• 제목/요약/키워드: Key sharing

검색결과 612건 처리시간 0.027초

국내 간호사의 재난간호 역량: 주제범위 문헌고찰 (The Competency in Disaster Nursing of Korean Nurses: Scoping Review)

  • 이은자;양정은
    • 동서간호학연구지
    • /
    • 제27권2호
    • /
    • pp.153-165
    • /
    • 2021
  • Purpose: The aim of study was to identify ranges of Korean nurses' competency in disaster nursing. Methods: A scoping review was conducted using the Joanna Briggs Institute methodology. The review used information from four databases: RISS, ScienceON, EBSCO Discovery Service, and CINAHL. In this review, key words were 'disaster', 'nurs*', 'competenc*', 'ability' and 'preparedness'. Inclusion and exclusion criteria were identified as strategies to use in this review. The inclusion criteria for this review focused on the following: Korean nurse, articles related to disaster nursing competency, peer-review articles published in the full text in Korean and English. Review articles were excluded. Results: Nineteen studies were eligible for result extraction. A total of 10 categories of disaster nursing competency were identified: Knowledge of disaster nursing, crisis management, disaster preparation, information collection and sharing, nursing record and document management, communication, disaster plan, nursing activities in disaster response, infection management, and chemical, biological, radiation, nuclear, and explosive management. Conclusion: It is necessary to distinguish between Korean nurses' common disaster nursing competency, professional disaster nursing competency, and disaster nursing competency required in nursing practice. Therefore, future research will be needed to explore and describe disaster nursing competency.

A Dynamic QoS Adjustment Enabled and Load-balancing-aware Service Composition Method for Multiple Requests

  • Wu, Xiaozhu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권3호
    • /
    • pp.891-910
    • /
    • 2021
  • Previous QoS-aware service composition methods mainly focus on how to generate composite service with the optimal QoS efficiently for a single request. However, in the real application scenarios, there are multiple service requests and multiple service providers. It is more important to compose services with suboptimal QoS and maintain the load balance between services. To solve this problem, in this paper, we propose a service composition method, named as dynamically change and balancing composition method (DCBC). It assumes that the QoS of service is not static, and the services can adjust the value of QoS to gain more opportunities to be selected for composition. The method mainly includes two steps, which are the preprocessing step and the service selection step. In the preprocessing step, a backward global best QoS calculation is performed which regarding the static and dynamic QoS respectively; then guided by the global QoS, the feasible services can be selected efficiently in the service selection step. The experiments show that the DCBC method can not only improve the overall quality of composite services but also guarantee the fulfill ratio of requests and the load balance of services.

블록체인 소프트웨어의 취약점을 이용한 OS 커맨드 인젝션 공격에 대한 연구 (Analysis of Blockchain Software Vulnerability against OS Command Injection Attack)

  • 김병국;허준범
    • 정보보호학회논문지
    • /
    • 제29권2호
    • /
    • pp.309-320
    • /
    • 2019
  • 블록체인 기술은 비트코인과 함께 알려졌으며, 급진적인 암호화폐의 성장과 함께 주요 기술로 인식되었다. 블록체인을 활용하기 위한 노력은 다양한 분야에서 이어지고 있으며 지속해서 발전하고 있다. 하지만 블록체인의 발전과 함께 블록체인을 위협하는 보안사고도 증가하고 있다. 이러한 문제를 해결하기 위해 블록체인의 다양한 보안 위협 중 블록체인 소프트웨어의 구현상 문제점을 분석하겠다. 본 논문에서는 블록체인 소프트웨어 중 오픈소스로 개발되는 암호화폐를 보안 관점에서 바라보며 소스코드에 존재하는 취약점을 분석하고, 취약점을 이용한 OS 커맨드 인젝션 공격에 대해 알아보겠다.

Energy Efficiency Optimization for multiuser OFDM-based Cognitive Heterogeneous networks

  • Ning, Bing;Zhang, Aihua;Hao, Wanming;Li, Jianjun;Yang, Shouyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.2873-2892
    • /
    • 2019
  • Reducing the interference to the licensed mobile users and obtaining the energy efficiency are key issues in cognitive heterogeneous networks. A corresponding rate loss constraint is proposed to be used for the sensing-based spectrum sharing (SBSS) model in cognitive heterogeneous networks in this paper. Resource allocation optimization strategy is designed for the maximum energy efficiency under the proposed interference constraint together with average transmission power constraint. An efficiency algorithm is studied to maximize energy efficiency due to the nonconvex optimal problem. Furthermore, the relationship between the proposed protection criterion and the conventional interference constraint strategy under imperfect sensing condition for the SBSS model is also investigated, and we found that the conventional interference threshold can be regarded as the upper bound of the maximum rate loss that the primary user could tolerate. Simulation results have shown the effectiveness of the proposed protection criterion overcome the conventional interference power constraint.

Evolution of PKI Internet Banking in Korea

  • Park, Seungchul
    • International journal of advanced smart convergence
    • /
    • 제8권1호
    • /
    • pp.44-57
    • /
    • 2019
  • Most banks in Korea have provided Internet banking services based on PKI(Public Key Infrastructure) certificates since the early 2000s when Internet banking began in Korea. To support PKI Internet banking, the Korean government backed the electronic signature law and supported the rapid spread of PKI-based Internet banking by regulating the application of PKI certificates to be compulsory in Internet banking until 2015. PKI Internet Banking in Korea has been developed as a pioneer in this field through many challenges and responses until its present success. Korea's PKI banking, which started with soft-token-based closed banking, has responded to various types of cyber attack attempts and promoted the transition to open banking by accepting various criticisms due to lack of compatibility with international standards. In order to improve the convenience and security of PKI Internet banking, various attempts have been made, such as biometric-integrated smartphone-based PKI authentication. In this paper, we primarily aim to share the experience and lessons of PKI banking by analyzing the evolution process of PKI Internet banking in Korea. It also has the purpose of presenting the challenges of Korea's PKI Internet banking and sharing its development vision.

SC20를 통해 본 HPC 기술 동향 (HPC Technology Through SC20)

  • 어익수;모희숙;박유미;한우종
    • 전자통신동향분석
    • /
    • 제36권3호
    • /
    • pp.133-144
    • /
    • 2021
  • High-performance computing (HPC) is the underpinning for many of today's most exciting new research areas, to name a few, from big science to new ways of fighting the disease, to artificial intelligence (AI), to big data analytics, to quantum computing. This report captures the summary of a 9-day program of presentations, keynotes, and workshops at the SC20 conference, one of the most prominent events on sharing ideas and results in HPC technology R&D. Because of the exceptional situation caused by COVID-19, the conference was held entirely online from 11/9 to 11/19 2020, and interestingly caught more attention on using HPC to make a breakthrough in the area of vaccine and cure for COVID-19. The program brought together 103 papers from 21 countries, along with 163 presentations in 24 workshop sessions. The event has covered several key areas in HPC technology, including new memory hierarchy and interconnects for different accelerators, evaluation of parallel programming models, as well as simulation and modeling in traditional science applications. Notably, there was increasing interest in AI and Big Data analytics as well. With this summary of the recent HPC trend readers may find useful information to guide the R&D directions for challenging new technologies and applications in the area of HPC.

외측상과염의 추나 치료에 대한 체계적 문헌 고찰 (Chuna Manual Therapy for Lateral Epicondylitis: A Systematic Review)

  • 한다영;이지윤;남수현;손정민;정다해;조혜미
    • 한방재활의학과학회지
    • /
    • 제32권3호
    • /
    • pp.65-75
    • /
    • 2022
  • Objectives This study was conducted to analyze the therapeutic effect of Chuna therapy for lateral epicondylitis. Methods Key words such as lateral epicondylitis and Chuna were searched in 10 databases (National Digital Science Library [NDSL], Oriental Medicine Advanced Searching Integrated System [OASIS], Research Information Sharing Service [RISS], Koreanstudies Information Service [KISS], KMBASE, Cochrane Library, PubMed, EMBASE, J-STAGE, China Academic Jurnals [CAJ]), and only suitable randomized controlled trials (RCTs) were selected. Results 8 RCTs were finally selected, and Chuna therapy showed positive results for lateral epicondylitis compared to western medicine, acupuncture, warm-acupuncture and Chinese medicine iontophoresis. Conclusions In this study, we finally reviewed 8 studies about Chuna therpay used for lateral epicondylitis. The studies showed that Chuna therapy is effective in treating lateral epicondylitis. However, because all of selected studies were found in Chinese database, more high-quality clinical trials about Chuna therapy for lateral epicondylitis are needed in Korea.

A Study on the Organizational Resilience of Netflix

  • Song, Minzheong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제14권3호
    • /
    • pp.40-50
    • /
    • 2022
  • The purpose of this study is to prove the global OTT, Netflix's organizational resilience (OR). For this, we review previous literatures regarding Netflix's OR and the theoretical logic of the OR. Then, we investigate Netflix's organizational culture (OC), corporate structure and business strategies based on the five levers of the OR. As a result, the first lever, the coordination makes Netflix to get rid of the inner wall by creating Netflix terms like 'sunshining,' and 'postmortem,' which makes their employees extraordinarily candid with each other. The second lever, the cooperation provides employees with understanding customers by sharing company and service information openly and broadly through transparent board system, billboard advertising, etc. The third lever, the clout allows Netflix to encourage independent decision-making by their employees. Netflix customers are under scrutiny and served 24/7 via live chat or phone by supporting a high-performance workplace. The fourth lever, the capabilities are related to Netflix's keeping highly effective people and it establishes a culture of highly motivated employees. The "dream team" policy is run by what is known as the "keeper test." The last lever, the connections make Netflix to forge external strategic partnership to stay agile. There is no rule for partnering with key content producers by allowing creative freedom to them.

국방 지능형 플랫폼 기반체계 발전방향 (Development Direction of the Military Intelligent Platform Infrastructure)

  • 편도후;김성태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2022년도 춘계학술대회
    • /
    • pp.58-61
    • /
    • 2022
  • 데이터가 디지털 전환을 위한 핵심자산으로 평가됨에 따라, 국방분야에서도 데이터의 효율적·안정적 관리와 원활한 공유, 그리고 데이터를 활용한 서비스 제공이 요구되고 있다. 이를 지원하기 위해 우리군은 국방데이터 관리 기반체계인 국방 지능형 플랫폼 구축을 위한 초석을 마련하고 있다. 본고에서는 우리나라 및 주요 선진군의 데이터전략과 데이터 플랫폼 추진방향을 살펴보고, 주요 시사점과 함께 우리군의 국방 지능형 플랫폼 발전방향을 제시하였다. 이를 통해 안전하고 효율적인 우리 군의 국방데이터 관리 기반체계 구축에 기여할 수 있기를 기대한다.

  • PDF

익명인증서 및 블록체인 암호화로 익명성이 강화된 디지털화폐 모델 (CBDC Model with Enhanced Anonymity Using ID Certificate andBlockchain Encryption)

  • 윤재호;김용민
    • 정보보호학회논문지
    • /
    • 제33권2호
    • /
    • pp.139-149
    • /
    • 2023
  • CBDC는 전자적 로그(log)에 의해 모든 기록이 남겨지는 전자지급수단과 유사한 특징을 가지고 있어 현금이 가지는 익명성을 충족하기는 어렵다. 이에 본 연구에서는 익명성 강화를 위해 디피헬만 키공유 알고리즘으로 거래내용을 모두 암호화하는 디지털화폐 거래모델을 제시하였다. 제시된 모델은 거래의 암호화를 통해 비연결성, 추적불가성등의 익명성을 제공하고 있다. 또한 실명 인증이 되지만, 실제로는 익명을 이용하는 CBDC 인증서를이용하였는데, 이 인증서를 통해 불법 등 추적이 필요한 거래는 권한이 부여된 기관 등에 의해 사후 추적도 가능하다.