• Title/Summary/Keyword: security rule

Search Result 286, Processing Time 0.025 seconds

Information Security Management in Healthcare Area (보건의료정보 보호관리 모델 개발)

  • Jeong, Hey-Jeong;Kim, Nam-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.953-956
    • /
    • 2005
  • 보건의료정보는 개인의 가장 민감한 정보로 최상의 보호가 이뤄져야하는 한편, 국민 건강과 복지 향상을 위한 공익의 성격도 강하여 관리와 책임에 대한 명확한 지침이 반드시 필요하다. 본 연구에서는 보건의료 부문의 특성과 정보화 현황을 반영하고 선행연구의 한계점을 보완하여 국내 보건의료 환경에 적합한 정보보호관리 모델을 개발하였다. BS7799, HIPAA Security Rule, HL7 EHR SIG 기능명세 등을 참고하여 필요성, 정보보호 목적/전략 수립, 위험분석/평가, 정보보호관리 정책수립, 정보보호관리 프레임워크 설계, 관리적 보안, 물리적 보안, 기술적 보안, 정보보호관리 평가,운영관리의 총 10개 세부 프로세스와 111개의 이행지표로 구성된 본 모델은 보건의료정보 취급자에게 실행 지침을 제공하여 보건의료정보시스템의 안정성 향상과 국민 보건복지 수준 향상에 이바지할 수 있을 것으로 기대된다.

  • PDF

Implementation of Stable Optical Information Security System using Interference Hologram and Photorefractive Material (간섭 홀로그램과 광굴절매질을 이용한 안정한 광 정보보호 시스템의 구현)

  • 김철수
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.64-76
    • /
    • 2001
  • In this paper, A simple image hologram encryption and decryption technique based on the principle of interference are proposed. The technique using the photorefractive material for getting a stable interference pattern is also proposed. And combine these two techniques, I would like to implement a stable optical information security system. In the encrypting process, I would generate binary phase hologram which can reconstruct original image perfectly, and regard this hologram as original image to be encrypted image. And then the hologram is encrypted as randomly generated binary phase image. Reference image is also generated from the encrypted image by applying interference rule. In the decrypting process, I can get a interference intensity by interfering the reference image and the encrypted image in the interferometer. and transform inferference intensity information into phase information. I recover original image by inverse Fourier transforming the phase information. In this process, the intensity information generated by interference of two images is very sensitive to external vibrations. So, I would like to get a stable interference using the characteristic of SPPCM(self pumped phase conjugate mirror) in photorefractive materials, especially BaTiO₃.

  • PDF

An improvement of MDA(Mail Delivery Agent) Filtering method for prevention of spam mail (스팸메일 방지를 위한 MDA의 필터링방법 개선방안)

  • 박은옥;김영현;최은정;유주영;김미애;박유미;김윤정;김명주
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.259-263
    • /
    • 2003
  • 인터넷 이용자가 증가함에 따라 전자메일 사용자도 증가하고 있다. 전자메일 사용으로 통신상의 비용 및 시간이 절약되는 장점이 있지만 소수의 유저들이 상업적 목적으로 많은 유저에게 원하지 않은 메일(스팸메일)을 보냄으로써 물질적, 정신적 피해를 입히고 있다. 따라서 스팸 메일을 방지하기 위한 여러 기법들이 제안되었다. 본 논문에서는 스팸 메일 문제를 해결하기 위해 먼저 전자메일 시스템에 대한 구조를 살펴보고 MTA, MDA를 이용하는 스팸 메일 필터링 도구들을 비교 분석한 연구결과를 제시한다. 그리고 탐지 성능을 개선할 수 있는 새로운 방안을 제시한다. 제안 방법은 공개 배포용 MDA인 procmail에 기반한 것으로, 규칙(rule)을 매칭(matching)시키는 시간을 줄이는 것이다.

  • PDF

A Design of Access Control Mechanism for the Secure Use of Internet (안전한 인터넷 사용을 위한 접근제어 메커니즘 설계)

  • Lee, Ho;Jung, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.84-90
    • /
    • 2000
  • This paper presents a design of an access control mechanism that can resolves the complicated problems of access control requirements in internet environment. In this paper, we proposed an access control mechanism which can satisfy the combined goals of confidentiality integrity and availability of any resource. We defined an access control mechanism from the viewpoints of identity-based, rule-based and role-based policy and implemented 6 access control operations. The Proposed access control mechanism can protect resources from unauthorized accesses based on the multi-level security policies of security label, integrity level, role and ownership.

  • PDF

A FUZZY-BASED APPROACH FOR TRAFFIC JAM DETECTION

  • Abd El-Tawaba, Ayman Hussein;Abd El Fattah, Tarek;Mahmood, Mahmood A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.257-263
    • /
    • 2021
  • Though many have studied choosing one of the alternative ways to reach a destination, the factors such as average road speed, distance, and number of traffic signals, traffic congestion, safety, and services still presents an indisputable challenge. This paper proposes two approaches: Appropriate membership function and ambiguous rule-based approach. It aims to tackle the route choice problem faced by almost all drivers in any city. It indirectly helps in tackling the problem of traffic congestion. The proposed approach considers the preference of each driver which is determined in a flexible way like a human and stored in the driver profile. These preferences relate to the criteria for evaluating each candidate route, considering the average speed, distance, safety, and services available. An illustrative case study demonstrates the added value of the proposed approach compared to some other approaches.

Toward Automotive Ethernet Security

  • Kim, Huy Kang
    • Review of KIISC
    • /
    • v.29 no.1
    • /
    • pp.34-37
    • /
    • 2019
  • 지난 5년동안 전통적인 차량에 적용된 CAN 버스 상에서의 침입탐지시스템에 대한 연구가 활발히 진행되고 있다. 초기에 rule-base 로 탐지하거나, 단순한 경량 알고리즘을 통해 침입탐지를 하는 알고리즘이 주를 이루었다면, 최근에는 machine learning을 적용한 탐지 알고리즘들 역시 많이 개발되고 있다. CAN 용 침입탐지시스템이 그간 학계에서 주로 연구가 이루어 졌었다면 2019년 이후에는 상용차량들에 침입탐지시스템을 실제 탑재하여 출시될 예정에 있기 때문에, 이제는 산업계 주도적인 개발과 적용이 이루어질 것으로 보여진다. 다만, CAN 버스의 설계 구조상 공격 노드를 특정하기 어렵다는 한계와 전송량 대역폭의 제한으로 인해 기술적인 한계가 있어 왔기 때문에, 최근에는 IP 체계가 적용되고 automotive ethernet 기반으로 차량 네트워크가 빠르게 적용될 예정에 있다. 이에, 본 기고문에서는 automotive ethernet 의 보안기술에 대해 살펴보고, automotive ethernet 상에서 침입탐지시스템을 개발하기 위해 필요한 사항들은 어떤 것들이 있을지 살펴보고자 한다.

Implementation of an Integrated Access Control Rule Script Language and Graphical User Interface for Hybrid Firewalls (익명 통신로를 이용한 Escrow 전자화폐)

  • 김춘수;박춘식;전희종
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.29-46
    • /
    • 1999
  • Most of the previous researches for the electronic cash system guarantee unconditional untraceability for the purpose of individual privacy. Such untraceable electronic cash system that only focuses on untraceability, however, has side effect such as money laundering, criminal activities. We present a escrow cash model using anonymous channel that supports not only untaceability but also crime prevention, and prove the efficiency of our scheme relative to previous escrow cash systems.

A Survey of Machine Translation and Parts of Speech Tagging for Indian Languages

  • Khedkar, Vijayshri;Shah, Pritesh
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.245-253
    • /
    • 2022
  • Commenced in 1954 by IBM, machine translation has expanded immensely, particularly in this period. Machine translation can be broken into seven main steps namely- token generation, analyzing morphology, lexeme, tagging Part of Speech, chunking, parsing, and disambiguation in words. Morphological analysis plays a major role when translating Indian languages to develop accurate parts of speech taggers and word sense. The paper presents various machine translation methods used by different researchers for Indian languages along with their performance and drawbacks. Further, the paper concentrates on parts of speech (POS) tagging in Marathi dialect using various methods such as rule-based tagging, unigram, bigram, and more. After careful study, it is concluded that for machine translation, parts of speech tagging is a major step. Also, for the Marathi language, the Hidden Markov Model gives the best results for parts of speech tagging with an accuracy of 93% which can be further improved according to the dataset.

Q&A Chatbot in Arabic Language about Prophet's Biography

  • Somaya Yassin Taher;Mohammad Zubair Khan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.211-223
    • /
    • 2024
  • Chatbots have become very popular in our times and are used in several fields. The emergence of chatbots has created a new way of communicating between human and computer interaction. A Chatbot also called a "Chatter Robot," or conversational agent CA is a software application that mimics human conversations in its natural format, which contains textual material and oral communication with artificial intelligence AI techniques. Generally, there are two types of chatbots rule-based and smart machine-based. Over the years, several chatbots designed in many languages for serving various fields such as medicine, entertainment, and education. Unfortunately, in the Arabic chatbots area, little work has been done. In this paper, we developed a beneficial tool (chatBot) in the Arabic language which contributes to educating people about the Prophet's biography providing them with useful information by using Natural Language Processing.

A Study on Period Division According to Overall Revision of 「Security Services Industry Act」 (「경비업법」제·개정에 따른 민간경비의 시대적 구분)

  • Park, Su Hyeon;Kim, Byung Tae;Choi, Dong
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.195-213
    • /
    • 2019
  • 「Security Services Industry Act」made in 1976 for the purpose of contributing to the good operation of services industry by establishing the requirements for promotion, development and systematic management of services industry has been since 26 times of overall revisions. Period division of private security through overall revision of 「Security Services Industry Act」 can be roughly divided into three periods. The first is a settlement period. It is a period when the present five business areas were completed rom 1976 to 2001. Beginning with facility and escort security in 1996, five types of jobs have been prepared. so far by adding personal protection in 1996, and machine and special security in 2001. The second is a quantitative growth period. It is a period when quantitative development is made on the institutional basis. As various culture, sports and arts events are increasing based on the demand of security services due to an increase in the people's sense of security, quantitative development was made, which additionally influenced the downward trend of capital and the possibility of having two jobs through revisions. The third is a qualitative growth period. From 2013 to the present is a period when quantitative growth has slowed and qualitative growth has been made. After the period of quantitative growth, the growth slowed down. However, by raising the criteria for permission of services industry through creation of a rule for the group civil petition, by raising capital, by institutionally compensating for diverse punishment regulations, by realizing the training hours for new security guards, by permitting private education, etc, the reliability and professionality of a security guard job has been to be recovered.