• Title/Summary/Keyword: Public key infrastructure

Search Result 349, Processing Time 0.027 seconds

Future Directions of Pharmacovigilance Studies Using Electronic Medical Recording and Human Genetic Databases

  • Choi, Young Hee;Han, Chang Yeob;Kim, Kwi Suk;Kim, Sang Geon
    • Toxicological Research
    • /
    • v.35 no.4
    • /
    • pp.319-330
    • /
    • 2019
  • Adverse drug reactions (ADRs) constitute key factors in determining successful medication therapy in clinical situations. Integrative analysis of electronic medical record (EMR) data and use of proper analytical tools are requisite to conduct retrospective surveillance of clinical decisions on medications. Thus, we suggest that electronic medical recording and human genetic databases are considered together in future directions of pharmacovigilance. We analyzed EMR-based ADR studies indexed on PubMed during the period from 2005 to 2017 and retrospectively acquired 1161 (29.6%) articles describing drug-induced adverse reactions (e.g., liver, kidney, nervous system, immune system, and inflammatory responses). Of them, only 102 (8.79%) articles contained useful information to detect or predict ADRs in the context of clinical medication alerts. Since insufficiency of EMR datasets and their improper analyses may provide false warnings on clinical decision, efforts should be made to overcome possible problems on data-mining, analysis, statistics, and standardization. Thus, we address the characteristics and limitations on retrospective EMR database studies in hospital settings. Since gene expression and genetic variations among individuals impact ADRs, pharmacokinetics, and pharmacodynamics, appropriate paths for pharmacovigilance may be optimized using suitable databases available in public domain (e.g., genome-wide association studies (GWAS), non-coding RNAs, microRNAs, proteomics, and genetic variations), novel targets, and biomarkers. These efforts with new validated biomarker analyses would be of help to repurpose clinical and translational research infrastructure and ultimately future personalized therapy considering ADRs.

A Task Scheduling Strategy in Cloud Computing with Service Differentiation

  • Xue, Yuanzheng;Jin, Shunfu;Wang, Xiushuang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5269-5286
    • /
    • 2018
  • Task scheduling is one of the key issues in improving system performance and optimizing resource management in cloud computing environment. In order to provide appropriate services for heterogeneous users, we propose a novel task scheduling strategy with service differentiation, in which the delay sensitive tasks are assigned to the rapid cloud with high-speed processing, whereas the fault sensitive tasks are assigned to the reliable cloud with service restoration. Considering that a user can receive service from either local SaaS (Software as a Service) servers or public IaaS (Infrastructure as a Service) cloud, we establish a hybrid queueing network based system model. With the assumption of Poisson arriving process, we analyze the system model in steady state. Moreover, we derive the performance measures in terms of average response time of the delay sensitive tasks and utilization of VMs (Virtual Machines) in reliable cloud. We provide experimental results to validate the proposed strategy and the system model. Furthermore, we investigate the Nash equilibrium behavior and the social optimization behavior of the delay sensitive tasks. Finally, we carry out an improved intelligent searching algorithm to obtain the optimal arrival rate of total tasks and present a pricing policy for the delay sensitive tasks.

A Brief Scrutiny of Malawi's Policy on Nuclear Power

  • Katengeza, Estiner Walusungu
    • Journal of Radiation Protection and Research
    • /
    • v.45 no.4
    • /
    • pp.147-153
    • /
    • 2020
  • Background: Malawi's 2018 National Energy Policy includes nuclear power as an energy option with an operational 100 MW targeted for 2035. Materials and Methods: This paper challenges the scope of the policy on nuclear power by reviewing its implementation strategy and comparing it to: the strategy established for coal in the same policy; some experiences from other countries; and documents by the International Atomic Energy Agency (IAEA) relating to establishing a national position on nuclear power and infrastructural requirements for a nuclear power program. Results and Discussion: It is found that the pro-nuclear position is uninformed, and targets are unrealistic owing to a lack of understanding of nature of nuclear power including the requirements for safety, security and safeguards, and nuclear infrastructure. It is apparent that neither consultation nor a proper analysis were comprehensively conducted for nuclear. Though the national energy policy suggests a national position for nuclear energy, the content does not demonstrate that the position was arrived at knowledgeably. Conclusion: Thus, nuclear power may presently be viewed as a potential energy option that is yet to be seriously considered. It is important to build an appropriate level of literacy on nuclear science and technology for policy makers, key stakeholders, and the public to be better positioned for strategizing on nuclear power.

A Study on Digital Evidence Transmission System for E-Discovery (E-Discovery를 위한 디지털 증거 전송시스템에 대한 연구)

  • Lee, Chang-Hoon;Baek, Seung-Jo;Kim, Tae-Wan;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.171-180
    • /
    • 2008
  • This paper also suggests the Digital Evidence Transmission System for E-Discovery which is suited to domestic environments in order to solve these problems and promote safe and convenient transmission of the electronic evidences. The suggested Digital Evidence Transmission System for E-Discovery is the system that submit digital evidences to Court's Sever through the Internet using Public Key Infrastructure and Virtual Private Network, and solves the problems - such as privileged and privacy data, trade secret of company, etc.

Design of Wireless LAM Authentication Mechanism for Fast Handoff Service based on PKI (공개키 기반구조에서 빠른 핸드오프를 위한 무선랜 인증 기법 설계)

  • 정종민;이주남;이구연
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.45-55
    • /
    • 2003
  • Wireless LAM has the advantage of extension, flexibility and easiness of installation and maintenance. However, due to the characteristics of wireless media, it is vulnerable to security attacks. PKI(Public Key Infrastructure) is estimated to be a good solution offering security function to wireless LAM including global roaming. It offers high security functions as authentication confidentiality and digital signature while it generates big overheads such as CRL search and certificate verification. The overheads can not be avoided during the initial authentication. However, when we consider the case of handoff, it can be minimized through the fast handoff. In this paper, we design a fast handoff authentication mechanism based on PKI in the wireless LAM and analyze the performance of the scheme.

Smart City Challenge Project Case Study: Based on Suwon Smart City New 1794 Project (스마트시티 챌린지 프로젝트 사례 연구: 수원 스마트시티 New 1794 Project 기반으로)

  • Yoon, Chang Jin;Seo, Eung Kyo;Kim, Tae Hyung
    • The Journal of Information Systems
    • /
    • v.30 no.2
    • /
    • pp.243-259
    • /
    • 2021
  • Purpose The beginning of innovation and creation, Haenggung-dong, Paldal-gu, Suwon-si: Suwon Hwaseong Fortress, which began in 1794 by King Jeongjo in accordance with the spirit of Beopgochangsin, mobilized the abilities of traditional techniques, new science and technology, and artists New starting point for urban innovation in Suwon: Based on 5G technology possessed by leading companies in the global ICT industry in Hwaseong (Haenggung-dong), a product of cutting-edge evidence, solve various urban problems through public, private, industrial and academic governance, and a new business model It aims to reorganize into the space where this is created. Design/methodology/approach The New 1794 Project is a 2019 demonstration project requested by the Ministry of Land, Infrastructure and Transport for "Suwon Smart City Challenge Project: Haenggung-dong, Paldal-gu, Suwon-si," developed by the Dankook University SW Design Convergence Center, and the main project from 2020 to 2022. The smart city project strategy should be implemented based on partnerships with multiple stakeholders, and the bottom-up approach and the traditional top-down must be able to coexist. Therefore, the smart city solution applied a horizontal governance method. Findings In this study, the definition of the New 1794 Project, which is the key to defining smart cities in relation to all analyzed aspects, was developed.

Design Strategy for Residential Complex based on Landscape Urbanism

  • Choi, Jae-Hyun
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.121-128
    • /
    • 2021
  • In this study, we aim to suggest direction for landscape design of residential complex in Korea by studying target areas to understand how landscape urbanism was applied to residential landscape design as it is the majority of landscape design in Korea and by closely examining design elements to be considered for design of residential complex based on landscape urbanism theory. For the purpose of the study, some of public multifamily housing complex were selected as target areas and a survey was first conducted to understand how landscape urbanism was applied to design of these target areas. Then, by analyzing the survey results, we identified which elements were of importance to designing of multifamily housing complexes in Korea and how practical design of landscape urbanism works. From this study, we concluded that landscape urbanism theory is not just about design strategies, but more of comprehensive design methodology covering both operation and management and that such theory can be appropriately applied to design of multi-housing complexes in Korea. We also discovered that in order to apply landscape urbanism in design stage for multi-housing complex, selecting which design strategy/words in the previous study is not what's important, but comprehensive understanding and interpretation of design languages is key.

Blockchain-Assisted Trust Management Scheme for Securing VANETs

  • Ahmed, Waheeb;Wu, Di;Mukathie, Daniel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.609-631
    • /
    • 2022
  • The main goal of VANETs is to improve the safety of all road users. Therefore, the accuracy and trustworthiness of messages transmitted in VANETs are essential, given that life may rely on them. VANETs are provided with basic security services through the use of public key infrastructure-based authentication. However, the trust of users is still an open issue in VANETs. It is important to prevent bogus message attacks from internal vehicles as well as protect vehicle privacy. In this paper, we propose a trust management scheme that ensures trust in VANETs while maintaining vehicle privacy. The trust scheme establishes trust between vehicles where a trust value is assigned to every vehicle based on its behavior and messages are accepted only from vehicles whose trust value is greater than a threshold, therefore, protecting VANETs from malicious vehicles and eliminating bogus messages. If a traffic event happens, vehicles upload event messages to the reachable roadside unit (RSU). Once the RSU has confirmed that the event happened, it announces the event to vehicles in its vicinity and records it into the blockchain. Using this mechanism, RSUs are prevented from sending fake or unverified event notifications. Simulations are carried out in the context of bogus message attacks to evaluate the trust scheme's reliability and efficiency. The results of the simulation indicate that the proposed scheme outperforms the compared schemes and is highly resistant to bogus message attacks.

A Study On A RFID Authentication Protocol Using Public Key Cryptography In Multi-Purpose Infrastructure (Multi-Purpose 구조에서 공개키 암호화를 이용한 RFID 인증 프로토콜에 관한 연구)

  • Shin, Ju-Seok;Yun, Tae-Jin;Park, Yong-Soo;Chung, Kyung-Ho;Ahn, Gwang-Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1438-1441
    • /
    • 2009
  • RFID 시스템에서 태그는 객체를 유일하게 식별하기 위한 정보를 가지고 있기 때문에 개인정보의 노출, 위치 추적 등의 프라이버시 침해를 유발할 수 있는 문제점이 있다. 태그가 다양한 목적을 위해 사용되어지는 경우 키 분배, 키 관리 등의 문제로 인해 공개키 암호화 기법이 적용될 수 있다. 공개키 암호화 기법을 이용한 기존 RFID 인증 프로토콜에서는 서버와 태그 사이에 공개키를 사전에 공유하고 있다고 가정을 하여 설계를 하였다. 하지만 하나의 태그가 다양한 목적으로 사용되는 다목적 구조에서 수동형 RFID 태그가 서로 다른 서버의 공개키를 모두 공유한다는 것은 현실적으로 불가능하다. 본 논문에서는 다목적 구조에서 XOR 연산과 리더와 태그가 사전에 공유한 마스터 키($K_m$)를 사용하여 태그에게 공개키를 안전하게 전달하며 이를 이용한 공개키 암호화 기반의 RFID 인증 프로토콜을 제안한다. 또한 제안한 인증 프로토콜은 프라이버시 침해를 유발할 수 있는 도청, 재전송 공격, 위치 추적과 같은 공격에도 안전성을 보장한다.

Design and Implementation of the Document HTML System for Preserving Content Integrity

  • Hyun Cheon Hwang;Ji Su Park;Jin Gon Shon
    • Journal of Information Processing Systems
    • /
    • v.19 no.3
    • /
    • pp.334-346
    • /
    • 2023
  • An electronic document based on PDF has been widely used in customer communication between an enterprise and a customer to deliver personalized content. However, electronic documents based on PDF in the form of paper layouts are not suitable for mobile environments because of low readability and lack of interactive interaction. Even though HTML is an essential language in a mobile environment, electronic document based on PDF is still used as it has a content integrity verification feature with a digital signature. It means that a user is sacrificing user experience in a mobile environment for content integrity and using paper-layout electronic documents. In this research, we design the Document HTML specification by setting the Document HTML conformance, adding the extended meta tags, and signing the message digest with a digital signature based on public key infrastructure (PKI). Furthermore, we implemented the Document HTML system, which has REST API services to generate and verify the Document HTML, and did experimental verification of the theory. As a result, we have confirmed that the Document HTML has both content integrity and user experience on mobile. Furthermore, the Document HTML is expected to be an alternative document format to deliver personalized content from an enterprise to a customer in a mobile environment instead of the paper layout electronic document such as PDF.