• Title/Summary/Keyword: Information share

Search Result 2,807, Processing Time 0.027 seconds

A Government Agency Environment Protects Information System Design using Intrusion Prevention System and Role-Base Security Policy (침입방지시스템과 역할기반 보안정책을 이용한 정부기관 정보보호 시스템 설계)

  • Ahn Joung Choul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.91-103
    • /
    • 2004
  • The survey of network firewall system has been focused on the deny policy that protects information from the unlicensed and the intrusion detection system. Government has solved several firewall problems as building the intranet separated from the intranet. However, the new firewall system would been satisfied both the denialpolicy and information share with the public, according as government recently emphasizes electronic service. Namely, it has to provide the functions such as the information exchange among divisions, partial share of information with the public, network connection and the interception of illegal access. Also, it considers the solution that protects system from hacking by inner user and damage of virus such as Worm. This Paper suggests the protects information system using the intrusion prevention system and role-based security policy to support the partial opennessand the security that satisfied information share among governments and public service.

A Share Hardening Method for Multi-Factor Secret Sharing (다중-요소 비밀 공유를 위한 지분 강화 기법)

  • Sung Wook Chung;Min Soo Ryu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.13 no.1
    • /
    • pp.31-37
    • /
    • 2024
  • Conventional secret sharing techniques often derive shares from randomly generated polynomials or planes, resulting in lengthy and complex shares that are challenging to memorize and/or manage without the aid of a separate computer or specialized device. Modifying existing secret sharing methods to use a predetermined value, such as a memorizable password or bio-metric information, offers a solution. However, this approach raises concerns about security, especially when the predetermined value lacks randomness or has low entropy. In such cases, adversaries may deduce a secret S with just (t - 1) shares by guessing the predetermined value or employing brute force attacks. In this paper, we introduce a share hardening method designed to ensure the security of secret sharing while enabling the use of memorizable passwords or biometric information as predetermined shares.

A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure

  • Li, Jing;Wang, Licheng;Yan, Jianhua;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4552-4567
    • /
    • 2014
  • A (n,t,n) secret sharing scheme is to share a secret among n group members, where each member also plays a role of a dealer,and any t shares can be used to recover the secret. In this paper, we propose a strong (k,t,n) verifiable multi-secret sharing scheme, where any k out of n participants operate as dealers. The scheme realizes both threshold structure and adversary structure simultaneously, and removes a trusted third party. The secret reconstruction phase is performed using an additive homomorphism for decreasing the storage cost. Meanwhile, the scheme achieves the pre-verification property in the sense that any participant doesn't need to reveal any information about real master shares in the verification phase. We compare our proposal with the previous (n,t,n) secret sharing schemes from the perspectives of what kinds of access structures they achieve, what kinds of functionalities they support and whether heavy storage cost for secret share is required. Then it shows that our scheme takes the following advantages: (a) realizing the adversary structure, (b) allowing any k out of n participants to operate as dealers, (c) small sized secret share. Moreover, our proposed scheme is a favorable candidate to be used in many applications, such as secure multi-party computation and privacy preserving data mining, etc.

Organizational Justice and the Intent to Share: Knowledge Sharing Practices among Forensic Experts in Turkey

  • Can, Ahmet;Hawamdeh, Suliman
    • Journal of Information Science Theory and Practice
    • /
    • v.1 no.4
    • /
    • pp.12-37
    • /
    • 2013
  • Organizational climate and organization culture can be some of the leading factors in hindering knowledge sharing within the organization. It is generally accepted that successful knowledge management practice, including knowledge sharing, comes as a result of a conducive and knowledge sharing friendly environment. Organizations that promote and reward collective work generate a trustful and a more collaborative learning culture. The perception of fairness in an organization has been considered an important indicator of employee behavior, attitude, and motivation. This study investigates organizational justice perception and its impact on knowledge sharing practices among forensic experts in the Turkish National Police. The study findings revealed that senior officers, who are experts in the field, have the strongest organizational justice perception. Meanwhile, noncommissioned officers or technicians bear positive but comparatively weaker feelings about the existence of justice within the organization. The study argues that those who satisfy their career expectations tend to have a higher organizational justice perception.

Direct Share: Photo Management System Based on Round-robin Concept-driven User Preference Feedback

  • Song, Tae-Houn;Jeong, Soon-Mook;Kim, Hyung-Min;Kwon, Key-Ho;Jeon, Jae-Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1346-1367
    • /
    • 2011
  • As the size of camera modules is decreasing and as the computing performance of portable devices is improving, taking photos has become a part of daily life. However, existing photo management programs and products that manage such photos still require extensive user effort to facilitate the sharing and browsing of images. It is especially difficult for novice users to manage and share photos. In this paper, we develop a round-robin concept-driven user preference feedback mechanism for achieving direct photo sharing, instant display, and easy management using optimized user controls and user preference-driven classification. Compared with commercial photo management systems, our proposed solution provides new features: optimized user controls, direct sharing and instant display, and user preference feedback driven classification. These new features boost the round-robin concept-driven user preference feedback. This paper proposes a photo finder that automatically searches for photos in storage spaces or cameras. The proposed photo finder relies on user preference feedback to share photos by leveraging user preferences, and the round-robin connection transmits photos to the family's digital photo frame or web album by arbiter. The proposed method saves time and spares users the effort required for photo management. Moreover, this method does not merely direct photo sharing and simple photo management, but it also increases the satisfaction level of users viewing the photos.

An Inference Verification Tool based on a Context Information Ontology (상황 정보 온톨로지 기반 추론 검증 도구)

  • Kim, Mok-Ryun;Park, Young-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.6
    • /
    • pp.488-501
    • /
    • 2009
  • In ubiquitous environments, invisible devices and software are connected to one another to provide convenient services to users. In order to provide such services, we must have mobile devices that connect users and services. But such services are usually limited to those served on a single mobile device. To resolve the resource limitation problem of mobile devices, a nearby resource sharing research has been studied. Also, not only the nearby resource share but also a resource recommendation through context-based resource reasoning has been studied such as an UMO Project. The UMO Project share and manage the various context information for the personalization resource recommendation and reason based on current context information. Also, should verify resource inference rules for reliable the resource recommendation. But, to create various context information requires huge cost and time in actuality. Thus, we propose a inference verification tool called USim to resolve problem. The proposed inference verification tool provides convenient graphic user interfaces and it easily creates context information. The USim exactly verifies new inference rules through dynamic changes of context information.

The Effect of Price Competition Structure and Change of Exchange Rate among Exports Countries to the Korea's Fish Import Market (우리나라 수산물 수입시장에서 수출국간의 가격경쟁구조 및 환율변화가 수출가격에 미치는 영향)

  • Kim, Ki-Soo;Lim, Eun-Son
    • The Journal of Fisheries Business Administration
    • /
    • v.40 no.1
    • /
    • pp.27-49
    • /
    • 2009
  • Recently, the Korea's economy concerns the second money crisis because of the rapid increase of the exchange rate. The Korea's economy which is very dependent on the foreign trade is more sensitive to the change of exchange rates. There are many literatures which analyze the effects of variations of the exchange rates on the secondary and tertiary industries such as the manufacturing industry and IT(Information Technology). But there have been no studies which try to figure out the effects of variations of exchange rate on the primary industries, especially, fisheries' industry. Therefore this paper tries to analyze the effect of price competition structure and the change of exchange rate on foreign fisheries exporting prices in Korea's fisheries import market. This study utilizes OLS(Ordinary Least Squares Analysis) for the analysis in the market of frozen yellow corvina, hairtail, angler fish which are major fisheries importable in Korea. The results show that the exporting country which has the highest market share is more sensitive to the change of the exchange rates itself than that of the other exporting countries' price when it starts to set up its exporting price. And the exporting countries which have low market share are more sensitive to the change of price which country has the highest market share than that of price whose countries have low market share and those of their exchange rate. Also we can find out that the countries which have similar market share try to set up price-setting strategy in the opposite direction. In other words, one country tries to bid up its price, other countries response to rival country by lowering their prices. In the consideration of the fact that most exporting countries aren't affected by Korea's fisheries' prices, the exporting countries in Korea's fisheries import market are more sensitive to the prices of other exporting countries than that of Korea's. This result indicates that the price leader-follower model could be applicable to the Korea's fisheries import market.

  • PDF

Task Synchronization Mechanism for Round Robin based Proportional Share Scheduling (라운드 로빈 기반 비례지분 스케줄링을 위한 동기화 기법)

  • Park, Hyeon-Hui;Yang, Seung-Min
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.4
    • /
    • pp.291-303
    • /
    • 2009
  • Round robin based proportional share scheduling(RRPS) defines weight which determines share for each task and allocates CPU resource to each task in proportional to its respective weight. RRPS uses fairness as the measure of performance and aims at high fairness of scheduling. However, researches for scheduling fairness problem due to synchronization among tasks have been rarely investigated. In this paper, we discuss that scheduling delay due to synchronization may result high unfairness in RRPS. We explain such a situation as weight inversion. We then propose weight inheritance protocol(WIP), a synchronization mechanism, that prevents weight inversion. We also show that WIP can reduce unfairness using fairness analysis and simulation.

A Study on Policy of Distribution Improvement of Fishery Products in Busan (부산수산물의 유통개선정책에 관한 연구)

  • Song, Gye-Eui
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.37
    • /
    • pp.161-185
    • /
    • 2008
  • In 2006, the share of fisheries distribution in Busan amounted to 1.9 million ton, which was 41 percent of the whole country. In details, coastal fishery 334 thousand ton(14% of the whole country), deep sea fishery 452 thousand ton(82%), import fishery 964 thousand ton(70%), export fishery 157 thousand ton(43%) were distributed in Busan region, respectively. According to distribution share, import(50%), deep sea fishery(24%), coastal fishery(18%), export(8%) are main category of fisheries distribution in Busan. After the institutional changes in 1997, that is, from monopoly to the competitive systems are implemented, the share of sales volume through a home trust market decreased gradually since 2000. Especially, the share of direct sales in farming fisheries sector amounted to 73.8 percent of total production volume, 80.7 percent of production value in 2005. Furthermore, the share of fisheries sale through e-commerce is increasing owing to the growth of IT and competitive price of its products. and the sale share of large discount store is also on the 10% more increase. Hereafter these structure changes of fisheries distribution in Busan will be more intensified. Therefore, after reflecting the change in distribution policy of Busan Fisheries, the directions of distribution policy should be established, as follows. $\cdot$ Distribution policy to prepare for increasing of non-trust market sales $\cdot$ Fisheries distribution policy to prepare for increasing of direct transaction like e-commerce $\cdot$ Distribution policy to prepare for increasing of sales ratio in large discount store $\cdot$ Distribution policy for making up sound purchasing circumstance of Fisheries $\cdot$ Distribution policy for reducing the fisheries distribution cost $\cdot$ Distribution policy to prepare for increasing of direct carrying the deep sea fisheries and import fisheries to Seoul and $Inch'{\breve{o}}n$ section $\cdot$ Distribution policy for implementing the information system for managing fisheries transaction $\cdot$ Distribution policy for advancing the export & import management of fisheries $\cdot$ Distribution policy for establishing transaction principle reflecting the peculiarity in fishery distribution(to enacting independent fishery law)

  • PDF

Spatial Distribution of Information Related Occupation and Its Regional Difference in Korea (우리나라 정보관련직종의 공간적 분포와 지역화 격차에 관한 연구)

  • 이희연
    • Journal of the Korean Regional Science Association
    • /
    • v.9 no.1
    • /
    • pp.3-23
    • /
    • 1993
  • In this paper the prevailing geography of the information sector, fousing on its occupatonal dimension, is examined. The purposes of this paper are to analyze the labor force share of information occupation workers at each special city and region, to compare the inter-regional distribution of information workforce and to analyze regional share of information occupations in manufacturing industry. Spatial pattern of size and occupational composition of information sector shows a core-periphery disparity. There is a clear evidence of Seoul's dominance of the information economy, particularly such as scientific and technical, consultative services, management and process control function. Also the distribution of information workers in manufacturing industry over space was polarized than is the case for total manufacturing employment and noninformation workers. Therefore Korean information economy is marked by a highly articulated spatial division of labor within individual industry, which can be attributed to the locational characteristics of information intensive industries and industrial composition of regional economy. From the results of this study, information employment prospects among regions of Korea would reinforce the unequal geography of job opportunity. In this light, regional policy efforts should be given to the improvement of information infrastructure to facilitate new computer-based service products and process in peripheral regions.

  • PDF