http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
공개 데이터집합에 대한 무조정, 실시간 프라이버시 보존
손용락 한국차세대컴퓨팅학회 2023 한국차세대컴퓨팅학회 논문지 Vol.19 No.5
This study proposes an approach to enable users to access the unadjusted original dataset in real time while preserving privacy. While previous methods for privacy preservation have employed kanonymity for entity disclosure prevention and ldiversity for attribute disclosure prevention, this study suggests an approach that preserves privacy solely through attribute disclosure prevention via ldiversity, excluding entity disclosure prevention. By not implementing kanonymity, the adjustment of quasiidentifiers in published datasets became unnecessary, thereby preventing a decrease in data usability. By accessing an ontology of sensitive attributes and selecting semantically related values, a set of sensitive attribute values connected to a single entity or an entity cluster was constructed, thus reducing information loss within the provided set of sensitive attribute values for users.
XML 문서 접근제어를 위한 권한부여 모델링 및 구현 설계
손용락 서경대학교 산업기술연구소 2003 産業技術硏究所論文集 Vol.13 No.-
In this paper, the objective is to propose a security model for accessing XML document(XML document Access Control Model: XACM). XACM supports an extended expressing power such as handling exception and cover stories. The XML document is represented in a way of tree structure and the smallest unit of object accessed by XACM is a node. That is, XACM is capable of applying authorization rules to the unit of node in a tree that has been built from an XML document. Futhermore, the system archecture of XACM is proposed as well.
손용락 서경대학교 산업기술연구소 2007 産業技術硏究所論文集 Vol.19 No.-
This paper suggests a security protocol for lifelog sensor network which founds on public key encryption methods. Public key encryption methods forces to operate public key infrastructure so that we decide to give a special role to a sensor node and call it a private certification authority. Private certification authority carefully coordinates the processes of key establishment and cross authentication between sensor nodes for trusted communication. It also enables the proposed security protocol to be capable of accepting confidentiality, integrity, and availability which are traditionally major security services. In addition, it provides resiliency and scalability which will improve network`s operability. We expect that lifelog sensor network security protocol will help to preclude various security infringements such as unauthorized subjects` impersonation, disclosure and/or distortion of privately collected information.
무결성 정책의 포괄적 운영을 위한 시스템 구조 및 정책명세 언어 설계
손용락 서경대학교 산업기술연구소 2006 産業技術硏究所論文集 Vol.17 No.-
Integrity is a fundamental requirement for secure computer systems. Especially, the demand for data integrity today is stronger than ever due to many organizations` reliance on data and also a number of data privacy regulations. This paper addresses various issues of integrity control and management for data with a primary focus on access control. It first reexamined some previously proposed integrity models and redefines a set of integrity requirements. Then it presents an architecture for comprehensive integrity control systems, which is based on both validation process and meta data. It also provides an integrity control policy language that is flexible and intuitive
의도 보존적 XML 데이터베이스 관리시스템 동시성 제어
손용락 서경대학교 산업기술연구소 2008 産業技術硏究所論文集 Vol.20 No.-
A distinctive feature of Intention Preserved timestamp ordering concurrency control on XML database management systems, iPX for short, is preserving the intension of users` operations and reflecting them to the scheduling strategy. Most of the concurrency control methods generalizes users` operations, such as retrieve, insert, delete, update, rename, into read and write operations while they are scheduling. However, iPX preserves them. The major advantages of iPX is to provide various rules specified to the native feature of each operation. iPX keeps just prior version of currently deleting data. Timestamp ordering scheduling, the fundamental feature of iPX, is well suited to this just prior versioning. iPX applies this approach to insertion operation as well and keeps the serializability and recoverability.
기밀적 트랜잭션 관리를 위한 그래프기반 단일 스냅샷 알고리즘
손용락 서경대학교 산업기술연구소 2002 産業技術硏究所論文集 Vol.12 No.-
Recent development of electronic commerce enables the use of Electronic Stock Trading Systems(ESTS) to be expanded. In ESTS, information with various sensitivity levels is shared by multiple users with mutually different clearance levels. Therefore, it is necessary to use Multilevel Secure Database Management Systems(MLS/DBMSs) in controlling concurrent execution among multiple transactions. In ESTS, not only analytical OLAP transactions, but also mission critical OLTP transactions are executed concurrently, which causes it difficult to adapt traditional secure transaction management schemes to ESTS environments. In this paper, we propose Secure One Snapshot(SOS) algorithm that is devised for Secure Real-time Transaction Management in ESTS. By maintaining additional one snapshot as well as working database, SOS blocks covert-channel efficiently, enables various real-time transaction management schemes to be adapted with ease, and promotes freshness of data read by transaction with higher clearance level by utilizing the characteristics of read-down operations. In this paper, we provide the process of SOS protocol with some examples, and then analyze correctness of devised protocol.
연결개방데이터 클라우드에서의 지식확장을 위한 연결정책 기반 검색시스템
손용락 한국차세대컴퓨팅학회 2022 한국차세대컴퓨팅학회 논문지 Vol.18 No.3
The LOD(Linked Open Data) cloud is the implementation project of semantic web. Diverse participants describe facts about a specific entity based on their diverse viewpoints and constructs LODs and open them. This research advocates that LODs establish and publish their own link policies. It will overcome the connectivity insufficiencies in today’s LOD cloud because its knowledge expansions have been restricted only on to the direct link RDF triples including <owl:sameAs> as predicate. Utilizing the link policies, burdens on maintaining enormous volume of direct link RDF triples will disappear and timeliness of searching results will be ensured. This paper suggested vocabulary set for specifying link policies and implemented LP-KES(Link Policy based Knowledge Expanding Search) to assure the effectiveness of the link policies. We found out that LP-KES guaranteed sufficient expansion and credibility if sameness of subject entity was set between 0.8 and 0.9. LOD(Linked Open Data) 클라우드는 시멘틱 웹 구현 프로젝트이다. 여러 참여기관들은 특정 개체에 대하여 RDF(Resource Description Framework) 모델에 기반하여 다양한 관점에서 기술한 내용을 LOD로 구축하여 공개한다. 본 논문에서는 현재 LOD 클라우드에서의 지식확장이 <owl:sameAs>를 이용한 직접연결에 국한함에 따른 연결성 확충 한계를 극복하는 방안으로 LOD들이 연결정책을 수립, 공개할 것을 제안한다. 이를 통하여 대량의 직접연결 RDF 트리플 운영부담을 제거하고 검색결과의 적시성 확보가 가능하여진다. 본 논문에서는 연결정책 명세를 위한 어휘집을 제안하였으며 이러한 연결정책 운영의 적절성을 확인하기 위하여 연결정책기반 지식확장검색(Link Policy based Knowledge Expanding Search: LP-KES) 시스템을 구현하고 그 실행결과를 분석하였다. 분석결과 주어개체 동일수준을 0.9와 0.8 사이로 설정할 경우 충분한 확장성과 신뢰성을 확보할 수 있음을 확인하였다.
손용락 서경대학교 산업기술연구소 2008 産業技術硏究所論文集 Vol.21 No.-
Lifelog is a set of data which includes person`s experiences, what and when he saw, heard, moved, did, where and when he located, and his physical informations such as blood pressure, diabetic level, and so on. Such data is accumulated and then utilized privately and(or) publicly. In case of public use, privacy infringement problem may occur. The purpose of this paper is to preserve privacy of persons` while utilizing their lifelog data. Basic idea of solution is that a service provider suggests his privacy preserving strategies to an information provider who reviews and modifies the strategies and then requests modified results to the service provider. This paper suggests a profile schema in XSchema which allows both service provider and information provider to describe his privacy preservation strategies in their profiles. With the profiles, they can negotiate their privacy strategies with each other.