• Title/Summary/Keyword: Personal Control

Search Result 1,851, Processing Time 0.031 seconds

Design of a Policy based Privacy Protection System using Encryption Techniques (암호기법을 이용한 정책기반 프라이버시보호시스템설계)

  • Mun Hyung-Jin;Li Yong-Zhen;Lee Dong-Heui;Lee Sang-Ho;Lee Keon-Myung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.33-43
    • /
    • 2006
  • In order to provide the efficient personalized services, the organizations and the companies collect and manage the personal information. However, there have been increasing privacy concerns since the personal information might be misused and spread over in public by the database administrators or the information users. Even in the systems in which organizations or companies control access to personal information according to their access policy in order to protect personal information, it is not easy to fully reflect the information subjects' intention on the access control to their own Personal information. This paper proposes a policy-based access control mechanism for the personal information which prevents unauthorized information users from illegally accessing the personal information and enables the information subjects to control access over their own information. In the proposed mechanism, the individuals' personal information which is encrypted with different keys is stored into the directory repository. For the access control, information subjects set up their own access control policy for their personal information and the policies are used to provide legal information users with the access keys.

Effective Access Control Mechanism for Protection of Sensitive Personal Information (민감한 개인정보 보호를 위한 효율적인 접근제어 기법)

  • Mun, Hyung-Jin;Kim, Ki-Soo;Um, Nam-Kyung;Li, Yong-Zhen;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7C
    • /
    • pp.667-673
    • /
    • 2007
  • In order to provide the efficient personalized services, the organizations and the companies collect and manage the personal information. The stored data have some slight differences among each subject. Even though the same attribute information leaks out, the personal privacy violation is different according to personal sensitivity. However, currently the organizations or the companies protect all the information as the same level. This paper reflects the sensitive attribute information of the information subject to each personal policy by the encrypting techniques. And then we propose a policy-based access control mechanism for the personal information which strictly prevents unauthorized information users from illegally accessing the personal information. In the proposed mechanism, the individuals' personal information which is encrypted with different keys is stored into the database. For the access control, information subjects set up their own access control policy for their sensitive personal information. Then it is possible to control the information access by providing the information to the information users according to personal and organizational privacy policy.

Supervised Hybrid Control Architecture for Navigation of a Personal Robot

  • Shin, Hyun-Jong;Im, Chang-Jun;Kim, Jin-Oh;Lee, Ho-Gil
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1178-1183
    • /
    • 2003
  • As personal robots coexist with a person with a role to help a person, while adapting various human life and environment, the personal robots have to accommodate frequently-changing or different-from-home-to-home environment. In addition, personal robots may have many kinds of different Kinematic configurations depending on the capabilities. Some may have a mobile base and others may have arms and a head. The motivation of this study arises from this not-well-defined home environment and varying Kinematic configuration. So the goal of this study is to develop a general control architecture for personal robots. There exist three major architectures; deliberative, reactive and hybrid. We found that these are applicable only for the defined environment with a fixed Kinematic configuration. Neither could accommodate the above two requirements. For the general solution, we propose a Supervised Hybrid Architecture (SHA), in which we use double layers of deliberative and reactive controls, distributed control with a modular design of Kinematic configurations, and real-time Linux OS. Deliberative and reactive actions interact through a corresponding arbitrator. These arbitrators help a robot to choose an appropriate architecture depending on the current situation to successfully perform a given task. The distributed control modules communicate through IEEE 1394 for the easy expandability. With a personal robot platform with a mobile base, two arms, a head and a pan-tilt stereo eye system, we tested the developed SHA for static as well as dynamic environments. For this application, we developed decision-making rules for selecting appropriate control methods for several situations of navigation task. Examples are shown to show the effectiveness.

  • PDF

Cornering Stability Control of a Personal Electric Vehicle with Direct-Drive In-Wheel Motors (직접구동 인 휠 모터를 장착한 1인승 전기자동차의 선회안정성제어)

  • Nam, Kanghyun;Eum, Sangjune
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.11
    • /
    • pp.919-924
    • /
    • 2016
  • This paper proposes a robust control design method for improving the cornering stability of a personal electric vehicle equipped with in-wheel motors. In general, vehicles undergo severe parameter variations and unpredictable disturbances with respect to a wide range of driving conditions (e.g., road surface conditions and vehicle velocity conditions). For this reason, robust control design techniques are required to guarantee consistent driving performances and robustness against various driving conditions. In this paper, an adaptive sliding mode control method is employed to enhance cornering stability by controlling the direct-drive in-wheel motors independently. Additionally, in order to confirm the effectiveness of a proposed control method, real driving tests with an experimental personal electric vehicle are performed.

A Study on Improvement of Personal Information Protection Control Log Quality: A Case of the Health and Welfare Division (개인정보통합관제 로그품질 분석 및 개선에 관한 연구: 보건복지 분야 사례를 중심으로)

  • Lee, Yari;Hong, Kyong Pyo;Kim, Jung Sook
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.1
    • /
    • pp.42-51
    • /
    • 2015
  • In this paper, we analyze the quality status of Health and Welfare division's standardized log and asses the characteristics of the institutions' logs analysis to establish the criteria to minimize hazards and control the quality of log's institutional details to limit extraction. As a result, extraction condition's proposed development direction to adequately assess and control health and welfare abuses privacy control target log. This improvement over the status and quality of information shared with relation to institutional work of the log quality characteristics is made possible. In addition, quality control and inspection standards were prepared in accordance with the institutional log characteristics. Future research will include performing continuous analysis and improvement activities on the quality of logs with integrated control of sharing personal information and distributing information about logs' quality to proactively target organ. Therefore, we expect that correcting proactive personal information misuse and leakage is possible to achieve.

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.

A study of current infection control by dental hygienists and related factors (치과위생사의 감염관리 실태와 관련요인)

  • Park, Jeong-Hee;Heo, Nam-Suk;Song, Hye-Jeong
    • Journal of Korean society of Dental Hygiene
    • /
    • v.11 no.6
    • /
    • pp.993-1003
    • /
    • 2011
  • Objectives : This study is designed to identify the need for an efficient infection control plan in the curriculum of Dept. of Dental Hygiene and encourage dental hygienists to be more attentive to infection control by analyzing their personal protective measures, hand-washing frequency and other factors relating to infection control. Methods : A survey was conducted of 471 dental hygienists in general hospitals, dental clinics and dental hospitals in City of Busan and Gyeongsangnam-do from December 20, 2009 to February 21, 2010. Results : 1. Among those who worked for more than 11 years, personal protection (3.79) and hand-washing frequency (3.90) factors were rated high (p<0.05). 2. When surveyed by workplace, personal protection was high in general hospitals (3.75) while hand-washing frequency was high in dental clinics (3.74). 3. Among those who received infection control education more than three times, personal protection (4.07) and hand-washing frequency (3.80) were high (p<0.05). 4. Personal protection-related factors were general hospital workers, necessity of infection control education and awareness on infectious disease (p<0.05), while factors associated with hand-washing frequency were number of patients per day, whether or not infection control-related class is given at school, necessity of infection control education and awareness on infectious disease (p<0.05). Conclusions : To enhance awareness of infection control, it may be necessary to addan infection control-related class to the school curriculum and provide the necessity of conducting continuous and systematic infection control education through newly entering staff training and education of dental practitioners.

Sensitive Personal Information Protection Model for RBAC System (역할기반 접근제어시스템에 적용가능한 민감한 개인정보 보호모델)

  • Mun, Hyung-Jin;Suh, Jung-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.103-110
    • /
    • 2008
  • Due to the development of the e-commerce, the shopping mall such as auction collects and manages the personal information of the customers for efficient service. However, because of the leakage of the Personal information in auction, the image of the companies as well as the information subjects is damaged. Even though the organizations and the companies store the personal information as common sentences and protect using role based access control technique, the personal information can be leaked easily in case of getting the authority of the database administrator. And also the role based access control technique is not appropriate for protecting the sensitive information of the information subject. In this paper, we encrypted the sensitive information assigned by the information subject and then stored them into the database. We propose the personal policy based access control technique which controls the access to the information strictly according to the personal policy of the information subject. Through the proposed method we complemented the problems that the role based access control has and also we constructed the database safe from the database administrator. Finally, we get the control authority about the information of the information subject.

  • PDF

A Study on the Guideline of Authority Record for Heading Control of Personal Name (인명표목통제를 위한 전거레코드작성기준에 대한 연구)

  • 정옥경
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.4
    • /
    • pp.257-282
    • /
    • 2001
  • The purpose of this study is to suggest a rational guidelines of authority record for personal name heading control. It analyzes the Statement of Principles of ICCP, the headings of Korean Cataloging Rules and personal name heading of KORMARC on Disc. It also investigates the problems and suggests the possible improvements for headings of personal name. The rules for heading control retains the frame from headings of cataloging rules. The guidelines for heading control of personal name will be integrated in the rules for headings. To efficient retrieval, It suggests distinction of different persons of the same name and subject List.

  • PDF

A PID Control of Supply Duct Outlet Air Temperature in Personal Environment Module

  • Park, Young-Chil
    • International Journal of Air-Conditioning and Refrigeration
    • /
    • v.11 no.2
    • /
    • pp.82-90
    • /
    • 2003
  • The work presented here is a design and an implementation of PID control system to regulate a supply duct outlet air temperature in PEM (Personal Environment Module). In PEM, the air is heated to the required temperature while it flows through the supply duct without any mixing chamber. This makes the control of air temperature in PEM difficult. A simulation is done first to understand the relationship between a temperature distribution in working area, flow rate and the outlet air temperature of PEM. Then a linear dynamic model of heating process in PEM is derived. P, PD and PID type control systems, to provide the rapid response without overshoot and saturation in heater command voltage, are designed using a linear model obtained. Experimentally obtained data shows that the control system satisfies the design criteria and works properly in controlling the supply duct outlet air temperature.