• Title/Summary/Keyword: Science technology authority data

Search Result 59, Processing Time 0.023 seconds

Extraction of Author Identification Elements of Overseas Academic Papers on Authority Data System for Science and Technology (과학기술 전거데이터 시스템에서의 해외 학술논문 저자 식별요소 추출)

  • Choi, Hyunmi;Lee, Seokhyoung;Kim, Kwangyoung;Kim, Hwanmin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.711-713
    • /
    • 2013
  • Various human resource information of the world can be found according to spread of social network such as facebook and twitter. There are an amounts of researcher information on the science and technology area but it is difficult to find a suitable researcher for research or business such as research partner, because researcher information is not systematically arranged. To solver this problem, we are constructing authority data system for science and technology based on authority information of overseas academic papers. In this paper, in order to construct the authority data, we extracts author identification elements from millions of overseas academic papers, which are published from 1994 to 2012. There are more than 50 author identification elements such as author name, affiliation, paper title, publisher, year, keywords, co-author, co-author's affiliation in Korean, English, Chinese, and Japanese. We construct the element database by extracting and storing an author identification information based on the elements from overseas academic papers. Future works includes that the authority database for overseas academic papers is constructed by storing an academic activities of researchers after author clustering with these extracted elements. The authority data is used to improve the researcher information utilization and activate community to find a suitable research partner or a business examiner.

  • PDF

A Study on the Research Trends of Library and Information Science in Korea using S&T Authority Data (과학기술 전거데이터를 이용한 국내 문헌정보학 분야 연구동향 분석)

  • Lee, Seok-Hyoung;You, Beom-Jong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.4
    • /
    • pp.377-399
    • /
    • 2014
  • In this paper, we analyzed the research trend of Library and Information Science field in Korea using science and technology authority data which has been constructed by KISTI. The authority data is a set of data given a unique identifier to identify a unique object for the authors, affiliations and journals of domestic and international academic paper that published in Korea or written by Korean authors. We examined collaborating patterns, authors and institutional productivity through analyzing the 5 domestic LIS journals published from 1997 to 2013.

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System

  • Zhang, Wei;Wu, Yi;Xiong, Hu;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.302-322
    • /
    • 2021
  • In the system of ciphertext policy attribute-based encryption (CP-ABE), only when the attributes of data user meets the access structure established by the encrypter, the data user can perform decryption operation. So CP-ABE has been widely used in personal health record system (PHR). However, the problem of key abuse consists in the CP-ABE system. The semi-trusted authority or the authorized user to access the system may disclose the key because of personal interests, resulting in illegal users accessing the system. Consequently, aiming at two kinds of existing key abuse problems: (1) semi-trusted authority redistributes keys to unauthorized users, (2) authorized users disclose keys to unauthorized users, we put forward a CP-ABE scheme that has authority accountability, user traceability and supports arbitrary monotonous access structures. Specifically, we employ an auditor to make a fair ruling on the malicious behavior of users. Besides, to solve the problem of user leaving from the system, we use an indirect revocation method based on trust tree to implement user revocation. Compared with other existing schemes, we found that our solution achieved user revocation at an acceptable time cost. In addition, our scheme is proved to be fully secure in the standard model.

A Study on the Structure of Headings in Authority Records (전거레코드 표목의 구조화 연구 - 인명과 단체명 전거레코드의 표목을 중심으로 -)

  • Kim, Tae-Soo;Kim, Lee-Kyum;Lee, Hye-Won;Kim, Yong-Kwang;Park, Zi-Young
    • Journal of Information Management
    • /
    • v.40 no.3
    • /
    • pp.1-21
    • /
    • 2009
  • This study aims to suggest some idea for construction of headings in authority records to improve conventional method for authority control. The reference structure between established form and other forms was replaced by the link structure based on access points and adopting standard authority numbers was considered. Additional elements such as work information to distinguish homonym and notational system of the headings to promote sharing of authority records were also addressed. Authority records management system was constructed to test structure of headings suggested in this study, too. Through this research, we confirmed that management, identification, and sharing of authority records were considerably improved compared with the conventional authority control system.

Identifying Service Opportunities for Enhancing Driving Safety of Intra-City Buses Based on Driving Behavior Analysis (운전자의 위험운전 행동 분석을 통한 시내버스 안전운전 지원 서비스 기회 도출)

  • Kim, Min-Jun;Lim, Chie-Hyeon;Lee, Chang-Ho;Kim, Kwang-Jae;Jeon, Jinwoo;Park, Yongsung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.5
    • /
    • pp.499-510
    • /
    • 2015
  • The purpose of this research is to identify new service opportunities for enhancing driving safety of intra-city buses based on driving behavior analysis. Service opportunity identification involves finding target customers of service (to whom), motivations for service (why), service contents (what), and service delivery process (when, where). This paper presents an analysis of driving behaviors using the operational data of intra-city buses in conjunction with traffic accident data and drivers' driving history data. This paper also presents four identified service opportunities based on the data analysis results. This research would contribute to enhancing driving safety of intra-city buses in Korea and serve as a basis for developing new services for driving safety enhancement.

Black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data

  • Xueyan Liu;Ruirui Sun;Linpeng Li;Wenjing Li;Tao Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2550-2572
    • /
    • 2023
  • Epidemiological survey is an important means for the prevention and control of infectious diseases. Due to the particularity of the epidemic survey, 1) epidemiological survey in epidemic prevention and control has a wide range of people involved, a large number of data collected, strong requirements for information disclosure and high timeliness of data processing; 2) the epidemiological survey data need to be disclosed at different institutions and the use of data has different permission requirements. As a result, it easily causes personal privacy disclosure. Therefore, traditional access control technologies are unsuitable for the privacy protection of epidemiological survey data. In view of these situations, we propose a black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data. Firstly, a black box-assisted multi-attribute authority management mechanism without a trusted center is established to avoid authority deception. Meanwhile, the establishment of a master key-free system not only reduces the storage load but also prevents the risk of master key disclosure. Secondly, a sensitivity classification method is proposed according to the confidentiality degree of the institution to which the data belong and the importance of the data properties to set fine-grained access permission. Thirdly, a hierarchical authorization algorithm combined with data sensitivity and hierarchical attribute-based encryption (ABE) technology is proposed to achieve hierarchical access control of epidemiological survey data. Efficiency analysis and experiments show that the scheme meets the security requirements of privacy protection and key management in epidemiological survey.

Study on the Density and Volume Change Property of Petroleum Products according to Temperature Variation (석유제품의 온도 변화에 따른 밀도 및 부피 변화 특성 연구)

  • Hwang, In-ha;Doe, Jin-woo;Kang, Hyung-kyu;Sung, Sang-rae;Ha, Jong-han;Na, Byung-ki
    • Journal of the Korean Applied Science and Technology
    • /
    • v.34 no.4
    • /
    • pp.1112-1120
    • /
    • 2017
  • Petroleum products are composed of various types of hydrocarbon compounds. Like other types of liquids, they presented the variation of density and volume according to temperature change. The method of measuring the density of petroleum products in a liquid phase is based on experimental data obtained mainly for each fractionally distilled petroleum product. In this study, the density and volume changes of kerosene and automotive diesel according to temperature change were measured and the property of change were analyzed. The conversion values were calculated using the density volume conversion table proposed by international standard ASTM. In addition, we analyzed the differences between the reference values and the measured values for the temperature changes specified in the domestic metering law.

A Study on the Method and System for Organization's Name Authorization of Korean Science and Technology Contents (국내 과학기술콘텐츠 전거데이터 구축을 위한 소속기관명 식별 방법과 시스템에 관한 연구)

  • Kim, Jinyoung;Lee, Seok-Hyong;Suh, Dongjun;Kim, Kwang-Young
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.555-563
    • /
    • 2016
  • Science and technology contents (research papers, patents, reports) are the most common reference material for researchers involved in research and development in the fields of science and technology. Based on various search elements (title, abstract, keyword, year of publication, name of journal, name of author, publisher, etc.), many services are available for users to search science and technology contents and bibliographic information owned by libraries. Authority data on organization name can be useful as an element for author identification and as an element to search for results produced by specific organizations. However, organization name is not taken into account by current search services for domestic academic information and bibliographic records. This study analyzes organization name data contained in the metadata of science and technology contents, which are the basis of the establishment of authority data, and proposes a method and system based on string containment and exact string matching.

A Study on Developing and Refining a Large Citation Service System

  • Kim, Kwang-Young;Kim, Hwan-Min
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.3 no.1
    • /
    • pp.65-80
    • /
    • 2013
  • Today, citation index information is used as an outcome scale of spreading technology and encouraging research. Article citation information is an important factor to determine the authority of the relevant author. Google Scholar uses the article citation information to organize academic article search results with a rank algorithm. For an accurate analysis of such important citation index information, large amounts of bibliographic data are required. Therefore, this study aims to build a fast and efficient system for large amounts of bibliographic data, and to design and develop a system for quickly analyzing cited information for that data. This study also aims to use and analyze citation data to be a basic element for providing various advanced services to the academic article search system.