• Title/Summary/Keyword: 공격 모델

Search Result 857, Processing Time 0.025 seconds

Authentication for Single/Multiple Domain using Attribute Certificates (유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일/멀티 도메인 인증)

  • Lee Deok-Gyu;Park Hee-Un;Lee In-Yeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.291-300
    • /
    • 2005
  • The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

Development of Timely Counter-scenario on Small Scale Engagements (소규모 교전에서의 적시 대응 시나리오 개발 방안 연구)

  • Ahn, Euikoog;Chang, Dae S.;Pyun, JaiJeong;Kwon, Yongjin James;Park, Sang C.
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.2
    • /
    • pp.63-71
    • /
    • 2013
  • Developing future weapons systems has become increasingly complicated and costly. There, modeling and simulation techniques have been highly interested in developing the defense systems. Modeling and simulation techniques provide a means to simulate military training, strategies, military doctrines, and weapons acquisition. In this paper, we proposed a small scale engagement scenario generation method for engagement M&S model. Generated scenario is one of critical factors in the field of commander training, operational analysis, and tactical evaluation. The objective of this paper is to develop a scenario generation method for small scale engagement using the FSA(Finite State Automata) and DFS(Depth First Search) algorithm. The proposed method is verified using a one-on-one combat engagement scenario between assault ship and reconnaissance ship. Also, we are visualized using Delta3D$^{TM}$.

Theoretical Studies on the Biochemical Roles of Zn (Zn 의 생화학적 역할에 관한 이론적 연구)

  • Kim, Ho Sun;Kim, Gwang Su
    • Journal of the Korean Chemical Society
    • /
    • v.34 no.3
    • /
    • pp.232-238
    • /
    • 1990
  • To study the biological roles of Zn, we investigated simple model systems of $Zn^{++}, coordinated with OH_2 or NH_3,$ or with O=C- in peptide. The geometrical structures and net atomic charges were calculated by the ab initio HF-SCF theory using double zeta basis sets. The ligands of O-H, N-H, and O=C- are very polar due to $Zn^{++}$. Therefore, the carbon atom in peptide becomes so electrophilic that it can be easily attacked by other nucleophiles. In addition, to understand how $Zn^{++}$ is coordinated with ligands in enzyme, a molecular mechanics method is applied to the system of the enzyme of carboxypeptidase A (CPA) with the substrate of glycyltyrosine. From our results, it appears that the Zn ion is coordinated not only by four ligands in enzyme and substrate but also by one water molecule.

  • PDF

A Study On The Structural Relationship Of Interaction, Identification, And Loyalty of Online Brand Community in China (중국 온라인 브랜드 커뮤니티의 상호작용, 동일시, 충성도간의 구조적 관계에 관한 연구)

  • Lee, Ji-Na
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.235-241
    • /
    • 2012
  • This paper takes the online automobile brand community in china as an example, importing 'interactivity', the concept of sociology, into online brand community study. It follows the logical way as 'How does interactivity embody among the online communities ${\rightarrow}$How about its deepening process? ${\rightarrow}$What the results of interactivity will be?', that is, 'formation of the relationship (Interaction) - deepening of the relationship (identification)-result of the relationship(brand loyalty)', makes systematic study through the method of combining theory and case analysis together, and puts forward the marketing strategic direction for online brand communities.

A Color Image Watermarking Technique by Embedding a Fresnel-Transformed Pattern (Fresnel 변환 패턴의 삽입에 의한 컬러 이미지 워터마킹 기법)

  • Lee Chang-Jo;Kang Seok
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.7
    • /
    • pp.90-98
    • /
    • 2006
  • Digital watermarking is a technique embedding hidden information into multimedia data imperceptibly such as images and sounds. Generally an original image is transformed and coded watermark data is embedded in frequency domain watermarking models. In this paper, We propose a new color image watermarking technique using Fresnel transform. A watermark image is Fresnel - transformed and the intensity of transformed pattern is embedded into color image. In our watermarking model, an original image is converted from RGB components into YCrCb components and then the values of real number and imaginary number of a Fresnel-transformed pattern of a watermark image are embedded into Y component. The watermarking experiments were conducted to show the validity of the proposed method using PSNR value, and the results show that our method has the robustness against lossy compression like JPEG.

  • PDF

A Vulnerability Analysis for Armored Fighting Vehicle based on SES/MB Framework using Importance of Component (구성 부품의 중요도를 활용한 SES/MB 프레임워크 기반 전차 취약성 분석)

  • Kim, Hun-Ki;Hwang, Hun-Gyu;Lee, Jang-Se
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.59-68
    • /
    • 2015
  • In this paper, we proposed a methodology of vulnerability analysis for armored fighting vehicle based on modeling and simulation. The SES/MB framework serves hierarchical representation of the structure for a complex systems and is easy to conduct modeling for the armored fighting vehicle which consists of various components. When the armored fighting vehicle is hit by the shots from threat, the vulnerability of the armored fighting vehicle is decreased by damaged or penetrated level of armors and components. The penetration is determined by the result of comparing a penetration energy through penetration analysis equation and defence ability of armor and components. And the defence ability is determined in accordance with type and defined property of normal component and armor component, all components have a weighted values for the degree of importance. We developed a simulation program for verification proposed methodology. Thus, the program analyzes vulnerability for armored fighting vehicle SES/MB framework using importance.

Personal Information Protection for Biometric Verification based TeleHealth Services (바이오인식을 이용한 원격의료에서의 개인정보보호)

  • Shin, Yong-Nyuo;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.659-664
    • /
    • 2010
  • This paper provides an integrated framework for biometric data and private information protection in TeleHealth. Biometric technology is indispensable in providing identification and convenience in the TeleHealth environment. Once biometric information is exposed to mallicious attacker, he will suffer great loss from the illegferuse of his biometric data by someone else because of difficulty of change not like ID and password. We have to buil by someone esystem data bon the integrated framework for biometric data and private information protection in TeleHealth. First, we consider the structure of the biometric system and the security requirements of y someone esystem data bon the biometrics. And then, we define the TeleHealth system model and provide the vulnerabilities and countermeasures of the biometric-data by someone eintegrated model.byhe TeleHealth sse bec requires two-phata authentication for countermeasure. Finally, we made some functionferrequirements for main componenets of biometric-data bintegrated TeleHealth system framework to protect biometric data.

Privacy Protection Scheme of Healthcare Patients using Hierarchical Multiple Property (계층적 다중 속성을 이용한 헬스케어 환자의 프라이버시 보호 기법)

  • Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.275-281
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

A Study and Design on security ticket based CERT system for quantified incident management (정량적 침해사고 관리를 위한 Security Ticket 기반의 침해사고 관리시스템(CERT) 설계 및 관리방안 연구)

  • Kim, Sun-Tae;Jun, Moon-Seog;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.141-150
    • /
    • 2007
  • There's been a difficulty for general corporate to adopt recent incident response study because those studies focus on nation wide CERT Coordination Center or large organization aspect. This study is focus on study and design on security ticket based CERT system through analysis Security management's threat element, attack element. response element and it also help general corporate establish incident response process that is adjusted on IT operation. Confirmed CERT model's effectiveness and effect of quantitative Security incident management wav that propose executing Security incident response experiment on the basis of this way. This study which Provides general corporate oriented CERT model can be used to improve corporate's capability of responding incident by quantified management technique and select incident response SLA indicator. Already, formation which operate CERT can heighten corporation's information protection level by measure Security incident response result as metrical and analyze and improve problem continuously.

  • PDF

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF