• 제목/요약/키워드: The Private Security

검색결과 1,401건 처리시간 0.031초

A Study on the Users' Response to Privacy Issues in Customized Services

  • Park, Sunwoo;Baek, Jeongyun;Yoo, Yeajoo;Kim, Dongwhan
    • Journal of Multimedia Information System
    • /
    • 제9권3호
    • /
    • pp.201-208
    • /
    • 2022
  • Customized service is a vital and mandatory element for apps in improving their technical performance and app customer analysis. While apps require users' consent for their data extraction and usage, many of the terms and agreement forms are written intricately, making it harder for users to fully understand the whole concept of users' data collection for customized services. Ever since the Facebook-Cambridge Analytica scandal, personal data privacy has been re-examined, forcing many app companies to reinforce a reliable solution to data privacy issues. However, there has not been a secured solution, which worries many people about the future advanced issues when metaverse platforms are actively used in daily apps. The research aims to collect the reactions and behaviors of everyday app users who utilize apps with customized services to understand the nature of privacy data issues and the users' opinions about the future implementation of metaverse platforms. The method of the research was an online questionnaire that targeted university students. The study revealed many fearful and anxious reactions about personal data and further metaverse issues where most app users were uneducated about how current apps collect and utilize users' private data.

Two Attribute-based Broadcast Encryption Algorithms based on the Binary Tree (이진트리 기반의 속성기반 암호전송 알고리즘)

  • Lee, Moon Sik;Kim, HongTae;Hong, Jeoung Dae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • 제17권3호
    • /
    • pp.358-363
    • /
    • 2014
  • In this paper, we present two constructions of the attribute-based broadcast encryption(ABBE) algorithm. Attribute-based encryption(ABE) algorithm enables an access control mechanism over encrypted data by specifying access policies among private keys and ciphertexts. ABBE algorithm can be used to construct ABE algorithm with revocation mechanism. Revocation has a useful property that revocation can be done without affecting any non-revoked uers. The main difference between our algorithm and the classical ones derived from the complete subtree paradigm which is apt for military hierarchy. Our algorithm improve the efficiency from the previously best ABBE algorithm, in particular, our algorithm allows one to select or revoke users by sending ciphertext of constant size with respect to the number of attributes and by storing logarithm secret key size of the number of users. Therefore, our algorithm can be an option to applications where computation cost is a top priority and can be applied to military technologies in the near future.

Smart Windows and Doors Platform for Providing Optimized Inner Environment (최적의 실내 환경을 제공하기 위한 스마트 창호 플랫폼)

  • Cho, Yong-Hyun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • 제25권5호
    • /
    • pp.464-469
    • /
    • 2015
  • This paper presents the smart system platform for remotely controlling the windows and doors system(WDS), which gathers and analyzes the state of WDS and the environmental data for preventing crimes and keeping a pleasant indoor. In particular, standard API between the smart WDS platform and the smart home platform has been presented to be easy to a home services, such as security, safety, and home appliance control. The private gateway of wire and wireless communication interfaces has been developed to remotely control and monitor the WDS for anytime and anyplace solving the crime prevention and ventilation problem. Web-and App-based user interface in order to detect the opening and shutting states and remotely control WDS have also been developed to support the mobile environment, respectively.

Topic Modeling of Korean Newspaper Articles on Aging via Latent Dirichlet Allocation

  • Lee, So Chung
    • Asian Journal for Public Opinion Research
    • /
    • 제10권1호
    • /
    • pp.4-22
    • /
    • 2022
  • The purpose of this study is to explore the structure of social discourse on aging in Korea by analyzing newspaper articles on aging. The analysis is composed of three steps: first, data collection and preprocessing; second, identifying the latent topics; and third, observing yearly dynamics of topics. In total, 1,472 newspaper articles that included the word "aging" within the title were collected from 10 major newspapers between 2006 and 2019. The underlying topic structure was analyzed using Latent Dirichlet Allocation (LDA), a topic modeling method widely adopted by text mining academics and researchers. Seven latent topics were generated from the LDA model, defined as social issues, death, private insurance, economic growth, national debt, labor market innovation, and income security. The topic loadings demonstrated a clear increase in public interest on topics such as national debt and labor market innovation in recent years. This study concludes that media discourse on aging has shifted towards more productivity and efficiency related issues, requiring older people to be productive citizens. Such subjectivation connotes a decreased role of the government and society by shifting the responsibility to individuals not being able to adapt successfully as productive citizens within the labor market.

A STUDY OF AN NAT USING THE TCP SEGMENT INFORMATION (TCP 세그멘트 정보를 이용한 NAT에 대한 연구)

  • JaeYongHwang;GiHoJoo
    • Journal of the Korean Geophysical Society
    • /
    • 제4권4호
    • /
    • pp.239-249
    • /
    • 2001
  • NAT (Network Address Translation) is an IP address modification protocol that translates private IP addresses into authentic Internet addresses. The main features of NAT are to improve network security and to save IP addresses. Generally speaking, in order to perform its functionality. NAT uses the address informaiton in the packet header. Certain application protocols, however, use the information in the packet data as well as the imformation in the packet header to perform end-to-end communication. Therefor, to support these types of application protocols, NAT should be able to perform appropriate translation of protocol information in the packet data. In this thesis, we design and implement a method which translates virtual IP information in the packet data into real IP information by using port proxy server.

  • PDF

Application Study applied to the Encryption at Virtualization Launcher (가상화 런처에서 암호화를 적용한 어플리케이션 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제14권2호
    • /
    • pp.87-92
    • /
    • 2014
  • Smartphones, as well as providing a number of convenience features such as an individual's personality to express the range is gradually increasing. Changed when we met another person, such as a change of outward change in the smartphone became responsive individuals. Each other, it is common to observe smartphones smartphones. Smartphone now due to the common use of information leakage has become a serious problem. In this paper, when sharing smart phone, smartphones to separate the user's area, and the constraints of privacy and the need to apply encryption to prevent information leakage or add application-specific information is encrypted and stored in other similar applications it is not accessible to protect the personal information was through this smartphone to share your private information even improved.

Privacy and Security on the Web (웹에서의 개인정보보호 방안)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2013년도 추계학술대회
    • /
    • pp.657-660
    • /
    • 2013
  • The Internet is referred as sea of information, which provides huge information, but personal information is collected for malicious behavior and provided to various web sites via internet. This can lead to economic losses as well as the disclosure of personal information. We can easily get personal information from device, such as mobile and private terminal, as well as internet, and then it can be spread very quickly. The personal information leakage and damage cases are also increasing, while the importance of personal information on the web page to distinguish the individual as the basic information is growing. In this paper we review and analyse recent invasion of privacy practices on the web and its causes, and technical and administrative protections.

  • PDF

A Study of an NAT Protocol using Virtual IP Information in the TCP Segment (TCP 세그멘트내의 가상 IP 정보를 이용하는 NAT 프로토콜에 대한 연구)

  • Hwang, Jae-Yong;Ju, Gi-Ho
    • The Journal of Engineering Research
    • /
    • 제5권1호
    • /
    • pp.45-55
    • /
    • 2004
  • NAT (Network Address Translation) is an IP address modification protocol that translates private IP address into authentic Internet address. The main features of NAT are to improve network security and to save IP address. Generally speaking, in order to perform its functionality, NAT uses the address information in the packet header. Certain application protocols, however, use the information in the packet data as well as the information in the packet header to perform end-to-end communication. Therefore, to support these types of application protocols, NAT should be able to perform appropriate translation of protocol information in the packet data. In this thesis, we design and implement a method which translates virtual IP information in the packet date into real IP information by using port proxy server.

  • PDF

The Geopolitics of Chinese Overseas Investment in Ports Under the 'One Belt One Road' Initiatives ('일대일로' 이니셔티브하의 중국 해외항만투자의 지정학적 접근)

  • Lee, Choong-Bae
    • Korea Trade Review
    • /
    • 제44권1호
    • /
    • pp.285-299
    • /
    • 2019
  • The 'One Belt One Road (OBOR)' initiative, which was promulgated as part of the enlargement policy along with the advent of Xi Jinping in 2013, is a policy to expand China's political and economic power externally through linkages with neighboring countries. China's overseas port investment plays an important role in the promotion of the 'OBOR' policy from the coast of China through maritime transportation routes from S.E Asia to Mediterranean and Europe. Since China's overseas port investment has been made from several factors such as political, economic, and military motives, it differs in purpose and character from investments made by private companies, such as Global Port Operators(GTO) which consider profitability first. This study aims to address future prospects and implications by analyzing the geopolitics of China's overseas port investment under the 'One Belt One Road' initiative. According to the results, China's overseas port investment is dominated by state-owned enterprises and political and security factors are more important than profitability. China's overseas port investment has been on a large scale in a short period of time, and China has faced with various problems both domestically and internationally. such as debt default, environmental problems, subordination problems from recipient countries and political and military confrontation with great countries such as United States, Japan and India etc.

State of the Art of Anti-Screen Capture Protection Techniques

  • Lee, Young;Hahn, SangGeun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권5호
    • /
    • pp.1871-1890
    • /
    • 2021
  • The transition toward a contactless society has been rapidly progressing owing to the recent COVID-19 pandemic. As a result, the IT environment of organizations and enterprises is changing rapidly; in particular, data security is expanding to the private sector. To adapt to these changes, organizations and companies have started to securely transfer confidential data to residential PCs and personally owned devices of employees working from home or from other locations. Therefore, organizations and companies are introducing streaming data services, such as the virtual desktop infrastructure (VDI) or cloud services, to securely connect internal and external networks. These methods have the advantage of providing data without the need to download to a third terminal; however, while the data are being streamed, attacks such as screen shooting or capturing are performed. Therefore, there is an increasing interest in prevention techniques against screen capture threats that may occur in a contactless environment. In this study, we analyze possible screen capture methods in a PC and a mobile phone environment and present techniques that can protect the screens against specific attack methods. The detection and defense for screen capture of PC applications on Windows OS and Mac OS could be solved with a single agent using our proposed techniques. Screen capture of mobile devices can be prevented by applying our proposed techniques on Android and iOS.