• Title/Summary/Keyword: User Protection

Search Result 677, Processing Time 0.029 seconds

Development of MATLAB GUI Based Software for Analysis of KASS Availability Performance (KASS 가용성 성능 평가를 위한 MATLAB GUI 기반 소프트웨어 설계)

  • Choi, Bong-kwan;Han, Deok-hwa;Kim, Dong-uk;Kim, Jung-beom;Kee, Chang-don
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.384-390
    • /
    • 2018
  • This paper introduces a MATLAB graphical user interface (GUI) based software for analysis of korea augmentation satellite system (KASS) availability performance. This software uses minimum variance (MV) estimator and Kriging algorithm to generate integrity information such as user differential range error (UDRE) and grid ionospheric vertical error (GIVE). The information is offered to ground and aviation users in Korean region. The software also gives accuracy data, protection level data and availability map about each user position by using the integrity information. In particular the software calculates the protection level along a path of aircraft. We verified the result of protection level of aviation user by comparing them with the results of SBASimulator#2, which is a simulation tool of european geostationary navigation overlay service (EGNOS). As a result, the protection level error between the result of our software and the SBASimulator#2 was about 2% which means that the result of our software is accurate.

Enhanced Certificate with User's Privacy Protection Methods (프라이버시 보호 기능이 추가된 인증서 프로화일에 관한 연구)

  • Yang Hyung kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4C
    • /
    • pp.290-295
    • /
    • 2005
  • When a Certification Authority (CA) issues X.509 public-key certificate to bind a public key to a user, the user is specified through one or more subject name in the 'subject' field and the 'subjectAltName' extension field of a certificate. The 'subject' field or the 'subjectAltName' extension field may contain a hierarchically structured distinguished name, an electronic mail address, If address, or other name forms that correspond to the subject. In this paper, we present the requirements for certificate holder's privacy protection and propose the methods to protect the user's privacy information contained in the 'subject' field or the 'subjectAltName' extension field of a public-key certificat

Carrying Capacity Estimation and Management Planning of the Seonjeong Royal Tomb(II) (선정릉의 적정수용능력추정 및 관리방안(II))

  • 이경재;오구균;조재창
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.15 no.2
    • /
    • pp.79-90
    • /
    • 1987
  • This second consecutive research was connected to 7he previous first research with same title. The purpose of this research is to estimate the carrying capacity for the Seonjeong royal tomb and to propose its management planning. User's characteristics and relationship between user's density and vegetational environment were analized for the above objective. The result of this research shall be summarized as follows. 1. The site was damaged seriously by pupils and social groups'picnic activities concentrated in special periods of Friday and weekend during April and May. 2. Social-psychological carrying capacity estimation would be impossible due to lack of relationship between user's density and satisfaction. 3. Maximum user's density limits as a ecological carrying capacity was 1.4 persons per 100 square meters and modified optimum ecological carrying capacity was estimated as 1.0persons per 100 square meters. Maximum visitors as a optimum carrying capacity of the Seonjeong royal tomb area was estimated as 6,000 persons when supposing the proposed landuse planning. 4. To restore and preserve the tomb landscape as a traditional historic site, Seonjeong royal tomb shall be managed by three landuse areas ; protection and control area, natural picnic area and shaded picnic area. And the protection and control area include three sites ; natural reclamation site, natural preservation site and tomb landscape conservation site.

  • PDF

A License Administration Protocol Providing User Privacy in Digital Rights Management (디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜)

  • 박복녕;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.189-198
    • /
    • 2003
  • As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.

A Practical Use of UCC for Improving Information Protection Education (정보 보호 교육 향상을 위한 UCC 활용방안)

  • Seo, Min-Sung;Cho, Seong-Je;Kim, Seong-Baeg
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.5
    • /
    • pp.1-13
    • /
    • 2009
  • Systematic information protection education is necessary to evoke the importance of information protection to the students and to provide them with alternatives to cope with malicious attacks. However, there have been too little development of the methods of systematic education and teaching materials to allow an effective education of information protection in the classrooms today. In this paper, we developed principle-oriented visual learning materials using UCC (User Created Content) for an effective education of information protection and evaluated the effectiveness of our approach with independent sample t-test method after being used in two classes, a test group and a control group. In particular, using UCCs, which have become the most frequently used contents in the Internet, as visual material for the education of information protection, proved to be effective in promoting the interest of students in classes and highly useful in education.

  • PDF

Proposal for Social Casino Game Policy based on Responsible Game System (책임게임시스템 기반 소셜 카지노 게임 정책 제언)

  • Song, Seung-keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2039-2044
    • /
    • 2016
  • This study aims to investigate the safety instrument to prepare the policy alternative for social web-board game which will be developed to base on social network in the future although social casino game is not available in Korea now. We reviewed several literature about responsible game system applied to especially U.S. New Jersey, responsible gambling system acted in the being advanced all countries. Game experts built up user protection model as previous work to prepare the law and policy which such a responsible game system will apply for current web-board gaem and future social casino game. As a result, this research revealed that standard of judgement which can identify four kind of addiction danger user group are raised. We expect to help this user protection alternative to provide the law and policy instrument for future social casino game and complement the problem of current web-board enforcement.

Realization of Protection IED for Distributed Power System (분산 전원 계통 연계용 보호 IED의 설계 및 구현)

  • Han, Chul-Wan;Oh, Sung-Nam;Kim, Kab-Il;Son, Young-Ik
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.517-519
    • /
    • 2005
  • In this paper, we consider a digital protection IED(Intelligent Electric Device) for a distributed power system. The IED can measure various elements for protection and communicate with another devices through network. The protection IED is composed of specific function modules: signal process module which converts analog signal from PT and CT handle algorithm to digital one; communication module for connection with another IEDs; input/output module for user-interfaces. A general purpose DSP board with TMS320C2812 is used in the IED. In order to verify the proposed IED, experimental researches with the power system simulator DOBLE has been carried out for a phase earth fault. The results show an under-voltage relaying algorithm has been realized sucessfully in the hardware system.

  • PDF

Adaptive undervoltage protection scheme for safety bus in nuclear power plants

  • Chang, Choong-koo
    • Nuclear Engineering and Technology
    • /
    • v.54 no.6
    • /
    • pp.2055-2061
    • /
    • 2022
  • In the event of a short-circuit accident on a 4.16 kV non-safety bus, the voltage is temporarily lowered as backflow occurs on the safety bus. In such cases, the undervoltage relay of the safety bus shall not pick up the undervoltage so as not to interfere with the operation of the safety motors. The aim of this study is to develop an adaptive undervoltage protection scheme for the 4.16 kV safety bus considering the faults on the 13.8 kV and 4.16 kV non-safety buses connected to secondary windings of the three winding transformers, UAT and SAT. The result of this study will be the adaptive undervoltage protection scheme for the safety bus of nuclear power plants satisfying functional requirements of the safety related medium voltage motors. The adaptive undervoltage protection scheme can be implemented into an integrated digital protective relay to make user friendly and reliable protection scheme.

Improving Personal Data Protection in IoT Environments (사물인터넷(IoT) 환경에서 개인정보보호 강화를 위한 제도 개선 방안)

  • Lee, Ae Ri;Son, Soomin;Kim, Hyun Jin;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.995-1012
    • /
    • 2016
  • In Internet of Things (IoT) environments, devices or sensors everywhere can automatically collect data without the individual awareness, further combine and share data using ubiquitous network, and thus the development of IoT raises new challenges in respect of personal data protection and privacy. This study aims to identify main issues related to data protection in the IoT and propose adequate measures. We analyzed the types of personal data controllers and processors in IoT and figured out the issues regarding the processing of personal data and the rights to privacy of data subject. Accordingly, we suggested the institutional ways (e.g., establishment of user-friendly notice and flexible consent system, re-identification risk monitoring system, data protection in cross-border transfer, and user education) to improve the situation of personal data protection in IoT and finally proposed the improvement tasks to carry out first based on the degree of urgency and importance.

Terrestrial DTV Broadcasting Program Protection System based on Program Protection Information (방송프로그램 보호신호에 기반한 지상파 방송프로그램 보호 시스템)

  • Choo, Hyon-Gon;Lee, Joo-Young;Nam, Je-Ho
    • Journal of Broadcast Engineering
    • /
    • v.15 no.2
    • /
    • pp.192-204
    • /
    • 2010
  • As illegal distribution of the terrestial DTV broadcast program occurs very frequently in on-line, the needs to protect broadcast program have increased. In this paper, a new approach to implement a system for terrestial DTV broadcast program protection based on program protection information(PPI) is proposed. In our approach, the broadcast program is recorded with encryption according to redistribution condition of the PPI and packaged into a file with key information and PPI together. And we also define a set of domain protocol for supporting user fair-use of broadcast program. In the proposed system, copy control can also be provided by process of home domain management. Implementation results show that our system can protect broadcast programs with efficiency and can support conditional distribution within home domain in order to satisfy user fair-use.