Research on Citations of Joseon Government in Early 17th Centuries
In: The Korea-Japan Historical Review, Band 77, S. 103-132
53 Ergebnisse
Sortierung:
In: The Korea-Japan Historical Review, Band 77, S. 103-132
In: The Korea-Japan Historical Review, Band 75, S. 63-97
In: The Korea-Japan Historical Review, Band 62, S. 215-242
In: The Korea-Japan Historical Review, Band 55, S. 61
In: Feminism and Korean Literature, Band 47, S. 87-118
In: Korea Institute for Industrial Economics and Trade Research Paper No. 11/IER/16/4-1
SSRN
Many mobile applications in wireless networks such as military battlefield, emergency response, and mobile commerce are based on the notion of secure group communications. Unlike traditional security protocols which concern security properties only, in this dissertation research we design and analyze a class of QoS-aware protocols for secure group communications in wireless networks with the goal to satisfy not only security requirements in terms of secrecy, confidentiality, authentication, availability and data integrity, but also performance requirements in terms of latency, network traffic, response time, scalability and reconfigurability. We consider two elements in the dissertation research: design and analysis. The dissertation research has three major contributions. First, we develop three "threshold-based" periodic batch rekeying protocols to reduce the network communication cost caused by rekeying operations to deal with outsider attacks. Instead of individual rekeying, i.e., performing a rekeying operation right after each group membership change event, these protocols perform batch rekeying periodically. We demonstrate that an optimal rekey interval exists that would satisfy an imposed security requirement while minimizing the network communication cost. Second, we propose and analyze QoS-aware intrusion detection protocols for secure group communications in mobile ad hoc networks to deal with insider attacks. We consider a class of intrusion detection protocols including host-based and voting-based protocols for detecting and evicting compromised nodes and examine their effect on the mean time to security failure metric versus the response time metric. Our analysis reveals that there exists an optimal intrusion detection interval under which the system lifetime metric can be best traded off for the response time performance metric, or vice versa. Furthermore, the intrusion detection interval can be dynamically adjusted based on the attacker behaviors to maximize the system lifetime while satisfying a system-imposed response time or network traffic requirement. Third, we propose and analyze a scalable and efficient region-based group key management protocol for managing mobile groups in mobile ad hoc networks. We take a region-based approach by which group members are broken into region-based subgroups, and leaders in subgroups securely communicate with each other to agree on a group key in response to membership change and member mobility events. We identify the optimal regional area size that minimizes the network communication cost while satisfying the application security requirements, allowing mobile groups to react to network partition/merge events for dynamic reconfigurability and survivability. We further investigate the effect of integrating QoS-aware intrusion detection with region-based group key management and identify combined optimal settings in terms of the optimal regional size and the optimal intrusion detection interval under which the security and performance properties of the system can be best optimized. We evaluate the merits of our proposed QoS-aware security protocols for mobile group communications through model-based mathematical analyses with extensive simulation validation. We perform thorough comparative analyses against baseline secure group communication protocols which do not consider security versus performance tradeoffs, including those based on individual rekeying, no intrusion detection, and/or no-region designs. The results obtained show that our proposed QoS-aware security protocols outperform these baseline algorithms. ; Ph. D.
BASE
Part 2: Full Papers ; International audience ; Military communities in tactical networks must often maintain high group solidarity based on the trustworthiness of participating individual entities where collaboration is critical to performing team-oriented missions. Group trust is regarded as more important than trust of an individual entity since consensus among or compliance of participating entities with given protocols may significantly affect successful mission completion. This work introduces a game theoretic approach, namely Aoyagi's game theory based on positive collusion of players. This approach improves group trust by encouraging nodes to meet unanimous compliance with a given group protocol. However, when any group member does not follow the given group protocol, they are penalized by being evicted from the system, resulting in a shorter system lifetime due to lack of available members for mission execution. Further, inspired by aspiration theory in social sciences, we adjust an expected system trust threshold level that should be maintained by all participating entities to effectively encourage benign behaviors. The results show that there exists the optimal trust threshold that can maximize group trust level while meeting required system lifetime (survivability).
BASE
In: Materials Science Forum; Eco-Materials Processing & Design VII, S. 426-429
In: Social behavior and personality: an international journal, Band 49, Heft 11, S. 1-11
ISSN: 1179-6391
During the course of the COVID-19 pandemic, social stigmatization of people who have been infected with the virus has been observed. This study measured the degree of social stigma by examining implicit and explicit attitudes toward people with COVID-19. Explicit attitudes were measured
through self-reporting, taking into account the three components of behavior, cognition, and emotion, and we used the Single-Category Implicit Association Test to assess implicit attitudes. The findings show that explicit attitudes toward people with COVID-19 were positive, whereas implicit
attitudes trended toward being negative. The results suggest that mental health services and policies are needed to reduce social stigma and prevent the risk of mental health problems among people who have been infected with COVID-19.
In: IEEE technology and society magazine: publication of the IEEE Society on Social Implications of Technology, Band 32, Heft 2, S. 32-38
ISSN: 0278-0097
In: Materials Science Forum; Eco-Materials Processing & Design VII, S. 958-961
In: STOTEN-D-22-02138
SSRN
In: Journal of international and area studies, Band 20, Heft 2, S. 101-115
ISSN: 1226-8550
In: Social behavior and personality: an international journal, Band 51, Heft 10, S. 1-11
ISSN: 1179-6391
We provided a meditation training program for psychiatric hospital inpatient clients with alcohol use disorder and tested its efficacy as a treatment modality for mood dysregulation. Participants were 31 men who were assigned to experimental or control groups. Those who participated
in the meditation training program for 8 weeks reported a significant decrease in psychosocial stress and negative mood states and an increase in positive mood states compared to the control group participants. The results demonstrated that meditation training was beneficial in decreasing
stress and negative mood states and increasing positive mood states in people with alcohol use disorder. More meditation training programs for clients with alcohol use disorder are needed to control their mood dysregulation, which is one of the most important elements of managing negative
mood states.