• Title/Summary/Keyword: Security Technology Policy

Search Result 686, Processing Time 0.03 seconds

A Security Labeling Scheme for Privacy Protection in Personal Health Record System (개인건강기록 시스템에서 개인 프라이버시 보호를 위한 보안 레이블 기법)

  • Yi, Myung-Kyu;Yoo, Done-sik;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.173-180
    • /
    • 2015
  • The advent of personal healthcare record(PHR) technology has been changing the uses as well as the paradigm of internet services, and emphasizing the importance of services being personalization. But the problem of user's privacy infringement and leaking user's sensitive medical information is increasing with the fusion of PHR technology and healthcare. In this paper, we propose a security labeling scheme for privacy protection in PHR system. In the proposed scheme, PHR data can be labeled also manually based on patient's request or the security labelling rules. The proposed scheme can be used to control access, specify protective measures, and determine additional handling restrictions required by a communications security policy.

Research on major technology trends in the field of financial security through Korea and foreign patent data analysis (국내외 특허 데이터 분석을 통한 금융보안 분야 주요 기술 동향 분석연구)

  • Chae, Ho-Kuen;Lee, Jooyeoun
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.53-63
    • /
    • 2020
  • Electronic financial transactions are also actively increasing due to the rapid spread of information communication media such as the Internet, smart devices, and IoT, but as a derivative by-product, threats of financial security such as leakage of various personal information and hacking are also increasing. Therefore, the importance of financial security against this is increasing, but in Korea, financial security technology is relatively insufficient compared to advanced countries in the field of financial security, such as Active-X. Therefore, this study aims to present the major development direction in the domestic financial security field by comparing key technology trends with IPC classification frequency analysis, keyword frequency analysis, and keyword network analysis based on domestic and foreign financial security-related patent data. In conclusion, it seems that recent domestic and foreign trends have focused on the development of related technologies according to the development of smart device-based electronic financial services. Accordingly, it is intended to be used as the basis data for technology development of financial security by mapping the trend of financial security research trend and technology trend analysis through thesis data analysis that reflects the research of the preceding aspect as the technology of commercialization in the future.

A Network Analysis on the Trend of Pressing Dementia Management Policy: Focusing on the Prevention of Dementia (치매관리정책의 언론보도 경향에 대한 네트워크 분석: 치매예방을 중심으로)

  • Choi, In-Kyu;Suh, Kyung-Do;Kim, Duck-Hwan;Choi, Ju-Keun
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.149-157
    • /
    • 2018
  • The purpose of this study is to identify the tendency of media reports on the dementia management policy in Korea and to suggest policy implications such as prevention of dementia, improvement of awareness, and management of dementia through network analysis. We analyzed the linkage structure between the main texts centered on the number of citations of the main language related to the dementia management policy and the centrality and mediation as the research procedures and methods. As a result of the analysis, first, a 'micro' perspective is needed to explain practically. Second, it is desirable to understand the dementia management policy in the context of community. Third, the network structure of key words such as 'dementia management policy' suggests the possibility of research study in academic research in future research. Therefore, the phenomenon of dementia management policy will contribute to the direction of future dementia management policy, not local or temporary.

The role and policy direction of food science and technology for food security of korea (식량안보를 위한 식품과학기술의 역할과 정책방향)

  • Lee, Cherl-Ho
    • Food Science and Industry
    • /
    • v.49 no.4
    • /
    • pp.3-18
    • /
    • 2016
  • The status of Korean food security was analyzed by considering world food situation and food self-sufficiency of Korea, and the hurdles to be solved by science and technology were highlighted. The role of food science and technology in preparing for future food crisis was reviewed in four categories: application of modern biotechnology to increase food production, use of irradiation technology for food storage, food processing technology for rice utilization in particular, and improving food safety regulation system for waste reduction.

A study on the Development for the National Cybersecurity Capability Assessment Criteria (국가 사이버보안 역량 평가를 위한 평가항목 연구)

  • Bae, Sunha;Park, Sangdon;Kim, So Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1293-1314
    • /
    • 2015
  • As ICT is becoming a major social infrastructure, the need to strengthen cyber capabilities are emerging. In the major advanced countries including the United States, has a continuing interest in strengthening cyber capabilities and has studied in enhancements of cyber capabilities. The cyber capability assessment is necessary in order to determine the current level of the country, establish policy directions and legislations. The selection of criteria has very important meaning to suggest future policy direction as well as an objective assessment of cybersecurity capabilities. But there are variable criteria for national cyber capabilities assessment such as strategy, legislation, technology, society and culture, and human resources. In this paper we perform the analysis of criteria for the other country's cybersecurity assessments including the U.S. and Europe. And we proposed the criteria for the national cybersecurity assessment reflecting the our country's characteristics.

Analysis of Privacy threats and Security mechanisms on Location-based Service (위치기반 서비스의 프라이버시 위협 요소 분석 및 보안 대책에 관한 연구)

  • Oh, Soo-Hyun;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.272-279
    • /
    • 2009
  • A location information used in LBS provides convenience to the user, but service provider can be exploited depending on how much risk you have. Location information can be exploited to track the location of the personal privacy of individuals because of the misuse of location information may violate the user can import a lot of damage. In this paper, we classify the life cycle of location information as collection, use, delivery, storage and destroy and analyze the factors the privacy is violated. Furthermore, we analyze information security mechanism is classified as operation mechanism and policy/management mechanism and propose a security solutions of all phase in life cycle.

  • PDF

An Authentication Protocol for the Security of RFID Tags and Readers using Random Number (난수를 이용한 RFID 태그와 리더의 보안 인증 프로토콜)

  • Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.229-233
    • /
    • 2012
  • A RFID system is a technology for detecting information on an object through wireless communication between a tag on the object and a reader, and its applications are being expanded to various areas. Because of its wireless communication, however, there are many vulnerabilities in security. Until now, many studies have been executed in order to solve problems related to the security and stability of RFID. In order to resolve vulnerabilities in existing security methods for privacy protection, this study proposed an authentication protocol that uses hash values received from tags and random numbers. When the proposed protocol was implemented, it was safe from various types of attacks between tag and reader and between reader and DB. Furthermore, compared to recently proposed protocols, it could implement a RFID system with enhanced security and less computation in tags.

A Study on adopting cloud computing in the military (국방 클라우드 컴퓨팅 도입에 관한 보안체계 연구)

  • Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.645-654
    • /
    • 2012
  • The South Korean Defense Ministry is planning and pushing forward to conduct a cloud computing pilot project in 2012. Taking into consideration the high-level security necessary in the military as well as wartime duties, if not designed properly, this project may anticipate severe damage to national security and interest. In particular, despite the fact that vulnerability due to inter-Korean confrontation and regular security-related incidents have been triggered, unconditionally conducting a cloud computing pilot project without reviewing not only violates security regulations but also causes various security-related side effects in and outside South Korea. Therefore, this thesis found conditions for conduct of this project by suggesting duties that can apply cloud computing as well as security technology, administration, post-accident matters and conditions for legally solving cloud computing in the military.

A Comparative Analysis of the Germany and Korea's Bilateral Cooperation Strategy to Secure Overseas Clean Hydrogen: Focusing on the Geopolitical Perspective (독일과 한국의 해외 청정수소 확보를 위한 양자협력 전략 비교 분석: 지정학적 관점을 중심으로)

  • JUN, EUNJIN;WOO, AMI;PARK, MIRA;JUNG, HYOUNDUK;SHIN, HYUN WOO
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.33 no.5
    • /
    • pp.470-498
    • /
    • 2022
  • Recently, the world has been considering hydrogen energy as the primary energy transition means to achieve carbon neutrality by 2050. In order to achieve the goal of reducing greenhouse gas emissions, Korea is also promoting a clean hydrogen economy. However, it is necessary to introduce various clean hydrogen from overseas so that the projected demand can not meet the domestically produced. For this study, we conducted the policy comparison approach between countries other than the generally considered technical and economic approaches. The finding proposes the direction of bilateral cooperation for a strategy of securing overseas clean hydrogen from a geopolitical perspective. Germany was a target country for the policy comparison since it has a high proportion of manufacturing, like Korea, and is taking the lead in the renewable-based energy transition policy. According to the survey and analysis of the policy establishment status and new projects of the two countries, Germany is promoting bilateral international cooperation in the hydrogen area with about 33 countries based on 7 types of activities. In comparison, Korea is involved in bilateral cooperation with about 12 countries on relatively few activities. Among the types of bilateral cooperation, R&D cooperation with advanced countries for hydrogen technology was a common activity type. Germany preemptively promotes cooperation for demonstration and commercialization, considering geopolitical means and strengthening manpower training and assistance on policy and regulation to preoccupy the market for the future. Therefore, it is necessary to consider establishing a network of an entire life cycle of supply and demand network that links the future market with securing clean hydrogen considering the geopolitical distribution. To this end, Korea also needs to expand bilateral cooperation countries by activity type, and it seems necessary to seek various geopolitical-based bilateral cooperation and support measures for developing countries to diversify the supply sources of hydrogen.

U.S. Commercial Remote Sensing Regulatory Reform Policy (미국의 상업적 원격탐사활동에 대한 규제개혁 정책)

  • Kwon, Heeseok;Lee, Jinho;Lee, Eunjung
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.2
    • /
    • pp.241-250
    • /
    • 2019
  • The current U.S. remote sensing act was made in 1992 and has been criticized for being outdated and inappropriate in view of the modern technological development. In order to enhance the American competitiveness and leadership in the world, President Trump announced Space Policy Directive (SPD) - 2 on May 24, which is designed to modernize the regulations related to commercial space activities including private remote sensing system operations. It should be noted that the regulatory reform efforts are made within broader terms of the National Security Strategy on Dec. 17, 2017, pursuing the enhancement of national security and economic prosperity as well. A legislative support in Congress has also been added to the Administration's efforts. The proposed regulatory reform on the licensing of commercial remote sensing system operations outlines the features of lessening administrative burden on applicants by simplifying the overall application process and of limiting the operations only when there is an impact upon the national security with clear and convincing evidence. But, due to a different regulatory system of each country, such a movement to expand an individual's freedom to explore and utilize outer space may result in an international dispute or a violation of international obligations, so there should be a merit in paying attention to the U.S. commercial remote sensing regulatory reform, and it is desirable to establish international norms as flexible and appropriate to the level of space technology and space industry.