• Title/Summary/Keyword: User Private Information

Search Result 363, Processing Time 0.024 seconds

An Empirical Study on Education and Training System for Effective Implementation of IT Strategies (정보화전략의 효과적 추진을 위한 교육훈련체계에 관한 실증적 연구)

  • Kim, Sang-Hoon;Jung, Hae-Yong
    • Asia pacific journal of information systems
    • /
    • v.9 no.4
    • /
    • pp.143-161
    • /
    • 1999
  • The objective of this research is to develop education and training systems for IS department and user department personnel, which is essential to effective implementation IT(information technology) strategies in most of organizations. In order to achieve this research objective, first this study theoretically derives six categories of education and training based on comprehensive review of the previous research, and explicates concrete items for each category. And then, with respect to each of these items, we empirically investigate the degree of necessity measured by the gap between the required level of knowledge and skills which staff members should have for effective implementation of IT strategies and the present level of them which they really have. Field survey is employed for the data collection: 270 questionnaires are distributed to the companies in private and public sectors, and 196 questionnaires are collected in useful condition and are analyzed. The findings of this research shows that six dimensions of education and training are empirically derived by factor analysis as following: (1) general knowledge for organizational overview, (2) management knowledge and skills, (3) knowledge and skills of the specific information system which IS department and user department personnel are directly involved in developing and operating, (4) knowledge and skills for strategic use of IT, (5) general knowledge and skills for IT and (6) advanced expert knowledge and skills for specific IT. And the degree of necessity turns out to be statistically significantly different among six dimensions of education and training needed by IS department and user department personnel respectively. Also for each dimension, the degree of necessity is shown to be statistically significantly different between IS department and user department personnel The results of this study can provide the theoretical basis for constructing the IT education and training system for effective implementation of IT strategies, Also they can be used as a practical guideline in developing and promoting specific IT education and training programs in real organizations.

  • PDF

An Efficient cryptography for healthcare data in the cloud environment (클라우드 환경에서 헬스케어 데이터를 위한 효율적인 암호화 기법)

  • Cho, Sung-Nam;Jeong, Yoon-Su;Oh, ChungShick
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.63-69
    • /
    • 2018
  • Recently, healthcare services are using cloud services to efficiently manage users' healthcare data. However, research to ensure the stability of the user's healthcare data processed in the cloud environment is insufficient. In this paper, we propose a partial random encryption scheme that efficiently encrypts healthcare data in a cloud environment. The proposed scheme generates two random keys (p, q) generated by the user to optimize for the hospital medical service and reflects them in public key and private key generation. The random key used in the proposed scheme improves the efficiency of user 's healthcare data processing by encrypting only part of the data without encrypting the whole data. As a result of the performance evaluation, the proposed method showed 21.6% lower than the existing method and 18.5% improved the user healthcare data processing time in the hospital.

An Analysis of Security Problem against Wireless Network in Smartphone (스마트폰 상에서 무선 네트워크 보안 문제점 분석)

  • Kim, Ki-Hawn;Lee, Young Sil;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.383-386
    • /
    • 2014
  • Due to the development of communication technology, a conventional major business through PC, laptop or Tablet PC can be performed via a smartphone and it is increasing the user's convenience. At this point, the user prefers to connect to the Internet using the wireless network because it occurs an additional charge according to the amount of data to be transmitted when using a data communication through 3G or 4G. However, when using a wireless network, there is a possibility of several attacks such as easily steal or modulate the information from the outside or to gain access to personal information stored in the user's smartphone with man-in-the-middle attacks by using the fake AP. IIn this paper, we describe how you can detect the AP when you use LAN of the smartphone, were analyzed for this vulnerability, has not been approved. Furthermore, Also, we discuss ways which can enhance the security when user the access to the internet services (i.e., internet, public/private cloud service, etc.) via wireless network in smartphone.

  • PDF

A Blockchain-based User-centric Role Based Access Control Mechanism (블록체인 기반의 사용자 중심 역할기반 접근제어 기법 연구)

  • Lee, YongJoo;Woo, SungHee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1060-1070
    • /
    • 2022
  • With the development of information technology, the size of the system has become larger and diversified, and the existing role-based access control has faced limitations. Blockchain technology is being used in various fields by presenting new solutions to existing security vulnerabilities. This paper suggests efficient role-based access control in a blockchain where the required gas and processing time vary depending on the access frequency and capacity of the storage. The proposed method redefines the role of reusable units, introduces a hierarchical structure that can efficiently reflect dynamic states to enhance efficiency and scalability, and includes user-centered authentication functions to enable cryptocurrency linkage. The proposed model was theoretically verified using Markov chain, implemented in Ethereum private network, and compared experiments on representative functions were conducted to verify the time and gas efficiency required for user addition and transaction registration. Based on this in the future, structural expansion and experiments are required in consideration of exception situations.

Development of Image Processing Software for Satellite Data

  • Chi, Kwang-Hoon;Suh, Jae-Young;Han, Jong-Kyu
    • Proceedings of the KSRS Conference
    • /
    • 1998.09a
    • /
    • pp.361-369
    • /
    • 1998
  • Recently, the improvement of on-board satellite sensors covering hyperspectral image sensors, high spatial resolution sensors provide data on earth in diverse aspect. The application field relating remotely sensed data also varies depending on what type of job one wants. The various resolution of sensors from low to extremely high is also available on the market with a user defined specific location. The expense to purchase remote sensed data is going down compare to the cost it need past few years ago in terms of research or private use. Now, the satellite remote sensed data is used on the field of forecasting, forestry, agriculture, urban reconstruction, geology, or other research field in order to extract meaningful information by applying special techniques of image processing. There are many image processing packages available worldwide and one common aspect is that they are expensive. There need to be a advanced satellite data processing package for people who can not afford commercial packages to apply special remote sensing techniques on their data and produce valued-added product. The study was carried out with the purpose of developing a special satellite data processing package which covers almost every satellite produced data with normal image processing functions and also special functions needed on specific research field with friendly graphical user interface (GUI). And for the people with any background of remote sensing with windows platform.

  • PDF

The Design and Implementation of Secure XML Messaging System (안전한 XML 메시징 시스템 설계 및 구현)

  • 이영교;안경림
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.9
    • /
    • pp.1233-1238
    • /
    • 2001
  • Security is very important at EC(Electronic Commerce) Environments. The reason is that exchanged data(that is user private information(accounts, card-no, password), transaction items, etc) is various and is very sensitive. In this paper, we propose the Secure-XML Messaging System(S-XMS) which is implemented to support Message Level Security, Encryption and Digital Signature. And we implement Message Confidentiality Service, User Authentication & Message Integrity Service and Non-Repudiation Service among the various Security Services.

  • PDF

VPN (Virtual Private Network) SW's examination example analysis (VPN(Virtual Private Network) SW의 시험사례분석)

  • Kim, Kyung-Muk;Yang, Hae-Sool
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.3012-3020
    • /
    • 2010
  • VPN can give safety in connection in Timbuc-too, by corporation's basis communication means today that transfer user support in Timbuc-too is required compulsorily, VPN is activated. This research wishes to investigate base technology of VPN software field and investigate VPN software market trend and standard and develop estimation model of VPN software. For this special quality of VPN software investigation / analyze and investigate or analyze market trend and standard this to VPN software to base deduction of estimation item and estimation model develop.

A study on the performance evaluation items of the private blockchain consensus algorithm considering consensus stability

  • Min, Youn-A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.71-77
    • /
    • 2020
  • Through the consensus algorithm, which is the core technology of the blockchain, the same data is accurately shared between connected nodes. The use of an appropriate consensus algorithm that considers the user and the usage environment ensures efficient maintenance of data integrity and accuracy. In this paper, we proposed a performance evaluation method for efficient selection of a consensus algorithm among authorized nodes considering the characteristics of a private blockchain platform, and applied the modified item to the existing published formula considering the number of authoritative connected nodes. Through this process, it was possible to simplify the consensus process considering the stability between nodes. The stability of the consensus process can be improved by selecting an appropriate consensus algorithm based on the proposed research.

On Design of the Recoverable Cryptosystem in Public Key Infrastructure (PKI 연동 키복구 암호 시스템 설계에 관한 연구)

  • 최희봉;오수현;홍순좌;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.1
    • /
    • pp.11-20
    • /
    • 2002
  • In 1998, A. Young and M. Yung proposed the auto-recovery auto-certificate cryptosystem in public key infrastructure. We propose the new recoverable cryptosystem in public key infrastructure which is designed with the concept of A. Young et al's auto-recovery auto-certificate cryptosystem. It has the private/public key pairs of the user and the master private/public key pairs of the escrow authority. It is based on RSA cryptosystem and has efficiency and security.

Design of a Strong Authentication Mechanism using Public-Key based on Kerberos (공개키를 이용한 커버로스 기반의 강력한 인증 메커니즘 설계)

  • 김은환;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.67-76
    • /
    • 2002
  • Kerberos is designed to provide strong authentication between client and application servers which are working in distributed network environment by using symmetric-key cryptography, and supposed to trust other systems of the realm. In this paper, we design an efficient and strong authentication mechanism by introducing the public/private-key to Kerberos. In the mechanism to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we employ a mutual authentication method, which is used on challenge-response mechanism based on digital signatures, to improve trust between realms, and present a way of reducing the number of keys by simplifying authentication steps.