• Title/Summary/Keyword: attribute data

Search Result 1,252, Processing Time 0.032 seconds

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.

Sensitivity analysis of reliability estimation methods for attribute data to sample size and sampling points of time (계수형 데이터에 대한 신뢰도 추정방법의 샘플 수와 샘플링 시점 수에 따른 민감도 분석)

  • Son, Young-Kap;Ryu, Jang-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.581-587
    • /
    • 2011
  • Reliability estimation methods using attribute data are widely used in reliability evaluation of various systems such as nuclear energy plants, food and drug, and space launch vehicles. This paper shows sensitivity analysis and comparison results of reliability estimation methods including a parametric estimation method in open literature with respect to both sample size and sampling points of time. And ways to improve accuracy of each reliability estimation method were proposed from the sensitivity analysis results.

Intrusion Detection using Attribute Subset Selector Bagging (ASUB) to Handle Imbalance and Noise

  • Priya, A.Sagaya;Kumar, S.Britto Ramesh
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.97-102
    • /
    • 2022
  • Network intrusion detection is becoming an increasing necessity for both organizations and individuals alike. Detecting intrusions is one of the major components that aims to prevent information compromise. Automated systems have been put to use due to the voluminous nature of the domain. The major challenge for automated models is the noise and data imbalance components contained in the network transactions. This work proposes an ensemble model, Attribute Subset Selector Bagging (ASUB) that can be used to effectively handle noise and data imbalance. The proposed model performs attribute subset based bag creation, leading to reduction of the influence of the noise factor. The constructed bagging model is heterogeneous in nature, hence leading to effective imbalance handling. Experiments were conducted on the standard intrusion detection datasets KDD CUP 99, Koyoto 2006 and NSL KDD. Results show effective performances, showing the high performance of the model.

A Study on the Effective Construction and Use of Cadastral Information Database (지적정보데이터베이스의 효율적 구축과 활용에 관한 연구)

  • Kang, Joon-Mook;Lee, Hyung-Seok
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.8 no.2 s.16
    • /
    • pp.71-78
    • /
    • 2000
  • In these days, the attributes data recorded in computerization of cadastral maps is just written in its own format, not considered the relation with graphic data. Therefore, digital information linked attribute data to graphic data is necessary to be performed as fundamental data of graphic information and analysis of various spatial information. This study is to present the possibility of GIS application by constructing cadastral information related to graphic and attribute Information based on the cadastral map. Attribute information was constructed as a relational database form using data modeling and entity-relationship diagram. Thus, this study is expected to be used as a fundamental data for various public planning and design including the effective management of cadastral information and building parcel based land information system by presenting various spatial analysis and application methods.

  • PDF

The study related to the meta data for the attribute mapping from IFC to CityGML (IFC에서 CityGML로 속성 맵핑을 위한 메타 데이터에 관한 연구)

  • Kang, Tae Wook;Choi, Hyun Sang;Hwang, Jung Rae;Hong, Chang Hee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.6_1
    • /
    • pp.559-565
    • /
    • 2012
  • The purpose of the present study is to suggest the meta data of the attribute mapping for interoperability from IFC to CityGML. For this, we analyzed the interoperability issue including the neutral information model structure such as IFC, CityGML. To solve the interoperability problem between IFC and CityGML model which is the neutral GIS format, We proposed the meta data including the mapping rule. The meta data is consists of the connection information between BIM and GIS model, the mapping rule based on the perspective of the use-case, the operator and the attribute. By using this, XML to represent the meta data is defined and the information mapping system is developed.

Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 프록시 재암호화 기반의 데이터 관리 방식)

  • Song, You-Jin;Do, Jeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.288-299
    • /
    • 2012
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.

Assessing Tourists' Restaurant Preferences within Tourism Area (관광 지역 음식점에 대한 관광객들의 선호도 평가)

  • Kang, Jong-Heon;Jeong, Hang-Jin
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.18 no.2
    • /
    • pp.165-171
    • /
    • 2008
  • The purpose of this study was to measure tourists' preference for alternative restaurants with different combinations of attribute levels: grown area logo, origin description, traditional food, fusion food, national food, and price. A total of 210 questionnaires were completed. A conjoint experimental method was used to develop hypothetical restaurants, and an ordinal probit model was used to measure the effects of the attribute levels on tourists' preference. The ordinal probit model analysis results for the data indicated an excellent model fit. The effects of the attribute levels on tourists' preferences were statistically significant. As expected, estimates of the marginal willingness to pay were statistically significant Moreover, the tourists were more willing to pay for grown area logo as compared to the other attribute levels. The tourists also considered the grown area logo as a very important attribute. Withe regard to developing and testing conjoint models in the design of choice experiments involving multifactor alternatives, this study may approach a deeper understanding of the conjoint experiment. Greater understanding of the conjoint experiment can improve the managerial diagnoses of the problems as well as the opportunities for different marketing strategies including local branding programs and menu development and marketing communications.

  • PDF

The Brand Image and the Benefit of 20s Female Apparel Market(Part III) (20대 여성정장의류의 편익과 상표이미지에 관한 연구(제3보) -속성.편익.태도에 의한 상표이미지 개념체계 연구-)

  • 박혜원;임숙자
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.24 no.8
    • /
    • pp.1197-1208
    • /
    • 2000
  • The purpose of this study was to find out the effects of the accord between consumers benefit factors and attribute factors of brand image on brand attitude. This study was based on Kellers conceptualizing model of brand image. The subjects were 605 working women in their twenties living in Seoul, Korea. The data were analyzed by Euclidian distance model, ANOVA of repeated measures, regression, F-test by Extra Sum of Squares Principle. The results were as follows. 1. There were significant differences among the brands and among the segmented groups in the accord between benefit factors and attribute factors of brand image and in the brand preference. Moreover there were significant interactions between the brands and the segmented groups in the accord between benefit factors and attribute factors of brand image and in the brand preference. 2. There were significant effects of the accord between benefit factors and attribute factor of brand image on brand attitude. 3. There were significantly different effects of the accord between benefit factors and attribute factors of brand image on brand attitude among the segmented groups.

  • PDF

An Analysis of Consumer Preferences for Internet Medical Information Service in China Using the Multi-Attribute Utility Theory (다속성 효용이론을 활용한 중국시장에서의 인터넷 의료정보 서비스 선호속성 분석)

  • Kim, Kyoung-Hwan;Chang, Young-Il
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.93-107
    • /
    • 2009
  • This study investigated consumer preferences for Internet medical information service in China using the multi-attribute utility theory. The multi-attribute utility theory is a compositional approach for modeling consumer preferences wherein researchers calculate the overall service utility by summing up the evaluation results for each attribute. We found that Chinese Internet medical information users consider the availability of information and quick response to be the most important attributes. Further, they think that the comment feature is less important as compared to other attributes such as costs and updates. In addition, we found that the Internet users having more Internet experience consider these attributes to be more important as compared to the people who are just beginning to surf the Internet. For any successful Internet business, Internet marketers should assess individual-level preference and accordingly organize a fresh campaign. As of now, Internet marketers need estimation methods to predict the market performance of new services in many different business environments. We believe that the multi-attribute utility theory is a useful approach in this regard.

  • PDF

A Study on the Analysis of Stmartphone's Functional Attribute (스마트폰의 기능적 속성의 분석에 관한 연구)

  • Chung, Soon-Suk;Kim, Kwang-Soo
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.3
    • /
    • pp.283-289
    • /
    • 2012
  • In the future, smartphone convergences are not only based on the on/offline integration, but also with the integration between mobile communications and broadcasts. Therefore, there is a need to search for new direction of mobile device that enables variety user applications that are different from the existing size and application issue. The aim of this research is to improve user interface of smartphone's functional attribute. We study on the analysis of smartphone's functional attribute by AHP. The survey results in this paper showed that the most preferable attribute of smartphone among the 8 was the wireless internet 25.3%, followed by messaging 20% and application 19.8%, which totaled to 62.5%. But the samples used were mostly limited to those aged 20 through 30. So the results are not considered as a representative preference of all smartphone users, and should be considered otherwise before materializing them to a product. Therefore, for the more liable results the further research should be conducted to gather data from a variety of users of all ages, and the functional attribute should be analysed through QFD.