• Title/Summary/Keyword: u-Security Service

Search Result 137, Processing Time 0.026 seconds

On the Relationship of u-Security Service, Usefulness and Citizen Satisfaction (u-방범서비스와 유용성 및 시민만족의 관계)

  • Choi, Chang-Sun;Hwang, Chan-Gyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.8
    • /
    • pp.875-882
    • /
    • 2014
  • This paper aims to study on the relationship of u-Security service, usefulness and citizen satisfaction. Independence variable is u-Security service, a mediation parameter is usefulness, and dependent variable is citizen satisfaction. Using SPSS 18.0, a series of factor analysis, reliability analysis, multiple regression analysis and path analysis have been performed. The conclusion is as following. First, u-Security service affects usefulness. That is, as publicity safety, system quality, service quality increase, usefulness increases. Second, u-Security service affects citizen satisfaction. That is, as publicity safety, system quality, service quality increase, citizen satisfaction increases. Third, usefulness affects citizen satisfaction. That is, as economic usefulness and security usefulness increase, citizen satisfaction increases. Last, u-Security service has direct and indirect effect in usefulness and citizen satisfaction. That is, usefulness is an important variable that mediates u-Security service and citizen satisfaction.

On Study is to Presidential Security Service in Korea and U.S Secret Service (한국과 미국의 국가원수경호조직 비교연구)

  • Min, Jea-Gi;Kim, Kye-Won
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.127-153
    • /
    • 2004
  • On Study is to presidential security service in Korea and U.S Secret Service. U.S Secret Service give emphasis a right of a people. This become the center of attention that Special Agent enforced comprehensive authority with Law enforcement, intelligence, security. Presidential security service in Korea emphasis a threat of North Korea in the past. but recent circumstances changed a threat of terrorism based Islamic Fundamentalism and emphasis a right of a people. You can't overemphasize the value of this point.

  • PDF

A Dynamic Security Service using Access Control Model in Distributed Framework Support for u-Healthcare (u-헬스케어 지원 분산 프레임워크에서 접근 제어 모델을 이용한 동적 보안 서비스)

  • Jeong, Chang-Won;Kim, Dong-Ho;Kim, Myung-Hee;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.29-42
    • /
    • 2007
  • This paper describes a security object designed to support a dynamic security service for application services in u-healthcare computing environments in which domains are used to object groups for specifying security policies, In particular, we focus on security object for distributed framework support for u-healthcare including policy, role for security and operations use to access control. And then, by using the DPD-Tool. we showed the access right grant procedure of objects which are server programs, the developing process of client program. Also, we verified the executablility of security service supporting by distributed framework support for u-healthcare use to the mobile monitoring application developing procedure implemented through DPD-Tools.

  • PDF

A Study of Security Policy for U-Healthcare Service (U-Healcare 서비스를 위한 보안정책에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.747-751
    • /
    • 2013
  • Researches on U-Healthcare service integrating medical information and IT technologies are actively conducted. U-Healthcare service is the next generation's medical paradigm that ensures conveniences to many users so that the society recognizes the importance and attempts for commercialization through various business model are performed. To form such U-Healthcare service market safely, various policies on the social structure should be established through the standard and the medical law to systemize of the medical information led by the governmen. Especially, the government's security policy to ensure the safety for the government leading visualization of U-Healthcare should be firmly established. Firstly, this paper presents U-healthcare Service and policy guideline. Secondly, it analyzes security threatening factors for the safe U-Healthcare service. By classifying the analyzed security threatening factors based on three major elements of the security, Confidentiality, Integrity and Availability of security policy for each element is proposed.

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

A Study on The United States Secret Service (미국 대통령경호제도에 관한 고찰)

  • Jang, Ki-Boong
    • Korean Security Journal
    • /
    • no.4
    • /
    • pp.299-317
    • /
    • 2001
  • The United States Secret Service is the strongest presidential protective organization in the world. Almost every country's security organization in the world is benchmarking its organization, protective operation system, security equipments and etc. In this paper, I study largely on the protective operation system of the U.S Secret Chapter I is the introduction part. Chapter II introduces the establishment and the background of its development of the U.S Secret Service. Chapter III deals with the organization and ranking system of the U.S SS. Chapter IV consider the protective operation system of the 5.5. The main theory of the protective operation is the 'Protective Envelope Philosophy' which emphasizes the "Cover and Evacuate". Also the protective operation system is developed with the principle of the democracy and in the history of continuing assassination attempt against president. Chapter V describes the legal basis and missions of the S.S. Every protective operational mission of the U.S SS is peformed by the legal basis and democratic procedure. It is followed by concluding observation made in Chapter VI.

  • PDF

A Method of Defense and Security Threats in U-Healthcare Service (U-Healthcare서비스의 보안 위협과 대응 방법)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.4
    • /
    • pp.1-5
    • /
    • 2012
  • The fast-paced development in the field of U-Healthcare, which is available anytime and anywhere, is being underway in accordance with the development of IT technology. U-Healthcare technology has various security threats because it is based on network. The purpose of this paper is to examine the threats of DOS / DDOS attacks based on network attacks, and to propose the response technique that fit the situation of the U-Healthcare service by modifying the existing Detecting Early DOS / DDOS attacks through Packet Counting.

Analysis of Security Threat in u-Healthcare Service (u-Healthcare 서비스의 정보보호 위협 분석)

  • Shin, Dong-Hoon;Han, Byoung-Jin;Lee, Hwan-Jin;Jung, Hyun-Chul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.52-55
    • /
    • 2010
  • 유비쿼터스 기술의 발전으로, u-City, u-물류, u-기상관측,u-Healthcare 등 다양한 융합 서비스가 개발되어 실생활에 적용되기를 기다리고 있다. 이들 중, 기존 의료서비스에 유비쿼터스 기술을 접목하여 언제, 어디서나 보건의료서비스를 제공하고자 하는 u-Healthcare 서비스의 경우에는, 바이오정보를 포함한 개인 정보와 의료정보를 다루기 때문에 해킹으로 인한 정보유출 사고발생시 국가적인 혼란과 사회적인 불신을 야기할 수 있다. 본 논문에서는 국내외에서 추진하고 있는 u-healthcare 서비스 현황을 조사하고, 이에 대한 보안위협을 제시하여 u-Healthcare 서비스의 정보보호 대책 수립시 활용할 수 있도록 제시한다.

  • PDF

An Approach to a Quantitative Evaluation of U-Service Survivability Reflecting Cyber-terrorism (사이버테러를 고려한 U-Service 생존성의 정량적 평가 방안)

  • Kim, Sung-Ki
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.67-72
    • /
    • 2011
  • A system that provides a ubiquitous service is a networked system that has to overcome their circumstances that the service survivability is weak. the survivability of a networked system is defined as an ability of the system that can offer their services without interruption, regardless of whether components comprising the system are under failures, crashes, or physical attacks. This paper presents an approach that end users can obtain a quantitative evaluation of U-service survivability to reflect intended cyber attacks causing the networked system to fall into byzantine failures in addition to the definition of the survivability. In this paper, a Jini system based on wireless local area networks is used as an example for quantitative evaluation of U-service survivability. This paper also presents an continuous time markov chain (CTMC) Model for evaluation of survivability of U-service that a Jini system provides, and an approach to evaluate the survivability of the U-service as a blocking probability that end users can not access U-services.

Process of the Encryption key using a Physical Information in the U-Healthcare Service (원격의료서비스에서 생체정보를 이용한 암호화키 생성방법 연구)

  • Song, Chung-Geon;Lee, Keun-Ho;Ryu, Gab-Sang
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.573-578
    • /
    • 2014
  • Recently as we enter into the world of an aging society, the U-Healthcare service is newly spotlighted. In order to secure this U-Healthcare, a development of security solution that is suitable for the U-Healthcare environment is required. But the U-Healthcare environment is difficult to apply the existing security solution with the lack of standards, a security solution with high completeness was not developed. At this point, in order to structure the safe U-Healthcare environment, a generating method of an encryption key using the body information that helps the effective key management and ensuring the confidentiality of the data is proposed.