• 제목/요약/키워드: Rule File

검색결과 45건 처리시간 0.021초

의료 이미지 데이터의 비식별화 방안에 관한 연구 (Study for the Pseudonymization Technique of Medical Image Data)

  • 백종일;송경택;최원균;유기근;이필우;인한진;김철중;여광수;김순석
    • 예술인문사회 융합 멀티미디어 논문지
    • /
    • 제6권6호
    • /
    • pp.103-110
    • /
    • 2016
  • 최근 의료데이터의 유출사고가 빈번히 발생하여 환자의 프라이버시 침해 및 의료기관의 피해가 날로 증가하고 있다. 정부에서는 개인정보보호법등과 같은 법규를 제정하여 이러한 피해사례 예방하고 있다. 이중 의료기관 및 의료데이타에 대한 가이드라인은 보건복지부에서 발표한 '국내 의료기관 개인정보보호 가이드라인' 정도만 발표되어 있다. 환자개인의 민감정보를 포함한 의료데이타를 타의료기관 또는 제3의 연구기관등에 전달이 필요한 경우가 발생한다. 전달하고자 하는 의료 이미지 데이터를 일반적인 이미지파일 (JPG, JPEG, TIFF)의 포맷으로 자료의 교환이 이루어지고 있다. 이와같이 일반적인 이미지 포맷의 파일은 아무런 보호조치가 되어 있지 않아 외부로 유출시에는 파일내에 포함된 환자의 주요 식별정보가 노출되는 위험성이 존재한다. 본 연구에서는 이미지 파일에 대한 광학문자판독기술(OCR)을 적용하고 민감정보가 포함된 이미지파일에 암호화된 모자이크기술을 이용한 마스킹 기법을 도입하여 이러한 위험성을 해결하기 위한 이미지 비식별화 방안을 제시한다.

KUIC_DRC : 집적회로 마스크 도면 검증 (KUIC_DRC : VLSI Layout Verification)

  • 서인환;김태훈;김홍락;김종렬;정호선;이우일
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1988년도 전기.전자공학 학술대회 논문집
    • /
    • pp.582-586
    • /
    • 1988
  • This paper describes KUIC_DRC(Kyungpook national University Intelligent CAD_Design Rule Checker) which verifies VLSI layout. It uses modified linked list data structure. The input form is modifed CIF(Caltech Intermediate Form), called KIF(Kyungpook Intermediate Form). It makes error file, a KIF file. It is written in C language and excuted on MS-DOS, in IBM PC/AT.

  • PDF

A Maximum Data Allocation Rule for an Anti-forensic Data Hiding Method in NTFS Index Record

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제9권3호
    • /
    • pp.17-26
    • /
    • 2017
  • An anti-forensic data hiding method in an NTFS index record is a method designed for anti-forensics, which records data as a file name in index entries and thereafter the index entries are made to remain in the intentionally generated slack area in a 4KB-sized index record[7]. In this paper, we propose a maximum data allocation rule for an anti-forensic data hiding method in an NTFS index record; i.e., a computational method for storing optimal data to hide data in an index record of NTFS is developed and the optimal solution is obtained by applying the method. We confirm that the result of analyzing the case where the number of index entries n = 7 is the maximum case, and show the screen captures of index entries as experimental results.

유비쿼터스 환경하에서의 홈게이트웨어를 위한 보안 설계 분석 (Analyses of Security Design for Home Gateway in Ubiquitous Surroundings)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2006년도 춘계종합학술대회
    • /
    • pp.761-764
    • /
    • 2006
  • We have developed a new remote-configurable firewall system that provides secure and easy-to-use access to home-network appliances such as network cameras, PVRs, and home file servers, through the internet. With a simple web browser operation, remote users can dynamically open and close the firewall of the home gateway. The firewall rule creation is based on an authentication of the remote client, and thus only packets from the authorized client can pass through the firewall, we analyses the sorority design for home gateway in ubiquitous surroundings.

  • PDF

조선총독부의 기록관리제도 (Records Management Systems of the Colonial Chosun Government General)

  • 이경용
    • 기록학연구
    • /
    • 제10호
    • /
    • pp.226-273
    • /
    • 2004
  • The characteristics of the records management systems of the Japanese colonial government can be summarized as follows. First, the Government General adopted a "decentralized retention" of public records. The Government General did not establish its own archives for central preservation of permanent public records. Colonial agencies established its own records office and the records office managed the records its agency created. Secret records and police records were exception. They were retained by the Secretary Office of the General Affairs Division and Police Division of the Chosun Government General respectively. Second, filing systems and retention periods of the public records followed the hierarchic structure of organization. In the headquarter of the government, records were filed by a "bureau-division-activity-file" classification system and a retention period of a file was given automatically by each unit the file belonged. A closed and cut-off file was retained and arranged according to its creating unit, creating year, and retention period. The filing system was easy to use once the filing system was established well, but to make it work effectively changes in activities and organizations should be on a reflected regular basis. It had an advantageous effect that permanent records could be preserved in a unified way throughout the organization. However, it is very critical to determine the permanent records in a professional way. Selection of the permanent records should be done professionally and in a historical perspective. Otherwise, the records retained as permanent records were not the records having an enduring value. And that was not done by the colonial government. Third, classification and scheduling of records were carried out by a creating division, rather than by the Records Office, mostly from the 1920s. Compilation of the records was also done by the creating agency. It implies that the records management lacked the professionalism. In conclusion, the records management system of the Chosun Government General wes nither modern nor user oriented. It managed the records for solely administrative purpose, i.e. effective colonial rule. The legacy of the colonial records system still exists in the public records system in Korean government. One should criticize the lack of will and efforts to modernize the public records system since the establishment of the Korean government while should reflect the historical origins of the records system in Korea.

IFTTT 서비스를 위한 실시간 이벤트 처리 룰 관리 시스템 (Real-time Event Processing Role Management System for IFTTT Service)

  • 김계영;이현동;조대수
    • 한국멀티미디어학회논문지
    • /
    • 제20권8호
    • /
    • pp.1379-1386
    • /
    • 2017
  • As the Internet of Things evolves, various IoT services are provided. IFTTT is an abbreviation for If This Then That and refers to a service that links different web-based services. This paper proposes a system that generates and manages rules that combine the possibility of IFTTT service and the real-time event processing according to the concept of IoT service. Conventional database-based data processing methods are burdened to process a lot of data of IoT devices coming in real-time. The IoT device's data can be classified into formal data such as the amount of power, temperature value and position information, and informal data such as video or image data. Thus, this system classifies the data stream of IoT devices coming in real-time using the CEP engine Esper into a file signature table, classifies the formal/informal data, and shows the condition of the device data defined by the user and the service to be provided by applying the service.

정기간행물기사색인'에 나타난 일본인명 표기에 관한 연구 (A study on the script of japan author names with chinese character in "Periodical's Index")

  • 김영귀
    • 한국도서관정보학회지
    • /
    • 제25권
    • /
    • pp.167-206
    • /
    • 1996
  • Some conclusions can be derived form the study : 1) The script of Japan author's name for 3 years(1960-1962, not published by the National Assembly Library but by Korea Library Association)and that of 1963's was arranged by their mother tongue although they had not the "author index". 2) "Periodical's Index" which the publication of National Assembly Library was not accept the principle that the person's name should be pronounce and script by one's mother tongue. It means that the Library was not accept the uniqueness of personal name. 3) Because the arrangement of the same person's name is mixed with one's mother tongue pronunciation and Korean one that they are scattered each another. 4) The same surname and the same Chinese character has different arrangement because of pronunciation rule of Korean language. 5) The same person's name was regarded as a different one because of nonaccurate name transcription. 6) A Japanese name was transcribed as Hangul with Korean pronunciation. 7) A Japanese name was transcribed as Hangul with Korean pronunciation and added Chinese Character in parenthesis. 8) A same Japanese name was regarded as a different one when it was transcribed with Chinese character and Hangul. 9) The arrangement of a same person's name was different when between the surname and forename has one space and has not. 10) "Author Index" is not playing as a role of name authority file.a role of name authority file.

  • PDF

연관규칙을 이용한 개인화 시스템 설계 (Design of Personalized System using an Association Rule)

  • 윤종찬;윤성대
    • 한국정보통신학회논문지
    • /
    • 제11권6호
    • /
    • pp.1089-1098
    • /
    • 2007
  • 최근 웹상에서 사용자들의 요구가 다양해지고 있다. 또한, 웹 사용자들은 보다 편리하고 빠르게 찾고자 하는 자료나 상품을 검색하기를 원하고 있다. 이것은 웹 사용자들마다 검색 기준이나 성향이 다르기 때문에 웹 설계자가 구현한 환경을 사용하려면 불필요한 반복 작업이 따르기 때문이다. 본 논문에서는 로그파일 분석기법을 이용하여 웹 상에서 일어나는 사용자 패턴을 분석하여 웹사이트의 정보를 사용자에게 보다 효과적으로 전달하기 위한 시스템을 제안하였다. 제안한 시스템의 고객 데이터(로그파일분석)은 데이터마이닝의 툴 중의 하나인 EC-Miner를 통해 이뤄지고 각 이동경로에 가중치를 줘서 개인화에 맞도록 적절한 레이아웃을 제공하고자 한다.

O/S 정보를 이용한 침입탐지 처리성능 향상에 관한 시스템 설계 및 구현 (Designing and Realization of the System for the Improvement of Processing Capability of Intrusion Detection by Using O/S Information)

  • 손만경;이동휘;김귀남
    • 융합보안논문지
    • /
    • 제6권2호
    • /
    • pp.91-99
    • /
    • 2006
  • 네트워크의 속도가 빨라지고 인터넷의 보편화로 인하여 웜, 이메일 바이러스 등 악의적인 공격이 급증하였으며. 네트워크의 악의적인 공격에 대한 방어로 기존의 방화벽을 비롯하여 최근 침입방지시스템에 이르기까지 수많은 방어기법이 생겨났다. 또한 악의적인 공격의 형태가 바뀜과 동시에 방어의 기법도 달라지게 된다. 가장 대표적인 방어 기법으로 Snort를 들 수 있으며 공격형태가 바뀜에 따라 Snort의 Rules 파일이 증가하게 된다. 따라서 탐지수행능력이 점점 떨어지게 된다. 본 논문에서는 Snort의 Rule 파일을 O/S별로 구분하여 처리성능 향상을 위한 구조를 제안하고 설계 및 구현한다. 이 시스템은 Snort의 기본 구성보다 처리성능을 향상시킬 수 있다.

  • PDF

Fuzzy Web Usage Mining for User Modeling

  • Jang, Jae-Sung;Jun, Sung-Hae;Oh, Kyung-Whan
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제2권3호
    • /
    • pp.204-209
    • /
    • 2002
  • The interest of data mining in artificial intelligence with fuzzy logic has been increased. Data mining is a process of extracting desirable knowledge and interesting pattern ken large data set. Because of expansion of WWW, web data is more and more huge. Besides mining web contents and web structures, another important task for web mining is web usage mining which mines web log data to discover user access pattern. The goal of web usage mining in this paper is to find interesting user pattern in the web with user feedback. It is very important to find user's characteristic fer e-business environment. In Customer Relationship Management, recommending product and sending e-mail to user by extracted users characteristics are needed. Using our method, we extract user profile from the result of web usage mining. In this research, we concentrate on finding association rules and verify validity of them. The proposed procedure can integrate fuzzy set concept and association rule. Fuzzy association rule uses given server log file and performs several preprocessing tasks. Extracted transaction files are used to find rules by fuzzy web usage mining. To verify the validity of user's feedback, the web log data from our laboratory web server.