• Title/Summary/Keyword: information Protection

Search Result 4,490, Processing Time 0.028 seconds

Hippocratic XML Databases: A Model and Access Control Mechanism (히포크라테스 XML 데이터베이스: 모델 및 액세스 통제 방법)

  • Lee Jae-Gil;Han Wook-Shin;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.684-698
    • /
    • 2004
  • The Hippocratic database model recently proposed by Agrawal et al. incorporates privacy protection capabilities into relational databases. Since the Hippocratic database is based on the relational database, it needs extensions to be adapted for XML databases. In this paper, we propose the Hippocratic XML database model, an extension of the Hippocratic database model for XML databases and present an efficient access control mechanism under this model. In contrast to relational data, XML data have tree-like hierarchies. Thus, in order to manage these hierarchies of XML data, we extend and formally define such concepts presented in the Hippocratic database model as privacy preferences, privacy policies, privacy authorizations, and usage purposes of data records. Next, we present a new mechanism, which we call the authorization index, that is used in the access control mechanism. This authorization index, which is Implemented using a multi-dimensional index, allows us to efficiently search authorizations implied by the authorization granted on the nearest ancestor using the nearest neighbor search technique. Using synthetic and real data, we have performed extensive experiments comparing query processing time with those of existing access control mechanisms. The results show that the proposed access control mechanism improves the wall clock time by up to 13.6 times over the top-down access control strategy and by up to 20.3 times over the bottom-up access control strategy The major contributions of our paper are 1) extending the Hippocratic database model into the Hippocratic XML database model and 2) proposing an efficient across control mechanism that uses the authorization index and nearest neighbor search technique under this model.

The Legal Issues of Private Investigation Service in WTO/FTA System : Study of South Korea (WTO/ FTA 체제에서 민간조사업의 법적문제)

  • Ko, Ji-Hoon;Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.161-195
    • /
    • 2011
  • As crimes have increased to an extent that the police cannot cope with, there have been continuous discussions for the introduction of Private Investigation (hereafter PI) in Korea. However, attempts to legislate for the introduction of PI have failed every time PI bills for the introduction of PI were proposed. This was fundamentally because arguments both for and against the introduction of PI were sharply divided depending on the priorities. However, regardless of those clash of views, an apparent need for the legislation of PI service has arisen. As Korea opens its service market to other countries through GATS and FTAs, currently existing domestic PI law has been found to be inconsistent with international agreements such as GATS and KOREA-US(KORUS) FTA. This paper found that the Act on Usage and Protection of Credit Information which regulates PI service is inconsistent with the Article 12.4(a)(i) and (iii) of KORUS FTA and the Article 7.11 and the Article 7.13 of KOREA-EU FTA. If Korea does not modify the existing laws and establish new laws in relation to PI, such inconsistencies could lead to international trade disputes which could amount to billions of dollars. In this regard, the passage of the PI bill is necessary.

  • PDF

In about Solution for Improvement in the Private Security Sector research (민간경비 구성요인에 따른 개선방안에 관한 연구)

  • Lee, Young-Oh
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.265-282
    • /
    • 2008
  • This research aims to provide a solution for the improvement of private security according to the change in criminal environment. The main cause of crime can be found in the anti-functional dimensions including value set disorder, social phenomenon variation, information-based, globalization and urbanization. In this environment, the private security sector has dramatically increased in a quantitative viewpoint, but it is insufficient in a qualitative viewpoint. This paper recognized this problem and demonstrates a solution for improvement through classifying elements of private security into relevant legislation, education institutions, security companies and security associations. The analysis result is a follows: First, motivation and satisfaction rate of escort and security related major has shown to be high. However, respondents evaluated the guard educational institution negatively. Second, the motivation of entering into the private security sector for internal staffs has shown to be positive and sound. However, the job satisfaction rate has shown to be low due to excessive competition, negative perception of occupation and low earning. Third, respondents gave an average mark to the Security Association's management and operation. In addition, the mutual-aid project received the same mark. Negative feedbacks were given to the protection of member's interest and to association operation and policy, while positive feedbacks were given to the degree of member's cooperation towards association policies.

  • PDF

Termite Resistance of The Less Known Tropical Woods Species Grown in West Java, Indonesia

  • Febrianto, Fauzi;Pranata, Andi Zaim;Septiana, Dea;Arinana, Arinana;Gumilang, Adiyantara;Hidayat, Wahyu;Jang, Jae-Hyuk;Lee, Seung-Hwan;Hwang, Won-Joung;Kim, Nam-Hun
    • Journal of the Korean Wood Science and Technology
    • /
    • v.43 no.2
    • /
    • pp.248-257
    • /
    • 2015
  • This research focused on the natural durability of twenty one lesser known tropical wood species planted in West Java, Indonesia against subterranean termite (Coptotermes curvignathus). It was observed that both heartwood and sapwood of Kiara payung (Filicium decipiens); heartwoods of Nangka (Arthocarpus heterophyllus), Mahoni (Swietenia macrophylla) and Simpur (Dillenia grandifolia); and sapwood of Bungur (Lagerstroemia speciosa) were rated as resistant (natural durability class II) according to Indonesian standard SNI 01.7207.2006 (BSN 2006). Both heartwood and sapwood of Salam (Syzigium polyanthum), Pasang (Lithocarpus sundaicus), Bisbul (Diospyros discolor), Rukam (Flacourtia rukam) and Trembesi (Samanea saman); heartwood of Puspa (Schima walichii), Bungur, Tanjung (Mimusops elangi) and Angsana (Pterocarpus indicus) were rated as moderately resistant (natural durability class III). Both heartwood and sapwood of Sungkai (Peronema canescens), Pine (Pinus merkusii), Mangium (Acacia mangium) and Afrika (Maesopsis eminii); sapwoods of Mahoni, Puspa and Tanjung were rated as poorly resistant (natural durability class IV). Both heartwood and sapwood of Agathis (Agathis dammara), Durian (Durio zibethinus), Ki sampang (Evodia latifolia) and Jabon (Anthocephalus cadamba); sapwoods of Nangka and Angsana were rated as very poorly resistant (natural durability class V). This reserach showed that woods with lower resistance against C. curvignathus attack (natural durability class IV and V) tend to have lower termite mortality values compared to woods with higher resistance against C. curvignathus attack (natural durability class II and III). Results of the study will provide some valuable information on termite resistance of twenty one lesser known tropical wood species planted in Indonesia.

Recovery Pattern and Seasonal Dynamics of Kelp Species, Ecklonia cava Population Formed Following the Large-scale Disturbance (대규모 교란현상 후 형성된 대형갈조류 감태(Ecklonia cava) 개체군의 계절적 변동 및 회복 양상)

  • KIM, SANGIL;KANG, YUN HEE;KIM, TAE-HOON;PARK, SANG RUL
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.21 no.3
    • /
    • pp.103-111
    • /
    • 2016
  • Seasonal dynamics of kelp forest-forming algae, Ecklonia cava population formed following the large-scale disturbance by Typhoon 'Bolaven' in August 2012 were investigated in Jeju Island, Korea. Morphological characteristics, recruits density, mortality rate, total density and biomass were monitored bimonthly from June 2013 to June 2015. Total and longest blade lengths, and individual weight of E. cava showed distinct seasonal trends. Stipe length increased from winter to spring, but did not show increase or reduced from summer to autumn. This indicates that morphological characteristics of E. cava are mainly affected by the change of blades. The optimal temperature for E. cava growth was about $15-18^{\circ}C$ during winter to spring while the growths were inhibited at the water temperature above $20^{\circ}C$ during summer. E. cava exhibited very low recruitment during spring-summer. However, high recruitment was observed on April 2015 when canopy cover was very low due to low density. This indicates that recruitment of E. cava was controlled not by seasonal effects but by physical factors such as canopy and space. The mortality rate of juvenile plants was highest due to their unstable settlement. By June 2015, 34 months after the disturbances, E. cava was almost recovered to the pre-disturbance population size structure. These results suggest that recovery of kelp forest following the large-scale disturbance requires a considerable period of time (more than three years). This study should provide valuable ecological information on management, restoration and protection of kelp species.

Design and Implementation of Sequential Pattern Miner to Analyze Alert Data Pattern (경보데이터 패턴 분석을 위한 순차 패턴 마이너 설계 및 구현)

  • Shin, Moon-Sun;Paik, Woo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.1-13
    • /
    • 2009
  • Intrusion detection is a process that identifies the attacks and responds to the malicious intrusion actions for the protection of the computer and the network resources. Due to the fast development of the Internet, the types of intrusions become more complex recently and need immediate and correct responses because the frequent occurrences of a new intrusion type rise rapidly. Therefore, to solve these problems of the intrusion detection systems, we propose a sequential pattern miner for analysis of the alert data in order to support intelligent and automatic detection of the intrusion. Sequential pattern mining is one of the methods to find the patterns among the extracted items that are frequent in the fixed sequences. We apply the prefixSpan algorithm to find out the alert sequences. This method can be used to predict the actions of the sequential patterns and to create the rules of the intrusions. In this paper, we propose an extended prefixSpan algorithm which is designed to consider the specific characteristics of the alert data. The extended sequential pattern miner will be used as a part of alert data analyzer of intrusion detection systems. By using the created rules from the sequential pattern miner, the HA(high-level alert analyzer) of PEP(policy enforcement point), usually called IDS, performs the prediction of the sequence behaviors and changing patterns that were not visibly checked.

  • PDF

Use of Microsatellite Markers Derived from Genomic and Expressed Sequence Tag (EST) Data to Identify Commercial Watermelon Cultivars (수박 시판 품종의 식별을 위한 Genomic과 Expressed Sequence Tag (EST)에서 유래된 Microsatellite Marker의 이용)

  • Kwon, Yong-Sham;Hong, Jee-Hwa;Kim, Du-Hyun;Kim, Do-Hoon
    • Horticultural Science & Technology
    • /
    • v.33 no.5
    • /
    • pp.737-750
    • /
    • 2015
  • This study was carried out to construct a DNA profile database for 102 watermelon cultivars through the comparison of polymorphism level and genetic relatedness using genomic microsatellite (gMS) and expressed sequence tag (EST)-microsatellite (eMS) markers. Sixteen gMS and 10 eMS primers showed hyper-variability and were able to represent the genetic variation within 102 watermelon cultivars. With gMS markers, an average of 3.63 alleles per marker were detected with a polymorphism information content (PIC) value of 0.479, whereas with eMS markers, the average number of alleles per marker was 2.50 and the PIC value was 0.425, indicating that eMS detects a lower polymorphism level compared to gMS. Cluster analysis and Jaccard's genetic distance coefficients using the unweighted pair group method with arithmetic average (UPGMA) based on the gMS, eMS, and combined data sets showed that 102 commercial watermelon cultivars could be categorized into 6 to 8 major groups corresponding to phenotypic traits. Moreover, this method was sufficient to identify 78 out of 102 cultivars. Correlation analysis with Mantel tests for those clusters using 3 data sets showed high correlation ($r{\geq}0.80$). Therefore, the microsatellite markers used in this study may serve as a useful tool for germplasm evaluation, genetic purity assessment, and fingerprinting of watermelon cultivars.

Prevention of Protein Loss Using A Shield Coating According to Moisture Behavior in Human Hair (수분거동 패턴에 따른 차폐막 설정을 통한 모발단백질 소실방지)

  • Song, Sang-Hun;Lim, Byung Tack;Son, Seong Kil;Kang, Nae-Gyu
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.46 no.1
    • /
    • pp.57-65
    • /
    • 2020
  • To prevent loss of hair protein during hair washing process by water through, a shield coating the pathway of water molecules was studied. Hydrophobic virgin hair, hydrophilic hair, which was damaged only methyleicosanoic acid (18-MEA) on the surface, and a repaired hair re-bound 18-MEA, were prepared and water mass changes by as heat were measured. Results showed that hydrophobic hairs followed bi-exponential function of 39 s and 151 s and other two hairs exhibited fast- and mono-exponential decay with 83 s, reflecting the extraction of water molecules without any resistance at the hydrophobic surface. On the assumption that hydrophobic surface resists an extraction of protein in water during the wash, the protein concentrations were compared from the hair of hydrophobic and hydrophilic surface. The extracted hair proteins were 179 and 148 ㎍/mL from the hair coated with hydrophilic polyethylene glycol (PEG) and hydrophobic polydimethylsiloxane (PDMS), respectively. This study suggested that hydrophobic coating on the hair surface could be used to prevent protein loss in wash, represented by LFM. In conclusion, this research provides some useful information to contribute to the development of hair washing products that can prevent protein loss in the cleaning process by granting hydrophobic coatings.

Overview of Legal Measures for Managing Workplace COVID-19 Infection Risk in Several Asia-Pacific Countries

  • Derek, Miller;Tsai, Feng-Jen;Kim, Jiwon;Tejamaya, Mila;Putri, Vilandi;Muto, Go;Reginald, Alex;Phanprasit, Wantanee;Granadillos, Nelia;Farid, Marina Bt Zainal;Capule, Carmela Q.;Lin, Yu-Wen;Park, Jihoon;Chen, Ruey-Yu;Lee, Kyong Hui;Park, Jeongim;Hashimoto, Haruo;Yoon, Chungsik;Padungtod, Chantana;Park, Dong-Uk
    • Safety and Health at Work
    • /
    • v.12 no.4
    • /
    • pp.530-535
    • /
    • 2021
  • Background: Despite the lack of official COVID-19 statistics, various workplaces and occupations have been at the center of COVID-19 outbreaks. We aimed to compare legal measures and governance established for managing COVID-19 infection risks at workplaces in nine Asia and Pacific countries and to recommend key administrative measures. Methods: We collected information on legal measures and governance from both general citizens and workers regarding infection risks such as COVID-19 from industrial hygiene professionals in nine countries (Indonesia, India, Japan, Malaysia, New Zealand, Republic of the Philippines, Republic of Korea, Taiwan, and Thailand) using a structured questionnaire. Results: A governmental body overseeing public health and welfare was in charge of containing the spread and occurrence of infectious diseases under an infectious disease control and prevention act or another special act, although the name of the pertinent organizations and legislation vary among countries. Unlike in the case of other traditional hazards, there have been no specific articles or clauses describing the means of mitigating virus risk in the workplace that are legally required of employers, making it difficult to define the responsibilities of the employer. Each country maintains own legal systems regarding access to the duration, administration, and financing of paid sick leave. Many workers may not have access to paid sick leave even if it is legally guaranteed.

A Study on the Automation of MVDC System-Linked Digital Substation (MVDC 시스템연계 디지털변전소 자동화 연구)

  • Jang, Soon Ho;Koo, Ja Ik;Mun, Cho Rong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.7
    • /
    • pp.199-204
    • /
    • 2021
  • Digital substation refers to a substation that digitizes functions and communication methods of power facilities such as monitoring, measuring, control, protection, and operation based on IEC 61850, an international standard for the purpose of intelligent power grids. Based on the intelligent operating system, efficient monitoring and control of power facilities is possible, and automatic recovery function and remote control are possible in the event of an accident, enabling rapid power failure recovery. With the development of digital technology and the expansion of the introduction of eco-friendly renewable energy and electric vehicles, the spread of direct current distribution systems is expected to expand. MVDC is a system that utilizes direct current lines with voltage levels and transmission capacities between HVDCs applied to conventional transmission systems and LVDCs from consumers. Converting existing lines in substations, where most power equipment is alternating current centric, to direct current lines will reduce transmission losses and ensure greater current capacity. The process bus of a digital substation is a communication network consisting of communication equipment such as Ethernet switches that connect installed devices between bay level and process level. For MVDC linkage to existing digital substations, the process level was divided into two buses: AC and DC, and a system that can be comprehensively managed in conjunction with diagnostic IEDs as well as surveillance and control was proposed.