• Title/Summary/Keyword: personal network

Search Result 1,440, Processing Time 0.028 seconds

An Efficient Signing and Certificate Status Management Scheme in Personal PKI (Personal PKI에서 효율적인 서명 및 인증서 상태 검증 기법)

  • Sur Chul;Shin Weon;Lee Kyung-Hyune
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.91-96
    • /
    • 2005
  • Recetly, the term Personal Public Key Infrastructure (PKI) was introduced to supprot reliable and authenticated service in a Personal Area Network (PAN). However, traditional public key signature schemes and certificate status management are not suitable for a PAN environment since mobile devices that constitute the PAN have limited computing capability. In this paper, we propose a new scheme that efficiently provides signature generation and certificate status management for mobile devices. Based on hash chain technique, we intend to reduce computational overhead on signature generation, and further, to minimize communication overhead for managing certificate status.

  • PDF

An Evaluation of the Necessity of Security Management of Personal Information Consignees : using Privacy Policy and ISMS data (개인정보 수탁사의 보안관리 대상 식별 방안 연구 : 개인정보처리방침 및 정보보호인증 데이터 이용)

  • Choi, Won-Nyeong;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2020
  • Business consignment using personal information is increasing for the operating profit and work efficiency of Internet companies. If the personal information leakage accident occurs at the consignee, the consigner who provided personal information will be damaged greatly. The purpose of this study is to analyze the business attributes of consignee using consigned personal information and present a model that can be used to select companies with high risk of personal information leakage by considering the importance of the involved personal information. For this, personal information consignment relations, consignment services, and personal information items used were analyzed. Social network analysis and cluster analysis were applied to select companies with high network centrality that are advisable to obtain information security certification. The results of this study could be used to establish information protection strategies for private or public enterprises that manage companies using personal information.

Safe Web Using Scrapable Headless Browser in Network Separation Environment

  • Jung, Won-chi;Park, Jeonghun;Park, Namje
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.77-85
    • /
    • 2019
  • In this paper, we propose a "Safe Web Using Scrapable Headless Browse" Because in a network separation environment for security, It does not allow the Internet. The reason is to physically block malicious code. Many accidents occurred, including the 3.20 hacking incident, personal information leakage at credit card companies, and the leakage of personal information at "Interpark"(Internet shopping mall). As a result, the separation of the network separate the Internet network from the internal network, that was made mandatory for public institutions, and the policy-introduction institution for network separation was expanded to the government, local governments and the financial sector. In terms of information security, network separation is an effective defense system. Because building a network that is not attacked from the outside, internal information can be kept safe. therefore, "the separation of the network" is inefficient. because it is important to use the Internet's information to search for it and to use it as data directly inside. Using a capture method using a Headless Web browser can solve these conflicting problems. We would like to suggest a way to protect both safety and efficiency.

The Impact of Worker's Entrepreneurship and Personal Characteristics on Entrepreneurial Intention: Moderating Effect of Social Network (직장인의 기업가 정신과 개인적 특성이 창업의도에 미치는 영향: 사회적 네트워크의 조절 효과)

  • Chang, Yu-Jin;Lee, Byung-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.497-511
    • /
    • 2019
  • The purpose of this study is to examine the effects of entrepreneurship and personal characteristics on entrepreneurial intention and to analyze what factors influence the entrepreneurial intention through the moderating effects of social networks. So, the survey was conducted on 374 employees in their 30s or older. Descriptive statistics were used to understand the actual state of entrepreneurial intentions, and exploratory factor analysis was conducted to analyze the validity. In addition, a correlation analysis was conducted to identify relationships with variables, finally, a hierarchical regression analysis was performed to identify the effect of moderating social networks in entrepreneurship and personal characteristics. The study found that, firstly, Entrepreneurship was positively correlated with extroversion, achievement desire, self-efficacy, social network, entrepreneurial intention, and negatively correlated with introversion. Second, The extroversion of personal characteristics showed positive correlations with achievement desire, self-efficacy, social network, and entrepreneurial intention and negatively correlated with introversion. Introversion has a negative correlation with achievement desire, self-efficacy, social network, and entrepreneurial intention, and self-efficacy has a positive correlation with social network and entrepreneurship. Third, social networks have been shown to moderate the relationship between personal characteristics and entrepreneurial intention. Reflecting the results from this study, we expect that those preparing for future start-ups will be a meaningful reference to validate their capabilities and start them.

Development of Personal Hypertension Management System Using PDA (PDA를 이용한 개인 심혈관리 시스템 개발)

  • Kwon, Seok-Young;Kwon, Mann-Jun;Park, Kyoung-Soon;Chun, Myung-Geun;Cha, Eun-Jong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.5
    • /
    • pp.718-723
    • /
    • 2007
  • In this paper, we developed a personal hypertension management system (PHMS) having self-diagnosis function with PDA. The developed PHMS consists of five modules such as a personal information management, a life management, a food management, a sickness management, and network management modules. The personal information management module offers physical and fatness information as well as personal information. The life management module gives exercise and body mass index. The food management module includes caloric intake and the sickness management module renders a personal blood pressure and a subjective symptom. Finally, wireless networks are implemented for the network management. From these, it is possible to make a self diagnosis and be examined and treated remotely by sending the stored blood pressure related information to a medical doctor.

Dynamic Personal Knowledge Network Design based on Correlated Connection Structure (결합 연결구조 기반의 동적 개인 지식네트워크 설계)

  • Shim, JeongYon
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.6
    • /
    • pp.71-79
    • /
    • 2015
  • In a new era of Cloud and Big data, how to search the useful data from dynamic huge data pool in a right time and right way is most important at the stage where the information is getting more important. Above all, in the era of s Big Data it is required to design the advanced efficient intelligent Knowledge system which can process the dynamic variable big data. Accordingly in this paper we propose Dynamic personal Knowledge Network as one of the advanced Intelligent system approach. Adopting the human brain function and its neuro dynamics, an Intelligent system which has a structural flexibility was designed. For Structure-Function association, a personal Knowledge Network is made to be structured and to have reorganizing function as connecting the common nodes. We also design this system to have a reasoning process in the extracted optimal paths from the Knowledge Network.

Design the Smart Object based on WBAN(Wireless Body Area Network) - Smart Belt (WBAN(Wireless Body Area Network) 기반 스마트 오브젝트 설계 - 스마트벨트)

  • Burn, U-In;Kim, Tae-Su;Cho, Weduke
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.674-678
    • /
    • 2008
  • Our research is for development of smart object in WBAN environment. Too many smart object in various computing device were developed, but users always attention to their lot of smart objects and any personal things now. So we need smart object that classification and management all of user's personal devices and any effects in invisible and seamless system. We discussed how develop do that object in WBAN(Wireless Body Area Network) system and how make components in this system to wireless network in this paper.

  • PDF

Co-author Network Characteristics of Korean System Dynamics Review (한국시스템다이내믹스 학회지 공저자 네트워크 특성에 관한 연구)

  • Kim, Sun-Duck;Sin, Cheol;Jung, Hyung-Ki;Lee, Man-Hyung
    • Korean System Dynamics Review
    • /
    • v.17 no.3
    • /
    • pp.31-50
    • /
    • 2016
  • This study examines the basic conditions of joint authorship research activities in the Korean System Dynamics Review and points out the structural co-author network characteristics among co-authored papers based on the social network analysis(SNA) techniques. In specific, this study identifies the cooperative relationship of research papers in the Korean System Dynamics Review, knowledge formation, and knowledge propagation paths. The study results imply that Korean System Dynamics Review has exhibited the typical 'Steven's power law,' which is repeatedly observed among complex systems, and that knowledge structure centered upon and propagated around couples of researchers. Additionally, the study results present that there have been active personal exchanges among major researchers. In contrast, personal contacts among research groups and within groups seem relatively weak.

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.97-104
    • /
    • 2022
  • In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.

Capacity Analysis of UWB Networks in Three-Dimensional Space

  • Cai, Lin X.;Cai, Lin;Shen, Xuemin;Mark, Jon W.
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.287-296
    • /
    • 2009
  • Although asymptotic bounds of wireless network capacity have been heavily pursued, the answers to the following questions are still critical for network planning, protocol and architecture design: Given a three-dimensional (3D) network space with the number of active users randomly located in the space and using the wireless communication technology, what are the expected per-flow throughput, network capacity, and network transport capacity? In addition, how can the protocol parameters be tuned to enhance network performance? In this paper, we focus on the ultra wideband (UWB) based wireless personal area networks (WPANs) and provide answers to these questions, considering the salient features of UWB communications, i.e., low transmission/interference power level, accurate ranging capability, etc. Specifically, we demonstrate how to explore the spatial multiplexing gain of UWB networks by allowing appropriate concurrent transmissions. Given 3D space and the number of active users, we derive the expected number of concurrent transmissions, network capacity and transport capacity of the UWB network. The results reveal the main factors affecting network (transport) capacity, and how to determine the best protocol parameters, e.g., exclusive region size, in order to maximize the capacity. Extensive simulation results are given to validate the analytical results.