• Title/Summary/Keyword: Confidential Document

Search Result 12, Processing Time 0.025 seconds

Study on the Confidential Document of A Distinguished Medical Family (기문비록(岐門秘錄)에 대한 고찰)

  • Kim, Dong-Min;Choi, Kyung-Suk;Shin, Seung-Yuel;Ahn, Jun-Mo;Keum, Kyung-Soo;Lee, Si-Hyeong
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.22 no.5
    • /
    • pp.1078-1105
    • /
    • 2008
  • An empirical formula that has been empirically shown to be effective for a particular condition can be said to add medicinal materials to an existing formula or to make a new prescription by the Korean medical doctors' empirical clinic. This dissertation aims to study the prescriptions according to A Confidential Document of A Distinguished Medical Family written by the writer's ancestor and to contribute to the development of Korean medicine. A Confidential Document of A Distinguished Medical Family is a medicinal recipe that is an heirloom of the Gyeongju Kim family for the eighth generation. And the date and the writer of the book are unknown. The contents of the book consist of 18 parts and are made up of about 300 medical recipes. Of these, 158 formulas and indications of cold damage, wind, urination, stool, jaundice, and internal injury are found in the book. From among these, 61 formulas was directly quoted out of The Precious Mirror of Oriental Medicine, 97 formulas are adjusted in proportion or combined. By the parity of reasoning of the above, I think that this book was published after The Precious Mirror of Oriental Medicine. I will continue to study other formulas except the formulas above mentioned.

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

An Algorithm for Detecting Leak of Defaced Confidential Information Based on SVDD (SVDD 기반 중요문서 변조 유출 탐지 알고리즘)

  • Ghil, Ji-Ho;Nam, Ki-Hyo;Kang, Hyung-Seok;Kim, Seong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.105-111
    • /
    • 2010
  • This paper proposes the algorithm which addresses the problem of detecting leak of defaced confidential documents from original confidential document. Generally, a confidential document is defaced into various forms by insiders and then they are trying to leak these defaced documents to outside. Traditional algorithms detecting leak of documents have low accuracy because they are based on similarity of two documents, which do not reflect various forms of defaced documents in detection. In order to overcome this problem, this paper proposes a novel v-SVDD algorithm which is based on SVDD, the novelty detection algorithm. The result of experiment shows that there is significant improvement m the accuracy of the v-SVDD in comparison with the traditional algorithms.

The Efficient Multipurpose Convertible Undeniable Signature Scheme (효율적인 다목적 전환 부인봉쇄 서명 기법)

  • Han Kun-Hee;Yun Sung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.83-91
    • /
    • 2005
  • The digital signature can be verified and disavowed only with cooperation of the signer in 'undeniable signature scheme. A signed confidential document of a company can be copied and delivered to a rival company. If a conventional signature scheme is used to sign the document, it can be confirmed as authentic by verifying the signature without the signer's cooperation. However, if the company doesn't want the document to be verified as authentic by the rival company, it is recommended to use the undeniable signature scheme. Convertible undeniable signature scheme has additional property that the signer can convert undeniable signature to the ordinary one. The document signed by undeniable signature scheme that is no longer confidential can be opened to public use by converting the signature to the ordinary one. In this study, the efficient multipurpose convertible undeniable signature scheme based on El-Gamal signature scheme is proposed. The proposed scheme satisfies undeniable property and can convert undeniable signature to the ordinary one. The number of public keys and signatures are less than those of Boyar's convertible signature scheme. It also reduces the number of communication steps of the signature confirmation protocol.

  • PDF

A Review on "Kimoonbirok" II ("기문비록(岐門秘錄)" 에 대(對)한 고찰(考察) (하(下)))

  • Choi, Kyung-Suk;Kim, Sang-Un;Song, Ji-Chung;Lee, Si-Hyeong
    • Journal of the Korean Institute of Oriental Medical Informatics
    • /
    • v.16 no.2
    • /
    • pp.51-88
    • /
    • 2010
  • An empirical formula that has been empirically shown to be effective for a particular condition can be said to add medical materials to an exciting formula or to make a new prescription by Korean medical doctors' empirical clinic. This dissertation aims to study the prescriptions according to A Confidential Document of A Distinguished Medical Family and to contribute to the development of Korean medicine. A Confidential Document of A Distinguished Medical Family is a medicinal recipe that is an heirloom of the Gyeongju Kim family for the eighth generation. And the date and the writer of the book are unknown. The contents of the book consist of 18 parts and are made up of about 300 medical recipes. Of these, 153 formulas and indications of roundworm, cholera, puffy swelling, abdominal distension, phlegm-rheum, woman, child, summerheat, dryness-heat, eye, and blood are found in the book. From among these, 26 formulas are directly quoted out of The Precious Mirror of Oriental Medicine, 93 formulas are adjusted in proportion or combined and 34 formulas are empirical ones. By the parity of reasoning of the above, I think that this book was published after The Precious Mirror of Oriental Medicine.

  • PDF

A Exploratory Study of Confidential Document Circulation System Design (기밀문서 유통체계 설계에 관한 탐색적 연구)

  • Chang, Hang-Bae;Kim, Heung-Gook
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.3
    • /
    • pp.462-470
    • /
    • 2011
  • Since, Davis(1991) has proposed the TAM(Technology Acceptance Model) through a literature review of informatization promotion, which insists that a user conveniency is judged by the degree of effectiveness caused by IT, the advancement of IT such as the Internet, e-mail, electronic data exchange, and groupware have brought into various changes in ordinary corporations and public institutions. However, with the right function, the advancement of IT has provided various benefits including additional reverse functions. Based on an integrated environment of business process, unauthorized user could access to information and a management of information becomes more difficult than before due to informatization of critical information. Furthermore, external hacking or information leakage by insider becomes easier owing to advancement in communication technology. This study has tried to develop a specified management procedure and implementation method for confidential documents.

Text Document Classification Scheme using TF-IDF and Naïve Bayes Classifier (TF-IDF와 Naïve Bayes 분류기를 활용한 문서 분류 기법)

  • Yoo, Jong-Yeol;Hyun, Sang-Hyun;Yang, Dong-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.242-245
    • /
    • 2015
  • Recently due to large-scale data spread in digital economy, the era of big data is coming. Through big data, unstructured text data consisting of technical text document, confidential document, false information documents are experiencing serious problems in the runoff. To prevent this, the need of art to sort and process the document consisting of unstructured text data has increased. In this paper, we propose a novel text classification scheme which learns some data sets and correctly classifies unstructured text data into two different categories, True and False. For the performance evaluation, we implement our proposed scheme using $Na{\ddot{i}}ve$ Bayes document classifier and TF-IDF modules in Python library, and compare it with the existing document classifier.

  • PDF

BubbleDoc: Document Forgery and Tamper Detection through the Agent-Free File System-Awareness in Cloud Environment (BubbleDoc: 클라우드 환경에서의 agent-free 파일시스템 분석을 통한 문서 위/변조 탐지)

  • Jeon, Woo-Jin;Hong, Dowon;Park, Ki-Woong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.429-436
    • /
    • 2018
  • Electronic documents are efficient to be created and managed, but they are liable to lose their originality because copies are created during distribution and delivery. For this reason, various security technologies for electronic documents have been applied. However, most security technologies currently used are for document management such as file access privilege control, file version and history management, and therefore can not be used in environments where authenticity is absolutely required, such as confidential documents. In this paper, we propose a method to detect document forgery and tampering through analysis of file system without installing an agent inside the instance operating system in cloud computing environment. BubbleDoc monitors the minimum amount of virtual volume storage in an instance, so it can efficiently detect forgery and tampering of documents. Experimental results show that the proposed technique has 0.16% disk read operation overhead when it is set to 1,000ms cycle for monitoring for document falsification and modulation detection.

Study on Security Grade Classification of Financial Company Documents (금융기관 문서 보안등급 분류에 관한 연구)

  • Kang, Bu Il;Kim, Seung Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1319-1328
    • /
    • 2014
  • While the recent advance in network system has made it easier to collect and process personal information, the loss of customers, financial companies and even nations is getting bigger due to the leakage of personal information. Therefore, it is required to take a measure to prevent additional damage from the illegal use of leakaged personal information. Currently, financial companies use access control in accordance with job title or position on general documents as well as important documents including personal information. Therefore, even if a documents is confidential, it is possible for a person of the same job title or position to access the document properly. This paper propose setting up security grade of documents to improve current access control system. It will help preventing the leakage of personal information.

Operative Challenges in Releasing Administrative Information and Records (행정정보 및 보존기록물 공개의 운영과제)

  • Lee, Won-Kyu
    • The Korean Journal of Archival Studies
    • /
    • no.12
    • /
    • pp.81-135
    • /
    • 2005
  • The release of administrative information has been the challenge of our age following the maturation of democratic ideology in our society. However, differences of opinion and conflict still exist between the government and private sectors regarding the issue, and it seems that the technical and policy-related insufficiencies of information and record management that actually operate the release of information are the main causes. From the perspective of records management, records or information are variable in their nature, value, and influence during their life span. The most controversial issue is the records and information in the current stage of carrying out business activities. This is because the records and information pertaining to finished business are but evidence to ascertain the past, and have only a limited relationship to the ideal of the 'democratic participation' by citizens in activities of the public sector. The current information release policies are helpless against the 'absence of information,' or incomplete records, but such weakness can be supplemented by enforcing record management policies that make obligatory the recording of all details of business activities. In addition, it is understood that the installation of 'document offices("Jaryogwan")' that can manage each organization's information and records will be an important starting point to integrate the release, management, and preservation of information and records. Nevertheless, it seems that the concept of 'release' in information release policies refers not to free use by all citizens but is limited to the 'provision' of records according to public requests, and the concept of 'confidential' refers not to treating documents with total secrecy but varies according to the particulars of each situation, making the actual practice of information release difficult. To solve such problems, it is absolutely necessary to collect the opinions of various constituents associated with the recorded information in question, and to effectively mediate the collective opinions and the information release requests coming from applicants, to carry out the business more practically. Especially crucial is the management of the process by which the nature and influence of recorded information changes, so that information which has to be confidential at first may become available for inquiry and use over time through appropriate procedures. Such processes are also part of the duties that record management, which is in charge of the entire life span of documents, must perform. All created records will be captured within a record management system, and the record creation data thus collected will be used as a guide for inquiry and usage. With 'document offices(Jaryogwan)' and 'archives' controlling the entire life span of records, the release of information will become simpler and more widespread. It is undesirable to try to control only through information release policies those records the nature of which has changed because, unlike the ones still in the early stages of their life span and can directly influence business activities, their work has finished, and they have become historical records or evidences pointing to the truth of past events. Even in the past, when there existed no formal policy regarding the release of administrative information, the access and use of archival records were permitted. A more active and expanded approach must be taken regarding the 'usage' of archival records. If the key factor regarding 'release' lies in the provision of information, the key factor regarding 'usage' lies in the quality and level of the service provided. The full-scale usage of archival records must be preceded by the release of such records, and accordingly, a thorough analysis of the nature, content, and value of the records and their changes must be implemented to guarantee the release of information before their use is requested. That must become a central task of document offices and "Today's information" will soon become "yesterday's records," and the "reality" of today will become "history" of the past. The policies of information release and record management share information records as their common objective. As they have a mutual relationship that is supplementary and leads toward perfection, the two policies must both be differentiated and integrated with each another. It is hoped that the policies and business activities of record management will soon become normalized and reformed for effective and fair release of information.