• Title/Summary/Keyword: security model

Search Result 4,015, Processing Time 0.03 seconds

Household food insecurity and coping strategies in a poor rural community in Malaysia

  • Shariff, Zalilah Mohd.;Khor, Geok Lin
    • Nutrition Research and Practice
    • /
    • v.2 no.1
    • /
    • pp.26-34
    • /
    • 2008
  • This cross-sectional study assessed household food insecurity among low-income rural communities and examined its association with demographic and socioeconomic factors as well as coping strategies to minimize food insecurity. Demographic, socioeconomic, expenditure and coping strategy data were collected from 200 women of poor households in a rural community in Malaysia. Households were categorized as either food secure (n=84) or food insecure (n=116) using the Radimer/Cornell Hunger and Food Insecurity instrument. T-test, Chi-square and logistic regression were utilized for comparison of factors between food secure and food insecure households and determination of factors associated with household food insecurity, respectively. More of the food insecure households were living below the poverty line, had a larger household size, more children and school-going children and mothers as housewives. As food insecure households had more school-going children, reducing expenditures on the children's education is an important strategy to reduce household expenditures. Borrowing money to buy foods, receiving foods from family members, relatives and neighbors and reducing the number of meals seemed to cushion the food insecure households from experiencing food insufficiency. Most of the food insecure households adopted the strategy on cooking whatever is available at home for their meals. The logistic regression model indicates that food insecure households were likely to have more children (OR=1.71; p<0.05) and non-working mothers (OR=6.15; p<0.05), did not own any land (OR=3.18; p<0.05) and adopted the strategy of food preparation based on whatever is available at their homes (OR=4.33; p<0.05). However, mothers who reported to borrow money to purchase food (OR=O.84; p<0.05) and households with higher incomes of fathers (OR=O.99; p<0.05) were more likely to be food secure. Understanding the factors that contribute to household food insecurity is imperative so that effective strategies could be developed and implemented.

Implementation of the Electronic Prescription Security System Using by an If Card (IC 카드에 의한 원외 전자처방전 보안을 위한 시스템 구축)

  • Kang, Se-Na;Lee, Ki-Han
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.281-286
    • /
    • 2003
  • Nowadays, a patient's private medical data which is exposed to the outside world has a severe effect on not only the patient's private life but also his/her social activities and environment. So, it is important to securely protect the patient's private medical data from the illegal manipulation. This paper studies the method to store the electronic prescription information in an IC card. For that, an access control for users, such as a doctor, a nurse, a medical institute member, a pharmacy, a pharmacist, or a patient, is proposed to access the data stored in an IC card. The certificate is issued using the Crypto API of a certificate management model supported by Windows 2000. The public/private key is created by the Cryptographic Service Provider program, and the electronic prescription is signed using the digital signature. The proposed system, therefore, can improve the quality of medical services by securing the safety and integrity of the electronic prescription, stored in an IC card.

The Efficient Group Key Management Blocking Collusion Attack (공모공격을 차단하는 효율적인 그룹 키 관리)

  • Kim, Tae-Gyun;Chung, Jong-In
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.409-418
    • /
    • 2004
  • Multicast services are provided on the Internet in fast increasing . Therefore it is important to keep security for multicast communication. Member leaving is deeply associated with scalability problem for group key management. If one member of the group is removed, new group key has to be generated and distributed to all remaining members of group. Minimizing the number of messages and operation cost for generation of the composite keys are important evaluating criteria of multicast key management scheme since generation and distribution of new keys for rekeying require expensive operation. Batch removal can reduce these important parameters rather than removing members sequentially In fashion one after another. In this paper, Hamming distance is calculated between eve교 members to be removed. The members with Hamming distance less than threshold are selected for rekeying procedure. With running the round assignment algorithm In the case of removing several members simultaneously, our model has advantages of reducing the number of message and operation cost for generation of the composite keys and eliminating possibility of collusion attack for rekeying.

VPN Traversal Scheme in Hierarchical MIPv4 environment (계층적 이동 IPv4 환경에서 VPN 운영 방안)

  • Sung, Su-Lyun;Kang, Jung-Ho;Shin, Young-Tae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.519-526
    • /
    • 2004
  • This paper presents an efficient interoperation scheme of a VPN(Virtual Private Network) and Mobile IP using a hierarchical structure of a FA(Foreign Agent). In the proposed scheme, the GFA(Gateway Foreign Agent) plays a role of VPN gateway on behalf of the MN(Mobile Node). When the MN moves in the same GFA domain, because the GFA has already an IPsec security association with a VPN gateway in the home network of the MN, the MN does not need an IPsec re-negotiaion. In this way, our mechanism reduces a message overhead and a delay resulted from an IPsec negotiation. And a MN can send a data to a correspondent node without a packet leakage. We show a performance of our scheme by using a discrete analytical model. Analytical results demonstrated that the total processing cost calculated by a registration update cost and a packet delivery cost is significantly reduced through our proposed scheme.

모바일 증권 서비스 이용에 관한 연구

  • Lee Min-Hwa;Kwon Hyun Young
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2003.05a
    • /
    • pp.55-73
    • /
    • 2003
  • As the development of wireless technologies continue, mobile stock trading has become a new channel for companies to reach their customers. This study examines the factors affecting customer acceptance of mobile stock trading services. The research model based on the previous studies was established and the research hypotheses were generated. The sample was divided into users and nonuser groups. The test results show that relative advantage and social influence are positively related to intention to accept mobile services as well as in intention to reuse, security risk is negatively related to intention to reuse, frequency of trading is positively related to intention to reuse, cost burden is negatively related to the probability of using mobile stock trading services, and social influence is positively related to the probability of using mobile services. The results also support that information quality and response time are positively related to relative advantage, and interface quality is negatively related to complexity. It is considered that the study results may help managers to increase customer use of mobile stock trading services.

  • PDF

Gene flow from herbicide resistant genetically modified rice to conventional rice (Oryza sativa L.) cultivars

  • Han, Sung Min;Lee, Bumkyu;Won, Ok Jae;Hwang, Ki Seon;Suh, Su Jeoung;Kim, Chang-Gi;Park, Kee Woong
    • Journal of Ecology and Environment
    • /
    • v.38 no.4
    • /
    • pp.397-403
    • /
    • 2015
  • Rice (Oryza sativa L.) is an important feeding crop in Asia, and utilization of genetically modified (GM) rice is highly demanding. For co-existence of GM rice and non-GM rice, the proper confinement measures should be provided. Thus, we surveyed gene flow from herbicide resistant GM rice to the conventional rice cultivars in the field tests. Gene flow frequency decreased with increasing distance between the pollen donor and recipients and did not exceed more than 1% even at the nearest distance. In single recipient model plot, a maximum gene flow frequency was observed at the shortest distance and hybrid was detected up to 12 m from the pollen donor. The direction of gene was coincided with the dominant wind direction. Gene flow assessment to multiple recipient plots was conducted under the high raining season by chance, and abrupt decline of gene flow frequency and maximum distance were resulted. According to the survey results, current regulation for isolation distance is reasonable for environmental safety or for general crop production. However, we suggest an alternative measure for GM rice cultivation that should be supplemented to overcome the out of estimation and in the environment asking higher security levels.

Flexible USIM Authentication System for Next Generation Mobile Radio Communication Systems (차세대 이동통신 시스템에서 유동적 USIM 카드를 이용한 인증 시스템)

  • Choi, Dong-Wook;Hwang, Jae-Young;Chung, Yeon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2340-2346
    • /
    • 2011
  • This paper presents a user-friendly authentication system using a flexible USIM. In the proposed method and its system, the flexible USIM utilizes personalized data such as Mobile Directory Number(MDN) and social security number as the key to user authentication. The authentication method proposed in this paper permits limited times of use and/or limited duration of use. A simple simulation model shows that the proposed algorithm works well and shows high compatibility with existing authentication methods. In addition, an alternative or more advanced authentication system can be developed with the proposed flexible USIM card. It is seen that this simple alternative method will eventually be able to make wireless communication networks more easily accessible for subscribers, irrespective of user environments.

u-Healthcare Service Authentication Protocol based on RFID Technology (RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.153-159
    • /
    • 2012
  • Now a days, U-healthcare comes into the spotlight as a new business model which combines RFID technology with medical service in the well-being era and IT popularization. U-healthcare service needs a method that can deals with hand-writing, overlap data, forgery and falsification of data, difference between information version that happen in medical process because of graft between RFID technology and u-healthcare. This paper proposes RFID based user certification protocol to protect user's privacy who gets medical service through U-healthcare. In the protocol, secret information of patient does the XOR with the secret key that is created in the hospital to reconsider the stability of security system of U-healthcare and user's data forgery and falsification and privacy and then saves it in the secret key field of patient in DB table. Also, it informs the case of illegal access to certification server and make it approved the access of u-healthcare service by differentiating whether u-healthcare is illegal or not.

A Survey of the Transmission-Power-Control Schemes in Wireless Body-Sensor Networks

  • Lee, Woosik;Kim, Heeyoul;Hong, Min;Kang, Min-Goo;Jeong, Seung Ryul;Kim, Namgi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1854-1868
    • /
    • 2018
  • A wireless body-sensor network (WBSN) refers to a network-configured environment in which sensors are placed on both the inside and outside of the human body. The sensors are much smaller and the energy is more constrained when compared to traditional wireless sensor network (WSN) environments. The critical nature of the energy-constraint issue in WBSN environments has led to numerous studies on the reduction of energy consumption of WBSN sensors. The transmission-power-control (TPC) technique adjusts the transmission-power level (TPL) of sensors in the WBSN and reduces the energy consumption that occurs during communications. To elaborate, when transmission sensors and reception sensors are placed in various parts of the human body, the transmission sensors regularly send sensor data to the reception sensors. As the reception sensors receive data from the transmission sensors, real-time measurements of the received signal-strength indication (RSSI), which is the value that indicates the channel status, are taken to determine the TPL that suits the current-channel status. This TPL information is then sent back to the transmission sensors. The transmission sensors adjust their current TPL based on the TPL that they receive from the reception sensors. The initial TPC algorithm made linear or binary adjustments using only the information of the current-channel status. However, because various data in the WBSN environment can be utilized to create a more efficient TPC algorithm, many different types of TPC algorithms that combine human movements or fuse TPC with other algorithms have emerged. This paper defines and discusses the design and development process of an efficient TPC algorithm for WBSNs. We will describe the WBSN characteristics, model, and closed-loop mechanism, followed by an examination of recent TPC studies.

The study of meanings and follow-up tasks for enactment of Assistive Technology Act in Korea (한국의 보조기기법 제정 의의와 후속과제에 대한 연구)

  • Nam, Se-hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.535-542
    • /
    • 2016
  • This study was to explore the meanings and follow-up tasks for enactment of Act on Supply and Utilization Promotion of Assistive Technology Devices for People with Disabilities and Seniors(Assistive Technology Act) in Korea. I conducted analysis about contents and establishment process of the Act. The study found meaningful effects ; it provided the basis for supporting assistive technology devices based on the social model, it led to an Implementation of the national obligations such as UN Convention on the Rights of Persons with Disabilities, it provided terms related to assistive technology. It is suggested to conduct follow-up studies and to put the efforts to strengthen additional laws for backing up the effective policy for extended support of assistive technology devices and for security of budget, for establishing regional service centers, for phasing of professional qualification, for controlling quality, for establishing an information system, and for promoting industries.