• Title/Summary/Keyword: data policy

Search Result 11,300, Processing Time 0.036 seconds

Global Building Market Assessment through 2019 Global Insight Analysis (Focusing on architecture) (2019년 글로벌 인사이트 분석을 통한 글로벌 건설시장 평가(건축분야))

  • Han, Jae Goo;Park, Hwan-Pyo
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2020.06a
    • /
    • pp.212-213
    • /
    • 2020
  • In this study, the market growth potential for the construction sector and the company's ease of entry were analyzed by using construction scale and risk data among global insight data. The survey was conducted in 74 countries. The purpose is to provide basic data whose result can be used as policy-based data for the overseas construction industry.

  • PDF

Oil consumption and economic growth: A panel data analysis

  • Lim, Kyoung-Min;Lim, Seul-Ye;Yoo, Seung-Hoon
    • Journal of Energy Engineering
    • /
    • v.23 no.3
    • /
    • pp.66-71
    • /
    • 2014
  • Oil is obviously vital for economic growth and industry development. This paper attempts to explore whether or not there is a inverted-U relationship between oil consumption and economic growth. To this end, we employ a panel data analysis with fixed effect or random effect models using the set of data from 61 countries for the year 1990-2008. In conclusion, a statistically significant inverted-U relationship between per capita consumption of oil and per capita GDP is found. However, the level of per capita GDP at the peak point of per capita oil consumption is estimated to be 65,072 in 2005 international constant dollars, which is much larger than economic scales of sampled countries. Thus, as per capita GDP grows, per capita oil consumption is predicted to increase until eventually reaching the peak.

Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel

  • Wang, Jianhua;Zhao, Zhiyuan;Sun, Lei;Zhu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2718-2731
    • /
    • 2019
  • Conjunctive keyword search encryption is an important technique for protecting sensitive data that is outsourced to cloud servers. However, the process of searching outsourced data may facilitate the leakage of sensitive data. Thus, an efficient data search approach with high security is critical. To solve this problem, an efficient conjunctive keyword search scheme based on ciphertext-policy attribute-based encryption is proposed for cloud storage environment. This paper proposes an efficient mechanism for removing the secure channel and resisting off-line keyword-guessing attacks. The storage overhead and the computational complexity are regardless of the number of keywords. This scheme is proved adaptively secure based on the decisional bilinear Diffie-Hellman assumption in the standard model. Finally, the results of theoretical analysis and experimental simulation show that the proposed scheme has advantages in security, storage overhead and efficiency, and it is more suitable for practical applications.

Research Trends on Literature Reviews in Scopus Journals by Authors from Indonesia, Japan, South Korea, Vietnam, Singapore, and Malaysia: A Bibliometric Analysis from 2003 to 2022

  • Prakoso Bhairawa Putera;Amelya Gustina
    • Asian Journal of Innovation and Policy
    • /
    • v.12 no.3
    • /
    • pp.304-322
    • /
    • 2023
  • Text data mining ('big data methods') is one of the most widely used approaches during the COVID-19 pandemic. In particular, text data mining on Scopus databases or Web of Science (WoS). Text data mining is widely used to collect literature for later bibliometric analysis, and in the end, it becomes a literature review article. Therefore, in this article, we reveal the trend of publication of literature reviews in Scopus journals from Indonesia, Japan, South Korea, Vietnam, Singapore, and Malaysia. This article describes two essential parts, namely 1) a comparison of international publication trends and subject area of literature review publications, and 2) a comparison of Top 5 for Authors, Affiliation, Source Title, and Collaboration Country.

Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system (유닉스 시스템에서 다양한 접근제어 정책을 이용한 커널 수준의 자동 암호화 기법)

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.387-396
    • /
    • 2003
  • Many studies have been done on secure kernel and encryption filesystem for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policy like ACL, MAC, RBAC and so on, but cannot protect user or system data from stealing backup media or disk itself. In addition to access control policy, there are many studies on encryption filesystem that encrypt file data within system level. However few studies have been done on combining access control policy and encryption filesystem. In this paper we proposed a new encryption filesystem that provides a transparency to the user by integrating encryption service into virtual filesystem layer within secure kernel that has various access control policies. Proposed encryption filesystem can provide a simple encryption key management architecture by using encryption keys based on classes of MAC policy and overcome a limit of physical data security of access control policy for stealing.

A Study on Security Threat Elements Analysis and Security Architecture in Satellite Communication Network (위성 통신망 보안 위협요소 분석 및 보안망 구조에 관한 연구)

  • 손태식;최홍민;채송화;서정택;유승화;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.15-31
    • /
    • 2001
  • In this paper we classify security threat elements of satellite communication into four parts; Level-0(satellite propagation signal), Level-1(satellite control data), Level-2(satellite application data) and ground network security level according to the personality and data of the satellite communication network. And we analyze each security levels. Using analyzed security threat elements, we divide security requirements into signal security level and information security level separately. And then above the existent signal security level countermeasure, we establish the countermeasure on the basis of information security policy such as satellite network security policy, satellite system security policy and satellite data security policy in information security level. In this paper we propose secure satellite communication network through the countermeasure based on information security policy.

A Study on Location Analysis of Public Sports Facilities Using Big Data Analysis of Local Currency Consumption Activity Space - Focusing on Municipal Sports Facilities in Seo-Gu, Incheon (지역화폐 소비활동공간 빅데이터 분석을 이용한 공공체육시설 입지분석에 관한 연구 - 인천광역시 서구 구립체육시설을 중심으로 -)

  • Kim, Namghi
    • Journal of Urban Science
    • /
    • v.12 no.1
    • /
    • pp.35-48
    • /
    • 2023
  • Recently increasing in marketing or policy decision is the trend of reflecting big data, which, however, has yet to be used directly for the location analysis of public facilities in terms of urban planning. This study examined how the local currency big data, issued often recently by municipalities throughout the country, can be used for the decision-making to select the location of public facilities more rationally. It is such an interesting attempt to acquire the big data of local currency payments by local residents and directly apply it to analyzing the location analysis of public facilities they use. The big data of local currencies which are issued by most municipalities now in Korea will continue to extend its role as the public data. Relatively easily available for municipalities with low cost, it is expected to be used for various policy decisions in future. Although the analysis of big data can make more accurate results than conventional survey methods, however, local residents' participation should not be scaled down in policy decisions. Rather, they should be given the findings of this kind of scientific survey so as to extend the citizen-participatory decision-making model.

A Study of Geostationary Atmospheric Environmental Monitoring Satellite Data Management Policies (정지궤도 대기환경 관측 위성 자료 관리 정책 방안 연구)

  • Choi, Won Jun;Eun, Jong Won
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.4
    • /
    • pp.10-14
    • /
    • 2016
  • Korean satellite development projects were divided military objectives such as national security, and commercial communication satellites. The First geostationary Korean earth observation satellite, GeoKOMPSAT is a turning point to concern another way to utilizing satellite. In the past, the main concern was the sharp ground images, now days, it is more important to make high added value from satellite data. In particular, environmental payload, GEMS mounted on the satellite GeoKOMPSAT-2 will monitor air quality which is not observed by visual material, may be referred to as case by utilizing the satellite. Satellite data utilization is likely to receive a great influence on the appropriate public policy data. If the public is expected to be fully revealed that potential demand. It is time to change the management policy on the security aspects of weak satellite data. Depending on the expanding use of satellites, it is necessary to investigate the status of disclosing satellite data, and suggests policy options for the distribution of materials for the environment satellite characteristics.