• 제목/요약/키워드: User Protection

검색결과 683건 처리시간 0.023초

Analysis of DC insulation and properties of epoxy/ceramic composites with nanosized ZnO/TiO2 fillers

  • Kwon, Jung-Hun;Kim, Yu-Min;Kang, Seong-Hwa;Kim, Pyung-Jung;Jung, Jong-Hoon;Lim, Kee-Joe
    • Journal of Ceramic Processing Research
    • /
    • 제13권spc2호
    • /
    • pp.332-335
    • /
    • 2012
  • A molded transformer is maintenance-free, which makes it unnecessary to replace the insulating material, like in an oil-filled transformer, because the epoxy, which is a molded insulating resin, does not suffer variations in its insulating performance for heat cycles over a long time, as compared to insulating oil. In spite of these advantages, a molded transformer may still be accessed by the user, which is not good in regards to reliability or noise compared to the oil transformers. In particular, a distrust exists regarding reliability due to the long-term insulating performance. These properties have been studied in regards to the improvement of epoxy composites and molded transformer insulation. There have nevertheless been insufficient investigations into the insulation properties of epoxy composites. In this study, it is a researching of the epoxy for insulating material. In order to prepare the specimens, a main resin, a hardener, an accelerator, and a nano/micro filler were used. Varying amounts of TiO2 and ZnO nano fillers were added to the epoxy mixture along with a fixed amount of micro silica. This paper presents the DC insulation breakdown test, thermal expansion coefficient, and thermal conductivity results for the manufactured specimens. From these results, it has been found that the insulating performance of nano/micro epoxy composites is improved as compared to plain molded transformer insulation, and that nano/micro epoxy composites contribute to the reliability and compactness of molded transformers.

유니온 파일시스템에 대한 보안 위협 및 대응 방법 (Security Treats about Union File System and Responce Methodology)

  • 한성화
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2021년도 추계학술대회
    • /
    • pp.445-446
    • /
    • 2021
  • 유니온 파일 시스템은 다양한 파일과 디렉토리를 통합하여 단일 파일 시스템으로 사용할 수 있는 기술로, 통합에 사용되는 Source File/Directory를 그대로 유지할 수 있는 장점이 있어 컨테이너 플랫폼 등의 많은 어플리케이션에서 사용되고 있다. 유니온 파일 시스템을 사용할 때, 사용자는 Write-able Layer에 접근하며, 여기에는 운영체제에서 제공하는 보안 기술을 적용할 수 있다. 그러나 유니온 파일 시스템 생성에 사용되는 Source File과 Directory에는 별도의 보안 기술을 적용하기 어려운 단점이 있다. 본 연구에서는 유니온 파일 시스템 사용 시 발생될 수 있는 Source File/Directory에 대한 보안 위협을 차단하기 위한 접근통제 메커니즘을 제안하고자 한다. 접근통제 메커니즘의 실효성을 검증하기 위해 실증 구현한 후 기능 테스트를 수행한 결과, 본 연구에서 제안한 접근통제 메커니즘은 유니온 파일 시스템의 장점을 유지하면서 Source File/Directory를 보호할 수 있는 것으로 확인되었다.

  • PDF

Developing a Safety Scaffold Monitoring System Using Wireless Sensor Network Technology

  • Tserng, H. Ping;Huang, Hung-Jui;Li, Xin-Yan;Huang, Han-Tang
    • 국제학술발표논문집
    • /
    • The 6th International Conference on Construction Engineering and Project Management
    • /
    • pp.324-327
    • /
    • 2015
  • Scaffold is the most commonly used equipment in various types of construction works. Since various types of construction works use the same scaffold equipment, it becomes more difficult to be controlled and managed, thus resulting hazard frequently. According to the information announced in July 2012 by Council of Labor Affairs Executive Yan, the site collapse or incomplete anti-falling protection has led the site to accident frequently, and this is the main reason that causes construction industry occupational disasters. The labor death occupational hazard ratio rises up to 13% in scaffold activity, and the Council of Labor Affairs Executive Yan has showed that the death ratio is higher when using the scaffold in construction site, the total number of death has reached to 139 from 2005 to 2010. In order to ensure the safety of scaffold user, this study tends to build a wireless sensor monitoring system to detect the reliability and safety of the scaffold. The wireless sensor technique applies in this study is different with the traditional monitoring technique which is limited with wired monitoring. Wireless sensor technique does not need wire, it just needs to consider the power supply for establishing the network and receiving stable information, and it can become a monitoring system. In addition, this study also integrates strain gauge technique in this scaffold monitoring system, to develop a real-time monitoring data transfer mechanism and replace the traditional wired single project monitoring equipment. This study hopes to build a scaffold collapse monitoring system to effectively monitor the safety of the scaffold as well as provide the timesaving installation, low-cost and portable features.

  • PDF

Preliminary study for the development of radiation safety evaluation methodology for industrial kV-rated radiation generator facilities

  • Hye Sung Park ;Na Hye Kwon ;Sang Rok Kim ;Hwidong Yoo;Jin Sung Kim ;Sang Hyoun Choi;Dong Wook Kim
    • Nuclear Engineering and Technology
    • /
    • 제55권10호
    • /
    • pp.3854-3859
    • /
    • 2023
  • Background: This study aims to develop an evaluator that can quickly and accurately evaluate the shielding of low-energy industrial radiation generators. Methods: We used PyQt to develop a graphical user interface (GUI)-based program and employed the calculation methodology reported in the National Council on Radiation Protection and Measurements (NCRP)-49 for shielding calculations. We gathered the necessary factors for shielding evaluation using two libraries designed for Python, pandas and NumPy, and processed them into a database. We verified the effectiveness of the proposed program by comparing the results with those from safety reports of six domestic facilities. Results: After verifying the effectiveness of the program using the NCRP-49 example, we obtained an average error rate of 1.73%. When comparing the facility safety report and results obtained using the program, we found that the error rate was between 1.09% and 6.51%. However, facilities that did not use a defined shielding methodology were underestimated by 31.82% compared with the program (the final barrier thickness satisfied the shielding standard). Conclusion: The developed program provides a fast and accurate shielding evaluation that can assist personnel that work in radiation generator facilities and government officials in reviewing safety.

IT기업의 규제샌드박스 활용 분석 (Analysis of Regulatory Sandbox Usage by IT Companies)

  • 송석주;민대환;이한진
    • 한국IT서비스학회지
    • /
    • 제22권5호
    • /
    • pp.109-124
    • /
    • 2023
  • This study aims to apply the concept of regulatory stringency to the regulatory sandbox with a fresh perspective. The regulatory sandbox is a system that gives opportunities under certain conditions to new technologies or businesses that have not been launched due to inadequacy or insufficiency in legal systems. Previous research on regulatory sandboxes has mainly focused on discussions about their impact on specific technologies or business domains. This study attention to the results according to the evaluations. Among them, whether special cases for demonstration can evolve into official permission has garnered significant attention. For this study, among the cases that passed the regulatory sandbox evaluation from February, 2019, to December, 2022, 162 cases in the field of ICT convergence were selected. The evaluation results were classified into three groups 'positive interpretation (Fast Track)', 'temporary permission', and 'special case for demonstration.' Each case was assigned to one of the three groups. Through the comparative analysis, the common characteristics and differences were summarized. Then, this study explored improvement measures to pass a less restrictive regulatory sandbox. The analysis of the cases revealed that the differences in each evaluation result were attributed to variations in the technological characteristics and user protection features. Considering these differences, as well as the higher weight and importance of the preparation stage for sandbox application, this study suggested a three-step approach to prepare for temporary permission and positive interpretation rather than special case for demonstration. In addition, this thesis discussed the policy limitations of the regulatory sandbox mechanism in South Korea and the limitations of the current study. Hopefully, the results of this study would be beneficial to individuals and companies, particularly venture companies and startups seeking to develop new technologies or businesses and utilize regulatory sandboxes.

Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management

  • S. Poorani;R. Anitha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권11호
    • /
    • pp.3182-3203
    • /
    • 2023
  • With the growing adoption of cloud-based technologies, maintaining the privacy and security of cloud data has become a pressing issue. Privacy-preserving encryption schemes are a promising approach for achieving cloud data security, but they require careful design and implementation to be effective. The integrated approach to cloud data security that we suggest in this work uses CogniGate: the orchestrated permissions protocol, index trees, blockchain key management, and unique Opacus encryption. Opacus encryption is a novel homomorphic encryption scheme that enables computation on encrypted data, making it a powerful tool for cloud data security. CogniGate Protocol enables more flexibility and control over access to cloud data by allowing for fine-grained limitations on access depending on user parameters. Index trees provide an efficient data structure for storing and retrieving encrypted data, while blockchain key management ensures the secure and decentralized storage of encryption keys. Performance evaluation focuses on key aspects, including computation cost for the data owner, computation cost for data sharers, the average time cost of index construction, query consumption for data providers, and time cost in key generation. The results highlight that the integrated approach safeguards cloud data while preserving privacy, maintaining usability, and demonstrating high performance. In addition, we explore the role of differential privacy in our integrated approach, showing how it can be used to further enhance privacy protection without compromising performance. We also discuss the key management challenges associated with our approach and propose a novel blockchain-based key management system that leverages smart contracts and consensus mechanisms to ensure the secure and decentralized storage of encryption keys.

동형암호를 활용한 DTC유전자검사 프라이버시모델 (Privacy model for DTC genetic testing using fully homomorphic encryption)

  • 진혜현;강채리;이승현;윤지희;김경진
    • 융합보안논문지
    • /
    • 제24권2호
    • /
    • pp.133-140
    • /
    • 2024
  • 이용자가 직접 유전체 검사를 의뢰하는 DTC(Direct-to-Consumer) 유전자검사가 확산되고 있다. 수요 확대에 따라 인증제도를 통한 비 의료기관에 검사자격을 부여하고, 검사항목을 확대하였다. 그러나 제약이 적은 국외 사례와 달리 국내 제도에서는 여전히 질병 검사항목은 제외한다. 기존의 비식별 방식은 유전체 정보의 고유성과 가족 공유성에도 영향을 미쳐 충분한 활용 가능성을 보장하지 못한다. 따라서 본 연구는 서비스 활성화 및 검사 항목 확대를 위한 방안으로 분석과정에 완전동형암호를 적용하여 유전체 정보의 유용성을 보장하되, 유출 우려를 최소화한다. 또한 정보주체의 자기결정권 보장을 위해 Opt-out을 기반한 프라이버시 보존 모델을 제안한다. 이는 유전체 정보보호와 활용 가능성 유지를 목표로 하며, 이용자의 의사를 반영한 정보의 활용 가능성을 보장한다.

Spring Security와 Apache Shiro의 CSRF 공격 방어 기법 비교 분석 및 검증 (Comparative Analysis and Validation of CSRF Defense Mechanisms in Spring Security and Apache Shiro)

  • 김지오;남궁다연;전상훈
    • 융합보안논문지
    • /
    • 제24권2호
    • /
    • pp.79-87
    • /
    • 2024
  • 본 논문은 웹 애플리케이션의 증가로 인해 소프트웨어 내 보안 취약점을 이용한 사이버 공격이 증가하고 있다. CSRF(Cross-Site Request Forgery) 공격은 특히 웹 사용자와 개발자에게 심각한 위협으로, 사전에 예방해야하는 공격이다. CSRF는 사용자의 동의 없이 비정상적인 요청을 통해 공격을 수행하는 기법으로, 이러한 공격으로부터 웹 애플리케이션을 보호하기 위한 방법은 매우 중요하다. 본 논문에서는 Spring Security와 Apache Shiro 두 프레임워크를 통해 CSRF 방어에 대한 성능을 비교 분석하고 검증하여, 효과적으로 적용 가능한 프레임워크를 제안한다. 실험 결과, 두 프레임워크 모두 CSRF 공격 방어에 성공하였으나, Spring Security는 평균 2.55초로 Apache Shiro의 5.1초보다 더 빠르게 요청을 처리하였다. 이러한 성능 차이는 내부 처리 방식과 최적화 수준의 차이에서 비롯되었으며, 시스템 자원 사용 측면에서는 두 프레임워크 간에 차이가 없었다. 따라서 높은 성능과 효율적인 요청 처리가 요구되는 환경에서는 Spring Security가 더 적합하며, Apache Shiro는 개선이 필요하다. 이 결과는 웹 애플리케이션의 보안 아키텍처 설계 시 중요한 참고 자료로 활용되기를 기대한다.

서비스 제공 기업에 대한 신뢰가 금융 마이데이터 서비스에 전이되는 현상에 관한 연구 (A Research on the Transference of Trust from Service Provider to MyData Banking Service)

  • 금아로;이정훈;여윤아
    • 한국IT서비스학회지
    • /
    • 제23권1호
    • /
    • pp.97-121
    • /
    • 2024
  • As data usage grows in importance, ensuring individual control over personal information becomes critical. The emergence of the 'MyData' concept addresses this, particularly in financial services. Although the institutional and technological framework for financial MyData services is in place, there's a need to establish consumer understanding and perception of its usefulness and safety for successful activation. This study focuses on investigating the impact of trust on the intention to use the new mobile banking service, financial MyData. This study has three objectives. Firstly, to analyze whether trust in financial MyData services and trust in financial MyData service providers affect the intention to use financial MyData services. Secondly, to analyze the process of forming trust in financial MyData services based on the phenomenon of transferring trust in service providers to trust in services. Thirdly, to identify the process by which trust transfer occurs between service providers and financial MyData services. Ultimately, the goal of this study is to promote the intention to use financial MyData services based on the concept of trust and to activate these services. In summary, this study emphasizes the significance of trust in financial MyData services, exploring its impact on user intention and the transfer of trust from providers to services. By promoting consumer trust, the research aims to contribute to the activation of financial MyData services.

탄소배출 저감을 위한 에너지 플랫폼 연구 (A Study on the Energy Platform to Reduce Carbon Emissions)

  • 차범석;문형진;위우진;류갑상
    • 사물인터넷융복합논문지
    • /
    • 제10권2호
    • /
    • pp.43-50
    • /
    • 2024
  • 본 논문에서는 지구온난화 문제를 해결하기 위해 새로운 에너지원을 만드는 것보다 기존 에너지을 효율적으로 활용하는 인공지능 기반의 에너지 플랫폼 시스템을 제안한다. 이를 위해 공공정보 데이터 포털 및 기상청 데이터를 수집하고 분석하여 최근 5년간 에너지 사용량 및 온실가스 배출량 등 전반적인 에너지 데이터를 전력공급자와 사용자에게 제공하여, 사용자 친화적인 인터페이스를 통해 실시간 에너지 정보 제공 및 효율적인 분산전원 시스템을 제공하고자 한다. 또한 기존 에너지 플랫폼의 한계점을 극복하기 위해 강력한 보안 및 개인정보 보호 기능을 제공하고 있다. 구축된 에너지 플랫폼을 통해 전력 공급자와 사용자의 편의성을 향상 시키고, 불필요한 과잉 전력 생산을 방지하여 지구온난화 문제에 기여하고자 한다. 본 논문에서는 시스템의 설계부터 구현까지의 내용을 상세하게 설명하고, 향후 보완 및 개선 방향을 제시한다.