• Title/Summary/Keyword: 광보안

Search Result 176, Processing Time 0.029 seconds

A Study Applying to Mutual Authentication Mechanism among Entities in Grid to Structure Secure Active Nodes (액티브 노드 보안을 위한 그리드 상에서의 엔티티 상호 인증 기법 적용에 관한 연구)

  • 이원구;이재광
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.708-711
    • /
    • 2003
  • 본 논문에서는 그리드 환경에서의 엔티티 상호 인증구조와 추가적으로 제안한 인증구조를 고찰하여, 향후 액티브 네트워크 상에서의 액티브 노드간의 상호인증구조를 구축하기 위한 초석을 다지고자 한다. 추가적으로 현재의 그리드 인가 구조에서 초 기반이 아닌 인증서 기반의 사용자 인가 시스템을 제안하였으며, 기존의 ID 매핑 방식의 인가 시스템 대신에 인증서내의 확장 필드에 사용자의 권한 등급을 추가하고, 이를 기반으로 자원에 대한 접근 제한 등급을 결정하도록 하였다.

  • PDF

Extending Jini security with PKDA (PKDA를 이용한 Jini Security의 확장)

  • 전문광;유지영;송대기;이철훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.364-366
    • /
    • 2001
  • Sun Microsystems에 의해서 개발된 Jini 네트워킹 기술은 자바 프로그램밍 언어를 기반으로 하여 분산환경을 만드는데 좋은 아키텍쳐를 제공한다. 그러나 현재의 자바 security solution 만으로는 분산환경에서의 보안 요구사항을 충족시키기에 충분하지 않다. 이를 해결하기 위한 여러 방법들이 있지만, 대부분이 centralized computing을 기반으로 하여 분산환경에는 맞지 않다. 이 논문에서는 PKDA(Public key based Kerberos for Distributed Authentication)를 사용하여 Jini의 security를 확장함으로써 분산환경에서의 security 요구사항을 충족시킬 수 있음을 보인다.

  • PDF

Bridge firewall in Linux environment, real-time monitoring system implemented using NTOP (리눅스 Bridge 방화벽환경에서의 NTOP을 이용한 실시간 모니터링 시스템 구현)

  • Lee, Jun-Hyung;Yu, Jinseung;Lee, JongSuk Ruth
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.48-49
    • /
    • 2013
  • 복잡한 네트워크 환경에서 광 대역 범위의 보안 정책을 적용하기 위하여 리눅스 커널기반의 Bridge 방화벽을 적용하고 운영시 실시간 트래픽 측정과 모니터링을 위하여 NTOP을 이용하여 실시간 모니터링 시스템을 구현하였다.

Case Study of User Interface Design for Spectrophotometer based on User Experience (사용자경험 기반의 인터페이스 디자인 사례연구 : 분광광도계)

  • Jeong, Seong-Won;Jeong, Sang-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.6
    • /
    • pp.32-40
    • /
    • 2012
  • This study is a case analysis for user interface(UI) design of spectrophotometer which is widely used in the field of chemistry, biology and environment, based on user experience(UX). Generally, experimental equipment developments are centered on functionality and technology, and the interface for interaction between the user and the machine is developed only by the engineers who do not have much consideration for the users. From this background, this study tried to find out how UX could melt into UI so that a kind of spectrophotometers can be designed to help the work process of researchers in the real context by examining and analyzing the real users' experiences and also considering the developer's perspective. As a result, it was possible to improve UI and was found that redefinition of the goal of UI, time-efficiency, security, and sufficient information delivery are essential to the design of user interface for spectrophotometers.

A Design of Information Security Education training Databank System for Preventing Computer Security incident (침해사고 예방을 위한 정보보안 교육훈련 문제은행 시스템)

  • Mo, Eun-Su;Lee, Jae-Pil;Lee, Jae-Gwang;Lee, Jun-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.277-280
    • /
    • 2015
  • Smishing, Phishing personal privacy caused by Incident accidents such as Phishing information security has become a hot topic. Such incidents have privacy in personal information management occurs due to a lack of user awareness. This paper is based on the existing structure of the XML Tag question bank used a different Key-Value Structure-based JSON. JSON is an advantage that does not depend on the language in the text-based interchange format. The proposed system is divided into information security sector High, Middle and Low grade. and Provides service to the user through the free space and the smart device and the PC to the constraints of time. The use of open source Apache Load Balancing technology for reliable service. It also handles the user's web page without any training sessions Require server verification result of the training(training server). The result is sent to the training server using jQuery Ajax. and The resulting data are stored in the database based on the user ID. Also to be used as a training statistical indicators. In this paper, we design a level training system to enhance the user's information security awareness.

  • PDF

(A Study on the Control Mechanism for Network Survivability in OVPN over IP/GMPLS over DWDM) (DWDM기반의 OVPN에서 네트워크 생존성을 위한 제어 메커니즘 연구)

  • Cho Kwang-Hyun;Jeong Chang-Hyun;Hong Kyung-Dong;Kim Sung-Un
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.9 s.339
    • /
    • pp.85-96
    • /
    • 2005
  • A ' Virtual Private Network (YPN) over Internet' has the benefits of being cost-effective and flexible. However, given the increasing demands for high bandwidth Internet and for reliable services in a 'VPN over Intemet,' an IP/GMPLS over DWDM backbone network is regarded as a very favorable approach for the future 'Optical VPN (OVPN)' due to the benefits of transparency and high data rate. Nevertheless, OVPN still has survivability issues such that a temporary fault can lose a large amount of data in seconds, moreover unauthorized physical attack can also be made on purpose to eavesdrop the network through physical components. Also, logical attacks can manipulate or stop the operation of GMPLS control messages and menace the network survivability of OVPN. Thus, network survivability in OVPN (i.e. fault/attack tolerant recovery mechanism considering physical structure and optical components, and secured transmission of GMPLS control messages) is rising as a critical issue. In this Paper, we propose a new path establishment scheme under shared risk link group (SRLG) constraint for physical network survivability. And we also suggest a new logical survivability management mechanism by extending resource reservation protocol-traffic engineering extension (RSVP-TE+) and link management protocol (LMP). Finally, according to the results of our simulation, the proposed algorithms are revealed more effective in the view point of survivability.

Development of Visible Light Communication (VLC) System Technology Based on High Brightness LED light (고휘도 LED 조명 기술을 이용한 고속 가시광통신 시스템 기술 개발)

  • Lee, Jong-Hyeok;Jang, Kyung-Soon;Kim, Byung-Gyu;Kim, Jin-Ho
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.29-36
    • /
    • 2014
  • In this study, we design and develop a VLC test-bed system which has been recently issued and focused as good convergence technology in the world. We classify the developed system into transmission part including analog LED driver module, digital signal modulation module, and receiver part with light sensing module and signal demodulation module. Then we introduce important characteristics and components. We analyze some factors for each module. To validate the communication of the designed VLC system, we develop a VLC sender-receiver simulator which can control the dimming factor and flicker-free effect. From the developed system, we observed about 12Mbps of data transmission rate with 0.5m~1m of distance, without packet loss. We verified the real-time communication with multimedia streaming which can be considered as very high date rate. The developed system and technology will be useful for some converged data services like indoor positing, home appliances, and indoor parking system.

Analysis of Cryptography Technique on Application Layer based on WAP (WAP 기반의 Application Layer 암호화 기법 분석)

  • 황영철;최병선;이성현;이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.748-751
    • /
    • 2004
  • In this paper, we discuss about wireless Internet security. The past few years have seen unprecedented growth in the number of wireless user, applications, and network access technologies. Wireless Internet is similar to wired internet, but it has some constrained wireless environment. So many internet technologies for wireless are developing now. There are WAP(Wireless Application Protocol) and WPKI. WAP(now version 2.0) is a protocol specification for wireless communication networks. it provides an application framework and network protocols for wireless devices such as mobile telephones, PDAs and internet technologies. In this paper some analysis of security(e.g. digital signature or encryption) for wireless internet are performed.

  • PDF

A study on selecting of Light Cutoff Panel depending on the installation condition using the lighting simulation (조명 시뮬레이션을 이용한 설치 환경별 차광판 선정에 관한 연구)

  • Park, Hyung-Kyu;Gu, Jin-Hoi;Lee, Kyu-Mok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.2
    • /
    • pp.246-251
    • /
    • 2016
  • The use of security lighting that emits spill light is considered a cause of light trespass problems in the residential areas. Therefore, a cutoff panel was installed as an alternative way to reduce light trespass. On the other hand, it has another problem in that it is less effective and is not good enough for aesthetics and safety. In this study, a light cutoff panel was designed and manufactured to reduce the light trespass, and the structure of a proper light cutoff panel was studied. Using a goniophotometer, the light distribution file (IES file) was extracted and the characteristics of light distribution were analyzed using the RELUX program. The results showed that the reduction of spilt light in the backward direction was decreased significantly for all types of light cutoff panels except the coated globe. In the case of a black powder coated light cutoff panel, the forward light caused by light reflected from the surface of the light cutoff panel was also reduced, which means that the black powder coated light cutoff panel is effective in the performance of light cutoff in the forward and backward directions. In addition, the coated glove increased the spilt light in the forward and backward directions because it reflects the upward light to go down. A 90 % accuracy between the measurement value of light trespass and the expected value of the light trespass was obtained from a simulation.

Optical Security System Based on the Phase Characteristic of Joint Transform Correlator (결합변환 상관기의 위상특성을 이용한 광 암호화 시스템)

  • 박세준;서동환;김수종
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.6
    • /
    • pp.400-407
    • /
    • 2003
  • In this paper an optical encryption system, which can decrypt the original image by using the autocorrelation terms of a JTC, is proposed. Unlike the classical JTC, the joint input plane of the proposed system is composed in a frequency domain not a spatial domain, thus it needs only one Fourier transformation. To use like this, the phase component appeared in the output plane of JTC should be considered. We presents the effect of phase and provides the solution. An original image is encrypted to a complex-valued random image. The original image is reconstructed using the autocorrelation terms which is the main drawback of JTC, therefore the proposed system is more suitable for JTC and real time processing. By computer simulation and optical experiment, the analysis for the phase effect and the performance of the proposed system are confirmed.