• Title/Summary/Keyword: Security Technology Policy

Search Result 686, Processing Time 0.026 seconds

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

A Study on Improvement of Test & Evaluation of Vehicle Part in Mixed Equipment and Defense Industrial Technology (혼성장비 차량부 시험평가 및 방위산업기술 보호 제도 개선에 관한 연구)

  • Yoon, Heung-Soo;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.241-249
    • /
    • 2018
  • The military purpose vehicles are developed by using the platform of civil vehicles according to the commercial vehicle expansion plan and military supplied product commercialization policy. But the information related to the military purpose vehicle which adopts the same platform with the civil vehicle is forced to be exposed because its information is revealed by containing into the maintenance manual and electric circuit diagram. Especially, the information disclosure should be blocked by reviewing the application of technology protection because the military vehicle becomes combating purposed mixed equipment when the missile and radar are mounted. The mixed equipment means the one configured with more than 2 types of equipment, and it is categorized into the main and sub equipment. This study was performed to derive the problems in Korean system for vehicle part test evaluation on the mixed equipment and the defense industry technology protection system, and to derive the methods for improving through interviews with the specialists. The conflicts between the civil laws and army regulation were reduced by adding a clause that the engine reflected with the newest emission gas standard should be mounted based on the time of force integration, and the commercialized military supplies were designated as element technology of defense industry technology in consideration of its roles and functions.

VERIFICATION OF ELECTROMAGNETIC EFFECTS FROM WIRELESS DEVICES IN OPERATING NUCLEAR POWER PLANTS

  • YE, SONG-HAE;KIM, YOUNG-SIK;LYOU, HO-SUN;KIM, MIN-SUK;LYOU, JOON
    • Nuclear Engineering and Technology
    • /
    • v.47 no.6
    • /
    • pp.729-737
    • /
    • 2015
  • Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

Efficiency Analysis of the Securities Firms using a Combined BSC and DEA Model (BSC와 DEA 결합모델을 이용한 증권사 효율성 분석)

  • Kim, Youngjin;Jung, Goosang;Hwang, Jae-Joon;Lee, Hyun-Soo;Kim, Sun Ah;Kim, Tae-Sung
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.159-168
    • /
    • 2013
  • This study analyze the business efficiency of securities company based on the 2011 performance of 29 securities firms which engage in domestic investment brokerage by applying a combination model of BSC and DEA. And we evaluate business state focused on efficiency which is based on logical system of BSC as business innovation method. The analysis of result is that companies with high customer efficiency index appeared that business efficiency composite index tended to be higher and we identified that customer perspective have an important factor to calculate business efficiency composite index of korea security company. In addition, based on the results of the efficiency analysis we analyze correlation analysis between traditional financial ratio and business efficiency composite index. We confirmed that company of high business efficiency level in terms of BSC have a good record in terms of profitability. BSC-DEA combination model expect to be utilized in security industry sector as well as other industrial sectors as good business indicator to determine the business efficiency and to be used a model can be evaluated the integrated firm valuation of tangible and intangible assets.

Social Media Analysis Based on Keyword Related to Educational Policy Using Topic Modeling (토픽모델링을 이용한 교육정책 키워드 기반 소셜미디어 분석)

  • Chung, Jin-myeong;Park, Young-ho;Kim, Woo-ju
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.53-63
    • /
    • 2018
  • The traditional mass media function of conveying information and forming public opinion has rapidly changed into an environment in which information and opinions are shared through social media with the development of ICT technology, and such social media further strengthens its influence. In other words, it has been confirmed that the influence of the public opinion through the production and sharing of public opinion on political, social and economic changes is increasing, and this change is already in use on the political campaign. In addition, efforts to grasp and reflect the opinions of the public by utilizing social media are being actively carried out not only in the political area but also in the public area. The purpose of this study is to explore the possibility of using social media based public opinion in educational policy. We collected media data, analyzed the main topic and probability of occurrence of each topic, and topic trends. As a result, we were able to catch the main interest of the public(the 'Domestic Computer Education Time' accounted for 43.99%, and 'Prime Project Selection' topics was 36.81% and 'Artificial Intelligence Program' topics was 7.94%). In addition, we could get a suggestion that flexible policies should be established according to the timing of the curriculum and the subject of the policy even if the category of the policy is same.

Analysis of Korea's Artificial Intelligence Competitiveness Based on Patent Data: Focusing on Patent Index and Topic Modeling (특허데이터 기반 한국의 인공지능 경쟁력 분석 : 특허지표 및 토픽모델링을 중심으로)

  • Lee, Hyun-Sang;Qiao, Xin;Shin, Sun-Young;Kim, Gyu-Ri;Oh, Se-Hwan
    • Informatization Policy
    • /
    • v.29 no.4
    • /
    • pp.43-66
    • /
    • 2022
  • With the development of artificial intelligence technology, competition for artificial intelligence technology patents around the world is intensifying. During the period 2000 ~ 2021, artificial intelligence technology patent applications at the US Patent and Trademark Office have been steadily increasing, and the growth rate has been steeper since the 2010s. As a result of analyzing Korea's artificial intelligence technology competitiveness through patent indices, it is evaluated that patent activity, impact, and marketability are superior in areas such as auditory intelligence and visual intelligence. However, compared to other countries, overall Korea's artificial intelligence technology patents are good in terms of activity and marketability, but somewhat inferior in technological impact. While noise canceling and voice recognition have recently decreased as topics for artificial intelligence, growth is expected in areas such as model learning optimization, smart sensors, and autonomous driving. In the case of Korea, efforts are required as there is a slight lack of patent applications in areas such as fraud detection/security and medical vision learning.

Economic Analysis of Intelligent Security Service for Crime Prevention :Focused on Anyang City Security Demonstration District Project (범죄예방을 위한 지능형 방범 서비스 도입에 따른 경제성 분석 연구 :안양시 방범 실증지구 사업을 중심으로)

  • Yu, In-Jae;Han, Sun-Hee;Shin, Young-Seob;Lee, Jae-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.8
    • /
    • pp.667-676
    • /
    • 2019
  • In recent years, the occurrence of life and violent crime in the city centered on crime-prone areas has become a big issue, raising the public interest in safety from crime has been higher than ever. As the initial response to crime and the importance of crime prevention are emerging, the government is preparing various measures such as crime prevention service using advanced technology. This project is a demonstration project to select specific target sites and apply that on a trial basis with the main purpose of commercialization of intelligent crime prevention technologies and services. In order to spread the business through the demonstration project, it is expected that the practical economic evaluation as well as the academic and practical value of the project will have a great significance. In this study, the purpose of this research is to derive economic feasibility through technologies and services to be implemented in Indokwon district of Anyang city, which is selected demonstration site of the intelligent security, to promote the spread of business and contribute to the policy activation.

The Effects of Perceived Characteristics of Smart Phone upon Psychological Attitude -Study with focus on sense of security and sense of dependence (스마트폰의 지각된 특성이 심리적 태도에 미치는 영향 -안도감과 의존감을 중심으로)

  • Cho, Hwi-Hyung
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.175-184
    • /
    • 2012
  • The aim of this study is to inquire into the influential relationship between perceived characteristics and psychological attitude toward smart phone in relation with the smart phone. This study conducted a questionnaire survey targeting domestic college students who are using the smart phone in an effort for an empirical test of the research model. The theoretical implications of this study laid foundation for doing research on the behavior of perceived characteristics and psychological attitude toward technology, and supplied a clue to diverse, in-depth research works on the further smart phone. The study-suggested practical implications are as follows: First, it is required that the usefulness and easy of use of the smart phone should be reinforced in order to form a positive attitude toward the smart phone. Second, the sense of dependence on the smart phone has an influence on user satisfaction.

A Study on a Plan for Adaptation according to the Change of a Bodyguard's Social Cognition (경호직 근무자의 업무능력 증대방안에 관한 고찰)

  • Kim, Chang-Ho
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.65-83
    • /
    • 2004
  • In modern society, the enterprises or the public organization have devised consistent means and methods with keen competition in high intelligence, high specialization and high competition for surviving in the struggle for existence. In the rapidly changing modern society like that, guard services are not free any more in the simple business. It will be survived only with consistent self-development and various abilities. Recently, it is on a trend that the enterprise including venture business requires the man of ability having many-sided thought, knowledge and capacity. That is, the era of a man with multi-function has come. The guards engaged in their present posts have to make efforts self-development consistently. And they have to work for self-development with theoretical knowledge acquirement about the expert knowledge escaping from simple function and business. The constitution including universities that train the guard should not adjust to the demand of quantitative manpower required in the enterprise organization with the training of the guard with simple functions only. It needs settlement as a curriculum with technology like ideology and knowledge breaking from short curriculum centered on function only in order to come to stay the recognition about guard services as expert services that the industrial society requires. The education centered on simple function should be replaced in the use of a high school, private academy and special guard institution. In addition, it requires a quality as the auxiliary, division, decision-making and spokesman according to the business role. Also, it requires the martial arts capacity, the communicative capacity, the sports or reports capacity, the guard driving capacity, the policy and assistant capacity and the information and analysis capacity, etc in individual. Lastly, it need each guard's change of cognition most of all. As part of the guard's adaptive plan according to the social change, it was enumerated like the mentioned above. It is important for the guard to prepare for the change of era and to build up quality and capacity before anything else.

  • PDF

The Effects of the Social Risk on the Resistance of Purchase in Mobile Shopping (모바일 쇼핑의 사회적 위험이 구매저항에 미치는 영향)

  • Moon, Hye-Mi;Lee, Kyeong-Rak;Lee, Sang-Joon
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.93-106
    • /
    • 2014
  • All of smart phone users not always make a good use of mobile shopping. The main cause is that in case of non-user of mobile shopping, potential apprehension to psychological and security weakness affects building up resistance on mobile shopping. In this paper, we designed models of innovation resistance heavily based on literature reviews and previous studies, and tried to find how perceived risk affects consumer's purchase intention in mobile shopping process. In conclusion, it shows that security, one of psychological factors, affects perceived risk in all aspects, while negative influence of society and cognitive dissonance just affect social risk and delivery risk, and uncertainty also just affects performance risk. Besides, it shows that all of variables made up perceived risk affects resistance of purchase. Especially social risk turns out to be a most influential factor to purchase behavior through smart phone.