• Title/Summary/Keyword: Personal information control

Search Result 694, Processing Time 0.031 seconds

Role Based Smart Health Service Access Control in F2C environment (F2C 환경에서 역할 기반 스마트 헬스 서비스 접근 제어)

  • Mi Sun Kim;Kyung Woo Park;Jae Hyun Seo
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.27-42
    • /
    • 2023
  • The development of cloud services and IoT technology has radically changed the cloud environment, and has evolved into a new concept called fog computing and F2C (fog-to-cloud). However, as heterogeneous cloud/fog layers are integrated, problems of access control and security management for end users and edge devices may occur. In this paper, an F2C-based IoT smart health monitoring system architecture was designed to operate a medical information service that can quickly respond to medical emergencies. In addition, a role-based service access control technology was proposed to enhance the security of user's personal health information and sensor information during service interoperability. Through simulation, it was shown that role-based access control is achieved by sharing role registration and user role token issuance information through blockchain. End users can receive services from the device with the fastest response time, and by performing service access control according to roles, direct access to data can be minimized and security for personal information can be enhanced.

Transmission Power Control algorithm based link quality indicator at IEEE 802.15.4 wireless personal area network (IEEE 802.15.4 무선 PAN에서 링크 품질에 기반을 둔 Transmission Power Control 알고리즘)

  • Seo, Jung-Tae;Kim, Kwang-Jin;Son, Byung-Hee;Kwon, Young-Bin;Park, Jae-Hwa;Park, Ho-Hyun;Lee, Jung-Woo;Choi, Young-Wan
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.3-6
    • /
    • 2009
  • IEEE 802.15.4 기반의 무선 PAN(WPAN: Wireless Personal Area Network)환경에서 기존에 제안된 전송 전력 제어(TPC: Transmission Power Control) 알고리즘은 수신 신호의 세기를 기반으로 반복 전송을 통하여 적합한 최소 전송 전력을 결정하는 방법으로 진행되어 왔다. 이러한 방법은 통신 채널의 변화가 잦은 지역에서는 재전송률이 높아지고 전송 품질이 떨어지는 단점을 가지고 있다. 따라서 본 논문에서는 IEEE 80215.4에서 제공하는 링크 품질 지표(LQI: Link quality indicator)값을 바탕으로 최소 전송 전력을 결정하여 재전송률을 줄이고, 통신 채널 변화에 보다 능동적으로 대응할 수 있는 새로운 전송 진력 제어 방법을 제안하고자 한다.

  • PDF

A flow control scheme for handoff on ATM-based PCN (ATM 기반 개인 휴대 통신망에서의 핸드오프를 위한 흐름 제어 방안)

  • 심재정;강경훈;장경훈;김덕진
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.10
    • /
    • pp.9-25
    • /
    • 1997
  • Personal Communication Networks will be composed of ATM-based broadband ISDN in the future. However, unlike the wired networks, many challenges will arise in the wireless communication service such as PCS. These callenges are frequency alteration of cell routing path, relatively very high error rate at transmission over the wireless interface, etc. Particularly, the alteration of cell routing path caused by handoff makes temporary deterioration of QoS. In this paper, the signaling flows of handoff scenarios which may occur on Personal Communication Networks are presented, and verified by Pertri-Net toolkit. In addition, the cell flow control scheme which minimizes the lagging gap between cells and maintains the cell sequence during handoff is proposed. The proposed scheme can be summarized as the differentiation of normal queue and handoff queue, and the cell flow control between these queues. For verification of the proposed scheme, we used two approaches, which are mathermatical manipulation and SLAM simulation.

  • PDF

Real-Time User Login Account Access Management Using Mobile App (모바일 앱을 이용한 실시간 사용자 계정 접근 관리)

  • Choi, Seokhwan;Kwon, Junho;Choi, Yoon-Ho
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.6
    • /
    • pp.350-358
    • /
    • 2017
  • Spill of personal information using a stolen ID and password that recently occurred in large enterprises and portal web site such as Nate, Auction, National Agricultural Cooperative Federation, suggesting the importance of protecting personal information. By managing access to user accounts in real time, users will be able to block access before personal information is leaked. Therefore, In this paper, we propose a method to prevent spill of personal information that may occur when connected to others by using an authorized ID and password from portals. Specifically, we offer a mobile status control app that controls the logged status of user account in real time to view login status information to user by visualization and information about specific time and IP address. Also, we propose a method for detecting and blocking duplicated login that connect via IP address change.

A GDPR based Approach to Enhancing Blockchain Privacy (GDPR에 기반한 블록체인 프라이버시 강화 방안)

  • Han, Sejin;Kim, Suntae;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.33-38
    • /
    • 2019
  • In this paper, we propose a new blockchain technology that could comply with GDPR. The proposed model can prevent illegal access by controlling access to the personal information according to a access policy. For example, it can control access to the information on a role-basis and information validation period. The core mechanism of the proposed model is to encrypt the personal information with public key which is associated with users attributes policy, and then decrypt it with a private key and users attributes based on a Attribute-based Encryption scheme. It can reduce a trusted third-part risk by replacing it with a number of nodes selected from the blockchain. And also the private key is generated in the form of one-time token to improve key management efficiency. We proved the feasibility by simulating the proposed model using the chaincode of the Hyperledger Fabric and evaluate the security.

The Priority of Internal Control Factors for Information Systems based on Individual Characteristics (개인 특성에 따른 정보시스템 내부통제요소 중요도에 관한 연구)

  • 박종은;이우형;이명호
    • Korean Management Science Review
    • /
    • v.21 no.1
    • /
    • pp.57-76
    • /
    • 2004
  • The development of informational technology has lead to a sharp change in not only the existing way of operations and management, but the way of human life or thinking as well. Those shifts of the paradigm in information technology have also affected Individuals to the organizational structure. A series of unexpected problems was, however, accompanied by the advance in informational technology, which had broaden its own area of application. Those problems include the losses of property or data the malfunction of systems and their wastefulness would result in, continuous increases in computer crimes, reliability and efficiency of the functional process with the development of information systems, such as the processing problems of inaccurate data, economical issues, and subjects related to safety, as interruptions of privacy, which would result from lots of one's exposure to the drains of personal information. Accordingly, Auditors' roles of information systems, for now, is more important than anything else in that they are responsible for the objective assessment of relevance and effectiveness of internal control systems under the environment of information systems. The objective of the study is, so as to obtain safety of information systems: First, to provide data to line-design internal control systems after finding internal control factors to prevent and eliminate the risks of information systems. Second, to evaluate the priorities of internal control factors with their effective management being considered as the key to settle the problems of risks of information systems. Third, to discriminate what factors affect In evaluating the relative degrees of Importance of internal control factors.

A Study on frequency offset effect decrease for 868MHz LR-WPAN receiver (868MHz LR-WPAN 수신기를 위한 주파수 옵셋 영향 감소에 대한 연구)

  • Kang, Sung-Min;Lim, Jae-Won;Lee, Sung-Young;Cheong, Cha-Keon
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.301-302
    • /
    • 2008
  • In this paper, we present an algorithm which decrease a frequency offset effect for 868MHz IEEE 802.15.4b LR - WPAN (Low Rate - Wireless Personal Area Network) receiver. The proposed method improve the robustness to frequency offset and receiver's stability using the multiple delay differential filter of receiver correlator.

  • PDF

Controlled Inquiry Rates of Clinical Interviews in Telehomecare

  • Moskowitz, Samuel E.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1945-1950
    • /
    • 2003
  • Conceived to acquire personal information for an electronic medical record, the clinical interview contains probing questions. The number and type of inquiries are assumed to fulfill medical protocols, and therefore are deemed essential for treatment - but the rate can and should be controlled. High rates of inquiry merely intimidate the patient and affect replies. The purpose of this paper is to mathematically formulate permissible rates of clinical interviews held during telehomecare virtual visits and designed to avoid patient anxiety. Mental stress is derived as a function of the weight of importance assigned by the patient, virtual visit duration, and the rate of questioning in the direction of greater sensitivity. Two operations are of interest: Collecting and recording information by the provider, and maintaining synchrony of questions and answers by the patient. The Lorentz transformation yields the patient’s view of the operational rates. Conservation of information momentum is postulated and applied before and after replies are recorded. It is shown that the weight of importance designated by the patient to collecting and recording personal information is driven by a singularity that depends on the rate of questioning. The findings should serve as a guideline in interviewer training programs.

  • PDF

Marketer-Generated Content Sharing Among Social Broadcasting Users: Effects of Intrinsic Motivations, Social Capital and the Moderating Role of Prevention Focus

  • Li, Yuhao;Wang, Kanliang
    • Asia pacific journal of information systems
    • /
    • v.25 no.4
    • /
    • pp.719-745
    • /
    • 2015
  • Social networking services provide individuals with an easy approach for exchanging messages with others based on interpersonal relationships. However, why individuals spread marketer-generated content (MGC) in their online social circles remains unclear. Therefore, we develop a theoretical model to examine how social capital, intrinsic motivations, personal perceptions, past behavior, and personal traits influence MGC sharing behavior of social media users in micro-blogging context. Data collected from 319 social networking users support the proposed model. The results from partial least squares analyses show that enjoyment, perceived control, and outcome expectations are significant indicators of individual's MGC sharing intention in the social broadcasting environment. Results also suggest that social capital, users' intention, and past behavior positively influence the MGC sharing behavior of users. Moreover, individual prevention pride exhibits a significant interaction effect on the relationships between users' MGC sharing and its antecedents. Implications for research and practice are discussed.

A Study on Improving Security Controls in the Electronic Financial Transaction (전자금융거래 시 보안 통제 사항의 개선 연구)

  • Lee, Gangshin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.881-888
    • /
    • 2015
  • Financial Authorities have added security controls to the Electronic Financial Transaction Act and the Supervisory Regulation according to the recent frequent personal credit information leakages. Accordingly, the security level has been upgraded. But it is necessary to study more security controls to add. This paper deduces 19 security controls over the mean value to be added to the financial area receiving 15 security consultant's help.