• Title/Summary/Keyword: 세션화

Search Result 223, Processing Time 0.023 seconds

A Secure Micro-Payment Protocol based on Credit Card in Wireless Internet (무선인터넷에서 신용카드기반의 안전한 소액 지불 프로토콜)

  • Kim Seok mai;Kim Jang Hwan;Lee Chung sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1692-1706
    • /
    • 2004
  • Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.

The e-Business Component Construction based on Distributed Component Specification (분산 컴포넌트 명세를 통한 e-비즈니스 컴포넌트 구축)

  • Kim, Haeng-Gon;Choe, Ha-Jeong;Han, Eun-Ju
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.705-714
    • /
    • 2001
  • The computing systems of today expanded business trade and distributed business process Internet. More and more systems are developed from components with exactly reusability, independency, and portability. Component based development is focused on advanced concepts rater than passive manipulation or source code in class library. The primary component construction in CBD. However, lead to an additional cost for reconstructing the new component with CBD model. It also difficult to serve component information with rapidly and exactly, which normalization model are not established, frequency user logging in Web caused overload. A lot of difficult issues and aspects of Component Based Development have to be investigated to develop good component-based products. There is no established normalization model which will guarantee a proper treatment of components. This paper elaborates on some of those aspects of web application to adapt user requirement with exactly and rapidly. Distributed components in this paper are used in the most tiny size on network and suggest the network-addressable interface based on business domain. We also discuss the internal and external specifications for grasping component internal and external relations of user requirements to be analyzed. The specifications are stored on Servlets after dividing the information between session and entity as an EJB (Enterprise JavaBeans) that are reusable unit size in business domain. The reusable units are used in business component through query to get business component. As a major contribution, we propose a systems model for registration, auto-arrange, search, test, and download component, which covers component reusability and component customization.

  • PDF

Effective Design Pattern and Enterprise Architecture Design Techniques in EJB Environment (EJB기반의 효율적인 설계 패턴 및 엔터프라이즈 아키텍처 설계 기법)

  • 민현기;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.11
    • /
    • pp.1025-1036
    • /
    • 2003
  • In industry, it is a current trend that systems are developed by using Enterprise JavaBeans(EJB) technology for reducing the cost and the time. Thus, the architecture of EJB is getting more essential to enhance reusability, extensibility and portability of system. However little has been studied in the realm of the practical software architectures for EJB. The architecture has just bean studied in abstract level, but not in concrete level providing the method to substantiate it using the practical J2EE techniques. Just using the EJB technology doesn't guarantee the reusability of the artifacts because EJB specification provides the characteristics and architecture for only fine grained components as session and entity bean. In this paper, we propose the enterprise software architecture for the systems based on EJB and the concrete techniques for implementing that. Also, design patterns of modeling efficient enterprise architecture are represented. By analyzing both the strengths and the weaknesses of suggested design patterns, EJB design patterns which are suitable for each layer of enterprise architecture will be identified. Through the component which design patterns are applied, the architecture can support the optimized relationship between the components. Five techniques for designing components from fine grained to coarse grained based on EJB technology, and architecture design techniques including transaction and assembling techniques are proposed.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

An Energy-Aware Multi-tree Video Multicast Scheme in Wireless Ad Hoc Networks (무선 애드 혹 네트워크에서 잔여 에너지를 고려한 다중 트리 비디오 멀티캐스트 기법)

  • Park, Jae-Young;Kang, Kyung-Ran;Cho, Young-Jong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1336-1348
    • /
    • 2009
  • In this paper, we propose an energy-aware multi-tree video multicast scheme for wireless ad hoc networks. Some network nodes may have energy enough to receive and forward the whole video content whereas some may not. Even though the video quality may vary depending on the remaining energy, our scheme enables the low-energy nodes to join the video multicast session. The video stream is split into a set of multiple and independent descriptions by MDC (Multiple description coding) scheme. Each description corresponds to a substream and number of substreams determine the video quality. The member nodes determine how many substreams it would receive depending on the remaining energy and expected amount of packets per substream. So does the intermediate tree nodes. That builds a tree per substream and multiple trees per session. The data source disseminates each substream through corresponding tree. The video quality of the member nodes varies according to number of participating trees. We evaluate the performance of our scheme by simulation. Our scheme showed better peak signal to noise ratio and extended the lifetime of the network nodes compared with MAODV, which builds a single tree, and MT-MAODV, which builds multiple trees but does not consider the available energy.

Music and Imagery as a Method for Mindfulness: Exploration of Music Therapy Interns' Experiences (마음챙김의 방법으로서 음악심상: 예비음악치료사의 경험을 중심으로)

  • Kim, Young Shil
    • Journal of Music and Human Behavior
    • /
    • v.15 no.2
    • /
    • pp.93-114
    • /
    • 2018
  • This study aimed to investigate the use of music and imagery (MI) as a method for promoting mindfulness. A total of 11 music therapy interns participated in an MI group over 8 weeks. Statements from participants during the program were transcribed and analyzed using the method of modified grounded theory. The results showed that the participants' statements fell into three categories: awareness, acceptance, and distancing. For each category, subcategories were identified. For the category of awareness, the subcategories were emotion, sensation, and thoughts. For the acceptance category, the subcategories were facing and broadening viewpoints. For the distancing category, the subcategories were dissociation from emotions. Each subcategory was further analyzed. The results showed that the participants' experiences were similar to one another in terms of type but differed in terms of dimension varied. These results support the use of MI for increasing mindfulness and reducing burnout in music therapy interns. Further studies are recommended to investigate the factors for the experience of mindfulness induced by MI processes.

Analysis of Al-Saggaf et al's Three-factor User Authentication Scheme for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we analyzed that the user authentication scheme for TMIS(Telecare Medicine Information System) proposed by Al-Saggaf et al. In 2019, Al-Saggaf et al. proposed authentication scheme using biometric information, Al-Saggaf et al. claimed that their authentication scheme provides high security against various attacks along with very low computational cost. However in this paper after analyzing Al-Saggaf et al's authentication scheme, the Al-Saggaf et al's one are missing random number s from the DB to calculate the identity of the user from the server, and there is a design error in the authentication scheme due to the lack of delivery method. Al-Saggaf et al also claimed that their authentication scheme were safe against a variety of attacks, but were vulnerable to password guessing attack using login request messages and smart cards, session key exposure and insider attack. An attacker could also use a password to decrypt the stored user's biometric information by encrypting the DB with a password. Exposure of biometric information is a very serious breach of the user's privacy, which could allow an attacker to succeed in the user impersonation. Furthermore, Al-Saggaf et al's authentication schemes are vulnerable to identity guessing attack, which, unlike what they claimed, do not provide significant user anonymity in TMIS.

Efficient RSA-Based PAKE Procotol for Low-Power Devices (저전력 장비에 적합한 효율적인 RSA 기반의 PAKE 프로토콜)

  • Lee, Se-Won;Youn, Taek-Young;Park, Yung-Ho;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.23-35
    • /
    • 2009
  • Password-Authenticated Key Exchange (PAKE) Protocol is a useful tool for secure communication conducted over open networks without sharing a common secret key or assuming the existence of the public key infrastructure (PKI). It seems difficult to design efficient PAKE protocols using RSA, and thus many PAKE protocols are designed based on the Diffie-Hellman key exchange (DH-PAKE). Therefore it is important to design an efficient PAKE based on RSA function since the function is suitable for designing a PAKE protocol for imbalanced communication environment. In this paper, we propose a computationally-efficient key exchange protocol based on the RSA function that is suitable for low-power devices in imbalanced environment. Our protocol is more efficient than previous RSA-PAKE protocols, required theoretical computation and experiment time in the same environment. Our protocol can provide that it is more 84% efficiency key exchange than secure and the most efficient RSA-PAKE protocol CEPEK. We can improve the performance of our protocol by computing some costly operations in offline step. We prove the security of our protocol under firmly formalized security model in the random oracle model.

Case study of Music & Imagery for Woman with Depression (우울한 내담자를 위한 MI(Music & Imagery) 치료사례)

  • Song, In Ryeong
    • Journal of Music and Human Behavior
    • /
    • v.5 no.1
    • /
    • pp.67-90
    • /
    • 2008
  • This case used MI techniques that give an imagery experience to depressed client's mental resource, and that makes in to verbalism. Also those images are supportive level therapy examples that apply to positive variation. MI is simple word of 'Music and Imagery' with one of psychology cure called GIM(Guided Imagery and Music). It makes client can through to the inner world and search, confront, discern and solve with suitable music. Supportive Level MI is only used from safety level music. Introduction of private session can associate specification feeling, subject, word or image. And those images are guide to positive experience. The First session step of MI program is a prelude that makes concrete goal like first interview. The Second step is a transition that can concretely express about client's story. The third step is induction and music listening. And it helps to associate imagery more easily by used tension relaxation. Also it can search and associate about various imagery from the music. The last step is process that process drawing imagery, talking about personal imagery experience in common with therapist that bring the power by expansion the positive experience. Client A case targets rapport forming(empathy, understanding and support), searching positive recourse(child hood, family), client's emotion and positive support. Music must be used simple tone, repetition melody, steady rhythm and organized by harmony music of what therapist and client's preference. The client used defense mechanism and couldn't control emotion by depression in 1 & 2 sessions. But the result was client A could experience about support and understanding after 3 sessions. After session 4 the client had stable, changed to positive emotion from the negative emotion and found her spontaneous. Therefore, at the session 6, the client recognized that she will have step of positive time at the future. About client B, she established rapport forming(empathy, understanding and support) and searching issues and positive recognition(child hood, family), expression and insight(present, future). The music was comfortable, organizational at the session 1 & 2, but after session 3, its development was getting bigger and the main melody changed variation with high and low of tune. Also it used the classic and romantic music. The client avoids bad personal relations to religious relationship. But at the session 1 & 2, client had supportive experience and empathy because of her favorite, supportive music. After session 3, client B recognized and face to face the present issue. But she had avoidance and face to face of ambivalence. The client B had a experience about emotion change according depression and face to face client's issues After session 4. At the session 5 & 6, client tried to have will power of healthy life and fairly attitude, train mental power and solution attitude in the future. On this wise, MI program had actuality and clients' issues solution more than GIM program. MI can solute the issue by client's based issue without approach to unconsciousness like GIM. Especially it can use variety music and listening time is shorter than GIM and structuralize. Also can express client's emotion very well. So it can use corrective and complement MI program to children, adolescent and adult.

  • PDF

Musical Instrumental Playing Activity using Blues Music Structure for the Improvement of Self-Efficacy in Female Middle School Students who have Depressive Tendencies (우울성향 여중생의 블루스 음악형식을 활용한 자기효능감 증진 연주활동)

  • Koo, Sae Rom
    • Journal of Music and Human Behavior
    • /
    • v.4 no.2
    • /
    • pp.1-17
    • /
    • 2007
  • Huge growth in developmental level, new accomplishment, and The period of adolescents is not only the transition stage but also improvement of academic level. In this level of stage, adolescents have difficulties in development, so they show psychological abnormality such as stress and depression. They could develop mental disorder such as depression or anxiety if they do not overcome the abnormality. According to the situation of the insufficiency of the decent program for adolescents' mental health in the current society, we are strongly requested to develop the psycho-therapeutic program for them. Therefore, in this study, we examined the effect of the musical activities as blues music structure on the improvement of the Self-Efficacy in the female middle school students who have depressive tendencies as well as what they experienced through the activities. The 3 participants were selected out of 70 students in the first year at the "D" middle school in Seoul by being tested with Child Depression Inventory(CDI) and Self-Efficacy Scale(SES). The musical activities were built with 3 steps. Of which, the first one was the introduction to each other, the formation of rapport, and induction of their interests to the musical activities through blues. The second one was letting participants learn the blues music structure by practice and play assigned music(including improvisation) during later 5 sessions with different difficulties at each session. The third one was giving them opportunities to play a music out of the acquired ones during the session or creative music by their own, which results in maximizing musical activities and an acquired experience. As a result, first of all, the scores of CDI test of 3 participants in 10 time sessions showed slight changes, suggesting the negative correlation between CDI and SES even though changes were not big differences. Secondly, the scores of SES test of 3 subjects in 10 time sessions were all changed and especially preference for tasking was significant. Thirdly, the scores of SES for musical playing test of 3 participants in 10 time sessions were all changed and especially preference for musical tasking was significant shown. Finally, according to answers of 3 participants in 10 time sessions for the after questionnaire on musical activities, participants experienced affirmative self-confidence and positive emotion. Taken together, it was suggested that musical activities using blues music structure could be promising therapeutic intervention method.

  • PDF