• 제목/요약/키워드: information policy

검색결과 10,147건 처리시간 0.038초

Cache-Filter: A Cache Permission Policy for Information-Centric Networking

  • Feng, Bohao;Zhou, Huachun;Zhang, Mingchuan;Zhang, Hongke
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.4912-4933
    • /
    • 2015
  • Information Centric Networking (ICN) has recently attracted great attention. It names the content decoupling from the location and introduces network caching, making the content to be cached anywhere within the network. The benefits of such design are obvious, however, many challenges still need to be solved. Among them, the local caching policy is widely discussed and it can be further divided into two parts, namely the cache permission policy and the cache replacement policy. The former is used to decide whether an incoming content should be cached while the latter is used to evict a cached content if required. The Internet is a user-oriented network and popular contents always have much more requests than unpopular ones. Caching such popular contents closer to the user's location can improve the network performance, and consequently, the local caching policy is required to identify popular contents. However, considering the line speed requirement of ICN routers, the local caching policy whose complexity is larger than O(1) cannot be applied. In terms of the replacement policy, Least Recently Used (LRU) is selected as the default one for ICN because of its low complexity, although its ability to identify the popular content is poor. Hence, the identification of popular contents should be completed by the cache permission policy. In this paper, a cache permission policy called Cache-Filter, whose complexity is O(1), is proposed, aiming to store popular contents closer to users. Cache-Filter takes the content popularity into account and achieves the goal through the collaboration of on-path nodes. Extensive simulations are conducted to evaluate the performance of Cache-Filter. Leave Copy Down (LCD), Move Copy Down (MCD), Betw, ProbCache, ProbCache+, Prob(p) and Probabilistic Caching with Secondary List (PCSL) are also implemented for comparison. The results show that Cache-Filter performs well. For example, in terms of the distance to access to contents, compared with Leave Copy Everywhere (LCE) used by Named Data Networking (NDN) as the permission policy, Cache-Filter saves over 17% number of hops.

유럽연합의 교육정보화 정책 및 시사점 (European Union's Policy on Information Technology in Education: Lessons and Policy Implications for Korea)

  • 김홍래;이승진;김정훈
    • 한국정보교육학회:학술대회논문집
    • /
    • 한국정보교육학회 2010년도 하계학술대회
    • /
    • pp.37-49
    • /
    • 2010
  • 본 연구는 유럽연합의 정보화사회 계획 및 교육정보화 추진 계획 및 성과를 분석하여 우리나라 교육정보화 발전에 시사점을 제공하고자 하였다. 이를 위하여 유럽연합의 정보화사회 추진 계획과 교육정보화 사업에 대한 내용을 세밀하게 검토하였다. 이를 통하여 우리나라 정보화 정책의 시사점을 얻고자 하였다. 그리고 유럽연합의 교육정보화 정책의 성과 및 문제점과 개선 방향을 분석하여 우리나라 교육정보화 정책을 위한 네 가지 시사점을 제시하였다.

  • PDF

Evaluation of ICT Policy for the Agriculture and Rural Development in Developed Countries: A Comprehensive Lesson for Developing Countries

  • Hossain, Md. Dulal
    • Agribusiness and Information Management
    • /
    • 제1권2호
    • /
    • pp.61-80
    • /
    • 2009
  • Information and Communication Technology is now widely accepted by developing countries as a development tool in their efforts to alleviate poverty, enhance human development, and achieve Millennium Development Goals. Recognizing this untapped potential and development strategies incorporating ICT are being increasingly promoted and launched across the developing countries requiring a comprehensive ICT policy that plays a crucial rule, in particular, in the area of agriculture and rural development. While the potential advantages of ICT for development are enormous in developed countries, national policies of developing countries are yet to adequately reflect truly comprehensive and integrated strategies for harnessing and exploiting this potential. This paper tries to provide implication of ICT policy to the agriculture and rural development in developing countries, in particular through lessons learned from European Union (EU) IT policy. Through the examination of vital projects in the agriculture and rural development sectors and case study analysis of applied policies and strategies implemented in the European Union, this paper provides tangible examples and lessons for policy-makers and practitioners involved in the field. Hence, this study provides policy-makers the necessary tools, information and knowledge to facilitate the formulation and adoption of ICT policies and strategies in the agriculture and rural development sector.

  • PDF

아시아.태평양국가(太平洋國家)의 정보정책(情報政策) (National Information Policy in Asia and Oceania)

  • 산업기술정보센터 정보자료실
    • 정보관리연구
    • /
    • 제21권2호
    • /
    • pp.24-37
    • /
    • 1990
  • 제11차(第11次) 국제문헌정보연맹(國際文獻情報聯盟/아시아 태평양위원회(太平洋委員會) 총회(總會)(FID/CAO)가 1990년 10월 29일부터 11월 1일까지 산업기술정보(産業技術情報)센터의 주관하에 서울에서 개최(開催)되었다. 총회(總會)의 주제(主題)는 국가정보정책(國家情報政策)이었으며, 이때 발표(發表)된 호주(濠洲), 인도네시아, 일본(日本), 말레이지아, 중국(中國), 타일랜드, 소련(蘇聯) 등 7 개국(個國)의 국가보고서(國家報告書)를 요약하였다. 국가(國家)마다 정보정책(情報政策)의 내용(內容)이나 정보(情報)시스템의 구조(構造)는 다소 차이가 있지만 주요목표(主要目標)는 유사한 것이었다. 정부(政府)는 국가정보정책(國家情報政策)을 수립(樹立)하고 정보관련기관(情報關聯機關)들의 협력(協力) 아래 정보정책(情報政策)의 실현을 보장해야 할 것이다.

  • PDF

정보통신분야 중소벤처기업 지원정책에 관한 인지지도 분석 (Cognitive Map Analysis on the Policy of SMEs and Ventures in the Field of Information Technology)

  • 이중만;황규희
    • 한국콘텐츠학회논문지
    • /
    • 제13권11호
    • /
    • pp.347-355
    • /
    • 2013
  • 본 연구에서는 이명박 대통령의 연설문과 지식경제부의 IT중소벤처기업 지원정책에 대한 내용을 토대로 심층적인 인지지도 분석을 하였다. 또한 정책수단변수와 정책목표변수간의 관계분석을 통해 정책목표를 도출하고, 종합적인 인지지도를 활용하여 성장역량강화, 투자활성화, 창업활성화, 기술경쟁력 제고, 글로벌화, 고용창출 등 정보통신분야 중소벤처기업 지원정책방향을 제시하였다. 그리고 IT중소벤처기업 지원정책의 인지지도 분석을 통해 피드백 루프가 별로 없다는 점과 IT중소벤처기업 지원정책이 선순환 구조를 가지고 있는 양의 피드백 루프구조라는 것을 발견했다.

Partially Observable Markov Decision Process with Lagged Information over Infinite Horizon

  • Jeong, Byong-Ho;Kim, Soung-Hie
    • 한국경영과학회지
    • /
    • 제16권1호
    • /
    • pp.135-146
    • /
    • 1991
  • This paper shows the infinite horizon model of Partially Observable Markov Decision Process with lagged information. The lagged information is uncertain delayed observation of the process under control. Even though the optimal policy of the model exists, finding the optimal policy is very time consuming. Thus, the aim of this study is to find an .eplison.-optimal stationary policy minimizing the expected discounted total cost of the model. .EPSILON.- optimal policy is found by using a modified version of the well known policy iteration algorithm. The modification focuses to the value determination routine of the algorithm. Some properties of the approximation functions for the expected discounted cost of a stationary policy are presented. The expected discounted cost of a stationary policy is approximated based on these properties. A numerical example is also shown.

  • PDF

Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing

  • Yin, Hongjian;Zhang, Leyou;Cui, Yilei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2768-2780
    • /
    • 2019
  • Ciphertext-policy attribute-based encryption (CP-ABE) is one of the practical technologies to share data over cloud since it can protect data confidentiality and support fine-grained access control on the encrypted data. However, most of the previous schemes only focus on data confidentiality without considering data receiver privacy preserving. Recently, Li et al.(in TIIS, 10(7), 2016.7) proposed a CP-ABE with hidden access policy and testing, where they declare their scheme achieves privacy preserving for the encryptor and decryptor, and also has high decryption efficiency. Unfortunately, in this paper, we show that their scheme fails to achieve hidden access policy at first. It means that any adversary can obtain access policy information by a simple decisional Diffie-Hellman test (DDH-test) attack. Then we give a method to overcome this shortcoming. Security and performance analyses show that the proposed scheme not only achieves the privacy protection for users, but also has higher efficiency than the original one.

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

  • Zhao, Zhiyuan;Wang, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권6호
    • /
    • pp.3254-3272
    • /
    • 2017
  • With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.

통신서비스의 정보화: 그 현황 및 개선 방향 (Informatization of Telecommunication Services: Its Actual Conditions and Policy Recommendations)

  • 조찬식
    • 정보관리연구
    • /
    • 제26권4호
    • /
    • pp.1-27
    • /
    • 1995
  • 정보사회에서의 통신서비스는 정보교환의 중요한 매체이며 이러한 통신서비스의 정보화란 그 사회 모든 부분에 통신서비스를 통한 정보의 교환이 가능해짐을 의미한다. 본 연구는 통신서비스 정보화의 이론적 토대 위에 우리나라 통신서비스의 역사 및 현황을 살펴보고 분석한 뒤, 그 분석을 바탕으로 개선 방향을 제시하고 있다.

  • PDF

교차영향분석을 이용한 국내 ICT 융합산업의 정보보호정책 우선순위 분석 (Priority Analysis of Information Security Policy in the ICT Convergence Industry in South Korea Using Cross-Impact Analysis)

  • 이동희;전효정;김태성
    • 정보보호학회논문지
    • /
    • 제28권3호
    • /
    • pp.695-706
    • /
    • 2018
  • 최근 제조업을 시작으로 농업, 금융업 등의 전 산업 영역에서 ICBM(IoT, Cloud, Bigdata, Mobile)을 중심으로 한 신산업과의 융합이 급속도로 진행되고 있다. 향후 융합산업의 가장 큰 문제 중 하나인 사이버 위협에 대비하기 위해 정보보호를 고려한 융합산업의 발전이 매우 중요한 상황이다. 이에 본 연구에서는 현재 발표된 산업발전정책과 이와 관련된 정보보호정책들의 세부 내용을 교차영향분석으로 분석하고 전문가 설문을 통해 정책의 우선순위를 제시하였다. 이를 통해 정보보호정책 내의 우선순위 및 상호 연관성을 밝히고, 효과적인 정책 시행방향에 대해서 제시하고자 하였다. 결과적으로 본 연구에서 도출한 6개의 정보보호정책과제들은 모두 핵심 동인에 속하며, 정책의 중요도를 고려한다면 보안 산업의 체질개선 및 지원 강화, 정보보호 인재양성, 정보보호산업 투자확대 등의 정책이 상대적으로 우선 시행될 필요가 있는 것으로 나타났다.