• Title/Summary/Keyword: Full security

Search Result 298, Processing Time 0.024 seconds

Publication Indicators under Web of Science, SCOPUS Databases at Northern Border University: 2008-2020

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.90-97
    • /
    • 2021
  • The study aimed to analyze the reality of the scientific publishing of the faculty members of the Northern Border University, in both the Web of Science database and the SCOPUS database, with the analysis of publishing indicators and trends for the period between 2008-2020, and the researcher's keenness to apply the bibliometric study research methodology to obtain an account Full and detailed publications indicators under the two databases, including a full analysis of scientific publishing through objective, temporal, quantitative, authors, languages, open access journals, information forms, the most productive authors, the most published scientific journals, the most scientific bodies involved with the university. The study found results, the most important of which is the existence of a high increase in scientific publishing, starting from 2015, with an increase in publishing in the scientific field compared to other disciplines, and that the vast majority of publishing is in the form of articles, as well as publishing in English for the rest of the languages.

The Social Security Pension Reform Debate between the World Bank and the ILO/ISSA (World Bank와 ILO/ISSA의 사회보장연금 민영화 논쟁에 관한 연구)

  • Won, Seok-Jo
    • Korean Journal of Social Welfare
    • /
    • v.46
    • /
    • pp.290-318
    • /
    • 2001
  • In 1981, Chile has fundamentally reformed the public pension system from the pay-as-you-go system (PAYGs) to the full funding defined contribution system managed by the private funding companies. The Chilean privatization reform influenced not only the neighbor South American countries but also the advanced countries. The United Kingdom contracted out the state earning related pension system. Australia and Sweden recently introduced the private investment accounts system. And now the hot debates on the privatization of the social security pension is going on in the United States of America. This wind of privatizing the public pension system is being backed up by the New Liberalism, the nowadays' strongest ideology. Besides, the theoretical and idealogical debate between the World Bank and the ILO/ISSA was happened in the middle of 1990s. The World Bank, the supporter of the international financial capital, insisted the introducing of the full funding individual accounts system and the abolition of the existing PAYGs. The ILO/ISSA apposed the World Bank's policies and advocated the moderate reform of the PAYGs. In this paper, I reviewed the Chilean reform, the World Bank's report and the opposing argument of the ILO/ISSA against it, and analysed the core issues of the two sides. Also, I tried to present the suggestions to the Korean public pension systems. Through the discussing the debate, we made certain of the importance of the basic issues in the social security system like equity vs. adequacy, inter-generational redistribution vs. intra-generational redistribution and welfare vs. economy, once again.

  • PDF

A Qualitative Study on the Full-Time Housewife′s Employment (′가사노동 전담자′인 전업주부에게 취업은 대안인가 아닌가\ulcorner)

  • 김선미
    • Journal of Families and Better Life
    • /
    • v.22 no.5
    • /
    • pp.29-45
    • /
    • 2004
  • This ethnographic case-study explores the interpretation and behavior in job considering among full-time housewives. The participants of this study are eleven middle class full-time housewives in their thirties and forties. In-depth interviews based on an unstructured Questionnaire were conducted for this study. Findings are as follows: Six full-time housewives tend to think their full-time housewife-lives more convenient, something unable to substitute and more profitable compared to the counter partner's lives. But they are classified into two groups according to the satisfaction for full-time housewife life. One group has found out more positive meaning in their life but the other group has not yet and they are doubtful about real life and other opportunity. In Contrast, other five full-time housewives tend to interpret employment as a more productive source to secure family resource for their children's education and repay the loan used to buy larger apartment. And the job is considered to confirm her own individuality and the feeling for the social entity as a competent social entity. But two of them who have never been employed do not try to get a job as a new identity alternative. And the various elements like household income, job experience, health, children's age and husband's attitude to his wife's employment etc. are defined to influence the interpretation and the job considering behavior among full-time housewives.

Study on Improved Decryption Method of WeChat Messenger and Deleted Message Recovery Using SQLite Full Text Search Data (WeChat 메신저의 향상된 복호화 방안과 SQLite Full Text Search 데이터를 이용한 삭제된 메시지 복구에 관한 연구)

  • Hur, Uk;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.405-415
    • /
    • 2020
  • With the increase in smartphone user, mobile forensics has become an essential element in modern digital forensic investigation. Mobile messenger data is very important data in mobile forensics because it can acquire information such as user's life pattern and mental state. In order to analyze messenger data, a decryption technique of an encrypted messenger data is required. Since most messengers provide a message deleting function, a technique for recovering deleted messages is required. WeChat Messenger, a messenger used by about 1 billion people around the world, uses IMEI (International Mobile Equipment Identity) information to encrypt data and provides message deletion function. In this paper, we propose a data decryption method in the absence of IMEI information and propose a method for recovering deleted messages using FTS (Full Text Search) database created for full-text search function of SQLite database.

Perceptions of the Security Management at Critical Facilities in South Korea: College students' attitudes toward increasing demand for security personnel and the alternatives to police (공공부문 정규직 전환 및 의무경찰제도 폐지에 따른 보안산업 변화에 대한 인식)

  • Wang, Sug-Won;Choi, Yeon-Jun
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.87-107
    • /
    • 2019
  • With the government policy on converting contract workers to full-time employees, there have been significant changes about the security personnel at the nation's critical facilities, including the National Assembly Building and airports. Moreover, the scheduled disbandment of the conscripted police force in 2023 has raised concerns about security management at different government agencies. To examine the college students' perceptions on the possible alternatives to fill the expected security gap, 234 undergraduate students of security management and protection in the Seoul metropolitan region were surveyed. Particularly, a comparative analysis was conducted on the legal bases and supervision, the employment types and salaries, and the scopes of responsibility and authority of suggested alternatives were compared. The results showed that utilization of private police forces was thought to be the most effective option. Based on the research findings, the university departments should develop and maintain a quality curriculum to educate their students to be prepared security professionals with a focus on emergency response capabilities and martial arts, including the courses on private police law and emergency rescue and cardiopulmonary resuscitation (CPR).

Performance Improvement of SSL/TLS Handshake Protocol through extension of a Session Resume (Session Resume의 기한 연장을 이용한 SSL/TLS Handshake 프로토콜의 성능 개선)

  • 박지철;한명진;이경현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.610-612
    • /
    • 2002
  • 전송계층에서의 안전한 통신을 위한 Secure Sockets Layer(SSL)와 Transport Layer Security(TLS)의 Handshake 프로토콜에서 Session ID의 저장이 매우 짧은 시간 동안 저장됨으로 전체적인 Full Handshake의 횟수가 증가한다. 따라서, 안전한 Session resume 보장함으로 서버의 session cache 기한을 연장할 수 있으며 전체적인 Full Handshake 프로토콜의 횟수를 줄일 수 있다. 본 논문에서는 Handshake 프로토콜의 성능 개선을 위하여 S/key와 같은 해쉬의 일방향 성질을 이용하는 개선된 Session resume의 방안을 제안한다.

  • PDF

ZigBee Security Using Attribute-Based Proxy Re-encryption

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.343-348
    • /
    • 2012
  • ZigBee Network is enabling technology for home automation, surveillance and monitoring system. For better secure network environment, secure and robust security model is important. The paper proposes an application, attribute-based proxy re-encryption on ZigBee networks. The method can distribute the authority to designated sensor nodes to decrypt re-encrypted ciphertext with associated attributes. However, a previous method is required to compute complex pairing operations. The high complexity is not suited to low resource device sensor networks, and it does not provide routing security either. To resolve these problems, we present a novel mechanism. The method can reduce overhead by imposing overhead to full function devices and ensure routing paths as well.

Provably-Secure Public Auditing with Deduplication

  • Kim, Dongmin;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2219-2236
    • /
    • 2017
  • With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

Combined Relay Selection and Cooperative Beamforming for Physical Layer Security

  • Kim, Jun-Su;Ikhlef, Aissa;Schober, Robert
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.364-373
    • /
    • 2012
  • In this paper, we propose combined relay selection and cooperative beamforming schemes for physical layer security. Generally, high operational complexity is required for cooperative beamforming withmultiple relays because of the required information exchange and synchronization among the relays. On the other hand, while it is desirable to reduce the number of relays participating in cooperative beamforming because of the associated complexity problem, doing so may degrade the coding gain of cooperative beamforming. Hence, we propose combined relay selection and cooperative beamforming schemes, where only two of the available relays are selected for beamforming and data transmission. The proposed schemes introduce a selection gain which partially compensates for the decrease in coding gain due to limiting the number of participating relays to two. Both the cases where full and only partial channel state information are available for relay selection and cooperative beamforming are considered. Analytical and simulation results for the proposed schemes show improved secrecy capacities compared to existing physical layer security schemes employing cooperative relays.

Physical Layer Security in Underlay CCRNs with Fixed Transmit Power

  • Wang, Songqing;Xu, Xiaoming;Yang, Weiwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.260-279
    • /
    • 2015
  • In this paper, we investigate physical layer security for multiple decode-and-forward (DF) relaying underlay cognitive radio networks (CRNs) with fixed transmit power at the secondary network against passive eavesdropping attacks. We propose a simple relay selection scheme to improve wireless transmission security based on the instantaneous channel information of all legitimate users and the statistical information about the eavesdropper channels. The closed-form expressions of the probability of non-zero secrecy capacity and the secrecy outage probability (SOP) are derived over independent and non-identically distributed Rayleigh fading environments. Furthermore, we conduct the asymptotic analysis to evaluate the secrecy diversity order performance and prove that full diversity is achieved by using the proposed relay selection. Finally, numerical results are presented to verify the theoretical analysis and depict that primary interference constrain has a significant impact on the secure performance and a proper transmit power for the second transmitters is preferred to be energy-efficient and improve the secure performance.