• Title/Summary/Keyword: protect the environment

Search Result 1,242, Processing Time 0.029 seconds

A Study of Virtual Home Environment Implementation Scenario for Subscriber Privacy (가입자 정보보호를 위한 Virtual Home Environment 시나리오 보안 취약점 분석)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of Industrial Technology
    • /
    • v.21 no.A
    • /
    • pp.117-122
    • /
    • 2001
  • Currently, the VHE (suggested for global roaming user to provide personal service environment) implementation scenario is being proposed to realize 3G network requirements. However, developing VHE scenarios are focused on signal flow between node and network, and network and network. this case may result in weakness to protect subscriber's privacy in 3G network which commonly uses visited network. In this paper, we reanalyze a several VHE implementation scenarios for user profile protection, indicate a problem concerning user privacy, and finally, design a procedure to cope with vulnerability in VHE implementation scenario.

  • PDF

A Study on the Development of Sustainable Environmental Evaluation Index (지속가능 환경평가지표의 개발에 관한 연구)

  • Lim, Mann-Taek;Kwon, Chang-Yong
    • Journal of the Korean housing association
    • /
    • v.21 no.6
    • /
    • pp.99-108
    • /
    • 2010
  • This study investigated the environmental indices in environmental administration, and to presents how to develop a sustainable environmental evaluation index. The index should be used to evaluate composite plans in the environmental aspects as well as means for setting goals of basic plans for the environment and its management. Specifically, the goals of composite plans are to check environments and land use frame, and evaluate individual measures (public projects). Environment policies are required to be 'a policy creating a clean environment' from 'a policy of environment regulation'. For the organization of a basic framework of environment policies, five topics are needed to be considered, such as the clarification of the idea of environment, establishment of environment regulations, environment management plan, plan to support civilian's action, and local government's efforts for the global matters of environment. For the amenity environments, people should expand their environmental behavior based on their voluntary intentions in transformation of personal life styles, projects with less load on the environment, development of environmentally-friendly projects with consideration for their impact on the earth. This study suggests that they should put more efforts into the development and implementation of useful environmental indices which effectively analyse the regional character to protect the natural ecology and create an sustainable environment with wide coverage.

Application of Multi-Resolution Modeling in Collaborative Design (협업 설계에서의 다중해상도 모델링 응용)

  • Kim, Taeseong;Han, Junghyun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.9 no.2
    • /
    • pp.1-9
    • /
    • 2003
  • Information assurance(IA) refers to methodologies to protect engineering information by ensuring its availability, confidentiality, integrity, non-repudiation, authentication, access control, etc. In collaborative design, IA techniques are needed to protect intellectual property, establish security privileges and create "need to know" protections on critical features. Aside from 3D watermarking, research on how to provide IA to distributed collaborative engineering teams is largely non-existent. This paper provides a framework for information assurance within collaborative design, based on a technique we call role-based viewing. Such role-based viewing is achieved through integration of multi-resolution geometry and security models. 3D models are geometrically partitioned, and the partitioning is used to create multi-resolution mesh hierarchies. Extracting an appropriately simplified model suitable for access rights for individual designers within a collaborative design environment is driven by an elaborate access control mechanism.

  • PDF

Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment (네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF

Framework for Deriving Water Quality Criteria of Toxic Substances (수질유해물질에 대한 수질환경기준 설정체계)

  • Chung, Yun-Chul;Ko, Dae-Hyun
    • Journal of Korean Society on Water Environment
    • /
    • v.21 no.4
    • /
    • pp.305-313
    • /
    • 2005
  • In these days, water environment is getting threatened by a variety of toxic pollutants discharged from industries. However, environmental standards and regulations in Korea may be in straitened circumstances to protect the water environment from it. Therefore, the purpose of this review is to compare the management state of the toxic substances in water environment and to present the framework for deriving water quality criteria in USA and Japan. To conserve the water environment from the toxic pollutants more efficiently, the following considerations could be suggested in standards and regulation in Korea. Firstly, there should be consistency of regulated pollutants in drinking water quality standard, water quality standards and permissible wastewater discharge standards. Secondly, in case of deriving the water quality standards, it is required to consider the conservation of the aquatic ecosystem as well as the protection of human health. Finally, it is indispensable to make risk-based approach in management of toxic pollutants in water environment.

A Study on the Regional Cooperation for the Prevention of Marine Pollution in the Yellow Sea (황해에 있어서의 해양오염방지를 위한 지역적 협력에 관한 연구)

  • 이윤철;최성규
    • Journal of the Korean Institute of Navigation
    • /
    • v.16 no.2
    • /
    • pp.41-52
    • /
    • 1992
  • It is, as everyone knows, very important for human beings to protect and conserve marine environment. We has believed the ocean is so wide and deep that it cannot be polluted. But it has begun to doubt the capacity of self-purification of the ocean due to pollution arising from marine casualities. It has proved that semi-enclosed sea is likely to be polluted and cannot be restored easily once pollution occurs. Therefore, first of all it is important to take preventive measures for prevention of marine pollution in the semi-enclosed sea like the Yellow Sea. Many of regional conventions for prevention of marine pollution have come into existence. this dissertation was set out for the fact that the Yellow Sea is semi-enclosed sea which is vulnerable to marine pollution. It is desirable not to deal with marine preservation of the Yellow Sea by a single exclusively but to deal with it by cooperation of all coastal states under the present circumstances. I proposed a program of regional cooperation to protect and conserve the Yellow Sea. This program must be progressed with gradual arrangements. First, they must establist a basic cooperation committee to work basic affairs on the protection of marine environment within the Yellow Sea. The Committee Mainly play parts of study and research concerned with pollution of the Yellow Sea in the non-governmental side and consist of legal and scientific experts. Second, they must establish the control Committee to prevent marine pollution of the Yellow Sea substantially. There is a reason that regional cooperation cannot be directly concluded with the regional tready. Because there is a problem of Recognition of States left. In principle, a subject of tready must be a state in the International Law. But they have not made Recognition of State which is demanded by International Law between North and South Koreas. Therefore, the Control committee must play a substantial part of prevention from pollution instead of the treaty. Finally, we concluded tentatively named $\ulcorner$Convention on Regional Cooperation for Protection of Marine Environment of the Yellow Sea from Pollution$\lrcorner$ if the matter is settled which is related to Recognition of States in the International Law.

  • PDF

Digital Watermarking for Robustness of Low Bit Rate Video Contents on the Mobile (모바일 상에서 비트율이 낮은 비디오 콘텐츠의 강인성을 위한 디지털 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Video contents in the mobile environment are processed with the low bit-rate relative to normal video contents due to the consideration of network traffic; hence, it is necessary to protect the copyright of the low bit-rate video contents. The algorithm for watermarking appropriate for the mobile environment should be developed because the performance of the mobile devices is much lower than that of personal computers. This paper suggested the invisible spread spectrum watermarking method to the low bit-rate video contents, considering the low performance of the mobile device in the M-Commerce environment; it also enables to track down illegal users of the video contents to protect the copyright. The robustness of the contents with watermark is expressed with the correlation of extraction algorithm from watermark removed or distorted contents. The results of our experiment showed that we could extract the innate frequencies of M-Sequence when we extracted M-Sequence after compressing the contents with watermark easily. Therefore, illegal users of the contents can be tracked down because watermark can be extracted from the low bit-rate video contents.

The Analysis of Actual State of Working Environment and Working Uniforms for Burning Waste Workers (생활폐기물 소각장 작업자의 작업환경과 작업복 현황 분석)

  • 박순자;신정숙;정명희
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.8
    • /
    • pp.992-1003
    • /
    • 2003
  • This study analyzes the actual state of the working uniforms worn by burning waste workers to protect their body from the hazardous environment. Directions for improvement of the clothing fabrics is also suggested. We visited and interviewed those persons who worked in the burning waste plant in Seoul and in Gyunggi Province. 245 workers were surveyed by questionnaires, and 211 workers out of 245 were statistically analyzed. Frequencies and percentages were calculated and $\chi$$^2$ test, ANOVA and Scheffe Post hoc comparison methods were utilized to test some hypothesis. The working uniforms were classified as four general types: separate type, disposable-coverall. overall, and winter clothes. At present, the working uniforms are not suitable for the conditions which they are used. There is a lack of ventilation and an inability to absorb perspiration limited elasticity, and the uniforms are prone to static shock. The degree of satisfaction varied significantly, based on the worker's educational background and main work. However, only a small percentage of workers interviewed were satisfied with the appearance and the fit of the present working uniforms. The working duration had a negative impact on the satisfaction of the worker. This results suggest that materials, colors, design and size of working clothes must be improved. The suggestions are as follows: Firstly. to use disposable non-woven fabrics finished to increase moisture regain. Secondly. to use the bad air permeability fabrics to protect the skin from absorbtion of harmful gases, flying dust, heavy metals, etc.

XML Digital signature System based on Mobile Environment (모바일 환경에서의 XML 문서 디지털 서명 시스템)

  • Hao, Ri-Ming;Hong, Xian-Yu;Lee, Seong-Hyun;Lee, Jae-Seung;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.701-704
    • /
    • 2007
  • Recently, More and more consumer enjoy the finance service such as settling, account transferring, stocks investment, and so via mobile device. In the mobile environment, data transferring between the devices is formatted as XML. However, the common XML file is exposed to the attack such as hacking and malignity code, to satisfy security of mobile environment is very difficult. The problem is more seriously at the open platform such as WIPI that is developed by our country. So there is enough reason to propose one system to protect the import data. In this paper, we development the system to digital signature and signature the XML document in order to protect data, and the system is observing the recommendation of the XML Signature Syntax and Processing by W3C. When designing and composition the system, we use the digital signature algorithm RSA, DSA, KCDSA, and HMAC, etc. we test the system at the open WIPI platform.

  • PDF