• Title/Summary/Keyword: key manager

Search Result 178, Processing Time 0.03 seconds

A Study of a Secure Smart Car System using Attribute-based Delegation Method (속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.71-79
    • /
    • 2019
  • The demand of smart cars is increasing rapidly. International stand organize such as 3GPP and 5GAA are proposing standard communication protocvols for connected-car, and automotive network infrastructure. But Smart car network have many security threats and more dangerous against the existed wire communication network. Typically, peripheral devices of a smart car may disguise their identity and steal location information and personal information about the vehicle. In addition, the infrastructure elements around smart cars can conspire and put driving cars in danger, threatening lives. This is a very serious security threat. Therefore, in order to solve these problems, we proposed a system that is secure from collusion and tampering attacks using attribute-based authorize delegation method and threshold encryption algorithms. We have demonstrated using a semantic safety model that the proposed system can be safe from collusion attack.

Distributed Access Privilege Management for Secure Cloud Business (안전한 클라우드 비즈니스를 위한 접근권한 분산관리)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.369-378
    • /
    • 2011
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server. And we construct the model of access privilege management using AONT based XOR threshold Secret Sharing, In addition, our scheme enable to grant weight for access privilege using XOR Share. In chapter 4, we differentiate existing scheme and proposed scheme.

Analysis of Hospital Services for Elderly Inpatients (노인 입원환자 병원서비스 분석)

  • Chang, Hyun Sook
    • Quality Improvement in Health Care
    • /
    • v.7 no.1
    • /
    • pp.18-31
    • /
    • 2000
  • Background : This study is to identify the inappropriate hospital services for elderly inpatients over 65 years in general hospital with acute care functioning. Consequently elderly inpatient care and the management of long-term care facilities are key issues for current government health policy. Method : The survey was conducted for two months for all inpatients over 65 in 7 general hospitals, 6 work sampling days randomly selected. In each survey day, the subjective judgement by medical staff on the degree of acute care needs and by nursing unit manager on hospital services of each inpatients was also conducted. Result : The total number of cases collected are 2,541 elderly inpatients, according to subjective judgements by medical staff on inpatient condition. However 46.8% of cases are turned out to be non-acute care group. The frequency of medical services provided to non-acute group are 2~3 vital sign checks per day 78.2%, IV injection 40.1%, antibiotics medication 20.2%. Conclusion : Lots of elderly patients' who are staving in acute hospitals, at present need to be transferred to long-term care facilities. However, there was been shortage of long-term care facilities. It is expected to identify the need of elderly inpatients and therefore, to provide cost-effective, appropriate and good quality health services to elderly inpatients depending on their needs.

  • PDF

The Relationship Among Leadership Styles of Nurse Managers, Job Satisfaction, Organizational Commitment, and Turnover Intention (간호 관리자의 리더십 유형과 직무만족, 조직몰입, 이직의도와의 관계 연구)

  • Ha, Na-Sun;Choi, Jung
    • Journal of Korean Academy of Nursing
    • /
    • v.32 no.6
    • /
    • pp.812-822
    • /
    • 2002
  • The Purpose of this study was to identify the relationship among leadership style of nurse managers, job satisfaction, organizational commitment, and turnover intention. Method: The subjects were 468 nurses and 19 head nurses who were working at the 3 general hospitals in seoul. The data were collected from July 6 to September 14, 2001 by the structured questionnaires. For data analysis, descriptive statistics, ANOVA, Pearson correlation coefficient, and stepwise multiple regression with SAS package were used. Result: 1) The score of the nurse managers' transformational leadership perceived by surbodinates' were higher than that of the nurse managers' transactional leadership. Among 5 subdimensions of the leadership styles perceived by surbodinates', the scores of 'charisma' and 'intellectual stimulation' were highest and 'management by exception' were lowest. 2) 'Charisma', 'intellectual stimulation', 'individual consideration' and 'contingent reward' were positively related to all of variables except 'turnover intention'. 'Management by exception' was negatively related to all of variables and was positively related to 'turnover intention'. 3) 'Job satisfaction' was positively related to 'organizational commitment' and 'Job satisfaction', 'organizational commitment' were negatively related to 'turnover intention'. 4) As a result of stepwise multiple regression analysis, the key determinants of 'turnover intention' were 'organizational commitment' and this explained 44.4% of the total variance of it.

Multicast Secure Architecture based on PIM-SM (소규모 멀티캐스트를 기반으로 한 멀티캐스트 보안구조)

  • 김성선;이상순;정영목
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.116-122
    • /
    • 2001
  • A conventional multicast secure protocol. MVMRP, CBT is designed for a large scaled r protocol so the PIM-SM (protect Independent Multicst-Sparse Mode) routing protocol which small number of clients, long distance path among the hosts and shortest path routing chara weak point of require it's own Core tree and re-keying when the traffic is pass through the ro In this study, proposes a architect for a licit information secure of join/leave to all the user or on-service user. With proposed architect, subgroups for multicast secure group mana will be divided by RP (Rendezvous-Point) unit and each RP has a subgroup manager. As a result, the transmitting time is shortened because there is no need to data translation by group key on data sending and the whole architecture size is samller than the other multicast secure architecture.

Development of Recommendation Agents through Web Log Analysis (웹 로그 분석을 이용한 추천 에이전트의 개발)

  • 김성학;이창훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.10
    • /
    • pp.621-630
    • /
    • 2003
  • Web logs are the information recorded by a web server when users access the web sites, and due to a speedy rising of internet usage, the worth of their practical use has become increasingly important. Analyzing such logs can use to determine the patterns representing users' navigational behavior in a Web site and restructure a Web site to create a more effective organizational presence. For these applications, the generally used key methods in many studies are association rules and sequential patterns based by Apriori algorithms, which are widely used to extract correlation among patterns. But Apriori inhere inefficiency in computing cost when applied to large databases. In this paper, we develop a new algorithm for mining interesting patterns which is faster than Apriori algorithm and recommendation agents which could provide a system manager with valuable information that are accessed sequentially by many users.

  • PDF

Neural Network Model-based Algorithm for Identifying Job Status in Block Assembly Shop for Shipbuilding (신경망 모델 기반 조선소 조립공장 작업상태 판별 알고리즘)

  • Hong, Seung-Taek;Choi, Jin-Young;Park, Sang-Chul
    • IE interfaces
    • /
    • v.24 no.3
    • /
    • pp.267-273
    • /
    • 2011
  • In the shipbuilding industry, since production processes are so complicated that the data collection for decision making cannot be fully automated, most of production planning and controls are based on the information provided only by field workers. Therefore, without sufficient information it is very difficult to manage the whole production process efficiently. Job status is one of the most important information used for evaluating the remaining processing time in production control, specifically, in block assembly shop. Currently, it is checked by a production manager manually and production planning is modified based on that information, which might cause a delay in production control, resulting in performance degradation. Motivated by these remarks, in this paper we propose an efficient algorithm for identifying job status in block assembly shop for shipbuilding. The algorithm is based on the multi-layer perceptron neural network model using two key factors for input parameters. We showed the superiority of the algorithm by using a numerical experiment, based on real data collected from block assembly shop.

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

RIA based Personalized Search with Widget Implementation (RIA 기반 개인화 검색을 위한 Widget 응용의 구현)

  • Park, Cha-Ra;Lim, Tae-Soo;Lee, Woo-Key
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.6
    • /
    • pp.402-406
    • /
    • 2007
  • Rich Internet Application(RIA) is one of the Web 2.0 technologies and is expected to be a next generation user interface technique which allows flexible and dynamic manipulation for Web searches. This paper addresses a personalization mechanism for advanced Web search using RIA for abundant user interactions. We devised a dynamic and graphical user interface instead of previous text-based searches and a client side application for storing personal preference information. In this research, we implemented the graphical personalized search manager using Yahoo web search API and widget, and demonstrated its effectiveness by performing some experiments with various query terms and representative predicates.

A Study on Concurrent Engineering Methodology for Automobile Wiring Harness Design System (자동차 전장용 에이전트 기반 시스템 연구)

  • Lee, S.H.;Choi, D.S.
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.1 no.3
    • /
    • pp.83-94
    • /
    • 1993
  • Design and production of wiring for automobile systems provide the background for the development of concurrent engineering framwork. Key issues include with different parts of the wiring design process and the development of hierarchical representations that capture the different characteristics(e.g., connectivity, geometry) of the harnesses. The abstraction of design information results in features, while the abstraction of operations leads to the development of agents. These abstracts are essential for efficient transactions among people and computer tools in a domain that involves numerous interacting constraints. We have decomposed the wiring design process into four basic categories of tasks that are each addressed by an "agent" : the Environment Editor(EE), the Free Space Manager(FSM), the Wiring Editor(WE), and the Part Selector(PS). In this paper the strategy for the problem decomposition, the definition of features, and the ways in which features are used by various agents, are discussed. We conclude with a discussion of some of the issues raised by the project and the steps underway to address them.

  • PDF