• Title/Summary/Keyword: access right

Search Result 336, Processing Time 0.025 seconds

An efficient privacy-preserving data sharing scheme in social network (소셜 네트워크에 적합한 효율적인 프라이버시 보호 데이터 공유 기법)

  • Jeon, Doo-Hyun;Chun, Ji-Young;Jeong, Ik-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.447-461
    • /
    • 2012
  • A social network service(SNS) is gaining popularity as a new real-time information sharing mechanism. However, the user's privacy infringement is occurred frequently because the information that is shared through a social network include the private information such as user's identity or lifestyle patterns. To resolve this problem, the research about privacy preserving data sharing in social network are being proceed actively. In this paper, we proposed the efficient scheme for privacy preserving data sharing in social network. The proposed scheme provides an efficient conjunctive keyword search functionality. And, users who granted access right to storage server can store and search data in storage server. Also,, our scheme provide join/revocation functionality suited to the characteristics of a dynamic social network.

A Low-Cost RFID Tag Search Protocol Preventing the Reuse of Mobile Reader's Tag-List (모바일 리더의 태그 리스트 재사용을 방지하는 저비용 RFID 태그 검색 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Choi, Hyun-Woo;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2011
  • When a real-time data transfer is not possible between a reader and a back-end server in the mobile environment, the reader should support a capability to search a certain tag without communicating with a back-end server. Some recent papers related to the mobile reader-based tag search protocol have addressed privacy concerns for the reader and the tags. However, to our best knowledge, there are no papers addressing the problem arising from reusing tag lists existed in the mobile reader. In other words, there arise a problem that a mobile reader which has lost an right to access to a specific tag is able to search that tag by reusing a tag list for searching a particular tag. If mobile reader having an unauthorized tag list, the mobile reader can reuse a particular tag list. Our protocol provides the enhanced secure tag lists preventing the reuse of the tag lists and an efficient tag search protocol based on dynamic identity in the mobile reader-based RFID environments.

A Study on the National Cryptographic Policy : About the Right to Access the Cryptographic (국가 암호정책에 대한 연구 : 암호접근권한을 중심으로)

  • Kim, Dong-hoon;Kwon, Hun-yeong;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.99-109
    • /
    • 2021
  • With the recent development of ICT, information exchange through data communication network is increasing. Cryptography is widely used as the base technology to protect it. The initial cryptography technology was developed for military use and authorized only by the nation in the past. However, nowadays, much of the authority was unwillingly transferred to the private due to the pervasive use of ICT. As a result, there have been conflicts between the private demand to use cryptography and the nation's authority. In this paper, we survey the conflicts between nations and the private in the process of formulating the cryptography policy. Morever, we investigate the reality of the cryptography policy in Korea. Our investigations are expected to help the government apply cryptographic control policy in a balanced manner and plan development of cryptography industries. Lastly, we propose a need to establish a cryptanalysis organization and to legislate a legal sanction against fraudulent use of cryptography.

Proposal of CT Simulator Quality Assurance Items (전산화단층 모의치료장치의 정도관리 항목 제안)

  • Kim, Yon-Lae;Yoon, Young-Woo;Jung, Jae-Yong;Lee, Jeong-Woo;Chung, Jin-Beom
    • Journal of radiological science and technology
    • /
    • v.44 no.4
    • /
    • pp.367-373
    • /
    • 2021
  • A quality assurance of computed tomography(CT) have done seven items that were water attenuation coefficient, noise, homogeneity, spatial resolution, contrast resolution, slice thickness, artifact using by standard phantom. But there is no quality assurance items and methods for CT simulator at domestic institutions yet. Therefore the study aimed to access the CT dose index(CTDI), table tilting, image distortion, laser accuracy, table movement accuracy and CT seven items for CT simulator quality assurance. The CTDI at the center of the head phantom was 0.81 for 80 kVp, 1.55 for 100 kVp, 2.50 for 120 mm, 0.22 for 80 kVp at the center of the body phantom, 0.469 for 100 kVp, and 0.81 for 120 kVp. The table tilting was within the tolerance range of ±1.0° or less. Image distortion had 1 mm distortion in the left and right images based on the center, and the laser accuracy was measured within ±2 mm tolerance. The purpose of this study is to improve the quality assurance items suitable for the current situation in Korea in order to protect the normal tissues during the radiation treatment process and manage the CT simulator that is implemented to find the location of the tumor more clearly. In order to improve the accuracy of the CT simulator when looking at the results, the error range of each item should be small. It is hoped that the quality assurance items of the CT simulator will be improved by suggesting the quality assurance direction of the CT simulator in this study, and the results of radiation therapy will also improve.

Surgical Outcomes of Cardiac Myxoma Resection Through Right Mini-Thoracotomy

  • Changwon Shin;Min Ho Ju;Chee-Hoon Lee;Mi Hee Lim;Hyung Gon Je
    • Journal of Chest Surgery
    • /
    • v.56 no.1
    • /
    • pp.42-48
    • /
    • 2023
  • Background: With recent advances in cardiac surgery through minimal access, mini-thoracotomy has emerged as an excellent alternative for cardiac myxoma resection. This study analyzed the surgical results of this approach, focusing on postoperative cerebral embolism and tumor recurrence. Methods: We retrospectively reviewed 64 patients (mean age, 56.0±12.1 years; 40 women) who underwent myxoma resection through mini-thoracotomy from October 2008 to July 2020. We conducted femoral cannulation and antegrade cardioplegic arrest in all patients. Patient characteristics and perioperative data, including brain diffusion-weighted magnetic resonance imaging (DWI) findings, were collected. Medium-term echocardiographic follow-up was performed. Results: Thirteen patients (20.3%) had a history of preoperative stroke, and 7 (11.7%) had dyspnea with New York Heart Association functional class III or IV. Sixty-one cases (95.3%) had myxomas in the left atrium. The mean cardiopulmonary bypass and cardiac ischemic times were 69.0±28.6 and 34.1±15.0 minutes, respectively. Sternotomy conversion was not performed in any case, and 50 patients (78.1%) were extubated in the operating room. No early mortality or postoperative clinical stroke occurred. Postoperative DWI was performed in 32 (53%) patients, and 7 (22%) showed silent cerebral embolisms. One patient underwent reoperation for tumor recurrence during the study period; in that patient, a genetic study confirmed the Carney complex. Conclusion: Mini-thoracotomy for cardiac myxoma resection showed acceptable clinical and neurological outcomes. In the medium-term echocardiographic follow-up, reliable resection was proven, with few recurrences. This approach is a promising alternative for cardiac myxoma resection.

A Study on the Awareness and Need for Connected-Convergence Education among College Students in Health-Related Fields

  • Su-Hyeon Hong;Seung-Yeon Shin;Na-Hee Lee;Jin-A Lee;Seon-Im Cheon;Seol-Hee Kim
    • Journal of dental hygiene science
    • /
    • v.22 no.4
    • /
    • pp.233-240
    • /
    • 2022
  • Background: In modern society, rapid changes in the medical environment have required medical staff to access various information and be competent in active and effective problem-solving through collegial interactions. In line with these changes, universities are aiming to connect education. This study aimed to provide basic data of connected-convergence education by survey the awareness and needs of college students in health-related fields. Methods: This study included 122 college students from the health field. A survey regarding "the awareness and need of connected-convergence education" was conducted and general characteristics of the participants were collected from June to July 2022. Results: The awareness of connected-convergence education was low at 19.7%, but the intention to participate was high at 74.6%. Subject requirements were 18.0% for medical psychology, 13.5% for communication and counseling, 13.5% for medical artificial intelligence technology convergence, and 10.4% for sports health management. In the group showing high satisfaction with the major curriculum, the demand for connected education was also high. For efficient operation, it was investigated that it was necessary to secure specialized training courses, recognition of liberal arts credits, the right to register for courses equal to those of major students, and secure dedicated classrooms. Conclusion: Although the awareness and experience of connected-convergence education among the participants were low, the intention to participate was high. As such a plan to revitalize the university curriculum was required. It is timely to discuss the nurturing of convergence-type talents and multidisciplinary thinking skills. It is meaningful to provide basic data necessary for connected-convergence education in health-related fields at university. Universities should strive to enhance job competency in the health field by providing connected-convergence education based on student demands.

A narrative review on immersive virtual reality in enhancing high school students' mathematics competence: From TPACK perspective

  • Idowu David Awoyemi;Feliza Marie S. Mercado;Jewoong Moon
    • The Mathematical Education
    • /
    • v.63 no.2
    • /
    • pp.295-318
    • /
    • 2024
  • This narrative review explores the transformative potential of immersive virtual reality (IVR) in enhancing high school students' mathematics competence, viewed through the lens of the technological, pedagogical, and content knowledge (TPACK) framework. This review comprehensively illustrates how IVR technologies have not only fostered a deeper understanding and engagement with mathematical concepts but have also enhanced the practical application of these skills. Through the careful examination of seminal papers, this study carefully explores the integration of IVR in high school mathematics education. It highlights significant contributions of IVR in improving students' computational proficiency, problem-solving skills, and spatial visualization abilities. These enhancements are crucial for developing a robust mathematical understanding and aptitude, positioning students for success in an increasingly technology-driven educational landscape. This review emphasizes the pivotal role of teachers in facilitating IVR-based learning experiences. It points to the necessity for comprehensive teacher training and professional development to fully harness the educational potential of IVR technologies. Equipping educators with the right tools and knowledge is essential for maximizing the effectiveness of this innovative teaching approach. The findings also indicate that while IVR holds promising prospects for enriching mathematics education, more research is needed to elaborate on instructional integration approaches that effectively overcome existing barriers. This includes technological limitations, access issues, and the need for curriculum adjustments to accommodate new teaching methods. In conclusion, this review calls for continued exploration into the effective use of IVR in educational settings, aiming to inform future practices and contribute to the evolving landscape of educational technology. The potential of IVR to transform educational experiences offers a compelling avenue for research and application in the field of mathematics education.

4-way Search Window for Improving The Memory Bandwidth of High-performance 2D PE Architecture in H.264 Motion Estimation (H.264 움직임추정에서 고속 2D PE 아키텍처의 메모리대역폭 개선을 위한 4-방향 검색윈도우)

  • Ko, Byung-Soo;Kong, Jin-Hyeung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.6
    • /
    • pp.6-15
    • /
    • 2009
  • In this paper, a new 4-way search window is designed for the high-performance 2D PE architecture in H.264 Motion Estimation(ME) to improve the memory bandwidth. While existing 2D PE architectures reuse the overlapped data of adjacent search windows scanned in 1 or 3-way, the new window utilizes the overlapped data of adjacent search windows as well as adjacent multiple scanning (window) paths to enhance the reusage of retrieved search window data. In order to scan adjacent windows and multiple paths instead of single raster and zigzag scanning of adjacent windows, bidirectional row and column window scanning results in the 4-way(up. down, left, right) search window. The proposed 4-way search window could improve the reuse of overlapped window data to reduce the redundancy access factor by 3.1, though the 1/3-way search window redundantly requires $7.7{\sim}11$ times of data retrieval. Thus, the new 4-way search window scheme enhances the memory bandwidth by $70{\sim}58%$ compared with 1/3-way search window. The 2D PE architecture in H.264 ME for 4-way search window consists of $16{\times}16$ pe array. computing the absolute difference between current and reference frames, and $5{\times}16$ reusage array, storing the overlapped data of adjacent search windows and multiple scanning paths. The reference data could be loaded upward and downward into the new 2D PE depending on scanning direction, and the reusage array is combined with the pe array rotating left as well as right to utilize the overlapped data of adjacent multiple scan paths. In experiments, the new implementation of 4-way search window on Magnachip 0.18um could deal with the HD($1280{\times}720$) video of 1 reference frame, $48{\times}48$ search area and $16{\times}16$ macroblock by 30fps at 149.25MHz.

EU Integration and Its Aviation Relationship with Third Countries (유럽연합(EU) 통합과 제3국과의 항공관계)

  • Lee, Jong-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.21 no.1
    • /
    • pp.135-167
    • /
    • 2006
  • Air service agreements between EU Member States and third countries concluded by Sweden, Finland, Belgium, Luxembourg, Austria, the Netherlands, Denmark and the United Kingdom after the Second World War infringe EU law. They authorize the third countries to withdraw, suspend or limit the traffic rights of air carriers designated by the signatory States. According to the Court of Justice of the European Communities (CJEC), these agreements infringe EU law in two respects. On the one hand, the presence of nationality clauses infringes the right of European airlines to non-discriminatory market access to routes between all Member States and third countries. On the other hand, only the EU has the authority to sign up to this type of commitment where agreements affect the exercise of EU competence, i.e. involve an area covered by EU legislation. The Court held that since the third countries have the right to refuse a carrier, these agreements therefore constitute an obstacle to the freedom of establishment and freedom to provide services, as the opening of European skies to third countries' companies is not reciprocal for all EU airlines. In the conclusion, in order to reconstruct these public international air law, The new negotiations between EU member states and third countries, especially the US, must be designed to ensure an adequate set of principles, so that Member States, in their bilateral relations with third countries in the area of air service, should consider following three models. The 1st, to develop a new model of public international air law such as a new Bermuda III. The 2nd, to reconstruct new freedoms of the air, for example, the 7th, 8th, and 9th freedoms. The 3rd, to explore new approaching models, such as complex system theory explored in the recent social sciences, to make access world-wide global problems instead of bilateral problems between EU member states and United States. The example will show any lessons to air talks between European Union and ROK.

  • PDF

Hybrid Natural Orifice Transluminal Endoscopic Cholecystectomy in Dogs: Transgastric, Transcolonic and Transvaginal Approaches (개에서 자연개구부를 통한 하이브리드 내시경적 담낭절제술: 경위장관, 경결장 및 경질 접근법)

  • Kim, Soo-Hyun;Jeong, Seong-Mok;Shin, Sa-Kyeng;Kim, Seong-Su;Shin, Beom-Jun;Lee, Jae-Yeon;Park, Ji-Yeong;Kim, Myung-Cheol;Kim, Young-Il;Lee, Sang-Il;Kim, Ji-Yeon
    • Journal of Veterinary Clinics
    • /
    • v.28 no.5
    • /
    • pp.497-505
    • /
    • 2011
  • Natural orifice transluminal endoscopic surgery is a newly emerging technique recently, with its many potential advantages in clinical practice. Cholecystectomy by Hybrid NOTES in this work, performed with single working channel endoscope in conjunction with a laparoscopic grasping forceps in dogs, is a "bridge" between laparoscopic procedure and pure NOTES. Three different approaches for cholecystectomy were carried out; transgastric, transcolonic and transvaginal. In all three approaches, abdominal opening was made by a 5 mm trocar, followed by making pneumoperitoneum of 4 mmHg with $CO_2$ insufflator. Transgastric cholecystectomy, single working channel endoscope was advanced to the peritoneal cavity through gastric incision in antral region made by endoscopic needle knife. Endoscope was retroflexed to visualize the gall bladder. Transcolonic access, incision for endoscopic entry was done at right ventral wall of descending colon, 15 cm inside from the anus. Incision in transvaginal access was made at right-ventral region, just caudal to the caudal tubercle. With the simple traction by the laparoscopic grasping forceps, good visualization of surgical field was obtained in all three groups. Cystic duct and artery were ligated with endoclips; for complete gall bladder dissection from liver, L-knife was used. Closure of incision sites were done in transgastric and transcolonic cholecystectomy by endoclips, not in transvaginal approach.