• Title/Summary/Keyword: security enhance

Search Result 799, Processing Time 0.027 seconds

Dynamic Multi-Proxy Signature Schemes based on Secret Sharing and Diffie-bellman Problem (비밀분산법과 Diffie-Hellman 문제에 기반한 동적 멀티 대리서명 프로토콜)

  • 박소영;이상호
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.8
    • /
    • pp.465-472
    • /
    • 2004
  • Proxy signatures is a signature scheme that an original signer delegates one's signature capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. Delegation of authority is a common practice in the real world, in particular, it happens naturally in hierarchical groups such as company, bank and army, etc. In this paper, we propose a new dynamic multi-proxy signature scheme allowing repetitive delegations in a hierarchical group. We adopt multi-proxy signatures to enhance the security of proxy signature. In multi-proxy signatures, plural proxy signers can generate a valid proxy signature collectively on behalf of one original signer. In our scheme, the proxy group is not fixed but constructed dynamically according to some situations. Delegations are processed from higher level to lower level in the hierarchy using delegation tickets. When the original signer wants to delegate one's signature authority, the original signer generates a delegation ticket based on secret sharing and Diffie-Hellman problems. The delegation ticket is shared among proxy signers and then all the proxy signers can generate a valid proxy signature collectively by reconstructing the original signer's delegation ticket. If a certain proxy signer can not attend the proxy signature generating protocol, the proxy signer can also delegate repetitively his partial signature authority to the lower level participants, and then the proxies are constructed dynamically.

A Study on the Development of Standard Profiles Management System which supports the Technical Reference Model for Information Technology Architecture (정보기술 아키텍처를 위한 기술참조모델을 지원하는 표준프로파일 관리시스템 개발에 관한 연구)

  • Yang, Jin-Hyeok;Kim, Yeong-Do;Jeong, Hui-Jun;Yang, Jin-Yeong;Yu, Myeong-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.665-672
    • /
    • 2001
  • ITA (Information Technology Architecture) satisfies the requirements of information system, supports the information used in the institution's business to guarantee the interoperability and security, and analyzes the components of information system. ITA consists of EA (Enterprise Architecture), TRM (Technical Reference Manual) and SP (Standard Profile). The SP, one of the major components of ITA, is a set of information technology standards. In this paper, to construct and utilize the ITA, we mention the applications of information technology about the SP system implementation based on the TRM. The SP management system implemented in this paper is the first trial in Korea, and designs the software with object oriented programming languages such as JSP and Java. Moreover the basic and detailed specification based on the UML notation, system design using the component and system design pattern consisting of software architectures enhance the software reusability. And the constructed system in this paper shows less maintenance cost by using the public softwares such as Linux system, Korean DBMS, Apache and Tomcat, etc. Finally, the system includes the SP reference system which is used in the other institutions and cannot be found in other institutions. Also it includes the additional diverse service modules which support the subsequent processing for the establishment and revision of standards via internet.

  • PDF

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

Part-time Work in Sweden: The Coexistence in Tension of Flexibility and Gender Equality (스웨덴의 시간제근로: 유연성과 성평등의 긴장 속 공존)

  • Kim, Young-Mi
    • Korean Journal of Labor Studies
    • /
    • v.17 no.1
    • /
    • pp.297-323
    • /
    • 2011
  • Part-time jobs in Sweden are highly feminized yet are in fair conditions in terms of job security, earnings, and collective representation. Three points are considered to be important to understand why part-time work in Sweden carries such positive characteristics. First, the part-time work in Sweden is widely spread not as a result of employers' need for labor flexibilization but as means to enhance the work-life balance, a value pursued within a broader social policy package to change the breadwinner model. Second, discrimination against part-time workers is restrained in Sweden because the boundary between part-time and full-time is not conspicuous. Most of part-time jobs are occupied by regular workers who exert the right to part-time work, hence may go back to the full-time status any time. Third, the regulation on overtime work of part-time workers as well as full-time workers is strong. It is largely agreed among researchers that part-time work contributed greatly to an increase of female employment rate in Sweden. Since the 1970s, the increased availability of part-time jobs induced married women who used to be economically inactive to the labor market and maintained them to be economically active throughout the child rearing period. From the gender perspective, one may still raise issues regarding part-time work in Sweden such as persistent feminization and strong occupational sex segregation. However, the observed trend shows that the part-time work in Sweden has functioned more as a stepping stone to the full-time work for women than as a women's trap.

Five-stage Anger Model Approach to Narrative and Protagonist's Revolt Action Mechanism in the Movie, "The Man Standing Next" ('분노의 5단계 모델'관점의 영화 <남산의 부장들> 서사와 주인공의 거사 결행 기제)

  • Kim, Jeong-Seob
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.3
    • /
    • pp.285-294
    • /
    • 2020
  • "The Man Standing Next" was a 'anger-character movie' that shows a fierce psychological game between the characters. Inspired by this point, it was analyzed the narrative structure of this film based on scene unit applying the 'Five-stage Anger Model' formulated by Lakoff and Kövecses and others. The results showed that the causality and feasibility of the protagonist's anger behavior were highly reflected above the model. In particular, among the five steps, the film-maker spent the longest time on 'anger control' justifying the hero's motivation for punishment or retaliation, while giving the shortest time to 'loss of control' to maximize the urgentness of the punitive actions. The detonator causing his anger at each stage was disposed two to six times each stage with neglect, contempt, arrogance, ostentation, mockery, unauthorized intervention, etc. Sneering of "Chief Security Officer" and insulting of "The President" make the protagonist feel the scorn of a terrible friend-murderer each functioned as a "rage trigger." In conclusion, the film follows the above sophisticated model in its narrative structure. Though it was a political drama that sets up a lot of anger scheme caused from public reasons, it reflects ordinary people's routine anger, which corresponds to 24 percent of the list of Nobaco's Provocation Inventory (PI). The producers elaborately reflected the anger procedure theory and balanced the public and private drivers of rage. It was considered to be derived from the intention to enhance communication with the audience increasing their understanding and aspiration for political movie that are usually heavy and unfamiliar.

A Study on the Determinants Affecting Global Tramper Companies' Bunkering Port Selection Using AHP Method (AHP를 활용한 부정기선사의 벙커링 항만 선정요인에 대한 연구)

  • Ahn, Ji Young;Ryu, Hee Chan;Lee, Choong-bae
    • Journal of Korea Port Economic Association
    • /
    • v.38 no.3
    • /
    • pp.15-28
    • /
    • 2022
  • Bunkering refers to the supply of bunker fuel necessary for the ship operation, as well as minimizing the price and supply cost of fuel itself, and includes supplying good quality fuel oil in a timely manner and at the optimal port. Bunkering is an important criterion in terms of cost for shipping companies because bunkering involves a significant cost to the purchaser of bunkering from the time of initial purchase. This study aims to prioritize selection criteria for tramper companies to call port for bunkering. For this study, the variables were selected by analyzing the common criteria such as price, location, bunker quality and service and infrastructure etc. employed in previous studies. The AHP method was employed to prioritize the criteria in order. As a result of the analysis, the high level factors appeared in the order of price, location, bunkering quality and port service and infrastructure factors. The importance of price criterion and location criterion was found to be high. In the low level criterion of price, the bunker price per MT was ranked first in importance. In terms of location criteria, the location on the main trade route was high. In the low criteria of bunker quality and port service, the bunkering available types and bunker quality were found to be important factors, and in the low level criteria of infrastructure, anchorage and availability of bunkering during loading and discharging and port security factors were found to be important criteria. This study provides the guidelines for research designed to compare the bunkering port selection factors and to derive their importance suggesting the ways to enhance competitiveness as a bunkering port.

Technology Standards Policy Support Plans for the Advancement of Smart Manufacturing: Focusing on Experts AHP and IPA (스마트제조 고도화를 위한 기술표준 정책영역 발굴 및 우선순위 도출: 전문가 AHP와 IPA를 중심으로)

  • Kim, Jaeyoung;Jung, Dooyup;Jin, Young-Hyun;Kang, Byung-Goo
    • Informatization Policy
    • /
    • v.30 no.4
    • /
    • pp.40-61
    • /
    • 2023
  • The adoption of smart factories and smart manufacturing as strategies to enhance competitiveness and stimulate growth in the manufacturing sector is vital for a country's future competitiveness and industrial transformation. The government has consistently pursued smart manufacturing innovation policies starting with the Manufacturing Innovation 3.0 strategy in the Ministry of Industry. This study aims to identify policy areas for smart factories and smart manufacturing based on technical standards. Analyzing policy areas at the current stage where the establishment and support of domestic standards aligning with international technical standards are required is crucial. By prioritizing smart manufacturing process areas within the industry, policymakers can make well-informed decisions to advance smart manufacturing without blindly following international standardization in already well-established areas. To achieve this, the study utilizes a hierarchical analysis method including expert interviews and importance-performance analysis for the five major process areas. The findings underscore the importance of proactive participation in standardization for emerging technologies, such as data and security, instead of solely focusing on areas with extensive international standardization. Additionally, policymakers need to consider carbon emissions, energy costs, and global environmental challenges to address international trends in export and digital trade effectively.

Improvement of Face Recognition Algorithm for Residential Area Surveillance System Based on Graph Convolution Network (그래프 컨벌루션 네트워크 기반 주거지역 감시시스템의 얼굴인식 알고리즘 개선)

  • Tan Heyi;Byung-Won Min
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.1-15
    • /
    • 2024
  • The construction of smart communities is a new method and important measure to ensure the security of residential areas. In order to solve the problem of low accuracy in face recognition caused by distorting facial features due to monitoring camera angles and other external factors, this paper proposes the following optimization strategies in designing a face recognition network: firstly, a global graph convolution module is designed to encode facial features as graph nodes, and a multi-scale feature enhancement residual module is designed to extract facial keypoint features in conjunction with the global graph convolution module. Secondly, after obtaining facial keypoints, they are constructed as a directed graph structure, and graph attention mechanisms are used to enhance the representation power of graph features. Finally, tensor computations are performed on the graph features of two faces, and the aggregated features are extracted and discriminated by a fully connected layer to determine whether the individuals' identities are the same. Through various experimental tests, the network designed in this paper achieves an AUC index of 85.65% for facial keypoint localization on the 300W public dataset and 88.92% on a self-built dataset. In terms of face recognition accuracy, the proposed network achieves an accuracy of 83.41% on the IBUG public dataset and 96.74% on a self-built dataset. Experimental results demonstrate that the network designed in this paper exhibits high detection and recognition accuracy for faces in surveillance videos.

A Case Study on Metadata Extractionfor Records Management Using ChatGPT (챗GPT를 활용한 기록관리 메타데이터 추출 사례연구)

  • Minji Kim;Sunghee Kang;Hae-young Rieh
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.24 no.2
    • /
    • pp.89-112
    • /
    • 2024
  • Metadata is a crucial component of record management, playing a vital role in properly managing and understanding the record. In cases where automatic metadata assignment is not feasible, manual input by records professionals becomes necessary. This study aims to alleviate the challenges associated with manual entry by proposing a method that harnesses ChatGPT technology for extracting records management metadata elements. To employ ChatGPT technology, a Python program utilizing the LangChain library was developed. This program was designed to analyze PDF documents and extract metadata from records through questions, both with a locally installed instance of ChatGPT and the ChatGPT online service. Multiple PDF documents were subjected to this process to test the effectiveness of metadata extraction. The results revealed that while using LangChain with ChatGPT-3.5 turbo provided a secure environment, it exhibited some limitations in accurately retrieving metadata elements. Conversely, the ChatGPT-4 online service yielded relatively accurate results despite being unable to handle sensitive documents for security reasons. This exploration underscores the potential of utilizing ChatGPT technology to extract metadata in records management. With advancements in ChatGPT-related technologies, safer and more accurate results are expected to be achieved. Leveraging these advantages can significantly enhance the efficiency and productivity of tasks associated with managing records and metadata in archives.

Study on Customer Satisfaction Performance Evaluation through e-SCM-based OMS Implementation (e-SCM 기반 OMS 구현을 통한 고객 만족 성과평가에 관한 연구)

  • Hyungdo Zun;ChiGon Kim;KyungBae Yoon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.891-899
    • /
    • 2024
  • The Fourth Industrial Revolution is centered on a personalized demand fulfillment economy and is all about transformation and flexible processing that can deliver what customers want in real time across space and time. This paper implements the construction and operation of a packaging platform that can instantly procure the required packaging products based on real-time orders and evaluates its performance. The components of customer satisfaction are flexible and dependent on the situation which requires efficient management of enterprise operational processes based on an e-SCM platform. An OMS optimized for these conditions plays an important role in maximizing and differentiating the efficiency of a company's operations and improving its cost advantage. OMS is a system of mass customization that provides efficient MOT(Moment of Truth) logistics services to meet the eco-friendly issues of many individual customers and achieve optimized logistics operation goals to enhance repurchase intentions and sustainable business. OMS precisely analyzes the collected data to support information and decision-making related to efficiency, productivity, cost and provide accurate reports. It uses data visualization tools to express data visually and suggests directions for improvement of the operational process through statistics and prediction analysis.