• 제목/요약/키워드: 이름 식별

Search Result 78, Processing Time 0.023 seconds

Analysis of Forwarding Schemes to Mitigate Data Broadcast Storm in Connected Vehicles over VNDN

  • Hur, Daewon;Lim, Huhnkuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.69-75
    • /
    • 2021
  • Limitation of the TCP/IP network technology included in the vehicle communication is due to the frequent mobility of the vehicle, the increase in intermittent connection requirements, and the constant presence of the possibility of vehicle hacking. VNDN technology enables the transfer of the name you are looking for using textual information without the need for vehicle identifiers like IP/ID. In addition, intermittent connectivity communication is possible rather than end-to-end connection communication. The data itself is the subject of communication based on name-based forwarding using two types of packets: Interest packet and Data packet. One of the issues to be solved for the realization of infotainment services under the VNDN environment is the traffic explosion caused by data broadcasting. In this paper, we analyze and compare the existing technologies to reduce the data broadcast storm. Through this, we derive and analyze the requirements for presenting the best data mitigation technique for solving the data explosion phenomenon in the VNDN environment. We expect this paper can be utilized as prior knowledge in researching improved forwarding techniques to resolve the data broadcast explosion in connected vehicles over NDN.

A Comparative Study on Off-Path Content Access Schemes in NDN (NDN에서 Off-Path 콘텐츠 접근기법들에 대한 성능 비교 연구)

  • Lee, Junseok;Kim, Dohyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.12
    • /
    • pp.319-328
    • /
    • 2021
  • With popularization of services for massive content, the fundamental limitations of TCP/IP networking were discussed and a new paradigm called Information-centric networking (ICN) was presented. In ICN, content is addressed by the content identifier (content name) instead of the location identifier such as IP address, and network nodes can use the cache to store content in transit to directly service subsequent user requests. As the user request can be serviced from nearby network caches rather than from far-located content servers, advantages such as reduced service latency, efficient usage of network bandwidth, and service scalability have been introduced. However, these advantages are determined by how actively content stored in the cache can be utilized. In this paper, we 1) introduce content access schemes in Named-data networking, one of the representative ICN architectures; 2) in particular, review the schemes that allow access to cached content away from routing paths; 3) conduct comparative study on the performance of the schemes using the ndnSIM simulator.

Personal Name Authority Control in Korean Public Libraries (국내 공공도서관의 인명 전거제어의 현황 및 발전 방향)

  • Shim, Kyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.4
    • /
    • pp.221-244
    • /
    • 2006
  • This research analyzes the current status of personal name authority control and its impact on the end user searching against OPACs in public libraries in Korea. Further it also suggests the ways to improve the recall ratio in author search with a minimal modification, system-wise and authority-wise. on the KOLISNET as a stepping stone for other public libraries. Finally, a long-term plan for establishing proper authority work in public libraries including the National Library of Korea is briefly proposed. In order to find out whether authority works are conducted and examine how variant written forms of the same foreign name and variant names of the same person are treated, OPACS of the National Library of Korea, KOLISNET, and ten randomly selected public libraries were searched. Findings indicate that while the National Library of Korea was performing authority control, even incomplete, the rest did not appear to conduct any form or authority control. As a spinoff of the research, it is observed that in many public libraries their bibliographic records and retrieval methods are inaccurate, lacking consistency, and incomplete. In sum. it is strongly recommended that (1) as a start for authority work among public libraries personal name authority control should be conducted to enhance the identifying and collocating functions in OPACs, (2) a shared authority database, for which the National Library of Korea's authority database might be used. should be built for Public libraries.

A Study on Online Fraud and Abusing Detection Technology Using Web-Based Device Fingerprinting (웹 기반 디바이스 핑거프린팅을 이용한 온라인사기 및 어뷰징 탐지기술에 관한 연구)

  • Jang, Seok-eun;Park, Soon-tai;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1179-1195
    • /
    • 2018
  • Recently, a variety of attacks on web services have been occurring through a multiple access environment such as PC, tablet, and smartphone. These attacks are causing various subsequent damages such as online fraud transactions, takeovers and theft of accounts, fraudulent logins, and information leakage through web service vulnerabilities. Creating a new fake account for Fraud attacks, hijacking accounts, and bypassing IP while using other usernames or email addresses is a relatively easy attack method, but it is not easy to detect and block these attacks. In this paper, we have studied a method to detect online fraud transaction and obsession by identifying and managing devices accessing web service using web-based device fingerprinting. In particular, it has been proposed to identify devices and to manage them by scoring process. In order to secure the validity of the proposed scheme, we analyzed the application cases and proved that they can effectively defend against various attacks because they actively cope with online fraud and obtain visibility of user accounts.

Expanding the Scope of Identifying and Linking of Personal Information in Linked Data: Focusing on the Linked Data of National Library of Korea (링크드 데이터에서 인물 정보의 식별 및 연계 범위 확장에 관한 연구: 국립중앙도서관 링크드 데이터를 중심으로)

  • Lee, Sungsook;Park, Ziyoung;Lee, Hyewon
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.3
    • /
    • pp.7-21
    • /
    • 2017
  • This study analyzed the methods for representing and linking personal information in the linked data of National Library of Korea and provided suggestions for expanding the scope of identifying and linking of the personal information. As a result, the personal information as a subject has been dealt with a concept, where the personal information as a contributor has been linked with a vocabulary of personal name. In addition, there have not been assured of including additional information except existing authority data in the process of building the linked data. Therefore, this study suggested that linking personal information as a subject and personal information as a contributor was essential for the quality of linked data. In addition, we proposed to provide additional information related to the person in linked data for expanding the scope of access points in information discovery.

A Study on the Construction of Work and Expression Authority Records (저작 및 표현형 전거레코드 구축방안에 관한 연구)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.3
    • /
    • pp.71-94
    • /
    • 2016
  • This study was to suggest the construction of work and expression authority records for FRBRization. ICP, FRBR/FRAD and RDA as the content rules were referred as the framework for the construction of work and expression authority records. LC RDA authority records examples, JSC of RDA authority examples, and VIAF work and expression authority records were analyzed as case studies. 5 findings were suggested. First, authority records consist of name, work, and expression authority records which are inter-related. Second, the construction of authorized access points was suggested according to 5 work types. Third, the consideration in describing work attributes as separate element and as part of an authorized access point, and other distinguishing characteristic of the work were suggested. Fourth, the consideration in describing expression attributes as separate element and as part of an authorized access point, and other distinguishing characteristic of the expression were suggested. Fifth, 5XX was suggested for linking between work and expression. This study would contribute to revise KCR4.

A Study on Service-based Secure Anonymization for Data Utility Enhancement (데이터 유용성 향상을 위한 서비스 기반의 안전한 익명화 기법 연구)

  • Hwang, Chikwang;Choe, Jongwon;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.681-689
    • /
    • 2015
  • Personal information includes information about a living human individual. It is the information identifiable through name, resident registration number, and image, etc. Personal information which is collected by institutions can be wrongfully used, because it contains confidential information of an information object. In order to prevent this, a method is used to remove personal identification elements before distributing and sharing the data. However, even when the identifier such as the name and the resident registration number is removed or changed, personal information can be exposed in the case of a linking attack. This paper proposes a new anonymization technique to enhance data utility. To achieve this, attributes that are utilized in service tend to anonymize at a low level. In addition, the anonymization technique of the proposal can provide two or more anonymized data tables from one original data table without concern about a linking attack. We also verify our proposal by using the cooperative game theory.

A Study on Automatic Classification of Class Diagram Images (클래스 다이어그램 이미지의 자동 분류에 관한 연구)

  • Kim, Dong Kwan
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.3
    • /
    • pp.1-9
    • /
    • 2022
  • UML class diagrams are used to visualize the static aspects of a software system and are involved from analysis and design to documentation and testing. Software modeling using class diagrams is essential for software development, but it may be not an easy activity for inexperienced modelers. The modeling productivity could be improved with a dataset of class diagrams which are classified by domain categories. To this end, this paper provides a classification method for a dataset of class diagram images. First, real class diagrams are selected from collected images. Then, class names are extracted from the real class diagram images and the class diagram images are classified according to domain categories. The proposed classification model has achieved 100.00%, 95.59%, 97.74%, and 97.77% in precision, recall, F1-score, and accuracy, respectively. The accuracy scores for the domain categorization are distributed between 81.1% and 95.2%. Although the number of class diagram images in the experiment is not large enough, the experimental results indicate that it is worth considering the proposed approach to class diagram image classification.

Recent Trend Analysis of Certificate Revocation Mechanism (인증서 폐기 메커니즘의 최근 동향 분석)

  • 황원섭;김자영;정수민;윤동식
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.77-82
    • /
    • 2004
  • The notion of a certificate was introduced by Kohnfelder in his 1978 MIT bachelor's thesis. The idea, now common, was that a certificate is a digitally signed statement binding the key-holder's name to a public key. With the increasing acceptance of digital certificate, there has been a gaining impetus for methods to nullify the compromised digital certificates and enable the end user to receive this information before be trusts a revoked certificate. The problem of certificate revocation is getting more and more crucial with the development of wide spread PKIs. In this paper, we investigate recent trend of certificate revocation mechanism.

  • PDF

Productivity Profiles of Korean Inventors: A First Look at the Korean Inventor Panel Data (한국 개발자 패널데이터를 이용한 기술개발자의 생애주기 생산성 분석)

  • Kim, Jinyoung
    • Journal of Labour Economics
    • /
    • v.41 no.3
    • /
    • pp.161-186
    • /
    • 2018
  • Albeit numerous endeavors in matching names and surveying inventors, inventor-level studies of patent data have been scarce because unique inventors can not be identified across patents. Using the Korean patent data with inventor IDs, birth year, and gender available, we construct unique inventor-level panel data. As the first undertaking with our data, we investigate the age profile of patent productivity among inventors. We find an inverted U-shaped profile with the peak at age 31. We also find an increasing productivity for younger cohorts of inventors. These findings are robust after we control for the calendar year effects and the quality of patents.

  • PDF