• Title/Summary/Keyword: Data Security Control Model

Search Result 213, Processing Time 0.022 seconds

Predicting the popularity of TV-show through text mining of tweets: A Drama Case in South Korea

  • Kim, Do Yeon;Kim, Yoosin;Choi, Sang Hyun
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.131-139
    • /
    • 2016
  • This paper presents a workflow validation method for data-intensive graphical workflow models using real-time workflow tracing mode on data-intensive workflow designer. In order to model and validate workflows, we try to divide as modes have editable mode and tracing mode on data-intensive workflow designer. We could design data-intensive workflow using drag and drop in editable-mode, otherwise we could not design but view and trace workflow model in tracing mode. We would like to focus on tracing-mode for workflow validation, and describe how to use workflow tracing on data-intensive workflow model designer. Especially, it is support data centered operation about control logics and exchange variables on workflow runtime for workflow tracing.

A Secure Database Model based on Schema using Partition and Integration of Objects (객체의 분할과 통합에 의한 스키마 기반 데이타베이스 보안 모델)

  • Kang, Seog-Jun;Kim, Yoeng-Won;Hwang, Chong-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.5 no.1
    • /
    • pp.51-64
    • /
    • 1995
  • In distributed environments, the DB secure models have been being studied to include the multi-level mechanism which is effective to control access according to the level of the data value. These mechanisms have the problems. The first, it is impossible to maintain the global data which is protected in the multi-level mechanism. The second, the access and the relation of the data is not clear due to the access revocation between the local data and the global's. In this paper, we proposed the mechanism using shema. The mechanism doesn't have the access revocation, and provides the protection of the data and the control to the global data.

Innovative Model-Based PID Control Design for Bus Voltage Regulation with STATCOM in Multi-Machine Power Systems (STATCOM을 사용한 다기 전력 계통의 버스 전압 조절을 위한 모델 기반 PID 제어기 설계)

  • Kim, Seok-Kyoon;Lee, Young Il;Song, Hwachang;Kim, Jung-Su
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.4
    • /
    • pp.299-305
    • /
    • 2013
  • The complexity and severe nonlinearity of multi-machine power systems make it difficult to design a control input for voltage regulation using modern control theory. This paper presents a model-based PID control scheme for the regulation of the bus voltage to a desired value. To this end, a fourth-order linear system is constructed using input and output data obtained using the TSAT (Transient Security Assessment Tool); the input is assumed to be applied to the grid through the STATCOM (STATic synchronous COMpensator) and the output from the grid is a bus voltage. On the basis of the model, it is identified as to which open-loop poles of the system make the response to a step input oscillatory. To reduce this oscillatory response effectively, a model-based PID control is designed in such a way that the oscillatory poles are no longer problematic in the closed loop. Simulation results show that the proposed PID control dampens the response effectively.

Enhance Security Management for SNMPv3 using Task-Based Privacy Model (직무기반 보안모델을 이용한 SNMPv3 보안관리 강화)

  • 양기철;오승훈;신성권;김민수;권오범
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.3
    • /
    • pp.351-362
    • /
    • 2002
  • Today, management object using SNMP is not only covered network but also more privacy object like personal or billing data. To enforce security management, view-based access control model is introduced in SNMPv3. However, they are not designed to enforce more privacy object such as purpose and increase complexity of user management. Task-based access control can provide enhanced security service using purpose binding and leverage the complexity of user management using purpose of task.

  • PDF

A Study on User Authentication with Smartphone Accelerometer Sensor (스마트폰 가속도 센서를 이용한 사용자 인증 방법 연구)

  • Seo, Jun-seok;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1477-1484
    • /
    • 2015
  • With the growth of financial industry with smartphone, interest on user authentication using smartphone has been arisen in these days. There are various type of biometric user authentication techniques, but gait recognition using accelerometer sensor in smartphone does not seem to develop remarkably. This paper suggests the method of user authentication using accelerometer sensor embedded in smartphone. Specifically, calibrate the sensor data from smartphone with 3D-transformation, extract features from transformed data and do principle component analysis, and learn model with using gaussian mixture model. Next, authenticate user data with confidence interval of GMM model. As result, proposed method is capable of user authentication with accelerometer sensor on smartphone as a high degree of accuracy(about 96%) even in the situation that environment control and limitation are minimum on the research.

AI-based Cybersecurity Solution for Industrial Control System (산업제어시스템을 위한 인공지능 보안 기술)

  • Jo, Bu-Seong;Kim, Mun-Suk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.97-105
    • /
    • 2022
  • This paper explains trends in security technologies for ICS. Since ICS is usually applied to large-scale national main infrastructures and industry fields, minor errors caused by cyberattack could generate enormous economic cost. ICS has different characteristic with commonly used IT systems, so considering security threats of ICS separately with IT is needed for developing modern security technology. This paper introduce framework for ICS that analyzes recent cyberattack tactics & techniques and find out trends in Intrusion Detection System (IDS) which is representative technology for ICS security, and analyzes AI technologies used for IDS. Specifically, this paper explains data collection and analysis for applying AI techniques, AI models, techniques for evaluating AI Model.

Implementation of the Authorization Model for the Database Server of BADA-III system (바다-III 시스템의 데이타베이스 서버를 위한 권한부여 모델의 구현)

  • Kim, Young-Kyun;Cho, Ok-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.41-56
    • /
    • 1996
  • Database servers that are used to provide multimedia information services in World Wide Web(WWW) environment have to support the access control mechanism that allows authorized users to access the constructed databases. In this paper, we define an authorization model as well as authorization policies to enforce the proper access control on databases in the BADA-III object-oriented database server and propose an access evaluation algorithm. Also we implement this model and the algorithm in the BADA-III database server. Considering the service environment of the WWW, we expect that database service providers can simply and effectively protect their data using the proposed model.

Trust based Mutual Authentication Mechanism for Cloud Computing

  • Mandeeep Kaur;Prachi Garg
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.81-90
    • /
    • 2023
  • Cloud computing is an emerging business model popularized during the last few years by the IT industry. Providing "Everything as a Service" has shifted many organizations to choose cloud-based services. However, some companies still fear shifting their data to the cloud due to issues related to the security and privacy. The paper suggests a novel Trust based Mutual Authentication Mechanism using Secret P-box based Mutual Authentication Mechanism (TbMAM-SPb) on the criticality of information. It uses a particular passcodes from one of the secret P-box to act as challenge to one party. The response is another passcode from other P-box. The mechanism is designed in a way that the response given by a party to a challenge is itself a new challenge for the other party. Access to data is provided after ensuring certain number of correct challenge-responses. The complexity can be dynamically updated on basis of criticality of the information and trust factor between the two parties. The communication is encrypted and time-stamped to avoid interceptions and reuse. Overall, it is good authentication mechanism without the use of expensive devices and participation of a trusted third party.

Intension to Use Mobile Banking: An Integration of Theory of Planned Behaviour (TPB) and Technology Acceptance Model (TAM)

  • Amrutha Sasidharan;Santhi Venkatakrishnan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.1059-1074
    • /
    • 2024
  • The paper is an attempt to study the individual's intention to use mobile banking. In light of the results obtained from the study, the proposed model offers a better fit with the data and explains the intention of individuals to use mobile banking services. Government support, trust, and compatibility significantly contribute to the Perceived behavioral control of a bank customer to use mobile banking while Perceived ease of use, Perceived usefulness, Security and privacy, and risk have a significant positive impact on the attitude of the individuals to utilize mobile banking service. The study uses primary data and the final instrument was administered to 950 respondents, across the country of which 904 data were used for the analysis after editing to accommodate the missing values. The study has adopted structural equation modeling approach to analyze the relationships between the variables in the study. The proposed framework in this study can be utilized to identify the factors that promote the adoption of mobile banking practices and the study also has the potential to provide updated and comprehensive literature on mobile banking, which can accelerate future research in this field.

The Brainwave Analyzer of Server System Applied Security Functions (보안기능을 강화한 뇌파 분석 서버시스템)

  • Choi, Sung-Ja;Kang, Byeong-Gwon;Kim, Gui-jung
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.343-349
    • /
    • 2018
  • Electroencephalograph(EEG) information, which is an important data of brain science, reflects various levels of information from the molecular level to the behavior and cognitive stages, and the explosively amplified information is provided at each stage. Therefore, EEG information is an intrinsic privacy area of an individual, which is important information to be protected. In this paper, we apply spring security to web based system of spring MVC (Model, View, Control) framework to build independent and lightweight server system with powerful security system. Through the proposal of the platform type EEG analysis system which enhances the security function, the web service security of the EEG information is enhanced and the privacy of the EEG information can be protected.