• Title/Summary/Keyword: Security Verification

Search Result 685, Processing Time 0.024 seconds

Efficient Proxy Re-encryption Scheme for E-Voting System

  • Li, Wenchao;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1847-1870
    • /
    • 2021
  • With the development of information and communication technologies, especially wireless networks and cell phones, the e-voting system becomes popular as its cost-effectiveness, swiftness, scalability, and ecological sustainability. However, the current e-voting schemes are faced with the problem of privacy leakage and further cause worse vote-buying and voter-coercion problems. Moreover, in large-scale voting, some previous e-voting system encryption scheme with pairing operation also brings huge overhead pressure to the voting system. Thus, it is a vital problem to design a protocol that can protect voter privacy and simultaneously has high efficiency to guarantee the effective implementation of e-voting. To address these problems, our paper proposes an efficient unidirectional proxy re-encryption scheme that provides the re-encryption of vote content and the verification of users' identity. This function can be exactly applied in the e-voting system to protect the content of vote and preserve the privacy of the voter. Our proposal is proven to be CCA secure and collusion resistant. The detailed analysis also shows that our scheme achieves higher efficiency in computation cost and ciphertext size than the schemes in related fields.

The Role of Wearable Devices for the Success of the Healthcare Business: Verification from PRISMA Approach

  • KIM, Ji-Hye;KANG, Eungoo
    • The Journal of Economics, Marketing and Management
    • /
    • v.10 no.4
    • /
    • pp.13-24
    • /
    • 2022
  • Purpose: Although numerous research has covered content on trends in the adoption and use of wearable devices, their uses across several sectors such as healthcare, gaming, and fashion, there seems to be a considerable paucity with regard to empirical research focusing on the solutions for factors that undermine the effectiveness of wearable devices in healthcare. The present research aims to highlight what has been covered on wearable devices in healthcare while highlighting the limitations for future research. Research design, data, and methodology -The present authors conducted one of the most famous qualitative literature approach which has been called as PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analysis) statement. The selecting criteria for eligible prior studies was estimated by whether studies are suitable for the current research, identifying they are peer-reviewed and issued by notable publishers between 2017 and 2022. Result - Our results indicated that (1) Increasing the Affordability and User Education on Wearable Devices in Healthcare (2) Tackling the Technological Issues in Wearable Devices to Promote Healthcare Delivery (3) Solving Security and Privacy Issues Associated with Wearable Devices (4) Promoting Standards and Appropriate Regulations for Wearable Devices. Conclusion - To add, resolving the technological issues associated with wearable devices in healthcare will ensure that the new devices in the market will have longer battery life, multiple functions, and enhanced accuracy, thus ensuring that patients receive better care. Necessary interventions are taken on time to avoid any deleterious consequences such as proliferating mortality rates among the different patient groups.

A Study on the Relationship between Job Characteristic Factors and Job Performance - Focusing on the Mediating Role of Empowerment

  • HONG, Kyu-Jeong
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.7
    • /
    • pp.1-6
    • /
    • 2022
  • Purpose: This study verified the influence of teachers' job characteristics on empowerment and job performance, and the mediating effect of empowerment in the relationship between job characteristics factors and job performance. Research design, data, and methodology: As a factor influencing human resources that influence organizational success or failure, job characteristics induce an important psychological state in organizational members, which affects individual motivation and job satisfaction, thereby achieving the goal of securing stable management and job security. In this study, a questionnaire survey of private academy instructors was conducted and reliability and factor analysis, and multiple regression analysis were used. Results: The purpose of this study was to understand the effect of the job characteristics of academy instructors on empowerment and job performance, and to verify whether empowerment plays a mediating role in the relationship between job characteristics and job performance. Conclusions: As a result of verifying Hypothesis 1, the educational environment, expertise, and social support of academy instructors all had a significant positive (+) effect on job performance. As a result of the verification of Hypothesis 2, empowerment greatly mediated the relationship between the educational environment, expertise, and job performance. However, empowerment did not mediate the relationship between social support for academy instructors and job performance.

Best Practices on Validation and Extraction of Object oriented Designs with Code Visualization Tool-chain (코드 가시화 툴체인 기반 UML 설계 추출 및 검증 사례)

  • Lee, Won-Young;Kim, Robert YoungChul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.79-86
    • /
    • 2022
  • This paper focuses on realizing design improvement and high quality through visualization of reverse engineering-based software. As new technologies and complex software emerge in various areas of the fourth industry in the future, software verification with both stability and reliability is becoming an issue. We propose a reverse engineering-based UML design extraction and visualization for high-quality software ranging from simple computational software to machine learning-based data-oriented software. Through this study, it is expected to improve software quality through design improvement by checking the accuracy of the target design and identifying the code complexity.

Software Risk Management and Cyber Security for Development of Integrated System Remotely Monitoring and Controlling Ventilators (인공호흡기 원격 통합 모니터링 및 제어 시스템 개발을 위한 소프트웨어 위험관리 및 사이버보안)

  • Ji-Yong Chung;You Rim Kim;Wonseuk Jang
    • Journal of Biomedical Engineering Research
    • /
    • v.44 no.2
    • /
    • pp.99-108
    • /
    • 2023
  • According to the COVID-19, development of various medical software based on IoT(Internet of Things) was accelerated. Especially, interest in a central software system that can remotely monitor and control ventilators is increasing to solve problems related to the continuous increase in severe COVID-19 patients. Since medical device software is closely related to human life, this study aims to develop central monitoring system that can remotely monitor and control multiple ventilators in compliance with medical device software development standards and to verify performance of system. In addition, to ensure the safety and reliability of this central monitoring system, this study also specifies risk management requirements that can identify hazardous situations and evaluate potential hazards and confirms the implementation of cybersecurity to protect against potential cyber threats, which can have serious consequences for patient safety. As a result, we obtained medical device software manufacturing certificates from MFDS(Ministry of Food and Drug Safety) through technical documents about performance verification, risk management and cybersecurity application.

A Study on the Effect of Online Travel Distribution's Brand Community Characteristics on Product Purchase Intention

  • LU, Lianghui;KANG, Min-Jung;SUN, Pengchang
    • Journal of Distribution Science
    • /
    • v.21 no.1
    • /
    • pp.107-117
    • /
    • 2023
  • Purpose: This study attempted to confirm the mediating effect of brand experience and to travel brand community satisfaction in the relationship between the characteristics of brand community contents and travel product purchase intention. This study also investigated the moderating role of consumer characteristics. Research design, data and methodology: Based on a total of 381 bytes of data, hypothesis verification was conducted using Smart-PLS 3.2.8 statistical package programs. Results: First, the content community travel brand attributes, personal affordability and creativity are a lingering fragrances on the intended consumers ' shopping trip. Second, information provision, interaction, and creativity, which are the characteristics of travel brand community content, influenced consumers' intention to purchase travel products through brand community satisfaction. Third, playfulness, vitality, and creativity, which are the characteristics of travel brand community content, influenced consumers' intention to purchase travel products through double mediation of the experience and community satisfaction of brand. Conclusions: Tourism industry managers should be able to market content by forming their own brand community. It is necessary to create an environment in which tourism industry managers can use social media travel brand community content to give discounts to consumers, provide creative, playful and vivid travel information.

Volume Holographic Optical Fingerprint Identification for Secure Entry System (안전 출입 시스템을 위한 체적 홀로그래픽 광지문인식)

  • Lee, S.H.;Park, M.S.;Shim, W.S.
    • Journal of the Korean Society of Safety
    • /
    • v.14 no.4
    • /
    • pp.204-210
    • /
    • 1999
  • We propose an optical fingerprint identification system using volume hologram for database of matched filter. Matched filters in VanderLugt correlator are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference fingerprint photographs of database are prerecorded in a photorefractive material in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database is achieved by controlling the reference directions with a step motor. Experimental results show that the proposed system can be used for secure entry systems to identify individuals for access to a restricted area, security verification of credit cards, passports, and other IDs.

  • PDF

Verification of Night Light Satellite Data using AIS Data (AIS 자료 기반 야간 불빛위성자료 검증)

  • Yoon suk;Hyeong-Tak Lee;Hey-Min Choi;Hyun Yang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.211-212
    • /
    • 2022
  • 지구온난화에 따른 우리나라 주변 환경의 변화와 최근 중국 불법어선의 연근해 어업자원의 고갈 등으로 인해 우리나라 연근해 어족자원을 보호할 필요성이 증대되고 있으며, 지속 가능한 어업을 위해서는 어획물의 종류와 양을 정확히 파악하고 불법 어업에 대한 철저한 감시 및 관리가 필요하다. 시공간적으로 다양하게 변하는 생태 및 어장 환경 정보와 선박에 대한 정보를 통해 해양관측과 위성 원격탐사를 동시에 이용함으로써 근해와 원양 생물자원 실태를 관측하는 것이 가능하다. 본 연구에서는 야간 불빛 위성 Suomi-NPP (Suomi National Polar-orbiting Partnership) 및 후속위성인 NOAA-20의 VIIRS (Visible Infrared Imaging Radiometer Suite) DNB (Day & Night Band) 영상을 이용하여 야간 불빛을 활용하고자 한다. 이 불빛 위성 자료를 이용하여 야간에 조업하는 어선 선단의 공간 분포를 분석할 수 있다. 또한 이 불빛 위성 자료와 AIS 자료를 상호 비교하여, 불빛 위성 자료를 통해 실제 선박의 위치 정보를 검색하는 것이 가능함을 검증하고자 한다.

  • PDF

Aspect of the chief of state guard EMP (Electro Magnetic Pulse) protection system for the consideration (국가원수 경호적 측면에서의 EMP(Electro Magnetic Pulse) 방호 시스템에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.37-66
    • /
    • 2014
  • In recent years, with the development of computers and electronics, electronics and communication technology in a growing and each part is dependent on the cross-referencing makes all electronic equipment is obsolete due to direct or indirect damage EMP. Korea and the impending standoff North Korea has a considerable level of technologies related to the EMP, EMP weapons you already have or in a few years, the development of EMP weapons will complete. North Korea launched a long-range missile and conducted a nuclear test on several occasions immediately after, when I saw the high-altitude nuclear blackmail has been strengthening the outright offensive nuclear EMP attacks at any time and practical significance for the EMP will need offensive skills would improve. At this point you can predict the damage situation of Korea's security reality that satisfy the need, more than anything else to build a protective system of the EMP. The scale of the damage that unforeseen but significant military damage and socio-economic damage and fatalities when I looked into the situation which started out as a satellite communications systems and equipment to attack military and security systems and transportation, finance, national emergency system, such as the damage elsewhere. In General, there is no direct casualties reported, but EMP medical devices that rely on lethal damage to people who can show up. In addition, the State power system failure due to a power supply interruption would not have thought the damage would bring State highly dependent on domestic power generation of nuclear plants is a serious nuclear power plant accident in the event of a blackout phenomenon can lead to the plant's internal problems should see a forecast. First of all, a special expert Committee of the EMP, the demand for protective facilities and equipment and conduct an investigation, he takes fits into your budget is under strict criteria by configuring the contractors should be sifting through. He then created the Agency for verification of performance EMP protection after you have verified the performance of maintenance, maintenance, safety and security management, design and construction company organized and systematic process Guard facilities or secret communications equipment and perfect for the EMP, such as protective equipment maneuver system should take.

  • PDF

The Effect Of Job Insecurity To The Union Commitment, Dual Commitment and The Union-Related Orientation (고용불안이 노조몰입, 이중몰입, 노사관계행동지향성에 미치는 영향에 관한 연구)

  • Son, Heon-I;Jung, Hyun-Woo
    • Management & Information Systems Review
    • /
    • v.34 no.2
    • /
    • pp.131-149
    • /
    • 2015
  • Recently many organizations have engaged in widespread restructuring as well as more flexible usage of labor in an attempt to cut costs and to increase profit. As a result of lays offs resulting from frequent restructuring, many people no longer consider their jobs as permanent positions. many employees have an increased feeling of job insecurity. There structuring and following downsizing have created an uncertain environment within creased fear offer ther job losses. therefore the study of job insecurity is significant. especially To understand the relationship between job security and union-relation behaviors on the industrial relations. The purpose of this study suggested the strategies to company and union. The purpose of this study is to examine how the union-relation behaviors are influenced by the job security. This study built a exploratory model that there is causal relationship of job security to union commitment, dual commitment, and labor related behaviors. For the verification of this study model, the regression analysis was applied to the surveys of 236 members of union that are located in Busan, Gyeongnam, Ulsan, and Pohang. The result of this research shows that the job insecurity is strongly related to the union commitment and union related behaviors. According to the research, the effect that the job security affects union commitment and union related behaviors are positive. With the research outputs, we have discussed about the academic and pragmatic viewpoint. We proposed comprehensive model to verify how the job insecurity affects the union-related behaviors, and objectively analyzed the model. The research result was opposite to what the existing theories have said that high job insecurity derives high union-related behaviors. This result is meaningful because it is concerned with the social issues-present situation of Korean company, low-employment, unstable employment and so on. Moreover, this research may contribute to expand the aspect of academic research on job insecurity as there are few research conducted in korea. This research also suggests the realistic alternative of union-related behaviors because it is proved that job security can contribute to innovation activities. Also, this research implies that the matter of job insecurity is the basic need of organizational individual and presents that job security is not a notion but the alternative by using of the positional stability and situational control power. The limitation of this research is that it is only utilized the cross-sectional study. To remedy the cross-sectional study, vertical, and serial method of research is needed. And there is no enough sample to secure more comprehensive data as the targets of the research is limited to Busan and Gyeongnam regions. Finally, the measurement tool for job security is needed to be suitably modified to by the South Korea's economic, linguistic, and cultural situation.

  • PDF