• 제목/요약/키워드: Self protection mechanism

검색결과 25건 처리시간 0.018초

스마트폰 환경에서 개인위치정보 보호시스템 응용방안 (The Application for the Protection System of Location-based Information on a Smart-phone Environment)

  • 김인재;최재원;김운영
    • 한국전자거래학회지
    • /
    • 제17권3호
    • /
    • pp.129-147
    • /
    • 2012
  • 이동통신 환경에서 위치기반 정보시스템은 많은 서비스 이점을 보유하고 있다. 아직까지 스마트폰과 같은 모바일 기기 운영체계에서 개인위치정보의 보호에 대한 프라이버시 구조는 많이 연구되어 있지 않다. 본 연구는 위치기반서비스 관련 기술, 산업, 표준화, 법제 현황 및 위치정보 보호 방안 연구 현황을 분석하였다. 따라서, 위치정보법에서 시행하는 위치정보 사업자 또는 위치기반서비스 사업자 신고를 하지 않은 사업자 및 애플리케이션 개발자에 대하여 개인위치정보에 대한 보호 방안을 제시하고 스마트 폰 운영체제에서 개인위치정보 보호 관련 기술 규격에 대한 조사 및 분석을 수행하였다. 본 연구의 목적은 국내 위치정보법 내에서 허가되지 않은 서비스 사업자 및 애플리케이션 개발자에 대한 개인위치정보를 사용자 스스로 보호할 수 있어야한다는 취지에서 자기제어 방안을 개발함에 있다. 연구 결과, 윈도우폰 플랫폼에서 개인위치정보 주체의 자기제어 방안에 대한 가능성을 검증하였다. 특히, 신고하지 않은 위치정보 및 위치기반서비스 사업자와 애플리케이션 개발자가 현재 서비스 중이거나 서비스를 개발 중인 시스템에서의 사용자 스스로의 자기제어 방안을 제시하였다.

Expression and Significance of MicroRNA155 in Serum of Patients with Cerebral Small Vessel Disease

  • Guo, Ying;Li, Dongxue;Li, Jiapei;Yang, Nan;Wang, Deyun
    • Journal of Korean Neurosurgical Society
    • /
    • 제63권4호
    • /
    • pp.463-469
    • /
    • 2020
  • Objective : This study aimed to investigate the changes and significance of microRNA155 levels in serum of patients with cerebral small vessel disease (CSVD). Methods : Thirty patients with CSVD who met the inclusion criteria were selected and divided into eight patients with lacunar infarction (LI) group and 22 patients with multiple lacunar infarction (MLI) combined with white matter lesions (WML) group according to the results of head magnetic resonance imaging (MRI). Thirty samples from healthy volunteers without abnormalities after head MRI examination were selected as the control group. The levels of serum microRNA155 in each group were determined by real-time polymerase chain reaction, and the correlation between microRNA155 in the serum of patients with CSVD and the increase of imaging lesions was analyzed by Spearman correlation analysis. Results : Compared with the control group, the serum microRNA155 level in the LI group, MLI combined with WML group increased, the difference was statistically significant (p<0.05); serum microRNA155 level was positively correlated with the increase of imaging lesions (p<0.05). Conclusion : The change of serum microRNA155 level in patients with CSVD may be one of its self-protection mechanisms, and the intensity of this self-protection mechanism is positively correlated with the number of CSVD lesions.

Social Network Service에서의 사용자 저항에 영향을 미치는 요인에 관한 연구 (A Study on the Factors Affecting the User Resistance in Social Network Service)

  • 박은경;최정일;연지영
    • 품질경영학회지
    • /
    • 제42권3호
    • /
    • pp.387-406
    • /
    • 2014
  • Purpose: The widespread use of social network services (SNS) has caused users concern about the disclosure of their privacy or personal information. The purpose of this study is to analyze the factors of privacy concern and self presentation that affect the user resistance in the use of social network service. Methods: This study verifies the factors that affecting the user resistance in SNS. The research model suggested in this study is tested via a survey of 260 SNS users. SPSS and Smart PLS had been used to test the suggested hypotheses. Results: This study shows that privacy experience, privacy awareness, self esteem, and social desirability significantly influence perceived risk and that privacy awareness, self esteem, self efficacy, and perceived risk significantly influence perceived trust. It also verifies that perceived risk and perceived trust positively affect user resistance. Conclusion: This paper suggests that high awareness on privacy of SNS user encourages the SNS companies to consider the privacy protection mechanism for eliminating various factors that affecting the risk. This study also shows that the privacy calculus model applies to understanding the mechanism on resistance of SNS user.

자가치유 메커니즘을 활용한 침입감내시스템의 취약성 분석 (A Vulnerability Analysis of Intrusion Tolerance System using Self-healing Mechanism)

  • 박범주;박기진;김성수
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제32권7호
    • /
    • pp.333-340
    • /
    • 2005
  • 네트워크 기반 컴퓨터 시스템이 외부 침입이나 혹은 내부 침입에 의해 부분적으로 손상 (Partially Compromised)이 되더라도 최소한의 필수 서비스를 지속적으로 제공할 수 있게 해주는 침입감내시스템(Intrusion Tolerance System) 설계에 요구되는 중요한 요소 기술 중의 하나는 컴퓨터 시스템의 정량적 신인도(Dependability) 분석이라 할 수 있다. 본 논문에서는 침입감내시스템의 방어능력을 확보하기 위해 자율컴퓨팅(Autonomic Computing)의 핵심 기술인 자가 치유(Self-healing) 메커니즘을 적용하였다. 주 서버와 보조서버로 구성된 침입감내시스템의 상태천이(State Transition)를 자가치유 메커니즘의 두 가지 요소(결함모델 및 시스템반응)를 활용하여 분석하였으며, 시뮬레이션 실험을 통해 침입감내시스템의 가용도(Availability)를 계산한 후, 두 가지 경우의 취약성(Vulnerability) 공격에 대한 사례 연구를 진행하였다.

배전자동화시스템 통신서비스를 위한 이중화 통신망 보호절체 알고리즘 연구 (A Study on the Protection Switching Mechanism for Distribution Automation System Ethernet Networks Service of Distribution Automation System)

  • 유남철;김재동;오재곤
    • 전기학회논문지
    • /
    • 제62권6호
    • /
    • pp.744-749
    • /
    • 2013
  • The protection switching technology is widely adopted in the fiber-optical transmission equipments based on TDM(Time Division Multiplexing), such as PDH, SDH/SONET. A variety of protection switching algorithms for Ethernet networks and the progress of standardization are summarized in the document. There are several kinds of protection switching algorithms for Ethernet networks, such as STP, RSTP, MSTP and etc. However, since Ethernet signal move through detour route, it causes much time to recover. Accordingly, it is difficult to secure a usability of Ethernet networks and QOS(Quality of Service). Also, if the protection switching protocol standardized by IEEE and ITU-T is used, it remains a inherent network switching time for protection. Therefore, a specific protection switching algorithm for Ethernet are needed for seamless and stable operation of Ethernet networks service for Distribution Automation System(DAS). A reliable protection algorithm with no switching delay time is very important to implement Self-healing service for DAS. This study of FPGA based protection switching algorithm for Ethernet networks shows that in case of faults occurrence on distribution power network, immediate fault isolation and restoration are conducted through interaction with distribution equipments using P2P(Peer to Peer) communication for protection coordination. It is concluded that FPGA based protection switching algorithm for Ethernet networks available 0ms switching time is crucial technology to secure reliability of DAS.

Mechanisms of Protection of the Rights and Interests of Entrepreneurs in Russia

  • Turanin, Vladislav Yurievich;Kistenev, Vitaliy Valentinovich;Posokhova, Yana Vitalievna;Kisteneva, Olga Alekseevna
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.291-293
    • /
    • 2022
  • The implementation of the legal mechanism to protect the rights and interests of entrepreneurs in Russia has its unique features. When the rights and interests of a businessman are threatened with infringement, specific legal remedies may be applied, by means of which the violated rights and interests are restored and, thereby, the opportunity to resume entrepreneurial activity is created. The paper explores extrajudicial ways to protect the rights and interests of entrepreneurs in Russia. The study analyzes the forms of self-help, arbitral tribunal, resolution of applications and complaints by executive authorities, the notariate, and work with the business ombudsman and civil society institutions.

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권5호
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.

A Data Burst Assembly Algorithm in Optical Burst Switching Networks

  • Oh, Se-Yoon;Hong, Hyun-Ha;Kang, Min-Ho
    • ETRI Journal
    • /
    • 제24권4호
    • /
    • pp.311-322
    • /
    • 2002
  • Presently, optical burst switching (OBS) technology is under study as a promising solution for the backbone of the optical Internet in the near future because OBS eliminates the optical buffer problem at the switching node with the help of no optical/electro/optical conversion and guarantees class of service without any buffering. To implement the OBS network, there are a lot of challenging issues to be solved. The edge router, burst offset time management, and burst assembly mechanism are critical issues. In addition, the core router needs data burst and control header packet scheduling, a protection and restoration mechanism, and a contention resolution scheme. In this paper, we focus on the burst assembly mechanism. We present a novel data burst generation algorithm that uses hysteresis characteristics in the queueing model for the ingress edge node in optical burst switching networks. Simulation with Poisson and self-similar traffic models shows that this algorithm adaptively changes the data burst size according to the offered load and offers high average data burst utilization with a lower timer operation. It also reduces the possibility of a continuous blocking problem in the bandwidth reservation request, limits the maximum queueing delay, and minimizes the required burst size by lifting up data burst utilization for bursty input IP traffic.

  • PDF

Functional Gene Analysis for the Protection of Male Germ Cell Injury Induced by Busulfan Treatment using cDNA Microarray Analysis

  • 최윤정;옥도원;황규찬;김진회
    • 한국동물번식학회:학술대회논문집
    • /
    • 한국동물번식학회 2003년도 학술발표대회 발표논문초록집
    • /
    • pp.21-21
    • /
    • 2003
  • Male germ cell apoptosis has been extensively explored in rodent. In contrast, very little is known about their susceptibility to apoptosis stimuli of developing germ cell stages at the time when germ cell depletion after busulfan treatment occurs. Furthermore, it is still unanswered how spermatogonial stem cells are resistant to busulfan treatment. We examined the change of gene expression in detail using cDNA microarray analysis of mouse testis treated with busulfan. A subtoxic dose of busulfan (40mg/kg of body weight) transiently increased 228 mRNA levels among of the 8000 genes analyzed. TagMan analysis confirmed that the mRNA levels such as defensive protein, support protein, enzymatic protein, transport protein, and hormonal protein were rapidly increased. These results were re-confirmed by real-time PCR analysis. However, the expression levels of these genes induced by busulfan treatment were significantly reduced in control testis, indicating that both of male germ cells and somatic cells after busulfan treatment induces self-defense mechanism for protection of testicular cell death. Among them, we conclude that defense proteins play a key role in testis injury induced by busulfan.

  • PDF

정보보안 역할 스트레스가 자기 결정성을 통해 준수 의도에 미치는 영향: 개인조직 적합성의 조절 효과 (The Effect on the IS Role Stress on the IS Compliance Intention Through IS Self-determination: Focusing on the Moderation of Person-organization Fit)

  • 황인호
    • 한국전자통신학회논문지
    • /
    • 제17권2호
    • /
    • pp.375-386
    • /
    • 2022
  • 정보자산 보호가 조직의 중요한 관리 요인으로 인식되면서, 조직들은 정보보안 정책 및 기술 도입을 위한 투자를 높이고 있다. 하지만, 엄격한 정보보안의 적용은 조직원에게 스트레스를 통해 미준수 행동을 일으킬 수 있다. 본 연구의 목적은 정보보안 역할 강화로 인해 형성된 조직원의 스트레스가 자기결정성을 통해 준수 의도에 미치는 매커니즘을 제시하고, 개인조직 적합성을 통해 준수 의도 강화 방안을 제시하는 것이다. 연구는 정보보안 정책을 도입한 기업에 근무하는 조직원을 대상으로 온라인 설문을 하였으며, 475개의 표본을 활용하여 가설검증을 하였다. 첫째, 구조방정식 모형을 적용한 주효과 분석 결과는 역할 스트레스가 자기결정성을 감소하여 준수 의도에 영향을 미쳤다. 둘째, Process 3.1을 적용한 조절 효과 분석 결과는 개인조직 적합성이 자율성, 관계성이 준수 의도에 미치는 영향을 강화하였다. 연구는 조직원의 정보보안 스트레스, 행동 동기의 영향을 확인함으로써, 조직 내부의 정보보안 목표달성 방향을 제언한 측면에서 시사점을 가진다.