• 제목/요약/키워드: 개인화 메시지

Search Result 85, Processing Time 0.022 seconds

A Study on the Implementation Status of Improvements Being Made of Korean University Libraries (도서관 운영 개선방법에 대한 국내 대학도서관의 도입실태 분석)

  • Noh, Dong-Jo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.21 no.3
    • /
    • pp.139-149
    • /
    • 2010
  • This study determines the implementation status of the improvement being made to Korean university libraries. An e-mail survey was conducted targeting 24 Korean university libraries. Conclusions after analysing the responses of the survey were as follows:(1) 24 university libraries implemented 88 different methods of operating their libraries. In other words each library implemented an average 3.67 different methods operating.(2) Twelve universities initiated their improvement schemes in 2008, ten universities initiated their improvement schemes in 2007, nine universities initiated their improvement schemes in 2005, eight universities initiated their improvement schemes in 2010 and seven universities initiated their improvement schemes in 2009. Most university libraries implemented their improvement after 2005.(3) Most university libraries improvement schemes entailed online tours, special events, personal customized services, and SMS services. We noted that online reference services such as the Wiki Service, Twitter, Facebook, Cyworld were not initiated.

Device Adapter Model based on Dynamic Management Module for u-Health gateway (u-헬스 게이트웨이를 위한 동적 관리 모듈 기반의 디바이스 어댑터 모델)

  • Kim, Jong-Tak;Song, Si-Yun;Hwang, Hee-Jeong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.41-48
    • /
    • 2010
  • It is essential to guarantee a smooth communication and data exchange in a PHD(Personal Healthcare Device) network for applications providing U-health services. In spite of that, most of PHDs are heterogeneous, so the heterogeneity of their protocols makes it difficult to develop an integrated gateway sending sensed healthcare data to U-health service providers. To solve this problem, we suggest the design and implementation of a device adapter model based on dynamic managed module in this paper. Our model were implemented to work on the OSGi-based gateway middleware and to have interoperability in connection with the HL7 system that is the standard of the Healthcare Information systems. In addition, our model has an architecture supporting a communication based on the object serialization in order to provide extensibility in the functional aspect of applications. Through the experiment on a test-bed which is an implementation of the device adapter module for electrocardiogram and blood-pressure/blood-sugar device having one channel, we have confirmed the accuracy of sensing and sending data.

Multi Server Password Authenticated Key Exchange Using Attribute-Based Encryption (속성 기반 암호화 방식을 이용한 다중 서버 패스워드 인증 키 교환)

  • Park, Minkyung;Cho, Eunsang;Kwon, Ted Taekyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1597-1605
    • /
    • 2015
  • Password authenticated key exchange (PAKE) is a protocol that a client stores its password to a server, authenticates itself using its password and shares a session key with the server. In multi-server PAKE, a client splits its password and stores them to several servers separately. Unless all the servers are compromised, client's password will not be disclosed in the multi-server setting. In attribute-based encryption (ABE), a sender encrypts a message M using a set of attributes and then a receiver decrypts it using the same set of attributes. In this paper, we introduce multi-server PAKE protocol that utilizes a set of attributes of ABE as a client's password. In the protocol, the client and servers do not need to create additional public/private key pairs because the password is used as a set of public keys. Also, the client and the servers exchange only one round-trip message per server. The protocol is secure against dictionary attacks. We prove our system is secure in a proposed threat model. Finally we show feasibility through evaluating the execution time of the protocol.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

A study on the Filtering of Spam E-mail using n-Gram indexing and Support Vector Machine (n-Gram 색인화와 Support Vector Machine을 사용한 스팸메일 필터링에 대한 연구)

  • 서정우;손태식;서정택;문종섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.23-33
    • /
    • 2004
  • Because of a rapid growth of internet environment, it is also fast increasing to exchange message using e-mail. But, despite the convenience of e-mail, it is rising a currently bi9 issue to waste their time and cost due to the spam mail in an individual or enterprise. Many kinds of solutions have been studied to solve harmful effects of spam mail. Such typical methods are as follows; pattern matching using the keyword with representative method and method using the probability like Naive Bayesian. In this paper, we propose a classification method of spam mails from normal mails using Support Vector Machine, which has excellent performance in pattern classification problems, to compensate for the problems of existing research. Especially, the proposed method practices efficiently a teaming procedure with a word dictionary including a generated index by the n-Gram. In the conclusion, we verified the proposed method through the accuracy comparison of spm mail separation between an existing research and proposed scheme.

Mobile Phone Uses and Social-Psychological Variables of Teen-Agers (청소년들의 이동전화 이용행태와 사회심리적 변인에 관한 연구: 부산.울산 지역 이용자들을 중심으로)

  • Lee, Joon-Ho;Ann, Soo-Geun;Jeong, Yong-Jo
    • Korean journal of communication and information
    • /
    • v.27
    • /
    • pp.247-282
    • /
    • 2004
  • The purpose of this study is to examine the mobile phone service usage patterns of Korean teenagers and their motivation to use it, and to explore the relationships between the teenagers' social-psychological characteristics and their trails of mobile phone usage. After reviewing prior theoretical studios, three hypotheses regarding the research questions shown above were generated. Questionnaire study was conducted with 400 high school students in Busan and Ulsan metropolitan areas. They were to answer three categories of questions, such as frequencies of voice calls and text messaging services and the other mobile services, questions asking their social-psychological characteristics, and their motivations for using mobile phone services. Findings show that the teenagers more likely to tend to use voice calls when communicating family members. They tend to avoid those services with high rate of use as multimedia, game, and broadcasting services via mobile phones. The teenagers use mobile phone services for the similar purposes to conventional telephone uses. Therefore, the classical theories showing the alternative purposes or motivations to use conventional telephone usage, which divided the main purposes for phone uses in to two; work/instrumental and socializing/entertaining, proved to be reasonable. The cheap messaging services with texts are popular among the teenagers and are used for socializing/entertaining purposes rather than instrumental/functional purposes. In addition, the teenagers' social-psychological characteristicss are significantly associated with the amount of mobile phone uses. A characteristic of "individual-centeredness" is positively related with non-voice service uses, while "group-centeredness" explains heavy amount of using voice calls and text messaging services. Such characteristics as "immediacy," "directness," "innovativeness," and "other-direction" are positively associated with the frequencies and amounts of mobile phone uses, while "inner-direction" and "tradition-direction" are negatively correlated.

  • PDF

The Design of Messaging System for Prescription Data Interchange (처방전달을 위한 메시징시스템의 설계)

  • 김동호;류근호;손현준
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1999.12a
    • /
    • pp.209-218
    • /
    • 1999
  • 처방전달시스템은 처방의 수행은 의사가, 그에 따른 의약품조제는 약사가 수행함으로써 의약품의 오․남용을 방지하기 위한 의약분업의 실시에 따른 국민불편의 최소화와 약화사고에 따른 인증문제 등을 지원하기 위한 정보시스템이다. 처방전달시스템은 환자 개인정보의 허용된 범위 내에서의 공유와 공유를 위한 각종 개인정보 보호장치, 처방의 안전한 전달을 위한 내용의 비밀보장과 위변조방지 및 송신자와 수신자의 인증을 위한 장치가 필수적으로 필요하다. 또한 자료의 생명주기 측면에서 본다면, 처방전의 생성은 병․의원에서 이루어지며 소멸은 약국 및 환자에의해 이루어진다. 자료의 유통과정에 살펴보면 처방전달시스템의 주요성공요인은 정보의 생산자인 병․의원(의사)의 적극적인 정보제공의지와 이를 지원하는 편리한 정보시스템의 구축이라고 할 수 있다. 정보의 생산자인 병․의원 정보시스템 환경은 다양하고 복잡하기 때문에 기존의 애플리케이션을 이용하면서 처방의 전송을 위해서는 기존 애플리케이션 및 플랫폼에 독립적이며 자료의 적합한 취합과 통합이 가능하도록 지원하는 시스템이 필요하다. 처방전달 메시징시스템은 이러한 복합적인 정보시스템 환경을 지원하며 동시에 처방정보의 안전한 전달을 위해 플랫폼으로 실행될 수 있는 시스템을 말한다. 또한 처방의 비교적 짧은 생명주기와 지역적 생산, 유통구조를 적합하게 지원하기 위해 지역별 독립시스템의 구축과 공통정보 활용을 위한 중앙시스템과의 역할분담 모델에 근거한 분산시스템의 구축이 요구된다. 본 연구에서의 처방전달 메시징시스템은 일반적인 메시지서비스의 특성을 기본으로 자료전달을 위해 자료 암호화와 복호화, 송신자와 수신자에 대한 인증 및 자료접근 제한기능을 제공하며 각 클라이언트와 서버간의 실시간 연결 혹은 지연연결을 지원하는 독립적인 애플리케이션이다. 이러한 처방전달 메시징시스템을 구성하는 각 요소에 대해 정의하고 개념적 모델을 설계하고자 한다.에게 청구되며, 소비자에게 전송 되는 청구서는 사용자DB를 참조하여 사용자가 미리 정의한 원하는 형태로 변환되어 전달되며, 필요시 암호화 과정을 거치는 것이 가능해야 한다. 전송된 청구서는 전자우편의 경우, 암호해독이 가능한 전용 브라우저를 통해 열람 되며, 이는 다시 전용 브라우저를 통해 지불인증이 승인되어 청구 제시서버에게 전송된다. EBPP 시스템의 제어 흐름은 크게 기업이 청구 정보를 소비자에게 제시하는 흐름과 소비자의 지불 승인으로 인해 기업이 은행에 지불을 요구하는 흐름으로 구분할 수 있다. 본 논문에서는 통합 청구서버 및 정구 제시서버의 역할 및 구성 요소들에 대해 서술하고, EBPP 시스템과 연동하여야 하는 메일 서버와의 상호 작용에 대해 서술할 것이다. 본 시스템을 아직 구현이 되지 않은 관계로 시스템의 성능 등의 수치적 결과를 제시할 수 없는 상태다., 취약계층을 위한 일차의료, 의약관리), ${\circled}2$ 보건소 조직 개편 및 민간의료기관과 협력체계 확립, ${\circled}3$ 전문인력 확보 및 인력구성 조정, 그리고 ${\circled}4$ 방문보건사업의 강화 등이다., 대사(代謝)와 관계(關係)있음을 시사(示唆)해 주고 있다.ble nutrient (TDN) was highest in booting stage (59.7%); however no significant difference was found among other stages. The concentrations of Ca and P were not different among mature stages. According to these results, the yellow ripe period is appropriate to harvest the whole crop rice for forage considering dry matter yields,

  • PDF

Effects of Country-of-Origin Dimensions on Product Evaluations: A Role of Motivational Focus (원산지 개념의 구성 차원이 소비자의 제품평가에 미치는 영향: 동기성향의 효과)

  • Shin, Sohyoun;Kim, Sanguk;Chaiy, Seoil
    • Asia Marketing Journal
    • /
    • v.10 no.2
    • /
    • pp.71-98
    • /
    • 2008
  • Considerably many numbers of studies on country-of-origin(hereafter COO) effects have been presented in international business and marketing areas. Recent studies have been included the effects of COO of manufacture, parts, and design, as well as the effects of brand origin, reflected by the accelerating convergent manufacture circumstances and increasingly competitive environments. Moderating constructs such as knowledge of product category and involvement as individual variables, have been also introduced and researched in various angles. In addition, how the effects of COO occur as processes is also argued in previous studies. This research has attempted to explain business corporation's strategic decisions on choosing a domain of its product manufacturing for several critical reasons, for cost reduction or better image. We displayed two constructs of brand and manufacture in a positive and negative country image group to reconfirm the existence of the effects of COO. Additionally, the effects of respondents' regulatory fit between their motivational focus and the contents of product messages, have been declared. Furthermore the respondents' motivational focus moderates the main effect of COO on product evaluations in a positive 'made-in' combination, while, surprisingly, it does not statistically moderate in a negative, except attitude. Based on the results, implications and suggestions on how to plan and execute more effective marketing strategies regarding COO dimensions, especially COO of manufacture, are separately presented for each situations when it has already been determined and when it is to be.

  • PDF

Mediated ID based signature scheme and key updating signature scheme (중재자를 이용한 ID기반 전자서명과 키 업데이팅 전자서명 기법)

  • Ju, Hak-Soo;Kim, Dae-Youb
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.463-470
    • /
    • 2007
  • Revocation is one of the main difficulties faced in implementing Public Key Infrastructures(PHs). Boneh, Ding and Tsudik first introduced a mediated cryptography for obtaining immediate revocation of RSA keys used in PKIs. Their method is based on the idea that each user's private key can be split into two random shares, one of which is given to the user and the other to an online security mediator(SEM). Thus any signature or decryption must be performed as a cooperation between a user and his/her associated SEM and revocation is achieved by instructing the mediator SEM to stop cooperating the user. Recently, Libert and Quisquater showed that the fast revocation method using a SEcurity Mediator(SEM) in a mRSA can be applied to the Boneh-Franklin identify based encryption and GDH signature schemes. In this paper we propose a mediated identity based signature(mIBS) with batch verification which apply the SEM architecture to an identity based signature. Libert's GDH siganture scheme is not forward secure even though forward security is an important and desirable feature for signature schemes. We propose an efficient key udating mediated signature scheme, mKUS based on mIBS and analyze its security and efficiency.

A Consideration on Creativity of the Unconscious: Focusing on a Series of Dreams (무의식의 창조성에 관한 하나의 고찰: 일련의 꿈을 중심으로)

  • Dukkyu Kim
    • Sim-seong Yeon-gu
    • /
    • v.38 no.2
    • /
    • pp.239-268
    • /
    • 2023
  • Humanity has faced destruction(chaos) due to catastrophes (Covid-19, war, earthquake) and awaits a new restoration. For civilizations and individuals, creation or creativity is essential to psychic development. Creativity is the driving force that renews an individual when a new stance and attitude of consciousness or a new adaptation to reality is desperately needed in the depth of the human mind. This article is the result of an exploration of the nature and characteristics of creativity presented by a series of four dreams. First, the definition and form of creativity were explored in the context of religion, mythology, and history of Eastern and Western. While Western mythology refers to creation or creativity originating from God, ancient China viewed creativity as expressed through the interaction of yin and yang, the movement of Tao. In East and West, the form of creation is divided into creation from nothing, creation from matter, and creation through dissolution from the matrix, which psychologically suggests that creativity or creation originates from the unconscious, the seedbed of infinite potential and creative power. Next, with insights from the second dream, the characteristics of creativity were discussed. Creativity occurs through transcendent function and 'going beyond the frame of reference,' that is, 'transgressivity.' Third, the nature of creativity was explored as the creativity of the unconscious aims for regeneration and drives the renewal of Self archetypal images within the collective and individuals. Ultimately, the creativity of the unconscious is the goal of the whole psyche and aims for individuation to become the whole. Realizing the creativity of the unconscious is the fate of humans as the second creator.