• Title/Summary/Keyword: Personal network

Search Result 1,445, Processing Time 0.031 seconds

RCBAC(Relationship-Content based Access Control) Model for User Privacy Protection of Digital Contents in Web 2.0 Environment (웹 2.0 환경에서 사용되는 디지털 컨텐츠의 사용자 프라이버시 보호를 위한 RCBAC 모델)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha;Kim, Jeong-Dong;Kang, Dong-Su;Baik, Doo-Kwon
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.697-705
    • /
    • 2008
  • The recent web technology has been developed by three mainsprings which include integration, virtualization, and socialization. The web technology provides the increment of the social networking ability. However it deepens the exposure of privacy about personal information as more complicating and difficult problems. Representatively, it is impossible to define and manage the specific relation, so the personal information and interest can be inferred from collecting and summarizing the contents. Also, there are some problems that it is hard to construct the information owner's own social network. Thus this paper proposes the RCBAC(Relationship-Content based Access Control) Model which applies both the concepts of Relationship and Content Semantic to the existing access control methods to protect the user's own digital contents in web 2.0 environment. This method prevents privacy such as personal inclination from being exposed and enables to define and manage the specific relation. By doing this the information owners can construct their social network. This social network can be applied and extended to web contents.

  • PDF

A Simulation Study of MAC Protocol Based on Beacon Mode for Considering IEEE 802.15.7 Star Topology Visible Personal Area Network System (IEEE 802.15.7 스타 토폴로지 VPAN 시스템을 고려한 비콘 모드 기반 MAC 프로토콜 성능 평가)

  • Hwang, Junho;Yoo, Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.4
    • /
    • pp.247-256
    • /
    • 2013
  • According to the complete standard document for PHY/MAC layer of visible light communication through the IEEE 802.15.7 WG on Sept. 2011, visible light communication lays a good foundation for developing a variety of application services. Thus, visible light communication moves to the advanced research period for developing application services, but most of applications are limited only to PtP service model. However, PtMP communication environment for VLC is required to accommodate more various applications. In this paper, we analyze an effect of key parameters on network performance in the star topology based visible personal area network system. We implement a simulator with considering attributes of PHY and MAC layer which are defined by IEEE 802.15.7 standard documents, and analyze the VLC performance.

Factors Affecting the Continuous Use Intention of Smartphone Social Network Games : With a Focus on the Value Model (스마트폰 소셜 네트워크 게임의 지속 사용의도 영향 요인 : 가치모형을 중심으로)

  • Kim, Hyun-Chul;Huh, Searle;Choi, Jun-Ho
    • Journal of Korea Game Society
    • /
    • v.12 no.3
    • /
    • pp.11-24
    • /
    • 2012
  • Primarily working on SNS(Social Network Service) platform, the SNG(Social Network Game) utilizes friends and neighbors for invitation and play. Based on the value model of HCI, this paper purports to discover how functional, hedonic, social and personal values predict the continuous usage intention and satisfaction of SNG in a smartphone. Hypothesis testing through structural equation modeling shows that hedonic and functional values affect satisfaction and intention to use of SNG while social and personal values do not. This result implies that fun and easy interface are more important to the success of SNG service than social networking motivation.

Streaming Layer of Personal Robot's Middleware

  • Li, Vitaly;Choo, Seong-Ho;Shin, Hye-Min;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1936-1939
    • /
    • 2004
  • This paper proposes streaming layer for personal robot's middleware. Under assumption that robot has open architecture, i.e. consists of modules created by different vendors and intercommunication between these modules is necessary, we have to consider that there are many different network interfaces. To make communication between modules possible it is necessary to develop new type of middleware. Such middleware has to support different platforms, i.e. OS, network interface, hardware, etc. In addition, it is necessary to implement effective interface between network and application in order to manage inter application communications and use network resources more effectively. Streaming layer is such interface that implements necessary functionality together with simplicity and portability. Streaming layer provides high level of abstraction and makes communication between distributed applications transparent as if are located in same module. With possibility of extension by user defined application interfaces it is suitable for distributed environments, i.e. module based architecture including small-embedded systems like as DSP board. To verify the proposed streaming layer structure it is implemented using C and tested.

  • PDF

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

The Development of LED Lighting Controller based on the PAN (PAN 기반의 LED 조명 제어 장치 개발)

  • Ohm, Woo-Yong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.1
    • /
    • pp.145-152
    • /
    • 2016
  • The usage of LED(Light Emitting Diode) has been rapidly increased and energy efficient management of LED light system is regarded as an important technology to enhance the energy efficiency. In this paper, we design and implementation of LED lighting controller which can control the LED lighting by using the wire and wireless communication technology based on the LAN(Local Area Network) and PAN(Personal Area Network). The implemented system can reduce the cost of LED lighting installing and avoids complicated wiring problem. And it is possible to minimize power consumption through automatic or manual LED control that they wished. In experimental results, the implemented LED lighting controller was satisfactory for all of the desired functions.

Study on the Characteristics of Fashion Leaders in College Clubs' Fashion Networks

  • Yun, So Jung;Jung, Hye In;Choo, Ho Jung;Jeong, So Won
    • International Journal of Costume and Fashion
    • /
    • v.14 no.1
    • /
    • pp.1-15
    • /
    • 2014
  • Fashion leadership is divided into visual influence, linguistic influence, and dual leadership. We refer to people exercising such influential power as fashion innovators, fashion opinion leaders, and fashion double leaders, respectively. Scholars and marketers have raised continuous questions on this issue: who are these fashion leaders and what characteristics do they have? In this study, social network analysis is applied to grasp the existence of three types of fashion leaders in college clubs, examine their positions in fashion process networks and investigate their individual and social characteristics. For this study, three college clubs were recruited through convenience sampling and surveyed online. Peer nomination questions for structuring fashion process networks and self-evaluation questions for measuring personal characteristics are included. Two fashion networks, an opinion leadership network and an innovativeness network, embrace four to six leaders and illustrate similar structure patterns in the three groups, which indicates that dual leaders enjoyed the lion's share in college clubs. The number of fashion innovators tends to be fewer compared to that of fashion opinion leaders, and we infer that peer relationship appears to intervene with fashion opinion leadership. Other personal characteristics supporting results from previous studies are also confirmed in this study.

Be study technical information protection in ubiqutious home networks (유비쿼터스 홈 네트워크에서의 정보보호 기술 연구)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.65-75
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at these papers, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS, DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding an external denial of service attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack like DoS, DDoS, IP Spoofing, and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

Limited Contention Scheme(LCS) to Reduce Collision in LR-WPAN (LR-WPAN에서 충돌을 줄이기 위한 제한경쟁 기법)

  • Ko, Su-Hwan;Lee, Jong-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.310-317
    • /
    • 2008
  • Data collision in LR-WPAN(Low Rate Wireless Personal Area Network) causes retransmission of which energy consumption may reduce life of the entire network. Furthermore LR-WPAN is very sensitive to collision as it has relatively fewer frequencies of backoff retries. LCS(Limited Contention Scheme) suggested in this study is a way to transmit data by certain groups of the total nodes so that it can reduce possibilities of data collision and retransmission by decreasing the number of competing nodes. As a result LCS can increase a throughput and the life of the entire network. As using LCS in designing LR-WPAN in the future can extend battery life, LCS can be useful in any application that requires low energy consumption.

Implementation of a Context-awareness based UoC Architecture for MANET (MANET에서 상황인식 기반의 UoC Architecture 구현)

  • Doo, Kyoung-Min;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1128-1133
    • /
    • 2008
  • Context-aware computing has been attracting the attention as an approach to alleviating the inconvenience in human-computer interactions. This paper proposes a context-aware system architecture to be implemented on an UoC (Ubiquitous system on Chip). A new proposed technology of CRS (Context Recognition Switch) and DOS (Dynamic and Optimal Standard) based on Context-awareness system architecture with pre-processor, HPSP(High Performance Signal Processor) in this paper. And proposed a new algorithm using in network topology processor shows for Ubiquitous Computing System. implementing in UoC (Ubiquitous System on Chip) base on the IEEE 802.15.4 WPAN (Wireless Personal Area Network) standard. Also, This context-aware based UoC architecture has been developed to apply to mobile intelligent robots which would support human in a context-aware manner.