• Title/Summary/Keyword: personal integrity

Search Result 111, Processing Time 0.022 seconds

How the meaning of things can be changed based on the epic of self and travel experience -focusing on 『Yeulhailgi』- (자기서사에 따른 사물의 의미변용과 여행 체험 -『열하일기』를 중심으로-)

  • Seo, Eun-A
    • Journal of Korean Classical Literature and Education
    • /
    • no.15
    • /
    • pp.5-29
    • /
    • 2008
  • This study examined how Ji-Won Park(Yeonam) created the eaning of things based on the epic of self and how his travel experience manifested on the epic of self. First of all, the author examined that how Yeonam interpreted the meaning of things based on his own reflection using the examples of "The Golden Arbor" and "Baeki-Sukje." As a result, the author found that Yeonam focused on the material value of "the Golden Arbor" rather than the reason of creation of "The Golden Arbor." Yeonam also used "Baeki-Sukje" as an ironic representation rather than the original meaning of loyalty and integrity. Second, it helped to present personal self epic since travel experience and the atmosphere of the travel journey could reduce the pressure from the epic of society on individuals. For instance, when Ji-Won Park (Yeonman) traveled the China (the country of Chung) where society promoted public welfare, Yeonman was able to express himself freely which showed utilitarian over justice. Finally, the author talked about how a book of travels can be used for the case of literature therapy since "Yeulhailgi" was written by Yeonam while he was traveling. The author indicated that it might be useful for the patients to write own travel journey since the therapist could analyze the mind of patients by the epic of self. In addition, using a book of travels also can be valuable for the patients since the therapist could analyze the condition of patients as well as help patients see through themselves while reading a book of travels.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

IoT MQTT Security Protocol Design Using Chaotic Signals (혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.778-783
    • /
    • 2018
  • With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.

Cloud Computing Virtualization: It's Security Issues and Vulnerability (클라우드 컴퓨팅 가상화 기술: 보안이슈 및 취약점)

  • Kang, Dea-Hoon;Kim, Sang-Gu;Kim, HyunHo;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.234-237
    • /
    • 2014
  • The increasing of Cloud Computing technology among several companies has been a key strategy for IT services to provide desirable IT solutions to consumers of cloud services. More attention is concentrated to these core technologies that enable cloud services and more particularly to the virtualization aspect. The accessibility to a larger number of users is possible because of the usage of the data-intensive, data management and data integrity. Unfortunately, those useful services are vulnerable to kind of attacks by hackers, thus the security of personal information is in critical situation. To solve this to leakage vulnerability, and with the proliferation of cloud services, the cloud service providers adopt a security system with firewall, antivirus software and a large number of virtualized servers and Host. In this paper, a variety of virtualization technologies, threats and vulnerabilities are described with a complement of different security solutions as countermeasures.

  • PDF

Blockchain-based Electronic Medical Record Sharing FrameworkUsing Ciphertext Policy Attribute-Based Cryptography for patient's anonymity (환자의 익명성이 보장되는 암호문 정책 속성중심 암호를 활용한 블록체인 기반 전자의무기록 공유 프레임워크)

  • Baek, Seungsoo
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.49-60
    • /
    • 2019
  • Medical record is part of the personal information that values the dignity and value of an individual, and can lead to serious social prejudice and disadvantage to an individual when it is breached illegally. In addition, the medical record has been highly threatened because its value is relatively high, and external threats are continuing. In this paper, we propose a medical record sharing framework that guarantees patient's privacy based on blockchain using ciphertext policy-based attribute based proxy re-encryption scheme. The proposed framework first uses the blockchain technology to ensure the integrity and transparency of medical records, and uses the stealth address to build the unlinkability between physician and patient. Besides, the ciphertext policy attribute-based proxy re-encryption scheme is used to enable fine-grained access control, and it is possible to share information in emergency situations without patient's agreement.

A Case Study on the Risk Management for the Long-term Preservation Business Activities Related to Electronic Records (전자기록 장기보존 위험관리 사례)

  • Yim, Jin-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.39
    • /
    • pp.3-43
    • /
    • 2014
  • This paper showed results of the risk management project in detail which was conducted by National Archives of Korea(NAK) in 2010. In the project NAK examined its long-term preservation business of electronic records using DRAMBORA(Digital Repository Audit Method Based on Risk Assessment). NAK has defined 44 different risk elements related to its business activities, assessed and classified them into several grades according to the severity calculated by risk probability score and risk potential impact score, and developed precise management plans for two of the most serious risks. This paper introduced the management plan for one of them. The risk was numbered with NR04 and described by 'Loss of integrity of records information'. This paper explained mitigation strategies, contingency organization, disaster control responsibilities, and personal mission cards for the NR04. This paper planned to give comprehensive understandings to Records Management Organizations about the risk management approaches as an effective way for business management through the case study.

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.2
    • /
    • pp.73-82
    • /
    • 2018
  • In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.

Security Analysis on 'Privacy-Preserving Contact Tracing Specifications by Apple and Google' and Improvement with Verifiable Computations ('애플과 구글의 코로나 접촉 추적 사양'에 대한 보안성 평가 및 검증 가능한 연산을 이용한 개선)

  • Kim, Byeong Yeon;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.291-307
    • /
    • 2021
  • There has been global efforts to prevent the further spread of the COVID-19 and get society back to normal. 'Contact tracing' is a crucial way to detect the infected person. However the contact tracing makes another concern about the privacy violation of the personal data of infected people, released by governments. Therefore Google and Apple are announcing a joint effort to enable the use of Bluetooth technology to help governments and health agencies reduce the spread of the virus, with user privacy and security central to the design. However, in order to provide the improved tracing application, it is necessary to identify potential security threats and investigate vulnerabilities for systematically. In this paper, we provide security analysis of Privacy-Preserving COVID-19 Contact Tracing App with STRIDE and LINDDUN threat models. Based on the analysis, we propose to adopt a verifiable computation scheme, Zero-knowledge Succinctness Non-interactive Arguments of Knowledges (zkSNARKs) and Public Key Infrastructure (PKI) to ensure both data integrity and privacy protection in a more practical way.

A Study on Factors of Increasing Satisfaction with College Education for Freshmen in College (전문대학 신입생의 대학 교육서비스 만족도 상승 요인에 관한 연구)

  • Lee, Jong-Ha;Han, Sung-il
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.390-399
    • /
    • 2021
  • This study analyze the factors that can improve the satisfaction level of college students stable adaptation to college life and education service. It was analyzed whether students' personal characteristics, college life-related characteristics, and changes in college life Adaptation increase the satisfaction of college education service. As a result of analyzing CAT(college adatiation test) differences of 1st survey and 2nd survey in the results of the total 368 students, the graduates of the academic high school showed high academic integration and social integration and the social integration was high in the types of regular admission. As a result of multiple regression analysis with the increase in college education service satisfaction as a dependent variable, the lower the language score, the more positive changes in academic integrity, career identity, college satisfaction, relationship with professors, economic stability, and study keeping stability. Based on these results, various student support programs were proposed to increase the college education service satisfaction of college students.

Low-cost Fiber Bragg Grating Interrogator Design for Unmanned Aircraft (무인 항공기를 위한 저가형 FBG 인터로게이터 설계)

  • Hong, Jae-Beom;Hong, Gyo-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.465-470
    • /
    • 2020
  • Complex materials are widely used in aviation industries where lightweighting is essential because they have lighter properties than metals. However, composite materials can cause defects such as internal void formation, poor adhesive mixing, and non-adhesive parts during the production process, and there is a risk of micro-cracking and interlayer separation due to low energy impact. Therefore, a structural damage test is essential. As a result, structural integrity monitoring using FBG is drawing attention. Compared to conventional electrical sensors, FBG has the advantage of being more corrosion-resistant and multiplexed without being affected by electrical noise. However, interloggers measuring FBG are expensive and have a large disadvantage because they are made on the premise of measuring large structures. In this paper, low-cost interloggers were designed for use in unmanned or small aircraft using optical switche, WDM filter, and LTFs, and compared to conventional high-priced interrogator.