• Title/Summary/Keyword: digital privacy

Search Result 377, Processing Time 0.027 seconds

Key Distribution Protocol and Call Control for Secure ISDN (안전한 종합정보통신망을 위한 키 분배 프로토콜과 호 제어)

  • Jeong, Hyeon-Cheol;Sin, Gi-Su;Lee, Seon-U;Kim, Bong-Han;Kim, Jeom-Gu;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.195-208
    • /
    • 1997
  • ISDN is network which has been developed to integrate and transfer some information(data, video, voice). In the ISDN, security problem that threat and intrusion about important information resource increase because every information is transferred in the form of digital and access of network has patiency. In this paper, for protect important information resource, studied that apply application method and encryption system to ISDN, and system structure, ITU-T Q.931 protocol were analyzed, and proposable encryption key distribution protocol, call control with hybrid encryption system for user information privacy to provide security service.

  • PDF

Fingerprinting Scheme for Contents Protection in Mobile Environment (모바일 환경에서의 콘텐츠 보호를 위한 핑거프린팅 기법)

  • Yong, Seung-Lim;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.167-172
    • /
    • 2008
  • Fingerprinting scheme supports the copyright protection to track redistributors of digital content using cryptographic techniques. Fingerprinting schemes should guarantee buyer's anonymity and asymmetry for their privacy. Most of known fingerprinting schemes adopt public-key cryptosystems to achieve asymmetry and discrete logarithm problem or graph isomorphism problem to achieve anonymity. However, these schemes are not suited in mobile environment because of the drawbacks of requiring high computational complexity. In this paper, we propose an efficient fingerprinting scheme for mobile environment to provide not only asymmetry of the protocol but also transaction anonymity of the buyer. By employing symmetric encryption to encrypt the digital content and adopting agent to perform the protocols, the efficiency of the proposed scheme is improved.

An Empirical Study on the Customer Value Factors Affecting Trust of Mobile Entertainment (모바일 엔터테인먼트의 신뢰에 영향을 미치는 고객가치 요인에 관한 실증적 연구)

  • Lee, Yi-jin;Yum, Chang-sun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.59-71
    • /
    • 2020
  • The purpose of this study is to analyze the relationship between customer value and trust and the effect of trust on loyalty in the field of mobile entertainment. As smartphone use becomes more popular, the mobile business is growing rapidly. In particular, the mobile entertainment industry, such as mobile games and mobile video, is growing faster. This study was based on the main survey had conducted from 25th September 2019 to 7th October 2019 by 300 users who had experienced mobile entertainment applications in the past. Statistical analysis was performed by using the IBM SPSS v.22.0. The analysis results are as follows. First, the utility and quality of utilitarian value, enjoyment and aesthetics of hedonic value, and status enhancing of social value have significantly positive influence on trust. Second, privacy risk of social value have significantly negative influence on trust. Finally, trust has significantly positive influence on loyalty. Based on the results, we discussed the implications for the successful operation of mobile entertainment.

Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare (유헬스케어의 무선환경에 적합한 WiMAX 보안 측정 및 분석)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.279-284
    • /
    • 2013
  • Wireless access network section needs strong security which supports high data rate and mobility not to invade patient's privacy by exposing patient's sensitive biometric from automatic implantable device that is adapted to u-healthcare service. This paper builds test bed and performs assessment and measurement of security ability of WiMAX network to transmit and receive mobile patient's biometric by building WiMAX network in wireless access network not to expose paitne's biometirc at wireless access network section to the third person. Specially, this paper compares and assesses data security, MAC control message security, handover conection delay, and frame loss and bandwidth of ECDH at the layer of WiMAX security compliance, WiMAX MAC IPSec, and MAC.

Folksonomy-based Personalized Web Search System (폭소노미 기반 개인화 웹 검색 시스템)

  • Kim, Dong-Wook;Kang, Soo-Yong;Kim, Han-Joon;Lee, Byung-Jeong
    • Journal of Digital Contents Society
    • /
    • v.11 no.1
    • /
    • pp.105-115
    • /
    • 2010
  • Search engines provide web documents that are related to user's query. However, using only the query terms that user provided, it is hard for search engines to know user's exact intention and provide the very matching web documents. To remedy this problem, search systems are needed to exploit personalized search technologies. In this paper, we propose not only a novel personalized query recommendation scheme based on folksonomy but also a new personalized search service architecture which reduces the risk of privacy violation while enabling search service providers to provide other various personalized services such as personalized advertisement.

A Study on the Protection of User Data in the Cloud System (클라우드 시스템에서의 사용자 데이터 보호에 관한 연구)

  • Lee, Ae-Ri;Cho, Do-Eun;Lee, Jae-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.389-394
    • /
    • 2012
  • The cloud computing is a system that provides IT resources service by using internet technologies, which grabs lots of attention today. Though cloud storage services provide service users with convenience, there is a problem in which data confidentiality is not guaranteed because it is hard for data owners to control the access to the data. This article suggested the technique by applying Public-Key Cryptosystem only to a block after dividing users' data into blocks in order to protect users' data in cloud system. Thus confidentiality and integrity are given to users' data stored in cloud storage server.

Use of Drones in the cultural industries (드론의 문화산업분야 활용방안에 관한 연구)

  • Yoon, Hongkeun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.99-112
    • /
    • 2015
  • Drones are more formally known as unmanned aerial vehicles without a human pilot aboard. Its flight is controlled either autonomously by onboard computers or by the remote control of a pilot on the ground. This research aims to analyze market trends and technological developments of drones, use cases and constraints of drones in the cultural industries take advantage of the possibility of future drones. Drones are looking for broadcasting, movie, theater, games, toys drones and racing games in a variety of cultural industry. The biggest problem of drone shall provide penalties for breaches of privacy and security issues in the debate. Drones performances are required such as battery capacity and compactness because of the technical limitations. The drones are expected to be used in various fields such as journalism drone, performance tools, augmented reality games, kidult culture. The drones can create a new cultural industry market such as the combination of robotics and drone journalism, drone crowded theater, utilizing drones character games, racing games etc. In conclusion, drones help reduce manpower, time and costs dramatically and will contribute to creating added value in the cultural industries.

A Design of Inter-Working System between Secure Coding Tools and Web Shell Detection Tools for Secure Web Server Environments (안전한 웹 서버 환경을 위한 시큐어코딩 도구, 웹쉘 탐지도구 간의 상호연동 시스템 설계)

  • Kim, Bumryong;Choi, Keunchang;Kim, Joonho;Suk, Sangkee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.81-87
    • /
    • 2015
  • Recently, with the development of the ICT environment, the use of the software is growing rapidly. And the number of the web server software used with a variety of users is also growing. However, There are also various damage cases increased due to a software security vulnerability as software usage is increasing. Especially web shell hacking which abuses software vulnerabilities accounts for a very high percentage. These web server environment damage can induce primary damage such like homepage modification for malware spreading and secondary damage such like privacy. Source code weaknesses checking system is needed during software development stage and operation stage in real-time to prevent software vulnerabilities. Also the system which can detect and determine web shell from checked code in real time is needed. Therefore, in this paper, we propose the system improving security for web server by detecting web shell attacks which are invisible to existing detection method such as Firewall, IDS/IPS, Web Firewall, Anti-Virus, etc. while satisfying existing secure coding guidelines from development stage to operation stage.

A Designing Method of Performance Evaluation for Network Security Equipment of Korean Style (한국형 네트워크 보안 시스템 성능 평가 방법론 실계)

  • Ju, Seung Hwan;Seo, Hee Suk;Kim, Sang Youn
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.97-105
    • /
    • 2011
  • With the advancement of network, privacy information as well as confidential information that belongs to government and company are exposed to security incident like spreading viruses or DDoS attack. To prevent these security incident and protect information that belongs to government and company, Security system has developed such as antivirus, firewall, IPS, VPN, and other network security system. Network security systems should be selected based on purpose, usage and cost. Verification for network security product's basic features performed in a variety of ways at home and abroad, but consumers who buy these network security product, just rely on the information presented at companies. Therefore, common user doing self performance evaluation for perform Verification before buying network security product but these verification depends on inaccurate data which based on some user's criteria. On this paper, we designing methodology of network security system performance evaluation focused on Korean using other cases of performance evaluation.

A Study on Library Furniture to support Communication Channel (커뮤니케이션을 지원하는 도서관가구에 관한 연구)

  • Cheon, Hye-Sun;Lee, Jeong-Mi;Lim, Che-Zinn
    • Korean Institute of Interior Design Journal
    • /
    • v.18 no.3
    • /
    • pp.57-65
    • /
    • 2009
  • Library is a communication channel between book and human. Specially public library furniture plays an important role from every aspect in information materials and users, among users and in relationship between library managers and users. This study defined library furniture as a communication channel which connects library materials and users and was based on 35 local libraries and 12 overseas libraries. The author studied major elements and characteristics which constitute communication types among storage furniture, furniture in reading areas and furniture in digital reading area. The followings are the results from the study. First, storage furniture should be designed by reflecting characteristics of library materials and for effective delivering to the users. Therefore utmost communication can be made by searching for various designs in book-shelves and effective manner of display. Secondly, furniture in reading areas should support various users' needs from customized browsing to long hour studying and there should be properly supported for private space and correspondent reading postures. The third, there are needs for design conditions to support privacy and for comfort from long hour reading and mobility out of posture change in digital reading areas. The fourth, there should be ergonomically designed furniture plan and surroundings in public library which can boost various reading postures. Also furniture plan should be done by considering users' bodies and eyes orientations which can result in improved power of concentration.