• Title/Summary/Keyword: Hides

Search Result 78, Processing Time 0.024 seconds

A Study on the Improvement of Security Enhancement for ZTNA (보안성 강화를 위한 ZTNA운영 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.21-26
    • /
    • 2024
  • The security model in the previous network environment has a vulnerability in which resource access control for trusted users is not properly achieved using the Perimeter model based on trust. The Zero Trust is an absolute principle to assume that the users and devices accessing internal data have nothing to trust. Applying the Zero Trust principle is very successful in reducing the attack surface of an organization, and by using the Zero Trust, it is possible to minimize damage when an attack occurs by limiting the intrusion to one small area through segmentation. ZTNA is a major technology that enables organizations to implement Zero Trust security, and similar to Software Defined Boundary (SDP), ZTNA hides most of its infrastructure and services, establishing one-to-one encrypted connections between devices and the resources they need. In this study, we review the functions and requirements that become the principles of the ZTNA architecture, and also study the security requirements and additional considerations according to the construction and operation of the ZTNA solution.

Digital painting: Image transfonnation, simulation, heterologie and transfonnation (현대회화에서의 형태와 물질 -Digital Transfiguration에 관한 연구-)

  • Jeong, Suk-Yeong
    • Journal of Science of Art and Design
    • /
    • v.10
    • /
    • pp.161-181
    • /
    • 2006
  • The words which appeared in my theoretical study and work are image transformation to digital painting, simulation, heterologie and transfiguration, etc. Firstly, let's look into 'digital era' or 'new media era'. Nowadays, the image world including painting within the rapid social and cultural change, which is called as digital era, is having the dramatic change. Together with the development of scientific technology, large number of events which was deemed to be impossible is happening as real in image world Moreover, these changes in image world is greatly influencing to our life. The word which compresses this change of image world and shows is 'digital'. Digit, which means fingers in Latin, indicates separately changing signal, and to be more narrow, it indicates the continual signal of '0' and ' 1' in computer. The opposite word is 'analogue'. As analogue is the word meaning 'infer' or 'similarity', it indicates the signal or form which continuously changes along the series of time when it is compared to digital. Instead of analogue, digital is embossed as a major ruler along the whole area of our current culture. In whole culture and art area, and in whole generalscience, digital is appearing as it has the modernism and importance. The prefix, 'digital', e.g. digital media, digital culture, digital design, digital philosophy, etc, is treated as the synonym of modernism and something new. This advent of digital results the innovative change to the image world, creates the new beauty experience which we could not experience before, and forecasts the formation of advanced art and expansion of creative area. Various intellectual activities using computer is developing the whole world with making the infrastructure. Computer in painting work immediately accomplishes the idea of painters, takes part in simulation work, contingency such as abrupt reversal, extraction, twisting, shaking, obscureness, overlapping, etc, and timing to stimulate the creativity of painters, and provides digital formative language which enables new visual experience to the audience. When the change of digital era, the image appeared in my work is shown in 'transfiguration' like drawing. The word, 'transfiguration' does not indicate the completed and fixed real substance but indicate endlessly moving and floating shape. Thus, this concept is opposite to the substantial consideration, so that various concepts which is able to replace this in accordance with the similar cases are also exist such as change, deterioration, mutation, deformity of appearance and morphing which is frequently used in computer as a technical word. These concepts are not clearly classified, and variably and complicatedly related. Transfiguration basically means the denial of "objectivity' and '(continual) stagnation' or deviation from those. This phenomenon is appeared through the all art schools of art ever since the realism is denied in the 19th century. It is called as 'deformation' in case of expressionism, futurism, cubism, etc, in the beginning of the century, which its former indication is mostly preserved within the process of structural deviation and which has the realistic limit which should be preserved. On the contrary, dramatic transfiguration which has been showing in the modern era through surrealism is different in the point that dramatic transfiguration tends to show the deterioration and deviation rather than the preservation of indicated object. From this point, transfiguration coming out from morphing using computer deteriorates and hides the reality and furthermore, it replaces the 'reality'. Moreover, transfiguration is closely approached to the world of fake or 'imaginary' simulation world of Baudrillard. According to Baudrillard, the image hides and deteriorates the reality, and furthermore, expresses 'not existing' to 'imaginary' under the name of transfiguration. Certain reality, that is, image which is absent from the reality is created and overflowed, so that it finally replaces the reality. This is simulation as it is said by Baudrillard. In turn, Georges Bataille discusses about the image which is produced by digital technology in terms of heterologie. Image of heterologie is the visual signal which is established with the media. Image of media is to have the continuous characteristics of produce, extinction, and transformation, and its clear boundary between images becomes meaningless. The meaning of composition, excess, violation, etc of digital image is explained to heterological study or heteologie suggested as important meaning of Georges Bataille who is a heretic philosopher. As the form and image of mutation shows the shape in accordance with mechanical production, heterologie is introduced as very low materialism (or bas materialisme), in this theory. Heterologie as low materialism which is gradually changing is developing as a different concept and analysis because of the change of time in the late 20s century beside high or low meaning. Including my image, all images non-standardizes and transforms the code. However, reappearance and non-standardization of this code does not seem to be simple. The problem of transformation caused by transfiguration which appears in my digital drawing painting, simulation, heterologie, etc, are the continual problems. Moreover, the subject such as existence of human being, distance from the real life, politics and social problems are being extended to actual research and various expressing work. Especially, individual image world is established by digital painting transfiguration technique, and its change and review start to have the durability. The consciousness of observers who look at the image is changing the subject. Together with theoretical research, researchers are to establish the first step to approach to various image change of digital era painting through transfiguration technique using our realistic and historical image.

  • PDF

kNN Query Processing Algorithm based on the Encrypted Index for Hiding Data Access Patterns (데이터 접근 패턴 은닉을 지원하는 암호화 인덱스 기반 kNN 질의처리 알고리즘)

  • Kim, Hyeong-Il;Kim, Hyeong-Jin;Shin, Youngsung;Chang, Jae-woo
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1437-1457
    • /
    • 2016
  • In outsourced databases, the cloud provides an authorized user with querying services on the outsourced database. However, sensitive data, such as financial or medical records, should be encrypted before being outsourced to the cloud. Meanwhile, k-Nearest Neighbor (kNN) query is the typical query type which is widely used in many fields and the result of the kNN query is closely related to the interest and preference of the user. Therefore, studies on secure kNN query processing algorithms that preserve both the data privacy and the query privacy have been proposed. However, existing algorithms either suffer from high computation cost or leak data access patterns because retrieved index nodes and query results are disclosed. To solve these problems, in this paper we propose a new kNN query processing algorithm on the encrypted database. Our algorithm preserves both data privacy and query privacy. It also hides data access patterns while supporting efficient query processing. To achieve this, we devise an encrypted index search scheme which can perform data filtering without revealing data access patterns. Through the performance analysis, we verify that our proposed algorithm shows better performance than the existing algorithms in terms of query processing times.

Classical Hollywood Cinema with Music Theatre Features - in Reference to "Gone with the Wind" - (음악극적 특성이 강조된 고전영화 분석 -"바람과 함께 사라지다"의 사례를 중심으로)

  • Oh, Sujin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.87-95
    • /
    • 2013
  • "Gone with the wind"(1939, Directed by Victor Fleming) was produced in the stylistic conventions of the classical hollywood cinema, and thus the musical employment also followed the norms of the style, such as late Romantic musical style, serving the narrative, signifier of emotion, and giving continuity and unity. But, at the same time, the statement of the classical theory that the music hides and tailors itself to support the drama - invisibility, inaudibility, narrative cuing and so on - does not seem to explain the musical employment of "Gone with the wind." On the contrary, it hires music to put itself forward, and often times it stops the narrative to show musical spectacles for which the image is tailored to fit the music. These are more of music theatre or music drama features rather than the conventional underscore of the films in that period. In this study analysed the musical employment of "Gone with the wind" to see how it took full advantage of music to lead the narrative in a more active way and to make musical spectacles, by borrowing the technique and style of music theatre, such as, overture and entr'acte, similarities with film musicals, Wagnerism influence, and the use of songs.

An Illegally-copied App Detecting Method by Using Odex File in Android Platform (안드로이드 플랫폼에서 odex 파일을 이용한 불법 복제 앱 탐지 방법)

  • Cho, Dueckyoun;Choi, Jaeyoung;Kim, Eunhoe;Gang, Gi-Du
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.67-75
    • /
    • 2015
  • According to the changes of the mobile environments, the usage and interest of the Android apps have been increased. But the usage of illegally-copied apps has been also increased. And the transparency and dependability of the app markets has been decreased. Therefore there are many cases for the copyright infringement of app developers. Although several methods for preventing illegally-copied apps have been studied, there may exist possible ways to bypass the methods. Since it is difficult to find out the first distributors of the illegally-copied apps, it is not easy to punish them legally. This paper proposes the method of detecting illegally-copied apps. The proposed detector can detect the illegally-copied apps using odex file, which is created when the app is installed. The detector can also find out the information of the first distributors based on forensic watermark technique. Since the illegally-copied app detector is running as a service on the system server, it is granted that the detector hides from the users. As an experiment result, the illegally-copied app detector takes on average within 0.2 seconds to detect and delete an illegally-copied app.

A Study on Seolmunhaeja and Jeongyeokwonui′s Twelve Earthly branches. (설문해자(說文解字)와 정역원의(正易原義)의 십이지(十二支)에 관(關)한 연구(硏究))

  • Hong, Jin-Im;Yun, Chang-Yeol
    • Journal of Haehwa Medicine
    • /
    • v.26 no.1
    • /
    • pp.33-48
    • /
    • 2017
  • Objective : Ten heavenly stems and twelve earthly branches are the important means to understand the orders of changes in heaven and earth. Method : We have so far looked into detailed explanations about twelve earthly branches in Seolmunhaeja, annotations in Seolmun of four major people, and commentaries in Jeongyeokwonui. Result & Conclusion : This can be also applied to the explanations of twelve early branches, as follows. In the $11^{th}$ month of the lunar calendar, the yang energy is finally born amid full of the ying energy. In the $12^{th}$ month, the yang energy prepares to break through the knots of the ying energy and gets ready to come out of the ground. In the first month, three kinds of the yang energy start to become vigorous and active. In the second month, the yang energy gains more force, sprouting various plants on the ground. In the third month, the yang energy arouse further, strengthening and growing plants. In the fourth month, all the yang energy is released, while the ying energy is still hiding. In the fifth month, one ying energy is born amid full of the yang energy, and there are interchanges between the yang energy and the ying energy. In the sixth month, the yang energy is still strong and vigorous, ripening the fruits in the fields. In the seventh month, the yang energy starts to hurt all creation. In the eighth month, the ying energy starts to flourish, and the yang energy starts to decline, diminishing all creation and, however, still ripening grains to be harvested. In the ninth month, one yang energy starts to hide from sight, not working its duty, while five kinds of the ying energy start to annihilate all creation. Finally, in the tenth month, the small yang energy hides to be rebirthed amid the flux and reflux of the ying-yang energy. The creative and unique interpretation of Jeongyeokwonui about twelve earthly branches is worth to be referred. It is definitely beyond the other existing explanations, as it incorporates trigrams and hexagrams from I Ching (Book of Changes) and the five primary substances.

  • PDF

The linguistic characteristics of Chinese character and Reading for the Analects of Confucius (한자(漢字)의 언어적 특성과 『논어(論語)』 읽기)

  • Kim, Sang-Rae
    • The Journal of Korean Philosophical History
    • /
    • no.30
    • /
    • pp.191-225
    • /
    • 2010
  • This paper is the outcome of attempting to approach for reading the Analects of Confucius through the polysemy of Chinese character and indecidability of articles. For this purpose at first, I explained which this Chinese character can be applied for 'philosophy language'. In the 16th century Matteo Ricci had tried to find out the possibility of ideographic script as standing for a universal language. On the other hand, Hegel and Heidegger strictly insisted on the Chinese character is inappropriate for expressing the logic thought of the human being. The reason was as next; firstly, this character had not the preposition and articles, and secondly the only one word could not indicates the bisemy including the meaning of opposition, lastly this language system expresses and communicates only with the change of word order without inflection. But With some scholar like Cassirer, Saussure and Derrida we can confirm the possibility which will discover the Chinese character for using the logic and reasoning language of from different view. Because in the language system of this Chinese character the connection of words in contexts is more important other than meaning as the individual word, in comparison to the language of the West. The Chinese character hides the original meaning until being what kind of event and thing relationship watch inside with different letters. So to speak, the Chinese character is called as 'language of indecidability'. For these points, even though The Chinese character lacks of preposition, articles, and inflection speech etc. the letter systematic, this language system can play a role for expressing as the philosophic language which manages with the complicated problems of the human being.

OPERATIONAL MODEL OF TIME-KEEPING SYSTEMS OF HEUMGYEONGGAK-NU (흠경각루 시보시스템의 작동모델)

  • KIM, SANG HYUK;YUN, YONG-HYUN;MIHN, BYEONG-HEE;LEEM, BYONG GUEN;YOON, MYUNG KYOON;LEEM, BYONG SI
    • Publications of The Korean Astronomical Society
    • /
    • v.34 no.3
    • /
    • pp.31-40
    • /
    • 2019
  • We study the internal structure under the artificial mountain of Heumkyeonggak-nu, a Korean water-powered clock in the early Joseon dynasty. All the puppets on the artificial mountain are driven by the rotational force generated by the water wheel at their designated time. We design a model that work with three parts of the artificial mountain. At the upper part of the artificial mountain to the east, west, north and south, there are four puppets called the Four Mystical Animal Divinity and four ladies called the Jade Lady respectively. The former rotates a quarter every double hour and the latter rings the bell every hour. In the middle part of this mountain is the timekeeping platform with four puppets; the Timekeeping Official (Hour Jack), the Bell-, Drum-, and Gong-Warriors. The Hour Jack controls time with three warriors each hitting his own bell, drum, and gong, respectively. In the plain there are 12 Jade Lady puppets (the lower ladies) combined with 12 Oriental Animal Deity puppets. In his own time a lady doll pops out of the hole and her animal doll gets up. Two hours later, the animal deity lies down and his lady hides in the artificial plain. These puppets are regularly moved by the signal such as iron balls, bumps, levers, and so on. We can use balls and bumps to explain the concept of the Jujeon system. Iron balls were used to manipulate puppets of the timekeeping mechanism in Borugak-nu, another Korean water-powered clock in Joseon dynasty, which was developed earlier than Heumgyeonggak-nu. According to the North Korea's previous study (Choi, 1974), it is obvious that bumps were used in the internal structure of Heumgyeonggak-nu. In 1669, The armillary clock made by Song, I-young was also utilized bumps. Finally we presented mock-ups of three timekeeping systems.