• Title/Summary/Keyword: Data Sharing Policy

Search Result 264, Processing Time 0.023 seconds

Implementation of Privacy Protection Policy Language and Module For Social Network Services (소셜 네트워크 서비스를 위한 프라이버시 보호 정책언어 및 프라이버시 보호 모듈 구현)

  • Kim, Ji-Hye;Lee, Hyung-Hyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.53-63
    • /
    • 2011
  • An SNS(Social Network Service) enables people to form a social network on online as in the real world. With the rising popularity of the service, side effects of SNSs were issued. Therefore we propose and implement a policy-based privacy protection module and access control policy language for ensuring the right of control of personal information and sharing data among SNSs. The policy language for protecting privacy is based on an attribute-based access control model which grants an access to personal information based on a user's attributes. The policy language and the privacy protection module proposed to give the right of control of personal information to the owner, they can be adopted to other application domains in which privacy protection is needed as well as secure sharing data among SNSs.

A Study on Use Case of Research Data Sharing in Biotechnology (생명공학분야의 연구데이터 공유 사례에 관한 연구)

  • Park, Miyoung;Ahn, Inja;Kim, Junmo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.1
    • /
    • pp.393-416
    • /
    • 2018
  • In this study, major steps of the research data management plan were derived through the research data management guidelines of major countries (NISO DMP in the US, UK DMP in UK archives, etc.). The results obtained are support for research data policy & planning, research data technical support, research data sharing support, research data legal mechanism support, and research data education support. In this study, we analyzed seven cases of data sharing among 7 domestic and foreign biotechnology. Shared use case countries are limited to the United Kingdom and the United States, which play a leading role in the management of research data. In Korea, shared cases were analyzed for the Korean Bio Information Center and related systems, which is a research and performance management and distribution agency designated by the Ministry of Science and Technology.

Derivation of Factors Affecting Demand for Use of Dockless Shared Bicycles Based on Big Data (빅데이터 기반의 Dockless형 공유자전거 이용수요 영향요인 도출)

  • Kim, Suk Hee;Kim, Hyung Jun;Shin, Hye Young;Lee, Hyun Kyoung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.3
    • /
    • pp.353-362
    • /
    • 2023
  • In this research, the usage status and characteristics of user big data of Mobike, a dockless bike sharing service introduced in Suwon city, were analyzed, and multiple regression analysis was performed to identify factors influencing the demand for dockless bike sharing service. For analysis, usage data of bike sharing system in Suwon city in 2019 were obtained, and they were organized by areas. As a result of analyzing the characteristics of the influencing factors selected for each area, it was found that the extension of bicycle roads shows high in areas with high demand for bicycles or adjacent areas. Also, the population of 10-30's shows high in areas with high demand for bicycles or adjacent areas. In addition, it was analyzed that the use of bike sharing system is high in areas with high maintenance rate of bicycle roads and large-scale residential and commercial facilities near residential districts and adjacent areas. As a result of the multiple regression analysis, it is analyzed that length of bicycle·pedestrian roads (non-separated), population of 10-30's, number of railway stations, number of schools, number of commercial facilities, number of industrial facilities factors were significant. It is expected that it may be possible to create an environment in which citizens want to use dockless bike sharing service by identifying factors affecting the number of stationless shared bicycles. Also, the results of data analysis are considered to be contributing to policy data to promote the use of dockless bike sharing.

A Nexus among Strategic Orientation, Social Network, Knowledge Sharing, Organizational Innovation, and MSMEs Performance

  • MUAFI, Muafi
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.6
    • /
    • pp.327-338
    • /
    • 2020
  • This study wants to test the nexus among resource orientation, market orientation, social network, and knowledge sharing toward organizational innovation, and the nexus between organizational innovation and MSMEs performance. Questionnaires and interviews are conducted with some MSMEs actors in Central Java Province, Indonesia, in Klaten Regency and Pekalongan City. These two areas have creative MSMEs, especially Batik MSMEs that have been very large and known worldwide. The sampling technique is done purposively with certain criteria for the respondents. The data analysis technique is done using Partial Least Square. This study provides recommendations about strategic practice and policy (resource and market), social network, and knowledge sharing in increasing organizational innovation, and the impact of organizational innovation toward MSMEs performance. It also offers a comprehensive model of the determinant factor of organizational innovation by considering the aspect of strategic orientation, social network, and knowledge sharing. Other unique aspects that are also important to consider are social network and the importance of knowledge sharing in improving MSMEs Performance. The respondents are still limited in two areas, namely, Pekalongan and Klaten, so it still cannot represent the whole population. These areas also have different orientation of production process approach, namely, synthetic and natural dyes.

Network Analysis on Communication of Welfare Policy Using Twitter Data

  • Seo, Bojun;Lee, Soochang
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.58-64
    • /
    • 2018
  • This main purpose of the study is to identify social network of communicators sharing information on Bokjiro for publicizing welfare policy. This study employs NodeXL pro to understand networks and their role in the social network. The data for social network analysis was collected from Twitter for a week. The result of the analysis shows that the social network of communicators on Bokjiro does not have many nodes. It also has an independent network with high possibility of information distortion. Little communicators have controlling power in information flow in one way of communication. According to the result, it is not effective for marketing strategy of welfare policy in providing online information through Bokjiro. The study suggests that the government should use the transactional approach to marketing based on agent-oriented activity focusing on the exchange relationship between information providers and demanders in an age of networked intelligence.

Policy-based Security System Modeling using Vulnerable Information (취약성 정보를 활용한 정책 기반 보안 시스템 모델링)

  • Sea, Hee-Suk;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Information Technology Services
    • /
    • v.2 no.2
    • /
    • pp.97-109
    • /
    • 2003
  • As the importance and the need for network security is increased, many organization uses the various security systems. They enable to construct the consistent integrated security environment by sharing the vulnerable information among firewall, intrusion detection system, and vulnerable scanner. And Policy-based network provides a means by which the management process can be simplified and largely automated. In this article we build a foundation of policy-based network modeling environment. The procedure and structure for policy rule induction from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Based) is conducted. It also transforms the policy rules into PCIM (Policy Core Information Model).

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing

  • Zhang, Yinghui;Chen, Xiaofeng;Li, Jin;Li, Hui;Li, Fenghua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4028-4049
    • /
    • 2014
  • Attribute-based encryption (ABE) is a promising cryptographic primitive for implementing fine-grained data sharing in cloud computing. However, before ABE can be widely deployed in practical cloud storage systems, a challenging issue with regard to attributes and user revocation has to be addressed. To our knowledge, most of the existing ABE schemes fail to support flexible and direct revocation owing to the burdensome update of attribute secret keys and all the ciphertexts. Aiming at tackling the challenge above, we formalize the notion of ciphertext-policy ABE supporting flexible and direct revocation (FDR-CP-ABE), and present a concrete construction. The proposed scheme supports direct attribute and user revocation. To achieve this goal, we introduce an auxiliary function to determine the ciphertexts involved in revocation events, and then only update these involved ciphertexts by adopting the technique of broadcast encryption. Furthermore, our construction is proven secure in the standard model. Theoretical analysis and experimental results indicate that FDR-CP-ABE outperforms the previous revocation-related methods.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

Search of Optimal Path and Implementation using Network based Reinforcement Learning Algorithm and sharing of System Information (네트워크기반의 강화학습 알고리즘과 시스템의 정보공유화를 이용한 최단경로의 검색 및 구현)

  • Min, Seong-Joon;Oh, Kyung-Seok;Ahn, June-Young;Heo, Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.174-176
    • /
    • 2005
  • This treatise studies composing process that renew information mastered by interactive experience between environment and system via network among individuals. In the previous study map information regarding free space is learned by using of reinforced learning algorithm, which enable each individual to construct optimal action policy. Based on those action policy each individuals can obtain optimal path. Moreover decision process to distinguish best optimal path by comparing those in the network composed of each individuals is added. Also information about the finally chosen path is being updated. A self renewing method of each system information by sharing the each individual data via network is proposed Data enrichment by shilling the information of many maps not in the single map is tried Numerical simulation is conducted to confirm the propose concept. In order to prove its suitability experiment using micro-mouse by integrating and comparing the information between individuals is carried out in various types of map to reveal successful result.

  • PDF

A Study on Policy Components of Data Access and Use Controls in Research Data Repositories (연구데이터 레포지터리의 데이터 접근 및 이용 통제 정책 요소에 관한 연구)

  • Kim, Jihyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.3
    • /
    • pp.213-239
    • /
    • 2016
  • As Open Data has been emphasized globally, discussions on data policies have occurred for minimizing problems resulting from data sharing and reuse. This study aimed at investigating policy components for controlling access and use of data and examining similarities and differences of the policy components across disciplines. For the purpose, the study analyzed policy components for data access and use controls provided by 37 research data repositories overseas. These included twenty repositories in biological and health science, ten in chemistry, earth and environmental science and physics, as well as seven in social science and general science. The analysis showed that common policy components involve copyright/licenses, data citation, disclaimers and embargoes. However, there were differences in diversity of policy components among the disciplines and it indicated that the rationales of access and use controls emphasized would be different in the disciplines.