• Title/Summary/Keyword: service provider

Search Result 1,415, Processing Time 0.033 seconds

Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges

  • Xu, Guangwei;Lai, Miaolin;Feng, Xiangyang;Huang, Qiubo;Luo, Xin;Li, Li;Li, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.558-579
    • /
    • 2021
  • The cloud storage provides flexible data storage services for data owners to remotely outsource their data, and reduces data storage operations and management costs for data owners. These outsourced data bring data security concerns to the data owner due to malicious deletion or corruption by the cloud service provider. Data integrity verification is an important way to check outsourced data integrity. However, the existing data verification schemes only consider the case that a verifier launches multiple data verification challenges, and neglect the verification overhead of multiple data verification challenges launched by multiple verifiers at a similar time. In this case, the duplicate data in multiple challenges are verified repeatedly so that verification resources are consumed in vain. We propose a duplicate data verification algorithm based on multiple verifiers and multiple challenges to reduce the verification overhead. The algorithm dynamically schedules the multiple verifiers' challenges based on verification time and the frequent itemsets of duplicate verification data in challenge sets by applying FP-Growth algorithm, and computes the batch proofs of frequent itemsets. Then the challenges are split into two parts, i.e., duplicate data and unique data according to the results of data extraction. Finally, the proofs of duplicate data and unique data are computed and combined to generate a complete proof of every original challenge. Theoretical analysis and experiment evaluation show that the algorithm reduces the verification cost and ensures the correctness of the data integrity verification by flexible batch data verification.

A Study on the Effect of External Response to Construction Subcontract Disputes (건설하도급분쟁에 대한 외부적 대응노력(컨설팅)의 효과에 대한 연구)

  • Bae, Chan Young;Hyun, Byung Hwan
    • Korean Journal of Construction Engineering and Management
    • /
    • v.20 no.5
    • /
    • pp.72-82
    • /
    • 2019
  • The purpose of this study is to find out how any organizational response or dispute-related consulting has a significant impact on management performance before or during a dispute over a construction subcontract dispute. In this study, multiple regression models were used to analyze the impact on consulting performance. According to the result of the analysis, the positive effects on the overall external consulting effect is influenced by five variables such as financial values, increase of the number of disputes, construction of response system by contents, construction of response system in each period, dispute response external response system. The original business operators were also more likely to be affected by internal activities of conflict response companies and the extent to which external response systems were established. This means that the supply and demand service provider's business environment is relatively poor, forcing it to be lower than the internal and external activities and influences of the original business operators of the conglomerates.

A Study on the Introduction of Liability Compensation Insurance to Prevent Medical Dispute (의료분쟁 예방을 위한 책임보상보험 도입에 관한 연구)

  • Kim, Kee-Hong
    • Journal of Arbitration Studies
    • /
    • v.28 no.4
    • /
    • pp.43-59
    • /
    • 2018
  • This study aims to review various efforts required by medical institutions to prevent medical accidents in advance and to suggest the necessity of introducing liability insurance for medical accidents based on cases abroad and compulsory professional indemnity insurance at home. Over the past five years between 2013 and 2017, the number of inquiries regarding medical accidents and medical disputes has increased by 11.1 percent from 36,099 to 54,929, and the number of mediation and arbitration for medical disputes has increased by 14.3 percent from 1,304 to 2,225. Since some medical accidents even cause social problems, a compulsory insurance system for the liability of medical institutions for damages need to be introduced to promptly compensate the victims of medical accidents and to ensure compensation by medical personnel. In Korea, a system is in place to provide compensation for a client who suffers an accidental damage after receiving professional services, regardless of whether or not the professional service provider can provide compensation. In major foreign countries, a medical liability system is in place that is applied either by the principle of liability with fault, or the principle of liability without fault. In this study, the cases of compulsory insurance and semi-compulsory insurance in the US and Japan to which the principle of liability with fault is applied, as well as the case of New Zealand to which the principle of liability without fault is applied, were examined. It is necessary to urgently introduce the compulsory insurance system for the liability of compensation to prevent medical disputes and to compensate for the life and physical damages of the victims of medical accidents in domestic medical institutions. Doing so is expected to ensure fair compensation for the victims of medical malpractice and compensation by medical personnel, thereby improving medical practice.

Medication Injection Safety Knowledge and Practices among Health Service Providers in Korea

  • Lee, Hyeong-Il;Choi, Ji-Eun;Choi, Sol-Ji;Ko, Eun-Bi
    • Quality Improvement in Health Care
    • /
    • v.25 no.1
    • /
    • pp.52-65
    • /
    • 2019
  • Purpose: Outbreaks resulting from medication injections have recently been on the rise in Korea despite various established guidelines. The objective of this study was to assess the degree to which healthcare professionals are aware of safe injection practice guidelines and to account for the adherence to and the deviation from safe injection guidelines formulated by healthcare providers. Methods: In November 2016, a cross-sectional anonymous questionnaire covering general characteristics of injections, patient safety culture, awareness of safe injection practices, and adherence to and barriers to safe injection guidelines was issued to healthcare providers who administer medication injections or manage and supervise these injections (N=550). Multivariate logistic regression analysis via enter method was performed to define the influencing factors of adherence of safe injection practices. Results: On average, respondents adhere to 17 of the 24 guidelines. Multivariate logistic regression found that those who were more likely to adhere to safe injection guidelines either underwent a patient safety training experience within the last year, provided care in a setting characterized by a highly developed patient safety culture, or were employed as physicians or nurses, as opposed to some other type of care provider. Barriers to safe injection guidelines were attributable to; thoughts of waste to discard leftover medicine, provisions that made adherence cumbersome, a weak culture of compliance, and insufficient amounts of injectable medicine, products, and education. Conclusions: The results of this study indicate that controllable factors like training experience of healthcare providers and patient safety culture were positively associated with adherence to safe injection practices. It was suggested that the training of healthcare providers on safe injection practices be a continuous process to promote patient safety. Additionally, there should be an increased focus on developing and implementing policies to improve patient safety culture from a prevention rather than post-management perspective.

A Digital ID Wallet User-oriented Mechanism in a Mobile Environment (모바일 환경에서 사용자 중심의 전자ID지갑 운용 메커니즘)

  • Song, Dong-Ho;Lim, Sun-Hee;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.57-64
    • /
    • 2007
  • As a ubiquitous environment approaches and the use of the wireless Internet using the mobile terminals is on the increase. Therefore, the users have to undergo the inconvenience of repeatedly input the same information for the user registration and the ID certification. The information the users have to put in to register in on-line services range from the basic personal information to the more other private information such as financial information. Accordingly the user can be in control of users personal information and safely manage the information by conveniently selecting from the Digital ID Wallet the Ticket that holds various information including the basic, financial or payment certification-related information. Consequently, we propose a digital identity management mechanism to control one's personal information in a mobile environment.

A Study on the Applicability of Anonymous Authentication Schemes for Fine-Grained Privacy Protection (개인정보보호를 위한 익명 인증 기법 도입 방안 연구)

  • Ki, Ju-Hee;Hwang, Jung-Yeon;Shim, Mi-Na;Jeong, Dae-Kyeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.195-208
    • /
    • 2010
  • As information communication technologies have highly advanced, a large amount of user sensitive information can be easily collected and unexpectedly distributed. For user-friendly services, a service provider requires and processes more user information. However known privacy protection models take on a passive attitude toward user information protection and often involve serious weaknesses. In reality, information exposure by unauthorised access and mistakenly disclosure occurs frequently. In this paper, we study on the applicability of anonymous authentication services for fine-grained user privacy protection. We analyze authentication schemes and classify them according to the level of privacy newly defined in this paper. In addition, we identify security requirements that a privacy protection scheme based on anonymous authentication can achieve within legal boundary.

Customized Serverless Android Malware Analysis Using Transfer Learning-Based Adaptive Detection Techniques (사용자 맞춤형 서버리스 안드로이드 악성코드 분석을 위한 전이학습 기반 적응형 탐지 기법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.433-441
    • /
    • 2021
  • Android applications are released across various categories, including productivity apps and games, and users are exposed to various applications and even malware depending on their usage patterns. On the other hand, most analysis engines train using existing datasets and do not reflect user patterns even if periodic updates are made. Thus, the detection rate for known malware is high, while types of malware such as adware are difficult to detect. In addition, existing engines incur increased service provider costs due to the cost of server farm, and the user layer suffers from problems where availability and real-timeness are not guaranteed. To address these problems, we propose an analysis system that performs on-device malware detection through transfer learning, which requires only one-time communication with the server. In addition, The system has a complete process on the device, including decompiler, which can distribute the load of the server system. As an evaluation result, it shows 90.3% accuracy without transfer learning, while the model transferred with adware catergories shows 95.1% of accuracy, which is 4.8% higher compare to original model.

Effect of TV Watching Activeness on Class-Oriented Drama Viewing Rate: Focusing on Residential Characteristics (TV 시청의 적극성이 상류 계층 묘사 드라마 시청률에 미치는 영향: 거주지역의 특성을 중심으로)

  • Park, Mee-Hyun;Shin, Hyung-Deok;Park, JooYeon
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.941-948
    • /
    • 2021
  • This study investigated the differences between active and inactive TV watching groups, in terms of residential characteristics, of class-oriented drama viewing rate. We compared Flow and Social Comparison Theories to explain the relationship between class-oriented contents in the drama and viewing rate. We collected 110,000 TV viewers data of 4 class-oriented and the other 4 dramas, aired between Feb. 2016 and March 2019, through D-Live local cable service provider. Controlling gender ratio and income level which may affect viewing rate, we found that class-oriented content significantly and positively affects viewing rate in active watching group while the same content significantly and negatively affects viewing rate in inactive watching group. These results imply that Flow and Social Comparison Theories may apply in opposite directions in different watching groups.

A Study on a Smart City Supply Chain Security Model Based on Zero-Trust (제로 트러스트(Zero-Trust) 기반의 스마트시티 공급망 보안모델 연구)

  • Lee, Hyun-jin;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.123-140
    • /
    • 2022
  • Recently, research on solving problems that have introduced the concept of smart city in countries and companies around the world is in progress due to various urban problems. A smart city converges the city's ICT, connects all the city's components with a network, collects and delivers data, and consists of a supply chain composed of various IoT products and services. The increase in various cyber security threats and supply chain threats in smart cities is inevitable, in addition to establishing a framework such as supply chain security policy, authentication of each data provider and service according to data linkage and appropriate access control are required in a Zero-Trust point of view. To this end, a smart city security model has been developed for smart city security threats in Korea, but security requirements related to supply chain security and zero trust are insufficient. This paper examines overseas smart city security trends, presents international standard security requirements related to ISMS-P and supply chain security, as well as security requirements for applying zero trust related technologies to domestic smart city security models.

Factors and Satisfaction in Selecting University and Departments of One University freshmen

  • Kim, Tae-Sun;Hong, Sun-Yeun;Hur, Hwa-La;Park, Gang-woo;Park, Jin-Sik;Lee, Chang-Soo;Ha, Jong-Uk;Shin, Hwa-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.203-212
    • /
    • 2022
  • In this paper, we propose to identify the factors and satisfaction of the selection of University and departments of One university freshmen. Research subjects were 499 freshmen in 2021 at K University located in G city. The data were analyzed by descriptive statistics, t-test, ANOVA, Scheffe' test and pearson's correlation coefficient using SPSS WIN 18.0. The results of this study showed that the internet/SNS was the highest in university information media, the school teacher was the highest in information provider, and the employment rate had the most impact on university registration decision. The University satisfaction score was 3.43, and there was a significant difference in gender(t=5.527, p=.019) and admission type(F=5.527, p<.001). The department satisfaction was 3.86 and there was a significant difference in the admissions type(F=3.004, p=.018). Univdrsity satisfaction and Department satisfaction showed a significant positive correlation(r=5.527, p<.001). Universities should improve their competitiveness through systematic admission information system.