• Title/Summary/Keyword: User Protection

Search Result 688, Processing Time 0.027 seconds

DEVELOPMENT OF POINT KERNEL SHIELDING ANALYSIS COMPUTER PROGRAM IMPLEMENTING RECENT NUCLEAR DATA AND GRAPHIC USER INTERFACES

  • Kang, Sang-Ho;Lee, Seung-Gi;Chung, Chan-Young;Lee, Choon-Sik;Lee, Jai-Ki
    • Journal of Radiation Protection and Research
    • /
    • v.26 no.3
    • /
    • pp.215-224
    • /
    • 2001
  • In order to comply with revised national regulationson radiological protection and to implement recent nuclear data and dose conversion factors, KOPEC developed a new point kernel gamma and beta ray shielding analysis computer program. This new code, named VisualShield, adopted mass attenuation coefficient and buildup factors from recent ANSI/ANS standards and flux-to-dose conversion factors from the International Commission on Radiological Protection (ICRP) Publication 74 for estimation of effective/equivalent dose recommended in ICRP 60. VisualShieid utilizes graphical user interfaces and 3-D visualization of the geometric configuration for preparing input data sets and analyzing results, which leads users to error free processing with visual effects. Code validation and data analysis were performed by comparing the results of various calculations to the data outputs of previous programs such as MCNP 4B, ISOSHLD-II, QAD-CGGP, etc.

  • PDF

Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives

  • Zhang, Junsong;He, Lei;Zhang, Qikun;Gan, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5654-5673
    • /
    • 2016
  • Participatory sensing applications rely on recruiting appropriate participants to share their surrounding conditions with others, and have been widely used in many areas like environmental monitoring, health care, and traffic congestion monitoring, etc. In such applications, how to ensure the privacy of a participant is important, since incentive mechanisms are used to maintain their enthusiasm for sustainable participation by offering certain amount of reward. In this paper, we propose a pseudonym-based privacy protection scheme, that takes both privacy protection and user incentives into consideration. The proposed scheme uses the pseudonym mechanism and one-way hash function to achieve user incentives, while protecting their identity. We also show extensive analysis of the proposed scheme to demonstrate that it can meet the security and performance the requirement of a participatory sensing application.

User Authentication System using RSA Algorithm

  • Yang, Sung-Ki;Lee, Kwang-Ok;Lee, Dae-Young;Jeong, Yu-Jeong;Bae, Sang-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.156-159
    • /
    • 2002
  • For the effective use of information in the information society, information should be protected and outflow of information by illegal users should be prevented. This study sets up user authentication policy, user authentication regulations and procedures for information protection and builds information protection key distribution center and encryption user Authentication system which can protect information from illegal users.

  • PDF

A Comparative Analysis of Domestic and Foreign Cloud Service Agreements (국내외 클라우드 서비스 이용약관 비교 분석 연구)

  • Song, Jiwon;Lee, Hwansoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.8
    • /
    • pp.499-509
    • /
    • 2016
  • The MSIP has implemented "Act on The Development of Cloud Computing and Protection of Its Users" from September 2015 and invigorated the cloud service industry. The act mainly includes the improvement cloud computing reliability and user protection for the development foundation and use activation. In order to expand the cloud market, it is important to increase the reliability of individual users. However, practical discussions and approach for cloud services adoption are still limited. In fact, there is no agreement standard for domestic cloud services. As a user agreement is not standardized, users feel difficulty compare to each agreement of cloud service provider and may be damaged because of unfair terms. Thus, it is necessary to examine the unfairness of cloud service agreement for user protection. This study analyzes domestic and foreign cloud service agreements including Practical Guide to Cloud Service Agreement of Cloud Standards Customer Council and suggests the direction of the standard agreement of cloud services.

A Study on The Protection of Industrial Technology based on LDAP (LDAP기반의 산업기술 유출방지에 관한 연구)

  • Kim, Do-Hyeoung;Yoo, Jae-Hyung;Lee, Dong-Hwi;Ki, Jae-Seok;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.21-30
    • /
    • 2008
  • This study researched into the method that allows only the certified user and computational engineer to possibly use network resources and computing resources by implementing the system of the intensified certification and security based on LDAP(Lightweight Directory Access Protocol) directory service, that copes with incapacitation in security program due to making the security program forcibly installed, and that can correctly track down the industrial-technology exporter along with applying the user-based security policy through inter-working with the existing method for the protection of industrial technology. Through this study, the intensified method for the protection of industrial technology can be embodied by implementing the integrated infra system through strengthening the existing system of managing the protection of industrial technology, and through supplementing vulnerability to the method for the protection of industrial technology.

  • PDF

MPEG-4 IPMP Authoring Tool for Protection and Management of Digital Contents

  • Kim Kwang-Yong;Kim Jae-Gon;Hong Jin-Woo;Kim Chang-Su;Jung Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.4
    • /
    • pp.195-200
    • /
    • 2005
  • The MPEG-4 standard is aimed to define an object based audiovisual coding standard to address the emerging needs from interactive broadcasting. Since a broadcasting program is created on the basis of its objects, it is considered that MPEG-4 is most suitable for interactive broadcasting contents production and it can be retrieved in terms of its properties. But, there is no system that protects the copyright of digital contents and manages copyright and possibility that contents producer and author's copyright receives infringement at process that exchange contents mutually rose very. Therefore, we need to control and distribute contents according to user's permission rights. In this paper, we present the authoring system based on MPEG-4 IPMP for copyright and protection of MPEG-4 contents. The main features of the proposed approach is to provide an MPEG-4 compliant IPMP authoring system in a plug-in type along with standardized interfaces, which is to be able to incorporated into an existing MPEG-4 content authoring system. In this way, it is capable of authoring content to the MP4 file format while accommodating protection and management of content in a unified way. Furthermore, it also allows a user to edit and/or author IPMP information in a more efficient way by offering form based user interfaces.

The Influence of Information Asymmetry of Telecommunication Service Websites on Intention for Continuous Usage (통신서비스 웹사이트 정보불균형이 지속이용의도에 미치는 영향)

  • Han, Moon Seung;Lee, John Hearn
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.131-146
    • /
    • 2015
  • The communications market can be characterized for its overflow of users, oligopoly business structure, 24/7 open service, incomplete sales, and operation of core platform function. These characteristics have lead users to continuously make complaints and suffer inconveniences, and thus the concept of user protection has come to receive attention. This study aims to propose solutions through communication channeling between businesses and users, based on website construction from the viewpoint of user protection. In particular, a research model was developed to display how the information symmetry of websites can be influential on the satisfaction, reliability, and continuous intention for using communication services. Total of 14 hypotheses were set to measure a significant degree of variables corelation and eight hypotheses were accepted finally. The analysis results showed that information symmetry of telecommunication service websites had a positive effect on intention for continuous usage. Through the research results, it is expected that communication service businesses will be able to consider important factors when constructing websites. Furthermore, the results are expected to be utilized as for ensuring users' continued usage of their communication services.

Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model

  • Sun, Yinggang;Zhang, Hongguo;Zhang, Luogang;Ma, Chao;Huang, Hai;Zhan, Dongyang;Qu, Jiaxing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3419-3437
    • /
    • 2022
  • Anonymization technology is an important technology for privacy protection in the process of data release. Usually, before publishing data, the data publisher needs to use anonymization technology to anonymize the original data, and then publish the anonymized data. However, for data publishers who do not have or have less anonymized technical knowledge background, how to configure appropriate parameters for data with different characteristics has become a more difficult problem. In response to this problem, this paper adds a historical configuration scheme resource pool on the basis of the traditional anonymization process, and configuration parameters can be automatically recommended through the historical configuration scheme resource pool. On this basis, a privacy model hybrid recommendation algorithm for user satisfaction is formed. The algorithm includes a forward recommendation process and a reverse recommendation process, which can respectively perform data anonymization processing for users with different anonymization technical knowledge backgrounds. The privacy model hybrid recommendation algorithm for user satisfaction described in this paper is suitable for a wider population, providing a simpler, more efficient and automated solution for data anonymization, reducing data processing time and improving the quality of anonymized data, which enhances data protection capabilities.

The Application for the Protection System of Location-based Information on a Smart-phone Environment (스마트폰 환경에서 개인위치정보 보호시스템 응용방안)

  • Kim, In-Jai;Choi, Jae-Won;Kim, Woon-Yoeng
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.3
    • /
    • pp.129-147
    • /
    • 2012
  • In this paper, we research on the personal information protection system in smart-phone based on mobile environment. This paper proposes the enhanced personal location privacy mechanism in location-based service environment of a smart phone operating system(iOS, Android) for the relevant regulations on location-based protection and utilization. Also, the result verified that possibility on a self-control mechanism of the personal information protection system's subject in the window platform throughout the experiment. Therefore, this study have drew a method that user positively can cope with a protection of personal location information by having a user's self-control method in the system under development or done by illegal location-based service providers and illegal application developer.

Protection of MPEG-2 Multicast Streaming in an IP Set-Top Box Environment

  • Hwang, Seong-Oun;Kim, Jeong-Hyon;Nam, Do-Won;Yoon, Ki-Song
    • ETRI Journal
    • /
    • v.27 no.5
    • /
    • pp.595-607
    • /
    • 2005
  • The widespread use of the Internet has led to the problem of intellectual property and copyright infringement. Digital rights management (DRM) technologies have been developed to protect digital content items. Digital content can be classified into static content (for example, text or media files) and dynamic content (for example, VOD or multicast streams). This paper deals with the protection of a multicast stream on set-top boxes connected to an IP network. In this paper, we examine the following design and architectural issues to be considered when applying DRM functions to multicast streaming service environments: transparent streaming service and large-scale user environments. To address the transparency issue, we introduce a 'selective encryption scheme'. To address the second issue, a 'key packet insertion scheme' and 'hierarchical key management scheme' are introduced. Based on the above design and architecture, we developed a prototype of a multicasting DRM system. The analysis of our implementation shows that it supports transparent and scalable DRM multicasting service in a large-scale user environment.

  • PDF