• 제목/요약/키워드: Data protection

검색결과 3,440건 처리시간 0.036초

OBJECT에 의한 운영체제의 구성에 대한 연구 (Object-Based Operating System)

  • 이창수
    • 한국통신학회논문지
    • /
    • 제8권1호
    • /
    • pp.23-29
    • /
    • 1983
  • 본 논문은 신뢰성과 abstract data type을 효과적으로 뒷받침할 수 있도록 object에 기초를 둔 운영체제의 구성에 대하여 논하였다. 신뢰성을 위하여 모든 object는 capability에 의해서만 access가 가능하도록 access right을 규정하였으며 모든 program 모듈은 protection domain을 갖도록 하여 이에 대한 효율적인 domain변경이 제시되었다. 또한 abstract data type을 위하여 type manager를 이용하였다.

  • PDF

개인정보 처리방침(Privacy Policy) 공개에 관한 주요 4개국 법제 비교분석 (A Comparative Analysis of the Legal Systems of Four Major Countries on Privacy Policy Disclosure)

  • 정태철;권헌영
    • 한국IT서비스학회지
    • /
    • 제22권6호
    • /
    • pp.1-15
    • /
    • 2023
  • This study compares and analyzes the legal systems of Korea, the European Union, China, and the United States based on the disclosure principles and processing policies for personal data processing and provides references for seeking improvements in our legal system. Furthermore, this research aims to suggest institutional implications to overcome data transfer limitations in the upcoming digital economy. Findings on a comparative analysis of the relevant legal systems for disclosing privacy policies in four countries showed that Korea's privacy policy is under the eight principles of privacy proposed by the OECD. However, there are limitations in the current situation where personal information is increasingly transferred overseas due to direct international trade e-commerce. On the other hand, the European Union enacted the General Data Protection Regulation (GDPR) in 2016 and emphasized the transfer of personal information under the Privacy Policy. China also showed differences in the inclusion of required items in its privacy policy based on its values and principles regarding transferring personal information and handling sensitive information. The U.S. CPRA amended §1798.135 of the CCPA to add a section on the processing of sensitive information, requiring companies to disclose how they limit the use of sensitive information and limit the use of such data, thereby strengthening the protection of data providers' rights to sensitive information. Thus, we should review our privacy policies to specify detailed standards for the privacy policy items required by data providers in the era of digital economy and digital commerce. In addition, privacy-related organizations and stakeholders should analyze the legal systems and items related to the principles of personal data disclosure and privacy policies in major countries so that personal data providers can be more conveniently and accurately informed about processing their personal information.

빅데이터 환경에서 개인정보 익명화를 통한 보호 방안 (Anonymity Personal Information Secure Method in Big Data environment)

  • 홍성혁;박상희
    • 융합정보논문지
    • /
    • 제8권1호
    • /
    • pp.179-185
    • /
    • 2018
  • 빅데이터는 이제 더 이상 미래 혁신의 아이콘이 아니라 인류가 당면한 과제를 해결하기 위한 하나의 수단으로써 공고히 자리매김해 가고 있다. 빅데이터의 활용과 개인정보 보호는 분명 양면성을 갖고 있다. 데이터의 활용을 강조할 경우 개인이 공개를 원하지 않는 사생활은 필연적으로 침해 될 것이고, 개인정보 보호를 강조할 경우 어설픈 수준의 빅데이터 연구만 가능해 공공의 목적을 달성 하는데 어려움을 겪을 수 있다. 본 연구에서는 개인정보 침해의 문제점을 알아보고 빅데이터의 활용과 개인정보의 보호를 하기 위해서 취합하는 빅데이터를 익명화하는 방안을 제시하였다. 이를통해 빅데이터 활용 뿐만 아니라 개인정보 침해의 문제점을 해결할 수 있을 것으로 보인다.

데이터 기본법과 개인정보보호 이슈에 관한 고찰 (A Study on the Data Basic Law and the Personal Information Security Issue)

  • 김종원;박진형
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2022년도 춘계학술대회
    • /
    • pp.9-11
    • /
    • 2022
  • 4차산업혁명 및 데이터 경제의 지속성장과 활성화를 위해 국내에서는 세계 최초로 '데이터 기본법'을 제정하여 시행하고 있다. 하지만 해당 법률은 데이터산업의 활성화와 데이터자산의 보호를 다루기는 데이터의 생산, 유통 및 이용 활성화를 우선으로 하고 있어서 개인정보보호법이나 저작권법보다 우선 적용·해석 될 수 있다. 이에 본 논문에서 데이터기본법의 주요내용을 살펴보고, 개인정보 이슈를 고찰해 보고자 한다.

  • PDF

An Improved Detection Technique for Spread Spectrum Audio Watermarking with a Spectral Envelope Filter

  • Jung, Sa-Rah;Seok, Jong-Won;Hong, Jin-Woo
    • ETRI Journal
    • /
    • 제25권1호
    • /
    • pp.52-54
    • /
    • 2003
  • We propose an improved algorithm for detecting audio watermarks based on a spread spectrum in the spectral domain. Since the energy of a watermark is much smaller than that of the cover audio data, pre-processing to reduce the effect of the cover data is needed to reliably extract watermarks. We introduce a spectral envelope filter as a pre-process that enhances detecting performance by filtering out the intrinsic spectral character of cover data. The proposed watermarking structure can be easily included in the compression system and can extract watermarks from partially decompressed spectral data. Our experimental results demonstrate that with a bit error rate of around 10 dB against general attacks, the proposed detecting scheme works better than detectors without the spectral filter.

  • PDF

3D프린터용 설계데이터의 저작권보호와 원격출력을 지원하는 오픈 마켓 시스템 개발 (Development of a 3D Printing Open-market System for Copyright Protection and Remote 3D Printing)

  • 김성균;유우식
    • 대한산업공학회지
    • /
    • 제41권3호
    • /
    • pp.253-258
    • /
    • 2015
  • The 3D printing is any of various processes for making a three dimensional object of almost any shape from a 3D model. Recently, a rapidly expanding hobbyist and home-use market has become established with the inauguration of the open-source RepRap and Fab@Home projects. However, this causes problems regarding copyright protection and usage of illegal 3D data. In this paper, we developed a 3D printing open-market system, which guarantees copyright protection using the remote 3D printing without direct distribution of 3D design data. Because most of the home-use 3D printers are FFF (Fused Filament Fabrication) based on NC code system, open-market system uses FFF 3D printers. Also, open-market system inspects the uploaded 3D model data, so the system can prevent distribution of illegal model data such as weapons, etc.

A New Copyright Protection Scheme for Depth Map in 3D Video

  • Li, Zhaotian;Zhu, Yuesheng;Luo, Guibo;Guo, Biao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권7호
    • /
    • pp.3558-3577
    • /
    • 2017
  • In 2D-to-3D video conversion process, the virtual left and right view can be generated from 2D video and its corresponding depth map by depth image based rendering (DIBR). The depth map plays an important role in conversion system, so the copyright protection for depth map is necessary. However, the provided virtual views may be distributed illegally and the depth map does not directly expose to viewers. In previous works, the copyright information embedded into the depth map cannot be extracted from virtual views after the DIBR process. In this paper, a new copyright protection scheme for the depth map is proposed, in which the copyright information can be detected from the virtual views even without the depth map. The experimental results have shown that the proposed method has a good robustness against JPEG attacks, filtering and noise.

한국전력 송전계통 보호 데어터베이스 구축 (A Development of Power Transmission System Protection Database for Korea Electric Power Company)

  • 안영태;이승재;최면성;강상희;김호표;이운희;최홍석
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제48권7호
    • /
    • pp.847-854
    • /
    • 1999
  • The setting of protective relays, which is critical to the power system security and reliability, requires a huge volume of data processing and repetitive calculation. Since it has been performed by relay engineers manually, it is vulnerable to human errors, its computerization has been pursued, in which the efficient management of the data is the key to the success. The database for power system protection must accommodate not only the power system network data but also a variety of protective devices. Also its information should be able to be viewed and updated with easy by operators and by computer programs. This paper describes several existing database designs for power system protection, their advantages and disadvantages. Also this paper has identified the required function and designed the database for the KEPCO power system data structure for the benefit of the relay setting process, etc..

  • PDF

빅데이터 환경에서 개인민감정보 보호 방안 및 대응책: 서베이 (Private information protection method and countermeasures in Big-data environment: Survey)

  • 홍성혁
    • 한국융합학회논문지
    • /
    • 제9권10호
    • /
    • pp.55-59
    • /
    • 2018
  • 4차 산업혁명 시대에 혁심기술인 빅데이터는 보건, 금융, 유통, 공공부문, 제조업, 마케팅 등 다양한 분야에서 서비스를 제공하고 있으며, 정확하고 신속한 데이터 분석을 통하여 마케팅 분석과 미래 설계에 매우 유용한 기술이며, 앞으로 더 발전할 가능성이 매우 높다. 하지만, 빅데이터 활용 시 가장 큰 문제점이 개인정보 보호와 프라이버시 문제이다. 빅데이터를 이용하여 분석을 통해 기존에 알지 못했던 개인의 취향 및 행동을 분석될 수도 있고, 이러한 정보들은 개인의 민감한 정보이자 개인의 프라이버시 침해가 될 수 있다. 따라서 본 논문에서는 빅데이터 환경에서 개인정보를 활용할 때 발생 가능한 개인정보 침해에 대한 필요 사항들을 분석하여, 그에 따른 필요한 개인정보보호 기술을 제안하여 개인정보 보호와 사생활 보호에 기여하고자 한다.

잊혀질 권리의 논의 동향과 우리나라 인터넷 법제의 수용과제 (Trend of Dispute on the Right to Be Forgotten and Acceptance Task of Internet Laws in Korea)

  • 정상기;김경열
    • 한국IT서비스학회지
    • /
    • 제12권1호
    • /
    • pp.131-141
    • /
    • 2013
  • Matters related to the right to be forgotten started the dispute Europe to introduce it first when Data Protection Directive established in 1995 proceeded revision. Relating to this, diverse disputes proceed on responding to personal information protection and internet laws in our nation. Especially as our National Assembly submitted the law regarding the promotion of information and communication network use and protection of information and amendment of copyright, it is necessary to look into the movement on introduction of law of right to be forgotten closely in detail. EU which attempted the institutionalization for the first time, relating to review of General Data Protection Regulation, proposed opinions such as the necessity to define subjects of personal information concretely and specifically and or protection target and balanced consideration on freedom of expression which is constitutional value. In the case of our nation, there was legislation attempt to introduce the regulation but it was limited in the form of fallen effectiveness without concrete and detailed review on internet law. To solve such problems, it is necessary to look into issues and matters to be considered required to accept right to be forgotten closely and discuss possibility of introducing right to be forgotten, conflicts between fundamental rights becoming issue, effect of goal achievement of personal information protection through the system introduction, and other rational acceptance method.