• 제목/요약/키워드: ubiquitous security

검색결과 521건 처리시간 0.031초

The Role of Reputation in Ubiquitous Healthcare System

  • Yuan, Weiwei;Guan, Donghai;Lee, Sung-Young
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.847-848
    • /
    • 2007
  • In this work, we analyze the role of reputation in ubiquitous healthcare system as well as the relationship of security, trust and reputation in this environment in details. In addition, an example is given to show how to use reputation system in ubiquitous healthcare and how to use reputation system on decision making.

  • PDF

센싱기술을 이용한 효과적인 LMS 모델에 관한 연구 (A Effective LMS Model Using Sensing System)

  • 김석수;주민성
    • 융합보안논문지
    • /
    • 제5권4호
    • /
    • pp.33-40
    • /
    • 2005
  • 교육은 정보를 받아들이는 가장 큰 통로의 하나라 할 수 있다. 유비쿼터스 시대를 맞이하면서 새로운 교육기술과 환경이 요구되고 이에 따른 많은 기술이 등장하고있다. 현재의 e-learning 또한 많은 요구점들을 해결하기위해 많은 변화가 이루어질 필요가있다. 본 논문서는 언제 어디서나, 어떤 내용에 관계없이 학습할수있는 유비쿼터스환경의 e-learning 모델을 위하여 기존 e-learning 모델의 한계점을 분석하고, 유비쿼터스 네트워크망과 차세대 센서기술등을 적용하여 SCORM표준안을 기반으로한 LMS에 학습콘텐츠의 변환서비스와 협력 학습서비스기능을 추가한 유비쿼터스 환경에 대응하는 LMS모델을 제안하였다. 학습형태 변환서비스는 센서 기술에 의해서 학습자의 주변상황을 감지 하거나 신체상태를 파악하여 스마트 센서로 정보화하여 학습자에게 가장 적합한 형태로 콘텐츠를 서비스해준다. Orestia SOB등의 센싱기술의 접목은 보다 원활한 협력학습 서비스를 가능케 해줄것이다.

  • PDF

USN 융합기술을 활용한 자전거 시설물의 안전향상에 관한 연구 (A Study on the Improvement Alternatives using USN Technology on Bicycle and Infrastructures)

  • 정성학
    • 한국컴퓨터정보학회논문지
    • /
    • 제15권8호
    • /
    • pp.173-180
    • /
    • 2010
  • 본 연구의 목적은 지능형 교통체계에서 유비쿼터스 센서 네트웍(USN: Ubiquitous Sensor Network)의 융합기술을 활용하여 자전거 시설물의 보안과 안전 기능을 향상하는데 있다. 이러한 목적을 달성하기 위해서 유니버셜 센서 네트웍 기술을 활용하여 U-bike 시스템을 개발하였다. 자전거도로 시설물 안전에 대한 문헌연구를 통하여 유비쿼터스 자전거 교통정보와 서비스 특성을 분석하여 USN을 활용한 자전거 및 시설물의 안전 인프라 구축 방안을 제시한다. 본 연구결과는 4대강 자전거도로 및 시설물 안전성능을 향상하는데 기여할 것이다.

도서관에서의 유비쿼터스 요소의 디자인 특성 평가 연구 (A Study on the Design Characteristics Evaluation of Ubiquitous Element in the Library)

  • 황지은;남경숙
    • 한국실내디자인학회논문집
    • /
    • 제24권3호
    • /
    • pp.137-145
    • /
    • 2015
  • Ubiquitous technology is currently being introduced to libraries at the fastest speed as compared to other spaces. However, the introduction of ubiquitous technology to the existing analog space is causing problems despite such intelligence of libraries as the design standards for ubiquitous spaces have not been arranged yet. This researcher analyzed and evaluated the characteristics of design from the ubiquitous aspect of the ubiquitous environment-oriented libraries that are still at their initial stage. The subjects for this study were the National Library of Korea, Myongji University Bangmok Library, and Yonsei University Library. The definition and characteristics of the ubiquitous environment libraries were examined through literature review and the standards for design analysis were derived by analyzing previous studies. Case analyses were conducted to evaluate the design elements in the ubiquitous environment libraries based on the field observation, photographing, and interviews with managers. As a result, functionality, safety, cognition and convenience were derived based on the investigation and analysis of previous studies; informativeness, playfulness, security, and simplicity which are the design characteristics were found. As a result of the case studies, while functionality and safety are met in most of the standards for design analysis, universality was very low. Care for minorities is need in a library as it is a space used by many unspecified individuals.

유비쿼터스 도시 환경에서 프라시버시 보호 방안에 관한 소고 - 경쟁하는 개인정보가치 분석을 중심으로 - (A Study Privacy and Security in Ubiquitous City Environment (Focous on Computing Values Analysis of Personal Information))

  • 정창덕;강장묵
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2006년도 하계학술대회
    • /
    • pp.249-254
    • /
    • 2006
  • As the concept of Ubiquitous City has become an important issue, we need to have a voice in the field of privacy. The Ubiquitous Computing revolution, it is achieved a physical space and an intelligent union of cyber space in the space where an off-line space was integrated with on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. According to the recent papers and studies, Privacy or Personal Information sector is mentioned as a major problem for Ubiquitous Computing Society. Therefore, this paper checks Ubiquitous City, the present privacy concept and situation of currently proceeding Ubiquitous computing environment. Also, The main purpose of this paper is to analyze the concepts privacy, personal information. Thus this paper treated the analysis of case, technological or social issue, problem and solution, competing values of privacy and so on.

  • PDF

New Secret Sharing Scheme for Privacy Data Management

  • 송유진;이동혁
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.765-773
    • /
    • 2006
  • In ubiquitous environment, private enterprise or public institution's privacy data are sometimes exposed to hackers because of the lack of the sense of information security. We apply secret sharing scheme to solve the privacy problems. But, the existing secret sharing scheme are not suitable for the management of large a quantity of data because that required operation of large capacity. In this paper, We propose new secret sharing scheme for privacy data management. Our scheme makes high-speed operation possible, and it also allows for set weight for each secret pieces depending on weight of participants. The scheme proposed in this paper makes it efficient to collect and manage secure privacy data in ubiquitous environment.

  • PDF

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • 제1권1호
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

의료분야에서 멀티캐스트 통신을 지원하는 셀 기반의 안전한 센서 네트워크 구조 (A Cell-based Secure Sensor Network supporting Multi-casting Communication for the Application of Telemedicine)

  • 성지연;최주영;김명주
    • 융합보안논문지
    • /
    • 제5권4호
    • /
    • pp.49-58
    • /
    • 2005
  • 환자의 이동성과 경제적인 의료서비스를 제공하는 미래의 원격의료시스템으로서 유비쿼터스 센서 네트워크(USN) 구조를 제시한다. 본 USN 구조는 계층적 라우팅과 평면 라우팅을 접합하여 개선한 것으로서 멀티캐스팅 통신을 지원하는 셀 기반의 안전한 4계층 구조이다. 본 구조에서는 환자의 개인정보 보호 및 안전한 의료정보를 위하여 경량의 PKI 기반 보안 통신 프로토콜을 채택하고 있으며 이에 따른 핵심 통신 과정을 함께 제시하였다.

  • PDF

Soft Systems are Ubiquitous-Defenses are Rare: A Case for Contingent Outsourcing of Patch Management

  • Arnett Kirk P.
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제14권3호
    • /
    • pp.23-30
    • /
    • 2005
  • Computer attacks on vulnerable software are ubiquitous. Today's attacks on client PCs can be used to create armies of zombie computers that are capable of wide reach attacks on high profile businesses and governments. The simple act of patching software vulnerabilities will certainly mitigate this problem, but patching has its own set of problems. Further, it is frequently the case that patches which are available to mitigate vulnerabilities are not being made on a timely basis and sometimes are not being made at all. One solution to the patch management dilemma is outsourcing. This paper notes that outsourcing is not a carte blanche decision that can be made based on dollars, but rather that a contingency decision matrix can provide guidance on outsourcing solutions for patch management and other security components as well. The matrix recognizes that IS staff expertise and employee security awareness are two important factors in the outsourcing decision.

  • PDF

VPN을 이용한 Embedded 홈 네트워크 시스템 보안 (Embedded Home Network System Security using VPN)

  • 진선일;정진규;안광혁;유영동;홍석교
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 학술회의 논문집 정보 및 제어부문 B
    • /
    • pp.701-704
    • /
    • 2003
  • The home network system of ubiquitous computing concept is changing present our home life as more comfortable and safe. Also, it permits that we can connect the home network system and control the appliance which is linked to the home network system without limitation in time and place. But, as other systems that use the public network like the Internet, remote control/monitoring of the home network system that use the Internet includes problems such as user's access which is not admitted and information changing. This paper presents the efficient solution about the security problem that is recognized to important problem of the home network system. Also this paper implements the security of the home network system based on the UPnP (Universal Plug and Play), adding VPN (Virtual Private Network) router that uses the IPsec to the home network system which is consisted of the ARM9 and the Embedded Linux.

  • PDF