한 연구)

  • Lee, Sun-Ju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.133-136
    • /
    • 2019
  • 본 고에서는 약 100 만건의 건강정보를 이용하여 3-Node MongoDB 플랫폼 환경에서 AES, 3DES, ARIA 암호 알고리즘을 이용하여 암호화를 적용하는 방법을 알아본다. 각각의 암호 알고리즘별로 YCSB 성능테스트 툴을 이용하여 다양한 Workload 별로 성능을 테스트를 수행한 뒤, 그 결과를 비교·정리한다.

Development of Traffic Centralized Control System Based on Protocol Redirection for DB Protection (DB 보호를 위한 Protocol Redirection기반 트래픽 중앙통제시스템 개발)

  • Su, Yang-Jin;Lee, Jae-Pil;Park, Cheon-O;Lee, Deok-Gyu;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1212-1220
    • /
    • 2010
  • The technologies of domestic user programs are not enough to convert address convert information, which was collected via port redirection server, to user traffic. Generally traffic redirection technology is a special purpose technology for I/O traffic via network device. L4 switch needs various additional costs and devices to achieve this special purpose. To solve this problem, there appears need for a central management of control and monitoring by centralizing traffic at one position regardless of network structure and it is necessary to realize redirection function of switch at network layer. Therefore this study offer development of traffic central control system through protocol redirection of client-side.

A Study on DSMS Framework for Data Security Certification (데이터보안인증을 위한 DSMS 프레임워크 구축 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.107-113
    • /
    • 2019
  • Data security is the planning, implementation and implementation of security policies and procedures for the proper audit and authorization of access to and use of data and information assets. In addition, data serviced through internal / external networks, servers, applications, etc. are the core objects of information protection and can be said to focus on the protection of data stored in DB and DB in the category of information security of database and data. This study is a preliminary study to design a proper Data Security Management System (DSMS) model based on the data security certification system and the US Federal Security Management Act (FISMA). And we study the major security certification systems such as ISO27001 and NIST's Cybersecurity Framework, and also study the state of implementation in the data security manager solution that is currently implemented as a security platform for preventing personal data leakage and strengthening corporate security.