• Title/Summary/Keyword: Protection mechanisms

Search Result 361, Processing Time 0.03 seconds

Privacy Information Protection Model in e-Healthcare Environment (e-Healthcare 환경 내 개인정보 보호 모델)

  • Kim, Kyong-Jin;Hong, Seng-Phil
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.29-40
    • /
    • 2009
  • The development of information technology such as the internet has brought about rapidly changes the old medical technology, e-Healthcare has been to raise social issue. The e-Healthcare which new turning point of paradigm in the medical information develops the medical policy in Korea and the technology, the prospective of reverse engineering in internet environment is incurring problems such as distribution of critical information and invasion and infringement of privacy, etc. In this research, we suggest the Role Based Access Control System, HPIP-e-Healthcare Privacy Information Protection, for solving above problem. The HPIP is composed 4 mechanisms such as Consolidate User Identity, Hospital Authorization, Medical Record Access Control, Patient Diagnosis and we are also prototyping the HPIP for feasible approach in the real computing environment.

  • PDF

Water Mist Fire Suppression for Raised Subfloor Spaces

  • Kim, Woon-Hyung;Kim, James A. Milke
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 1997.11a
    • /
    • pp.617-624
    • /
    • 1997
  • Over 100 experiments have been conducted at the University of Maryland to evaluate the performance of a water mist fire suppression system for protection of an interstitial space below a raised subfloor. Experiments are conducted as part of an ongoing research effort to compare the fire suppression capabilities of various water mist system designs in a raised subfloor space. Water mist system design parameters considered in the investigation include means of actuation, concentration of water mist required for extinguishment of fires, and delivery mechanisms of water mist within close proximity to the fire. Delivery of the required concentration of water mist within close proximity to the fire is a principal factor governing the adequacy of water mist systems. Two sets of experiments have been conducted to document the performance of water mist system designs. One set is involved in documenting the concentration of water mist as a function of position within the space. The second set of experiments is concerned with the ability of water mist system designs to control fires in the space. One result of the research is the assessment of the ability of a water mist system to control fires at particular locations as a function of water mist density at that location.

  • PDF

A Study on the Criminal Threat and Privacy Protection with a Proxy Service (프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.317-326
    • /
    • 2012
  • Internet service provider is able to collect personal information to prevent the violations of the rights of service providers and customers using internet. But there are still many debates going on between a personal privacy and a regulation. Proxy servers are used in various technical purposes include bypass access. Although the proxy server users are increasing but there are not any proper institutional mechanisms and regulations to protect users. In this study, we discuss the two sides of a proxy service includes its privacy protection function and the cyber-crime threat and propose supplementary measures to mediate between the interests of public and private.

Hormesis as a Confounding Factor in Epidemiological Studies of Radiation Carcinogenesis

  • Sanders Charles L.
    • Journal of Radiation Protection and Research
    • /
    • v.31 no.2
    • /
    • pp.69-89
    • /
    • 2006
  • Biological mechanisms for ionizing radiation effects are different at low doses than at high doses. Radiation hormesis involves low-dose-induced protection and high-dose-induced harm. The protective component is associated with a reduction in the incidence of cancer below the spontaneous frequency, brought about by activation of defensive and repair processes. The Linear No-Threshold (LNT) hypothesis advocated by the International Commission on Radiological Protection (ICRP) and the Biological Effects of ionizing Radiation (BEIR) Report VII for cancer risk estimations Ignores hormesis and the presence of a threshold. Cancer incidences significantly less than expected have been found in a large number of epidemiological studies including, airline flight personnel, inhabitants of high radiation backgrounds, shipyard workers, nuclear site workers in scores of locations throughout the world, nuclear power utility workers, plutonium workers, military nuclear test site Participants, Japanese A-bomb survivors, residents contaminated by major nuclear accidents, residents of Taiwan living in $^{60}Co$ contaminated buildings, fluoroscopy and mammography patients, radium dial painters, and those exposed to indoor radon. Significantly increased cancer was not found at doses <200 $mSv^*$. Evidence for radiation hormesis was seen in both sexes for acute or chronic exposures, low or high LET radiations, external whole- or partial body exposures, and for internal radionuclides. The ubiquitous nature of the Healthy Worker Effect (HWE)-like responses in cellular, animal and epidemiological studies negates the HWE as an explanation for radiation hormesis. The LNT hypothesis is wrong and does not represent the true nature of the dose-response relationship, since low doses or dose-rates commonly result in thresholds and reduce cancer incidences below the spontaneous rate. Radiation protection organizations should seriously consider the cost and health implications of radiation hormesis.

A Protection Technique for Kernel Functions under the Windows Operating System (윈도우즈 운영체제 기반 커널 함수 보호 기법)

  • Back, Dusung;Pyun, Kihyun
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.133-139
    • /
    • 2014
  • Recently the Microsoft Windows OS(operating system) is widely used for the internet banking, games etc. The kernel functions provided by the Windows OS can perform memory accesses, keyboard input/output inspection, and graphics output of any processes. Thus, many hacking programs utilizes those for memory hacking, keyboard hacking, and making illegal automation tools for game programs. Existing protection mechanisms make decisions for existence of hacking programs by inspecting some kernel data structures and the initial parts of kernel functions. In this paper, we point out drawbacks of existing methods and propose a new solution. Our method can remedy those by modifying the system service dispatcher code. If the dispatcher code is utilized by a hacking program, existing protection methods cannot detect illegal operations. Thus, we suggest that protection methods should investigate the modification of the dispatcher code as well as kernel data structures and the initial parts of kernel functions.

The Effect of Aucklandiae Radix.Moschus(木香.麝香)'s for Delayed Neuronal Death in Hypoxia (목향(木香) 및 사향(麝香)이 저산소증 유발 배양 대뇌신경세포에 미치는 영향)

  • Jeong Sung-Hyun;Shin Gil-Cho;Lee Won-Chu;Moon Il-Su;Ryu Do-Kyun
    • The Journal of Internal Korean Medicine
    • /
    • v.24 no.2
    • /
    • pp.348-357
    • /
    • 2003
  • Objectives : The purpose of this investigation is to evaluate the effects of Aucklandiae Radix Moschus(木香 麝香)and to study the mechanism for neuronal death protection in hypoxia with Embryonic day 20 (E20) cortical cells of a rat (Sprague Dawley). Methods : E20 cortical cells used in this investigation were dissociated in Neurobasal media and grown for 14 days in vitro (DIV). On 14 DIV, Aucklandiae Radix Moschus(木香 麝香) was added to the culture media for 72 hrs. On 17 DIV, cells were given a hypoxic shock and further incubated in normoxia for another three days. On 20 DIV, Moschus(麝香)'s effects for neuronal death protection were evaluated by LDH assay and the mechanisms were studied by Bcl-2, Bak, Bax, caspase family. Results : This study indicate that Aucklandiae Radix(木香)'s effects for neuronal death protection in normoxia and Scutellariae Radix(麝香)'s effects for neuronal death protection in hypoxia were confirmed by LDH assay in culture method of Embryonic day 20(E20) cortical neuroblast. Moschus(麝香)'s mechanism for neuronal death protection in hypoxia is to increase the anti-apoptosis protein Bcl-2. Conclusions : It may be reasonable to propose that Moschus(麝香) protects delayed neuronal death in hypoxia by increasing Bcl-2, thereby reducing mitochondrial permeability transition(PT) pores, the cytochrome c channels.

  • PDF

Major ginsenosides from Panax ginseng promote aerobic cellular respiration and SIRT1-mediated mitochondrial biosynthesis in cardiomyocytes and neurons

  • Huang, Qingxia;Lou, Tingting;Lu, Jing;Wang, Manying;Chen, Xuenan;Xue, Linyuan;Tang, Xiaolei;Qi, Wenxiu;Zhang, Zepeng;Su, Hang;Jin, Wenqi;Jing, Chenxu;Zhao, Daqing;Sun, Liwei;Li, Xiangyan
    • Journal of Ginseng Research
    • /
    • v.46 no.6
    • /
    • pp.759-770
    • /
    • 2022
  • Background: Aerobic cellular respiration provides chemical energy, adenosine triphosphate (ATP), to maintain multiple cellular functions. Sirtuin 1 (SIRT1) can deacetylate peroxisome proliferator-activated receptor gamma coactivator 1 alpha (PGC-1α) to promote mitochondrial biosynthesis. Targeting energy metabolism is a potential strategy for the prevention and treatment of various diseases, such as cardiac and neurological disorders. Ginsenosides, one of the major bioactive constituents of Panax ginseng, have been extensively used due to their diverse beneficial effects on healthy subjects and patients with different diseases. However, the underlying molecular mechanisms of total ginsenosides (GS) on energy metabolism remain unclear. Methods: In this study, oxygen consumption rate, ATP production, mitochondrial biosynthesis, glucose metabolism, and SIRT1-PGC-1α pathways in untreated and GS-treated different cells, fly, and mouse models were investigated. Results: GS pretreatment enhanced mitochondrial respiration capacity and ATP production in aerobic respiration-dominated cardiomyocytes and neurons, and promoted tricarboxylic acid metabolism in cardiomyocytes. Moreover, GS clearly enhanced NAD+-dependent SIRT1 activation to increase mitochondrial biosynthesis in cardiomyocytes and neurons, which was completely abrogated by nicotinamide. Importantly, ginsenoside monomers, such as Rg1, Re, Rf, Rb1, Rc, Rh1, Rb2, and Rb3, were found to activate SIRT1 and promote energy metabolism. Conclusion: This study may provide new insights into the extensive application of ginseng for cardiac and neurological protection in healthy subjects and patients.

The Effect of Information Protection Control Activities on Organizational Effectiveness : Mediating Effects of Information Application (정보보호 통제활동이 조직유효성에 미치는 영향 : 정보활용의 조절효과를 중심으로)

  • Jeong, Gu-Heon;Jeong, Seung-Ryul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.71-90
    • /
    • 2011
  • This study was designed to empirically analyze the effect of control activities(physical, managerial and technical securities) of information protection on organizational effectiveness and the mediating effects of information application. The result was summarized as follows. First, the effect of control activities(physical, technical and managerial securities) of information protection on organizational effectiveness showed that the physical, technical and managerial security factors have a significant positive effect on the organizational effectiveness(p < .01). Second, the effect of control activities(physical, technical and managerial securities) of information protection on information application showed that the technical and managerial security factors have a significant positive effect on the information application(p < .01). Third, the explanatory power of models, which additionally put the information protection control activities(physical, technical and managerial securities) and the interaction variables of information application to verify how the information protection control activities( physical, technical and managerial security controls) affecting the organizational effectiveness are mediated by the information application, was 50.6%~4.1% additional increase. And the interaction factor(${\beta}$ = .148, p < .01) of physical security and information application, and interaction factor(${\beta}$ = .196, p < .01) of physical security and information application among additionally-put interaction variables, were statistically significant(p < .01), indicating the information application has mediated the relationship between physical security and managerial security factors of control activities, and organizational effectiveness. As for results stated above, it was proven that physical, technical and managerial factors as internal control activities for information protection are main mechanisms affecting the organizational effectiveness very significantly by information application. In information protection control activities, the more all physical, technical and managerial security factors were efficiently well performed, the higher information application, and the more information application was efficiently controlled and mediated, which it was proven that all these three factors are variables for useful information application. It suggested that they have acted as promotion mechanisms showing a very significant result on the internal customer satisfaction of employees, the efficiency of information management and the reduction of risk in the organizational effectiveness for information protection by the mediating or difficulty of proved information application.

Biologic Effect of Non-ionizing Radiation (비전리방사선의 생물학적 작용)

  • Huh, Seung-Jae;Wu, Hong-Gyun
    • Journal of Radiation Protection and Research
    • /
    • v.20 no.3
    • /
    • pp.163-168
    • /
    • 1995
  • The Radio-frequency electromagnetic(RFEM) spectrum is defined as waves that range in frequency from>0 to $3{\times}1012Hz$. Although there are several thousands of reports that present data or opinion of the biological response to RFEM radiation, no consensus has emerged regarding thresholds and mechanisms of injury. This review presents a overview of the subject on mechanisms of interaction of RFEM fields with tissue, chromosomal and mutagenic effect. carcinogenic effects. The scope of the review is expanded to include systemic effects such as those on reproduction, growth, and development, hematological effects. Some biological end points, those with associated with behavior and cataractogenesis is discussed.

  • PDF

Virtual Network Embedding through Security Risk Awareness and Optimization

  • Gong, Shuiqing;Chen, Jing;Huang, Conghui;Zhu, Qingchao;Zhao, Siyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2892-2913
    • /
    • 2016
  • Network virtualization promises to play a dominant role in shaping the future Internet by overcoming the Internet ossification problem. However, due to the injecting of additional virtualization layers into the network architecture, several new security risks are introduced by the network virtualization. Although traditional protection mechanisms can help in virtualized environment, they are not guaranteed to be successful and may incur high security overheads. By performing the virtual network (VN) embedding in a security-aware way, the risks exposed to both the virtual and substrate networks can be minimized, and the additional techniques adopted to enhance the security of the networks can be reduced. Unfortunately, existing embedding algorithms largely ignore the widespread security risks, making their applicability in a realistic environment rather doubtful. In this paper, we attempt to address the security risks by integrating the security factors into the VN embedding. We first abstract the security requirements and the protection mechanisms as numerical concept of security demands and security levels, and the corresponding security constraints are introduced into the VN embedding. Based on the abstraction, we develop three security-risky modes to model various levels of risky conditions in the virtualized environment, aiming at enabling a more flexible VN embedding. Then, we present a mixed integer linear programming formulation for the VN embedding problem in different security-risky modes. Moreover, we design three heuristic embedding algorithms to solve this problem, which are all based on the same proposed node-ranking approach to quantify the embedding potential of each substrate node and adopt the k-shortest path algorithm to map virtual links. Simulation results demonstrate the effectiveness and efficiency of our algorithms.