• Title/Summary/Keyword: Party School

Search Result 264, Processing Time 0.023 seconds

Privacy-Preserving Kth Element Score over Vertically Partitioned Data on Multi-Party (다자 간 환경에서 수직 분할된 데이터에서 프라이버시 보존 k번째 항목의 score 계산)

  • Hong, Jun Hee;Jung, Jay Yeol;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1079-1090
    • /
    • 2014
  • Data mining is a technique to get the useful information that can be utilized for marketing and pattern analysis by processing the data that we have. However, when we use this technique, data provider's personal data can be leaked by accident. To protect these data from leakage, there were several techniques have been studied to preserve privacy. Vertically partitioned data is a state called that the data is separately provided to various number of user. On these vertically partitioned data, there was some methods developed to distinguishing kth element and (k+1) th element by using score. However, in previous method, we can only use on two-party case, so in this paper, we propose the extended technique by using paillier cryptosystem which can use on multi-party case.

Practical Password-Authenticated Three-Party Key Exchange

  • Kwon, Jeong-Ok;Jeong, Ik-Rae;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.312-332
    • /
    • 2008
  • Password-based authentication key exchange (PAKE) protocols in the literature typically assume a password that is shared between a client and a server. PAKE has been applied in various environments, especially in the “client-server” applications of remotely accessed systems, such as e-banking. With the rapid developments in modern communication environments, such as ad-hoc networks and ubiquitous computing, it is customary to construct a secure peer-to-peer channel, which is quite a different paradigm from existing paradigms. In such a peer-to-peer channel, it would be much more common for users to not share a password with others. In this paper, we consider password-based authentication key exchange in the three-party setting, where two users do not share a password between themselves but only with one server. The users make a session-key by using their different passwords with the help of the server. We propose an efficient password-based authentication key exchange protocol with different passwords that achieves forward secrecy in the standard model. The protocol requires parties to only memorize human-memorable passwords; all other information that is necessary to run the protocol is made public. The protocol is also light-weighted, i.e., it requires only three rounds and four modular exponentiations per user. In fact, this amount of computation and the number of rounds are comparable to the most efficient password-based authentication key exchange protocol in the random-oracle model. The dispensation of random oracles in the protocol does not require the security of any expensive signature schemes or zero-knowlegde proofs.

User Behavior Analysis for Online Game Bot Detection (온라인 게임 봇 탐지를 위한 사용자 행위 분석)

  • Kang, Ah-Reum;Woo, Ji-young;Park, Ju-yong;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.225-238
    • /
    • 2012
  • Among the various security threats in online games, the use of game bots is the most serious problem. In this paper, we propose a framework for user behavior analysis for bot detection in online games. Specifically, we focus on party play that reflects the social activities of gamers: In a Massively Multi-user Online Role Playing Game (MMORPG), party play log includes a distinguished information that can classify game users under normal-user and abnormal-user. That is because the bot users' main activities target on the acquisition of cyber assets. Through a statistical analysis of user behaviors in game activity logs, we establish the threshold levels of the activities that allow us to identify game bots. Also, we build a knowledge base of detection rules based on this statistical analysis. We apply these rule reasoner to the sixth most popular online game in the world. As a result, we can detect game bot users with a high accuracy rate of 95.92%.

A Proposal Based on the Analysis of Each Party Election Pledge Related to Korean migrant workers (한국 이주노동자에 대한 각 정당 선거공약 분석과 제언)

  • Yoon, Miral;Lee, Chun Ho
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.10
    • /
    • pp.883-893
    • /
    • 2018
  • The inflow of Labor Migrants has been grown up to 600,000 people until now with the adoption of Employment Permit System (EPS) in 2004 until now. However the institutional support lack to ensure their rights and improve their conditions. This is because of their consideration ad temporary labors in South Korean society and labor forces rather than the objects of integration. As a result, the legal status and rights of migrant workers are criticized for their utilization rather than human rights, and human rights protection is insufficient. To this context, this paper analyzed the 19th presidential election pledge of the four political parties (Democratic Party, the Liberty Korea Party, Bareun Party and Justice Party) the majority of the Korean National Assembly, and predicted how the policies of migrant workers would evolve. The study found that there were two political parties that did not mention policies for migrant workers, and the remaining two parties also maintained their current policies. This is probably the biggest reason to recognize migrant workers as temporary residents. However, they should also be aware of the fact, that migrant workers are the members of the Korean society and are the owners of human rights that should be guaranteed, and should consider the policy directions to live with them.

Study of the Professionalization of Education for Traditional Chinese Medicine (중의학 교육의 전문화에 대한 연구)

  • Kwon, Young-Kyu;Lee, Hyun-Ji
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.19 no.4
    • /
    • pp.860-864
    • /
    • 2005
  • Nowadays most of scholarship is based on the western model. Traditional Chinese Medical education system also follows the western medical education. In the views of medical sociology, it shows very interesting phenomenon that the modernization of traditional area follows the western model of modernization. Moreover, it provides a good chance to discuss whether modernization and westernization of tradition is real development or not. Traditional Chinese Medicine had been the only institutional medicine in China for a long time. But the status of Traditional Chinese Medicine has been changed very rapidly since modern era. Shanghai Traditional Chinese Medical School was established in 1916. But National Party government tried to abolish Traditional Chinese Medicine and it met a crisis of maintenance. But the situation has been dramatically changed when Communist Party got the power in 1949. The Communist Government needed a chief medical service. And Traditional Chinese Medicine could meet the condition. Traditional Chinese Medicine could provide also the ideology of national superiority. Therefore, Traditional Chinese Medicine has been protected and developed by the assistance of the Communist Party. In the process, Traditional Chinese Medical education has been professionalized.

Eco-Friendly Behaviors and Trust Mechanism in Building Satisfaction and Loyalty (만족도와 충성도 구축에 있어서의 친환경 행동과 신뢰 메커니즘)

  • Debora, LEE
    • The Korean Journal of Franchise Management
    • /
    • v.14 no.1
    • /
    • pp.57-74
    • /
    • 2023
  • Purpose: As global interest in environmental issues increases, the demand for green products/services is increasing. Companies are establishing eco-friendly policies to meet the changing expectations of customers. Therefore, this study aims to analyze the effect of eco-friendly behavior and third-party certification on trust, satisfaction, and loyalty as well as the mediating role of satisfaction based on SOR and signaling theory. Research design, data and methodology: This study collected data from 501 respondents who visited restaurant and analyzed using measurement model with SPSS 28.0 and SmartPLS 4. Results: First, restaurants' eco-friendly behavior and third-party certification (TPC) positively influenced trust while these did not influence satisfaction. Second, trust positively influenced satisfaction. Third, trust and satisfaction positively influenced loyalty. Fourth, TPC had stronger impact on trust and satisfaction compared to eco-friendly behavior in female group while TPC had stronger impact on trust in male group. Conclusions: This study emphasized the importance of TPC over eco-friendly behavior. Restaurants should maintain pro-environmental behaviors such as reducing single-use items while obtaining TPC such as ISO and LEED certifications to increase customer trust. It also found the importance of trust and satisfaction in securing loyal customers. Restaurants should make efforts to build bonds with customers through authentic marketing such as events that encourage customer participation.

Truck Weight Estimation using Operational Statistics at 3rd Party Logistics Environment (운영 데이터를 활용한 제3자 물류 환경에서의 배송 트럭 무게 예측)

  • Yu-jin Lee;Kyung Min Choi;Song-eun Kim;Kyungsu Park;Seung Hwan Jung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.45 no.4
    • /
    • pp.127-133
    • /
    • 2022
  • Many manufacturers applying third party logistics (3PLs) have some challenges to increase their logistics efficiency. This study introduces an effort to estimate the weight of the delivery trucks provided by 3PL providers, which allows the manufacturer to package and load products in trailers in advance to reduce delivery time. The accuracy of the weigh estimation is more important due to the total weight regulation. This study uses not only the data from the company but also many general prediction variables such as weather, oil prices and population of destinations. In addition, operational statistics variables are developed to indicate the availabilities of the trucks in a specific weight category for each 3PL provider. The prediction model using XGBoost regressor and permutation feature importance method provides highly acceptable performance with MAPE of 2.785% and shows the effectiveness of the developed operational statistics variables.

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid

  • Li, Hongwei;Liu, Dongxiao;Alharbi, Khalid;Zhang, Shenmin;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1404-1423
    • /
    • 2015
  • In smart grid, electricity consumption data may be handed over to a third party for various purposes. While government regulations and industry compliance prevent utility companies from improper or illegal sharing of their customers' electricity consumption data, there are some scenarios where it can be very useful. For example, it allows the consumers' data to be shared among various energy resources so the energy resources are able to analyze the data and adjust their operation to the actual power demand. However, it is crucial to protect sensitive electricity consumption data during the sharing process. In this paper, we propose a fine-grained access control scheme (FAC) with efficient attribute revocation and policy updating in smart grid. Specifically, by introducing the concept of Third-party Auditor (TPA), the proposed FAC achieves efficient attribute revocation. Also, we design an efficient policy updating algorithm by outsourcing the computational task to a cloud server. Moreover, we give security analysis and conduct experiments to demonstrate that the FAC is both secure and efficient compared with existing ABE-based approaches.

Design of Remote Data Collection System using Orbcomm Satellite Communication (오브컴 위성 통신을 이용한 원격지 데이터 수집 시스템 설계)

  • Heo, Min;Jung, Sung-Hun;Mo, Soo-Jong;Lim, Jae-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.122-125
    • /
    • 2005
  • Data collection system is now widely used. This system is divided by embedded system and communication module. And data collection system in the remote area is using Satellite communication. So, data collection system is complicated and expensive. This paper proposes stabilization and cheapness of remote data collection system in dusty. The system can be composed simply through third party Satellite Communication programming of terminal including embedded system. Finally, collected data is transmitted to multi-user through web agent.

  • PDF

A Study on Tea Culture and Manner: focused on the Blooming Lotus Pond Tea (차문화와 예절에 관한 연구: 연지화개기호차를 중심으로)

  • Lee Il Hee
    • Journal of Family Resource Management and Policy Review
    • /
    • v.8 no.3
    • /
    • pp.1-14
    • /
    • 2004
  • This is a historical study of the tea culture and its manners after checking the origin of the tea culture in Korea. Also I created the Blooming Lotus Pond Tea which can be utilized in various meetings or at homes in connection with the tea culture and etiquette by studying good manners, clothing and light refreshments in 'Kyucongyogyul' by Lee-E, 'Karyejibramdo' by Kim Jang-Seng and other books of the Chosun Dynasty. I created the Blooming Lotus Pond Tea by referring to the tea-ceremonies described in the poems by Hong Inmo, his wife, Lady Suh, and her descendants. They can be better harmonized with the modem tea culture rather than the strict procedures of traditional court ceremonies or marriage, funeral, and other formal tea ceremonies. About the costumes of the nobilities, that is especially referred to Kyukmongyogyul by Lee-I of the Chosun Dynasty for the etiquette, also 'The Living Manners' by Professor Lee Gilpyo and Choi Baeyong. In addition, the tea-food is made based on 'the five elements'. The Blooming Lotus Pond Tea is made of frozen lotus flowers and prepared in the lotus formed broad-rimmed tea-utensils and supposed to be shared with family members or guests. It's recommended to hold a poetry-party with a tea-party. At present, this kind of daily tea ceremony is being developed at homes. It'll be desirable if it could recreate the traditional way as a ceremonial tea culture. In that case, it'll regain the quality of the traditional etiquette by harmonizing tea culture and manners. Such a tea culture can contribute to the quality of people's ordinary life and the identity of our country.

  • PDF