• 제목/요약/키워드: Personal information control

검색결과 688건 처리시간 0.027초

AGV 시스템의 운영기술 개발 (Development of Operating Technology for AGV System)

  • 송준엽;이승우;이현용
    • 연구논문집
    • /
    • 통권22호
    • /
    • pp.27-38
    • /
    • 1992
  • We deals with stationary layout control system of AGV. It is a intelligent control system to he wholly charged control PC a layout information and guided command and to be controlled a vehicle driving, steering, safety of natural functions of AGV. Fieldbus concentrator of stationary layout control system serves control command from control PC and status information of AGV. Telegram software monitors transmitted command and status information through IR(JnfraRed) modem. Especially it is possible to easily network to use not an exclusive controller of AGV but personal computer(PC) when communicate and interface a different kind of controller.

  • PDF

소셜 네트워크 서비스를 위한 프라이버시 보호 정책언어 및 프라이버시 보호 모듈 구현 (Implementation of Privacy Protection Policy Language and Module For Social Network Services)

  • 김지혜;이형효
    • 정보보호학회논문지
    • /
    • 제21권1호
    • /
    • pp.53-63
    • /
    • 2011
  • 소셜 네트워크 서비스는 현실 세계의 인간관계를 바탕으로 온라인에서 서비스를 제공하는 웹서비스로 서비스의 인기가 높아짐에 따라 프라이버시 보호, 즉 개인정보 소유자의 권리 보호에 대한 목소리가 높아졌다. 본 논문은 개인정보 소유자의 자기정보 통제권을 보장하면서 소셜 네트워크 간 데이터 공유를 지원하기 위한 정책언어를 제시하고 이 정책을 기반으로 하는 프라이버시 보호 모듈을 설계 및 구현한다. 프라이버시 보호를 위한 정책언어는 개인정보에 접근하는 사용자의 속성을 기반으로 접근여부를 결정하는 속성기반 접근통제모델을 바탕으로 하고 있다. 뿐만 아니라 본 논문에서 제시된 정책 언어와 개발 모듈은 소셜 네트워크 서비스 간 안전한 데이터 공유 외에도 개인정보에 대한 자기정보 통제권이 필요한 다른 응용분야에 적용이 가능하다.

퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가 (Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments)

  • 진병욱;김종화;차시호;전문석
    • 디지털산업정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

A Privacy Negotiation Algorithm for Digital Rights Management

  • Phuttharak, Jurairat;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.788-793
    • /
    • 2004
  • Internet-based distribution of digital contents provides great opportunities for producers, distributors and consumers, but it may seriously threaten users' privacy. The Digital Rights Management (DRM) systems which one of the major issues, concern the protection of the ownership/copyright of digital content. However, the most recent DRM systems do not support the protection of the user's personal information. This paper examines the lack of privacy in DRM systems. We describe a privacy policy and user's privacy preferences model that protect each user's personal information from privacy violation by DRM systems. We allow DRM privacy agent to automatically negotiate between the DRM system policy and user's privacy preferences to be disclosed on behalf of the user. We propose an effective negotiation algorithm for the DRM system. Privacy rules are created following the negotiation process to control access of the user's personal information in the DRM system. The proposed privacy negotiation algorithm can be adapted appropriately to the existing DRM systems to solve the privacy problem effectively.

  • PDF

개인정보 제공에 대한 인터넷 사용자의 경제적 행동에 관한 연구: Privacy Calculus, CPM 이론을 중심으로 (A Study on the Internet User's Economic Behavior of Provision of Personal Information: Focused on the Privacy Calculus, CPM Theory)

  • 김진성;김종기
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제26권1호
    • /
    • pp.93-123
    • /
    • 2017
  • Purpose The purpose of this study is to deduct the factors for explaining the economic behavior of an Internet user who provides personal information notwithstanding the concern about an invasion of privacy based on the Information Privacy Calculus Theory and Communication Privacy Management Theory. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the computation theory of information privacy with the factors deducted from the management theory of communication privacy on the basis of the Dual-Process Theory. In addition, this study, did empirical analysis of the path difference between groups by dividing Internet users into a group having experience in personal information spill and another group having no experience. Findings According to the empirical analysis result, this study confirmed that the Privacy Concern about forms through the Perceived Privacy Risk derived from the Disposition to value Privacy. In addition, this study confirmed that the behavior of an Internet user involved in personal information offering occurs due to the Perceived Benefits contradicting the Privacy Concern.

ISMS-P와 GDPR의 개인정보보호 부문 연계 분석 (A Linkage Analysis of ISMS-P and GDPR; Focused on Personal Information Protection)

  • 박민정;유지은;채상미
    • 한국IT서비스학회지
    • /
    • 제18권2호
    • /
    • pp.55-73
    • /
    • 2019
  • The importance of the personal information has been increased, there have been a lot of efforts to establish a new policy, certification or law for administrating personal information more effectively and safely. Korean government has operated ISMS and PIMS certification system to assess whether an organization has established and managed appropriate information security system or not. However, it has been addressed the needs for revising and modifying of PIMS and ISMS. It is evaluated there are a few overlapped criteria to assess information management system in both ISMS and PIMS. ISMS-P certification, combining with ISMS and PIMS, is, finally, suggested, in the recent. GDPR is established having an aim of primarily to give control to individuals over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU. This study compares GDPR and ISMS-P, focusing on "personal information". It can be expected to contribute as followings. This study can be a criterion for self-evaluation of possibility to violate of GDPR of a firm in preparation for ISMS-P. Second, this study also aims to increase the understanding of the role of ISMS-P and GDPR, among various certifications with the purpose of assessment of the information security management system, by reducing the costs required to obtain the unnecessary certification and alleviating the burden. Third, it contributes to diffusion of ISMS-P newly implemented in Korea.

분산형 개인통신서비스를 위한 망구조 및 제어절차 분석 (Analysis of network architectures and control procedures for distributed personal communication services)

  • 박영순;최훈
    • 한국통신학회논문지
    • /
    • 제22권7호
    • /
    • pp.1437-1447
    • /
    • 1997
  • This paper proposes a cluster-based PCS(Personal Communication Services) network architecture to support increased signaling and control traffic. The procedures are presented to serve the mjobility management and the efficient procesing of the call-control functional using distributed servers. Especially when call-setups are made within a cluster, this distributed servers. Especially when call-setup time and the amount of control traffic of H-HLS (High level Home Location Server) in the network as L-HLS(Low lever Home Location Server) serves the call on behalf of H-HLS. Performance and reliability of the architecture have been also cairried out.

  • PDF

휴대용 개인 건강정보 시스템 개발 (Development of Personal Health Record System with a USB Memory)

  • 정혜정;김남현;배하석
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2008년도 하계종합학술대회
    • /
    • pp.1105-1106
    • /
    • 2008
  • In this paper we construct a portable storage device (USB memory) for personal health information management system which guarantees control of one's information. (1) Development of system for inquiry hospital visit history, check-up results, and medication details (2) Establishment of personal emergency information management system for rapid and accurate treatment by an authorized person in case of an emergency (3) Development of a health diary program in which individual patients can input and manage their health information such as blood pressure, blood sugar level, weight, and pulse that they measured.

  • PDF

HDTV를 위한 개인형 디지털 녹화기 구현 (Implementation of personal Digital Recorder for HDTV)

  • 김윤상;이석필;양창모
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2006년도 하계학술대회
    • /
    • pp.141-144
    • /
    • 2006
  • The personal digital recorder is a consumer electronics device that records television shows to a hard disk in digital format. In this paper, we propose an implementation method of personal digital recorder for HDTV. The proposed personal recorder includes CPU and system control modules, graphics and display module, audio DSP module, digital I/O module, NIM module, graphic software library, and embedded software modules for providing a lot of personal digital recorder functions such as live or reserved recordings, browsing of recorder content list, trick lay and time shifting. Especially, combining trick play with time shifting makes much more convenient functions such as pausing live TV, instant replay of interesting scenes, and skipping advertising.

  • PDF

유럽 PSD2 시행에 따른 금융분야 마이데이터 정책의 개인정보보호 강화 방안 연구 (A Study on Privacy Protection in Financial Mydata Policy through Comparison of the EU's PSD2)

  • 송미정;김인석
    • 정보보호학회논문지
    • /
    • 제29권5호
    • /
    • pp.1205-1219
    • /
    • 2019
  • 데이터 기반 경제시대에서 데이터 활용능력이 경쟁력이 됨에 따라 개인정보의 보호와 더불어 개인정보의 활용을 통한 경제적 부가가치를 창출하려는 노력이 함께 강조되고 있다. 이 가운데 등장한 EU의 PSD2(the second Payment Service Directive)는 정보 주체의 '정보이동권'을 근거로 개인의 자기결정권을 보장하면서 데이터의 활용과 유통을 촉진하는 마이데이터 정책으로 전 세계 오픈뱅킹 정책의 시초가 되고 있다. 이러한 추세에 따라 우리나라 정부도 국내 금융업권별 실정을 반영하여 마이데이터 정책을 적극적으로 추진하고 있다. 하지만, 마이데이터 정책으로 인해 금융정보의 유통 및 활용 범위가 커진 만큼 개인정보의 유출 및 오남용, 해킹 등 위험도 커진 것도 사실이다. 본 연구에서는 EU PSD2가 어떻게 국내 금융분야 마이데이터 정책에 반영되어 추진되고 있는지를 살펴본다. 그리고 국내 마이데이터 정책의 개인정보보호 위험 사항을 개인정보 생명 주기별로 나누어 식별한 후 이러한 위험에 대한 법적 기술적 대응책을 제시하고자 한다.