• 제목/요약/키워드: attribute-based

검색결과 1,450건 처리시간 0.024초

컨조인트 분석을 통한 대학급식소의 효율적인 운영에 관한 연구 (Research on Efficient Operation of University Foodservice through Conjoint Analysis)

  • 김광지;박기용
    • 한국조리학회지
    • /
    • 제12권4호
    • /
    • pp.33-45
    • /
    • 2006
  • The purpose of this study is to make special study of the efficient operation of university foodservice. The concrete results through the conjoint analysis can be elicited as follows. First, through the interview in depth we draw out the efficient attribute comparing and analyzing elements of selecting menu and main reasons for selecting either student cafeterias or general cafeterias. Second, we elicit the best attribute based on the results of analysis on preference. Third, we present an improvement program for operating student cafeterias through simulation. As a result of conjoint analysis of the main reason for selecting a cafeteria and the utility of each attribute, the most important factor comes price (34.95%), the time required (33.20%), food taste (30.45%), and various menu (1.42%) in that order. What draws attention in the research is that price (34.93%) is not the only factor which influences students' choice of a cafeteria. Location (33.20%) and food taste (30.45%) are all equally important. These results show that students' expectation for cafeterias is getting various. Basically, all customers look for a nearer restaurant where its food taste is good and menu is various at a low price.

  • PDF

GDPR 준수 가능한 블록체인 기반 접근제어 시스템 (GDPR Compliant Blockchain Based Access Control(GCBAC))

  • 임준호;천지영;노건태;정익래
    • 정보보호학회논문지
    • /
    • 제30권6호
    • /
    • pp.981-997
    • /
    • 2020
  • 블록체인 기술은 탈중앙화된(decentralized) 분산원장(distributed ledger)과 합의 기반 구조를 바탕으로 높은 보안 수준을 제공할 수 있다는 장점이 있다. 이와 같은 블록체인 기술의 활용도 증진을 위해서는 헬스 케어, 전자상거래 등 개인정보 처리가 필요한 분야에서의 활용 방안 모색이 필요하다. 이를 위해서는, 블록체인 기반 시스템에서도 유럽 연합(EU) 개인정보보호 규정(GDPR, General Data Protection Regulation)으로 대표되는 개인정보보호 관련 법규 및 규정을 준수할 수 있어야 한다. 그러나, 블록체인의 자체 특성상 기록된 자료에 대한 불변성과 탈중앙성 때문에 기존 개인정보보호 규정의 요구사항을 블록체인상에서 기술적으로 구현함에 어려움이 있다. 본 논문에서 우리는 카멜레온 해시(chameleon hash)와 속성 기반 암호화(Attribute Based Encryption, 이하 ABE)를 활용하여 GDPR에서 요구하는 개인정보 주체의 권리를 보장 가능한 다중 체인(multi-chain)기반 접근제어 시스템을 제시한다. 끝으로 우리의 시스템에서는 기밀성과 무결성을 유지한 가운데, 개인정보 처리가 가능함을 보안 분석을 통해 보인다.

속성기반 재 암호화를 이용한 스마트카드 인증권한 분배스킴 (Smart Card Certification-Authority Distribution Scheme using Attributes-Based Re-Encryption)

  • 서화정;김호원
    • 대한임베디드공학회논문지
    • /
    • 제5권3호
    • /
    • pp.168-174
    • /
    • 2010
  • User authentication is an important requirement to provide secure network service. Therefore, many authentication schemes have been proposed to provide secure authentication, such as key agreement and anonymity. However, authority of scheme is limited to one's self. It is inefficient when authenticated users grant a certification to other users who are in an organization which has a hierarchical structure, such as a company or school. In this paper, we propose the first authentication scheme to use Attributes-Based Re-encryption that creates a certification to other users with specified attributes. The scheme, which has expanded from Rhee et al. scheme, has optimized computation performance on a smart card, ensuring the user's anonymity and key agreement between users and server.

저전력 임베디드 소프트웨어 개발을 위한 ADD 기반의 아키텍처 설계 기법 (A Technique of ADD-based Architecture Design for Low Power Embedded Software)

  • 이재욱;홍장의
    • 대한임베디드공학회논문지
    • /
    • 제8권4호
    • /
    • pp.195-204
    • /
    • 2013
  • The embedded software has been developed in the forms of various versions that provides similar service based on product family. For increase usefulness of product family, software must has well-structured and reusable properties. Software architecture is important to improve adaptability in model-based development of embedded software mounted onto product family. In this paper, we proposed a technique of ADD(Attribute-Driven Design)-based software architecture design for low power software development. This technique provides a chance to consider the power consumption issue in design phase of software, and makes possible to develop low power embedded software.

Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel

  • Wang, Jianhua;Zhao, Zhiyuan;Sun, Lei;Zhu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2718-2731
    • /
    • 2019
  • Conjunctive keyword search encryption is an important technique for protecting sensitive data that is outsourced to cloud servers. However, the process of searching outsourced data may facilitate the leakage of sensitive data. Thus, an efficient data search approach with high security is critical. To solve this problem, an efficient conjunctive keyword search scheme based on ciphertext-policy attribute-based encryption is proposed for cloud storage environment. This paper proposes an efficient mechanism for removing the secure channel and resisting off-line keyword-guessing attacks. The storage overhead and the computational complexity are regardless of the number of keywords. This scheme is proved adaptively secure based on the decisional bilinear Diffie-Hellman assumption in the standard model. Finally, the results of theoretical analysis and experimental simulation show that the proposed scheme has advantages in security, storage overhead and efficiency, and it is more suitable for practical applications.

혜택세분화와 인식도에 의한 진의류 브랜드 이미지 연구(II) -인식도에 의한 브랜드 이미지 분석- (Brand Image: Analysis of Domestic Jeans Market through Benefit Segmentation and Perceptual Mapping(II))

  • 최일경;고애란
    • 한국의류학회지
    • /
    • 제19권5호
    • /
    • pp.699-712
    • /
    • 1995
  • The purpose of this study was 1) to identify the constructing factors of jeans brand image 2) to analyze the domestic jeans market using perceptual maps of three benefit segments based on stdy(I). The questionnaire consisted of brand preference, attribute of brand image and wearer image was selected from the previous studies or developed for this study. The subjects were 350 male and female university students who have purchased at least one of the nine jeans wear brand selected for the study. For statistical analysis, reliability test, factor analysis, MANOVA, and multiple regression were used. The results of this study were as follows: 1. Symbolism, quality, and economy were found out as constricting factors of brand image in the attribute dimensions, while innovative and active image were found out in the wearer image dimensions. 2. 9 Perceptual maps of attribute dimensions and 3 perceptual maps of wearer image dimensions were constructed and each ideal vector was drawn.

  • PDF

국내 위험기반 항공안전감독 적용을 위한 안전감독 점검표 구성체계 (A Study on the Composition and Application of Risk Based Aviation Safety Oversight Checklist)

  • 안주현;송병흠;최영재
    • 한국항공운항학회지
    • /
    • 제28권2호
    • /
    • pp.71-77
    • /
    • 2020
  • The checklist currently used for aviation safety inspection performed by ASIs(Aviation Safety Inspectors) consists of inspection groups and multiple items, it does not have safety attribute and structured hierarchy system which required to efficiently process aviation safety analysis. On this study, categorized the domestic and foreign ASI checklist by safety attribute from ICAO recommended and presented composition of checklist for safety assurance by comparative analysis composition of domestic and foreign ASI checklist.

나이브 베이시안 학습에서 정보이론 기반의 속성값 가중치 계산방법 (An Information-theoretic Approach for Value-Based Weighting in Naive Bayesian Learning)

  • 이창환
    • 한국정보과학회논문지:데이타베이스
    • /
    • 제37권6호
    • /
    • pp.285-291
    • /
    • 2010
  • 본 연구에서는 나이브 베이시안 학습의 환경에서 속성의 가중치를 계산하는 새로운 방식을 제안한다. 기존 방법들이 속성에 가중치를 부여하는 방식인데 반하여 본 연구에서는 한걸음 더 나아가 속성의 값에 가중치를 부여하는 새로운 방식을 연구하였다. 이러한 속성값의 가중치를 계산하기 위하여 Kullback-Leibler 함수를 이용하여 가중치를 계산하는 방식을 제안하였고 이러한 가중치들의 특성을 분석하였다. 제안된 알고리즘은 다수의 데이터를 이용하여 속성 가중치 방식과 비교하였고 대부분의 경우에 더 좋은 성능을 제공함을 알 수 있었다.

Limiting Attribute Disclosure in Randomization Based Microdata Release

  • Guo, Ling;Ying, Xiaowei;Wu, Xintao
    • Journal of Computing Science and Engineering
    • /
    • 제5권3호
    • /
    • pp.169-182
    • /
    • 2011
  • Privacy preserving microdata publication has received wide attention. In this paper, we investigate the randomization approach and focus on attribute disclosure under linking attacks. We give efficient solutions to determine optimal distortion parameters, such that we can maximize utility preservation while still satisfying privacy requirements. We compare our randomization approach with l-diversity and anatomy in terms of utility preservation (under the same privacy requirements) from three aspects (reconstructed distributions, accuracy of answering queries, and preservation of correlations). Our empirical results show that randomization incurs significantly smaller utility loss.

An Additive Quantitative Randomized Response Model by Cluster Sampling

  • Lee, Gi-Sung
    • 응용통계연구
    • /
    • 제25권3호
    • /
    • pp.447-456
    • /
    • 2012
  • For a sensitive survey in which the population is comprised of several clusters with a quantitative attribute, we present an additive quantitative randomized response model by cluster sampling that adapts a two-stage cluster sampling instead of a simple random sample based on Himmelfarb-Edgell's additive quantitative attribute model and Gjestvang-Singh's one. We also derive optimum values for the number of 1st stage clusters and the optimum values of observation units in a 2nd stage cluster under the condition of minimizing the variance given constant cost. We can see that Himmelfarb-Edgell's model is more efficient than Gjestvang-Singh's model under the condition of cluster sampling.