• 제목/요약/키워드: privacy issues

검색결과 416건 처리시간 0.021초

클라우드 컴퓨팅 - 가상 네트워크 관련 문제 (Cloud Computing -Virtual Network Related Issues)

  • 모하마드 아 잠;밤복흥;아이만 압둘라 알사파르;알 아 민호 새 인;이슬람;허의남
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2013년도 춘계학술발표대회
    • /
    • pp.507-510
    • /
    • 2013
  • Cloud computing is an emerging technology, which allows the user to fulfill his needs by outsourcing the resources. With the passage of time, cloud computing has become an essential part of our lives. But it still requires some sort of standardization, specially in terms of user's trust, privacy, and security related things. This study presents different types of cloud computing services and their working domains along with some key virtualization related issues that are encountered by the cloud service provider as well as the user. Those key issues, related with virtual network are discussed in this paper. This study provides a basis to work further on those issues, so that the key concerns are addressed as soon as possible and cloud computing could become standardized and more prevalent.

Filtered Randomized Response Technique

  • Choi, Kyoung-Ho
    • Communications for Statistical Applications and Methods
    • /
    • 제13권2호
    • /
    • pp.319-326
    • /
    • 2006
  • Randomized response technique is a survey technique for eliminating evasive answer bias. This technique is popular in social survey for sensitive issues. In this paper we present a simple and obvious procedure for estimating the population proportion of a sensitive group. Here, we shows the weak point in the method of Kim and Warde (2005). Also, it is found that the proposed procedure is more efficient than the ones of Warner (1965) and Kim and Warde (2005). Lastly we discuss the conditions that the suggested method will be more efficienct.

정보관리와 관련된 법적문제 (Legal Issues In Information Management)

  • 이순자
    • 한국문헌정보학회지
    • /
    • 제19권
    • /
    • pp.23-61
    • /
    • 1990
  • Libraries and information centers are no different from any other institutions in our society. Today, their managers have to make many more decisions which have certain legal implications than before. The ignorance of the law on their parts can not be an acceptable excuse anymore, since. the consequences sometimes maybe quite serious. This paper outlines some important legal issues involved in the services and management of libraries and information centers. They are: constitutional rights on human knowledge activities: library act and it's related laws; censorship and right to know; information access and the protection of privacy: library services and copyright law; labor relations; protections of the people and properties of the institutions, etc. The laws are not static: rather, they change with the social, political and technological environments. The managers, as well as the staff members of libraries and information centers should be constantly updated with the changes in the field, in order to give the maximum service to the clients and to prevent any infringement of the laws, which may discredit their services and the institutions.

  • PDF

무선 네트워크망의 정보보호를 위한 시스템 설계 (Security Design of Information Security for Wireless Local Area Network)

  • Kim, Jung-Tae;Jung, Sung-Min
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2003년도 춘계종합학술대회
    • /
    • pp.729-732
    • /
    • 2003
  • 무선 통신망의 데이터를 보호하기 위한 암호화의 방법 및 비밀 통신을 위한 인중 메카니즘에 대한 방법을 제안하였다. 무선 통신망의 경우 기존의 유선망에 비해, 설치, 이동성 등이 우수하여 많은 기술적인 발전을 보이고 있다. 따라서 이에 대한 데이터의 보호에 대한 관심이 고조되고 있다. 본 논문에서는 가정, 사무실, 건물과 같은 전형적인 외부 환경에 대해 정보를 보호할 수 있는 시스템의 구조를 설계하여 제안하였다.

  • PDF

Study on the current direction of our country in accordance with the basic conditions for the commercialization of the UAV

  • Jo, Jong Deok;Lee, Chang Hee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권4호
    • /
    • pp.58-62
    • /
    • 2016
  • Shipping related services is attracting attention as a UAV (Unmanned Aerial Vehicle) application with the recent economy has been generally accepted drones. UAV of the existing military-driven logistics delivery, aerial photography, wireless Internet connection, broadcasting, disaster research, digital maps, transportation, advertising, meteorological, border surveillance, agricultural use, such as hobbies range of uses from up military are diverse and growing. The advantage of delivery drones seems to be an important feature of delivery of the goods, including labor-saving, long-distance transportation in cold weather. UAV is demanded by competitive performance development for commercialization. Privacy issues that may arise during the drone operation, ensuring marketability issues, control system, regulations, operational standards and specifications, etc. should be addressed. Development direction of Korea UAV based in current technology, regulation, and growth potential presented by deriving from the idea of 'GIF 2016 Gang-won Hackathon.

Authorization Model with Provisions and Obligations in XML

  • Kim Suhee;Park Jongjin
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 ICEIC The International Conference on Electronics Informations and Communications
    • /
    • pp.355-360
    • /
    • 2004
  • With the growing acceptance of XML technologies, XML will be the most common tool for all data manipulation and data transmission. Meeting security requirements for privacy, confidentiality and integrity is essential in order to move business online and it is important for security to be integrated with XML solutions. Many policies require certain conditions to be satisfied and actions to be performed before or after a decision is made. Binary yes/no decision to an access request is not enough for many applications. These issues were addressed and formalized as provisions and obligations by Betti et Al. In this paper, we propose an authorization model with provisions and obligations in XML. We introduce a formal definition of authorization policy and the issues involving obligation discussed by Betti et Al. We use the formal model as a basis to develop an authorization model in XML. We develop DTDs in XML for main components such as authorization request, authorization policy and authorization decision. We plan to develop an authorization system using the model proposed.

  • PDF

컴퓨터 윤리에 관한 연구 (Computer Ethics in Computer Education)

  • 주영주;이광희
    • 정보교육학회논문지
    • /
    • 제1권2호
    • /
    • pp.84-100
    • /
    • 1997
  • All technology has both intended and unintended effects, we have said, and information technology is no exception. Information technology offers a number of challenges: those of computer education, computer literacy, the ethical and societal impacts of computing and communication systems. Current computer education focuses primarily on the history, parts and usage of a computer, and programming, it does not fully include the moral standards or ethics that help guide behavior and conduct for citizens of Information society. The purpose of this study is to review of the theoretical issues and societal impacts of computers, communication systems and computer ethics; then, to nalyse current curriculum and content of school computer education in Korea: finally, to develop a possible course in computer ethics containing a goal statement and aspects of computer literacy. Contents in computer ethics covers issues of nettiquette, privacy, health, copyright-related software and network piracy, computer crime and viruses. Six suggestions are made for the computer ethics of Information Age in the conclusion.

  • PDF

초연결 지능화 인프라 보안기술 동향 -5G 시대의 이동통신 보안 중심 (Mobile Network Issues regarding 5G Security)

  • 박종근;김종현;김익균;진승헌
    • 전자통신동향분석
    • /
    • 제34권1호
    • /
    • pp.36-48
    • /
    • 2019
  • Recently, competition among global mobile operators has focused on the commercialization of 5G for the first time. Apart from protecting the privacy of subscribers and the confidentiality and integrity of communication, protecting the network against various cyber attacks is also important to ensure that high-quality mobile services operate safely. In this study, we examine the security vulnerabilities with respect to mobile communication environments using previous and current LTEs. We also investigate whether existing vulnerabilities can be effectively protected and identify security issues that need to be considered in the approaching 5G environment.

초저전력 엣지 지능형반도체 기술 동향 (Trends in Ultra Low Power Intelligent Edge Semiconductor Technology)

  • 오광일;김성은;배영환;박성모;이재진;강성원
    • 전자통신동향분석
    • /
    • 제33권6호
    • /
    • pp.24-33
    • /
    • 2018
  • In the age of IoT, in which everything is connected to a network, there have been increases in the amount of data traffic, latency, and the risk of personal privacy breaches that conventional cloud computing technology cannot cope with. The idea of edge computing has emerged as a solution to these issues, and furthermore, the concept of ultra-low power edge intelligent semiconductors in which the IoT device itself performs intelligent decisions and processes data has been established. The key elements of this function are an intelligent semiconductor based on artificial intelligence, connectivity for the efficient connection of neurons and synapses, and a large-scale spiking neural network simulation framework for the performance prediction of a neural network. This paper covers the current trends in ultra-low power edge intelligent semiconductors including issues regarding their technology and application.

VANET 프라이버시 보장 아키텍처 설계 (VANET Privacy Assurance Architecture Design)

  • 박수민;홍만표;손태식;곽진
    • 인터넷정보학회논문지
    • /
    • 제17권6호
    • /
    • pp.81-91
    • /
    • 2016
  • VANET은 무선통신 기술을 이용하여 차량과 차량, 차량과 인프라와의 통신을 제공하는 네트워크 환경으로 자동차의 속도, 위치, 교통정보 등과 같은 데이터를 공유하여 차량 안전 주행 확보 및 교통 체증 등의 문제점을 해결할 수 있는 차세대 ITS 구현의 핵심기술이다. 이처럼 VANET 환경을 통해 운전자의 안전성 증진과 효율성 및 이동성을 향상시킬 수 있지만, 끊임없이 차량 간 또는 차량과 인프라 간의 주고받는 데이터에는 차량 식별 정보 및 위치 정보 등의 프라이버시 정보가 포함되어 있어 프라이버시 보장을 위한 대책이 필요한 실정이다. 만약 VANET 환경에서 프라이버시 보장 방안이 제공되지 않는다면 식별 개인정보가 피해 받을 뿐만 아니라 개인의 위치 추적이 가능하여 공격자로부터 표적이 될 수 있으며, 정보의 오류 및 왜곡 등을 유발하여 생명과 재산에도 큰 피해를 안겨 줄 수 있다. 또한, 통신 환경에서의 도청을 통한 프라이버시 정보 노출 및 공격자의 악의적인 위장 공격을 통한 정보 갈취 등의 위협도 받을 수 있다. 따라서 본 논문에서는 이와 같은 위협으로부터 프라이버시를 보장하기 위해 VANET 프라이버시 보장 아키텍처를 제안한다.