• Title/Summary/Keyword: information policy

Search Result 10,172, Processing Time 0.039 seconds

Access Control Policy of Data Considering Varying Context in Sensor Fusion Environment of Internet of Things (사물인터넷 센서퓨전 환경에서 동적인 상황을 고려한 데이터 접근제어 정책)

  • Song, You-jin;Seo, Aria;Lee, Jaekyu;Kim, Yei-chang
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.409-418
    • /
    • 2015
  • In order to delivery of the correct information in IoT environment, it is important to deduce collected information according to a user's situation and to create a new information. In this paper, we propose a control access scheme of information through context-aware to protect sensitive information in IoT environment. It focuses on the access rights management to grant access in consideration of the user's situation, and constrains(access control policy) the access of the data stored in network of unauthorized users. To this end, after analysis of the existing research 'CP-ABE-based on context information access control scheme', then include dynamic conditions in the range of status information, finally we propose a access control policy reflecting the extended multi-dimensional context attribute. Proposed in this paper, access control policy considering the dynamic conditions is designed to suit for IoT sensor fusion environment. Therefore, comparing the existing studies, there are advantages it make a possible to ensure the variety and accuracy of data, and to extend the existing context properties.

A Study on Network Strategy for Smart Society by Analysis of Spatial Information Technology Trends (공간정보기술 동향 분석을 통한 스마트사회 네트워크 전략에 관한 연구)

  • Kang, Young-mo;Kang, Chan-woo;Han, Kyeong-seok;Kim, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1411-1418
    • /
    • 2015
  • Currently, the previous studies on the concept, configuration, and system regarding spacial information policies show the little progress. However, these studies only propose the basic structure system in terms of a policy theory, seeking and suggesting the basic concept to establish spacial information policies. In the shift of a new paradigm from a PC-based paradigm that began in the mid-2000s to the current smart society based on mobile devises, such as smart phones, this study thus reviewed the strategic direction of the propulsion to establish the desired future strategy for the spatial technology policy with spatial information system that can influence the future national competitiveness of Korea. The results of this study is expected to be used to analyze a variety of issues and technological changes on geospatial intelligence at the global level and to support the establishment of a road-map for policies and research & development on domestic geospatial information.

A Study on the Information Security System of Fin-Tech Business (핀테크 기업의 정보보안체계 관한 연구)

  • Kang, Young-Mo;Lee, Young-Geun;Kwon, Hyun-Jung;Han, Keyung-Seok;Chung, Hyun-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.19-24
    • /
    • 2016
  • A Study on the Information Security System of Fin-Tech Business In traditional electronic commerce, there have not been severe issues of trading information through documents in paper or the closed EDI. The scale of e-commerce has increased as internet develops, however, turning to the online e-commerce, which caused a number of issues such as authentication, information forgery, and non-repudiation between the parties. To prevent conflicts from such troubles and perform the post management, security technologies are applied throughout the process of e-commerce, certificates intervening. Lately, meanwhile, FinTech has been creating a sensation around the mobile payment service. Incidents of information leakage from card corporations and hackings imply the need of securing safety of the financial service. Development and evolution of FinTech industry must be accompanied by information protection. Therefore, this research aims to inquire into the information security system of leading FinTech company in a foreign country.

Information Analysis Framework for Supporting Evidence-based Research and Development Policy: Practical Considerations for Rationality in the Policy Process (증거기반 연구개발 정책 지원을 위한 정보 분석 프레임워크에 대한 연구: 정책과정의 합리성 제고에 관한 실무적 고찰)

  • Lee, Do-Yeon;Kim, Keun-Hwan
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.77-93
    • /
    • 2021
  • This study is based on a review of how and in which stages evidence can be used, in practice, in the policy process and proposes an information analysis framework capable of inducing continuous interaction among stakeholders and an operation procedure that allows experts to reconcile conflicts through the analyzed information. In particular, it focuses on the strategic planning process carried out in the policy formation stage of the R&D policy process, which promotes the creation of knowledge related to science and technology required to improve national competitiveness and solve social and environmental problems. Conflicts are negotiated and resolved by ensuring rationality in the policy process, following the operation procedure and inducing communication between the stakeholders participating in national R&D strategic planning related to the issue of population aging throughout utilizing the provided useful information. Our results showed that the proposed operating procedures and information analysis framework had a positive effect on the communication-oriented shift. Thus, in order to promote conflict management, an agreed operating procedures and information analysis framework should be established between stakeholders, thereby reducing a conflict of opinions in advance. This article realizes the true meaning of movement of evidence-based policies. In addition, the framework is helping support evidence-based R&D policies by strengthening rational behavior.

Information Strategy Planning for Fisheries Policy Information Systems Using the Data Warehouse (Data Warehouse 기법을 이용한 수산정책정보시스템 구축)

  • 어윤양;김하균;이재정
    • The Journal of Fisheries Business Administration
    • /
    • v.31 no.2
    • /
    • pp.119-132
    • /
    • 2000
  • One of most important wort to build Fisheries Policy Information Systems(FPIS) is related to connect the data warehouse between fisheries departments, This paper presents the developing strategies to build the FPIS. First, developing the FPIS needs to compensate the laws and regulations with assistance of fisheries departments. Second, FPIS developer needs to cooperate the related fisheries departments deeply, Third, developing the data warehouse will be contribute to improve criterion and statistics of fisheries data. Forth, For experts of systems use the FPIS, they are needed to educate for appling the systems in the fisheries environments.

  • PDF

Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption

  • Wang, Guangbo;Li, Feng;Wang, Pengcheng;Hu, Yixiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3401-3420
    • /
    • 2021
  • We provide a traceable ciphertext-policy attribute based encryption (CP-ABE) construction for monotone access structures (MAS) based on composite order bilinear groups, which is secure adaptively under the standard model. We construct this scheme by making use of an "encoding technique" which represents the MAS by their minimal sets to encrypt the messages. To date, for all traceable CP-ABE schemes, their encryption costs grow linearly with the MAS size, the decryption costs grow linearly with the qualified rows in the span programs. However, in our traceable CP-ABE, the ciphertext is linear with the minimal sets, and decryption needs merely three bilinear pairing computations and two exponent computations, which improves the efficiency extremely and has constant decryption. At last, the detailed security and traceability proof is given.

Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel

  • Wang, Jianhua;Zhao, Zhiyuan;Sun, Lei;Zhu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2718-2731
    • /
    • 2019
  • Conjunctive keyword search encryption is an important technique for protecting sensitive data that is outsourced to cloud servers. However, the process of searching outsourced data may facilitate the leakage of sensitive data. Thus, an efficient data search approach with high security is critical. To solve this problem, an efficient conjunctive keyword search scheme based on ciphertext-policy attribute-based encryption is proposed for cloud storage environment. This paper proposes an efficient mechanism for removing the secure channel and resisting off-line keyword-guessing attacks. The storage overhead and the computational complexity are regardless of the number of keywords. This scheme is proved adaptively secure based on the decisional bilinear Diffie-Hellman assumption in the standard model. Finally, the results of theoretical analysis and experimental simulation show that the proposed scheme has advantages in security, storage overhead and efficiency, and it is more suitable for practical applications.

Policy-based Network Security with Multiple Agents (ICCAS 2003)

  • Seo, Hee-Suk;Lee, Won-Young;Yi, Mi-Ra
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1051-1055
    • /
    • 2003
  • Policies are collections of general principles specifying the desired behavior and state of a system. Network management is mainly carried out by following policies about the behavior of the resources in the network. Policy-based (PB) network management supports to manage distributed system in a flexible and dynamic way. This paper focuses on configuration management based on Internet Engineering Task Force (IETF) standards. Network security approaches include the usage of intrusion detection system to detect the intrusion, building firewall to protect the internal systems and network. This paper presents how the policy-based framework is collaborated among the network security systems (intrusion detection system, firewall) and intrusion detection systems are cooperated to detect the intrusions.

  • PDF

Finding Policy Leverages with Analysis of Dynamic Growth Behaviors of Cyberspace and Electronic Commerce (전자공간과 전자상거래 성장의 동태성 분석을 통한 Policy Leverage 탐색)

  • 하원규;김도훈;문태훈;최남희;홍민기
    • Korean System Dynamics Review
    • /
    • v.1 no.1
    • /
    • pp.29-56
    • /
    • 2000
  • During the past few years, cyberspace and electronic commerce has been expanding throughout the world rapidly. The purpose of this paper is to find out policy leverages for boosting up cyberspace and electronic commerce using system dynamics simulation modeling approach. The system dynamics simulation model developed in this paper allows analysis of both the effect of factors on dynamic growth pattern of cyberspace as well as the effect of time delay in information processing, money transfer and delivery on model behavior. Finding of this study is that capacity of information infrastructure and size of cyberspace population are key factors of cyberspace growth. Also, reducing time delay in information flow, money flow, and delivery flow is an important policy leverages for growth of electronic commerce.

  • PDF

Present State of Database Industry and the Policy to Foster (데이터베이스 산업(産業)의 현황(現況)과 육성방안)

  • Seo, Tae-Sul;Choi, Myoung-Gyu
    • Journal of Information Management
    • /
    • v.23 no.4
    • /
    • pp.21-38
    • /
    • 1992
  • The purpose of this study is to grope for policy to foster the database industry of Korea. Then, this study suggests a definition, classifications and the industry structure of database, and presents the developing processes of both world and Korea database industry. Finally, the problems of domestic database industry of Korea are pointed out and the policy to foster it is suggested.

  • PDF