Data Preprocessor for Order Preserving Encryption Jo, Suhyung; Choi, Doo Ho; Lee, Sang Su
Applied Mechanics and Materials,
04/2015, Letnik:
752-753, Številka:
Advanced Engineering and Technology
Journal Article
Recenzirano
Sensitive data such as personal telephone number, address, social security number at database is prevented to access by SQL search query. In order to prevent security problems it needs to encrypt ...database. Order preserving encryption (OPE) is a method of encrypting data so that it's possible to make efficient inequality comparisons on the encrypted items without decrypting them. OPE data of database is available to make index without decryption. In this paper, the data preprocessor by reducing plaintext range, the performance of OPE is increased and sensitive data are protected at database.
The study of document filter for smart device SuHyung Jo; JuHan Kim; DooHo Choi
2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS),
08/2015
Conference Proceeding
Document filter extracts text of UTF-16, Unicode or UTF-8 format from documents files of smart device. The extracted text is used at viewer and index search of smart device. This paper researches ...document filter of text based smart device files. The result of this research is useful to develop the mobile device search, which lets you find easily all your docs, pdf, text and email on smart device.
Defense technology of anti forensic Suhyung Jo; Dowon Hong
2008 International Conference on Control, Automation and Systems,
2008-Oct.
Conference Proceeding
An anti-forensic is the technology which it collects witness data which are disadvantageous for a self among data stored in the computer or the mobile equipment or doesnpsilat analyze and obstructs a ...forensic. The data enciphering which it is one among the anti-forensic technique codes when storing data in a disc. It is the decoded when reading data technique. The various programs of Microsoft Office, Adobe PDF, WinRar, AlZip, and etc. provide the encryption of data. In these environments, the knowledge of over certain level about the digital device like a computer and ability of technique are needed in order to collect evidences. Particularly, it inquires into the technique of reaction which confronts with data hiding and modulation, evidence deletion, data enciphering, BitLocker drive encryption and can find out the evidence of the digital forensic.
This paper studies about the policy enforcement of security router platform with Intel IXP2800 network processor. IXP2800 network processor improves networking processing. Security router platform ...has packet filtering, intrusion detection and VPN functions. They are implemented at microengines of network processor. Security policy enforcement of router is implemented at Xscale core of network processor. Security router platform communicates the security policies with management system through COPS protocol. Security router platform analyzes the whole security conditions of network and preserves the network services from attacks according to policy. Security policies are packet filtering policy, intrusion detection policy, access control policy and VPN policy
The study of text extraction for forensic data Suhyung Jo; Dowon Hong
The 7th International Conference on Networked Computing and Advanced Information Management,
2011-June
Conference Proceeding
A hard disk size of notebook or personal computer is increased as 3 Terabytes. The forensic data including social network such as twitter is over several Petabytes. As the evidence is large scale ...data, an investigator takes long time to search critical clue which is related a crime. So, high speed of analysis from large scale forensic data is necessary. This paper is concerned with text extraction for forensic data. As file input/output processing of forensic image is used memory interface instead of file, so it makes to reduce the extraction times of text and analysis times of forensic data.
Port efficiency and international trade in China Chang, Young-Tae; Jo, Ahhyun; Choi, Kyoung-Suk ...
Transportmetrica (Abingdon, Oxfordshire, UK),
12/2021, Letnik:
17, Številka:
4
Journal Article
Recenzirano
The relationship between port infrastructure and international trade is linked inextricably since ports remain the main gateway for international trade. All international ports thus have as their ...goal the effective and efficient management of ever-increasing cargo. And yet, previous research on the impact of the port efficiency on international trade remain subject to some biases in their measurement model. In order to correct them, this study developed a new port efficiency measurement model using the bootstrapping slacks-based-measurements data envelopment analysis. The study then built the linkage model with international trade by applying the gravity model using Poisson pseudo-maximum likelihood and multilateral resistance term. Based on data from 2002 to 2012 on 23 major container ports in China, our result shows a more significant and positive impact of port efficiency on international trade than in other models.