• Title/Summary/Keyword: Science technology authority data

Search Result 59, Processing Time 0.028 seconds

ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Rehan, Akmal;Mumtaz, Imran;Ahmad, Wasi
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.208-221
    • /
    • 2019
  • The inference for this research was concentrated on client's data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software's and hardware's are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client's necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client's info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

The analysis of Change on Property and CO2 Emission Factor of Domestic Transportation Fuel from 2012 to 2015 (2012 ~ 2015년 국내 수송용 연료의 물성 및 CO2 배출계수의 변화추이 분석연구)

  • Kang, Hyungkyu;Doe, Jinwoo;Lim, Wanguy;Hwang, Inha;Ha, Jonghan;Na, Byungki
    • Journal of the Korean Applied Science and Technology
    • /
    • v.33 no.4
    • /
    • pp.855-863
    • /
    • 2016
  • Most greenhouse gases were arisen from the generation and use of energy, more than about 95 % of greenhouse gas from the traffic section was resulted by the transportation fuels. Also, when using the $CO_2$ emission factor suggested at IPCC G/L, there was the weakness which did not reflect the own property of fuel by country. And most industrialized countries have applied with the $CO_2$ emission factor of Tier 2 or Tier 3 to make the national greenhouse report to submit to UN according to the Kyoto Protocol. In this study, the transportation fuels using in domestic like unleaded gasoline, diesel, etc were analysed to identify the physical/chemical properties and these data were used to calculate the $CO_2$ emission factor of each fuels. And the study analysed the time series analysis to compare the property of fuels according to the change of time.

Private Certification Method of ePedigree for Cooperatives (협동조합을 위한 전자 페디그리 사설인증 방법)

  • Kim, Sangsik;Chae, Myungsu;Jung, Sungkwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.463-466
    • /
    • 2016
  • Sharing of product and process information with partners is a basic activity and key requirement which ensures success of distribution. ePedigree that encapsulates all of the event data from manufacturer to retail shop provides a flexible mechanism of storing and sharing traceable information to the partners of supply chain and credibility of shared information through digital signature based on Public Key Infrastructure (PKI). To generate the signature that can be authenticated through PKI, the partners of supply chain should pay for PKI certificates from Certificate Authority (CA). In case of agrifood cooperatives which consist of petty merchants or farmers, it is hard to pay for the PKI certificate for all members and is a big obstacle for the ePedigree to be applied to the supply chain. This paper proposes a private certification method of ePedigree for cooperatives. Cooperatives can apply the ePedigree using the proposed method to all the members at small cost and the proposed method can assure the credibility of information at the same level of the previous ePedigree.

  • PDF

An Evaluation of Applying Knowledge Base to Academic Information Service

  • Lee, Seok-Hyoung;Kim, Hwan-Min;Choe, Ho-Seop
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.3 no.1
    • /
    • pp.81-95
    • /
    • 2013
  • Through a series of precise text handling processes, including automatic extraction of information from documents with knowledge from various fields, recognition of entity names, detection of core topics, analysis of the relations between the extracted information and topics, and automatic inference of new knowledge, the most efficient knowledge base of the relevant field is created, and plans to apply these to the information knowledge management and service are the core requirements necessary for intellectualization of information. In this paper, the knowledge base, which is a necessary core resource and comprehensive technology for intellectualization of science and technology information, is described and the usability of academic information services using it is evaluated. The knowledge base proposed in this article is an amalgamation of information expression and knowledge storage, composed of identifying code systems from terms to documents, by integrating terminologies, word intelligent networks, topic networks, classification systems, and authority data.

North Korean Research Institutes for Plant Resources and the Actual Conditions of Their Agricultural Usage

  • Lim, Sang-Cheol;Kim, Wan-Seok
    • Korean Journal of Plant Resources
    • /
    • v.23 no.6
    • /
    • pp.550-553
    • /
    • 2010
  • The representative research institutes in North Korea are the Academy of Science and the laboratories of major universities. The National Academy of Science consists of headquarters, Academy of Medicinal Science, Academy of Forestry Science, and Academy of Agricultural Science. Under the authority of the National Academy of Science, Central Information Agency for Science and Technology (CIAST) has built up a database system integrating all the science technology data to provide scientific and technological information. The major universities of North Korea include Kim Il-sung University, Kim Chaek University of Technology, Pyongyang Agricultural College, and Wonsan Agricultural College, and an agricultural college is situated in each province. Out of 3,860 plant species in North Korea, 158 species which amounts to approximately 4% of the total are rare and endangered, and deforestation is under a critical situation. The Oriental Medicine (Koryo Medicine) has been well developed using medicinal plants, and practical researches on biotic pesticide are largely conducted as an alternative to tackle the shortage of farming materials. Hereafter, a South-North joint research on the amount of plant resources and the methods of its conservation is needed and the North Korean research areas of biotic pesticide are worth adopting to the South Korean eco-friendly organic agriculture.

A Study on the Reliability Evaluation Index Development for the Information Resources Retained by Institutions: Focusing on Humanities Assets

  • Jeong, Dae-Keun;Noh, Younghee
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.9 no.2
    • /
    • pp.65-89
    • /
    • 2019
  • This study has the aim of developing an evaluation index that can help evaluate the reliability of the information resources of institutions retaining humanities assets for the purposes of laying out the foundation for providing one-stop portal service for humanities assets. To this end, the evaluation index was derived through the analysis of previous research, case studies, and interviews with experts, the derived evaluation index was then applied to the humanities assets retaining institutions to verify the utility. The institutional information resources' reliability evaluation index consisted of the two dimensions of the institutions' own reliability evaluation index. The institution provided a service and system evaluation index. The institutions' own reliability evaluation index consisted of 25 points for institutional authority, 25 points for data collection and construction, 30 points for data provision, and 20 points for appropriateness of data, for a total of 100 points, respectively. The institution provided service and system evaluation indexes consisting of 25 points for information quality, 15 points for appropriateness (decency), 15 points for accessibility, 20 points for tangibility, 15 points for form, and 10 points for cooperation, for the total of 100 points, respectively. The derived evaluation index was used to evaluate the utility of 6 institutions representing humanities assets through application. Consequently, the reliability of the information resources retained by the Research Information Service System (RISS) of the Korea Education & Research Information Service (KERIS) turned out to be the highest.

Minimally Supervised Relation Identification from Wikipedia Articles

  • Oh, Heung-Seon;Jung, Yuchul
    • Journal of Information Science Theory and Practice
    • /
    • v.6 no.4
    • /
    • pp.28-38
    • /
    • 2018
  • Wikipedia is composed of millions of articles, each of which explains a particular entity with various languages in the real world. Since the articles are contributed and edited by a large population of diverse experts with no specific authority, Wikipedia can be seen as a naturally occurring body of human knowledge. In this paper, we propose a method to automatically identify key entities and relations in Wikipedia articles, which can be used for automatic ontology construction. Compared to previous approaches to entity and relation extraction and/or identification from text, our goal is to capture naturally occurring entities and relations from Wikipedia while minimizing artificiality often introduced at the stages of constructing training and testing data. The titles of the articles and anchored phrases in their text are regarded as entities, and their types are automatically classified with minimal training. We attempt to automatically detect and identify possible relations among the entities based on clustering without training data, as opposed to the relation extraction approach that focuses on improvement of accuracy in selecting one of the several target relations for a given pair of entities. While the relation extraction approach with supervised learning requires a significant amount of annotation efforts for a predefined set of relations, our approach attempts to discover relations as they occur naturally. Unlike other unsupervised relation identification work where evaluation of automatically identified relations is done with the correct relations determined a priori by human judges, we attempted to evaluate appropriateness of the naturally occurring clusters of relations involving person-artifact and person-organization entities and their relation names.

Comparative Analysis of KoMCI 2004 and KCI 2004 Impact Factors (KoMCI(Korean Medical Citation Index)와 KCI(Korea Citation Index)의 2004년도 영향력지표값 비교분석)

  • Sun, Huh;Lee, Choon-Shil
    • Journal of Information Management
    • /
    • v.36 no.3
    • /
    • pp.183-193
    • /
    • 2005
  • Korean Academy of Medical Sciences began developing Korean Medical Citaton Index(KoMCI) database in 2002, and has announced the impact factors of Korean medical journals published since 2000. In July 2005, Korea Research Foundation also announced the KCI impact factor of journals covering all subject areas for the 2003 and 2004. We compared the impact factor(IF), impact factor excluding self-citation(ZIF), and self-citation impact factor(SIF) of KoMCI 2004 and KCI 2004 in order to disclose why there is such a great difference in the values of impact factors between two databases. Out of 72 medical journals in both database, 59 journals were compared after excluding the missing data in KCI. Mean IF of KoMCI 2004 was 0.2 and that of KCI 2004 was 0.03(p=0.0000). Mean ZIF of KoMCI was 0.06 and that of KCI was 0.01(p=0.000). Mean SIF of KoMCI was 0.139 and that of KCI was 0.02(p=0.0000). We presumed that the major difference in the impact factor values was originated from the fact that KCI does not control the authority of journal names cited in the references. We strongly recommend that it is necessary to control the authority especially if Korea Research Foundation wants to ensure the validity and reliability of KCI data in the evaluation of korean journals.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System (안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구)

  • Nam, Gi-hoon;Gong, Seong-hyeon;Seok, Byoung-jin;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.111-122
    • /
    • 2018
  • Using OAuth protocol, third-party applications on the Android operating system use user's credentials or access tokens that have access authority on user's resources to gain user's account and personal information from account information providers. These credentials and token information are stored in the device by the OAuth data management method provided by the Android operating system. If this information is leaked, the attacker can use the leaked credential and token data to get user's personal data without login. This feature enables the digital forensic investigator to collect data directly from the remote server of the services used by the target of investigation in terms of collecting evidence data. Evidence data collected at a remote location can be a basis for secondary warranties and provide evidence which can be very important evidence when an attacker attempts to destroy evidence, such as the removal of an application from an Android device. In this paper, we analyze the management status of OAuth tokens in various Android operating system and device environment, and show how to collect data of various third party applications using it. This paper introduces a method of expanding the scope of data acquisition by collecting remote data of the services used by the subject of investigation from the viewpoint of digital forensics.