• Title/Summary/Keyword: 인가 서비스

Search Result 172, Processing Time 0.029 seconds

A Study on the Security Structure of Next Generation E-mail System (차세대 이메일 보안 기술에 관한 연구)

  • Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.183-189
    • /
    • 2008
  • E-mail's role has been increased due to its merit which is sending demanded information in real-time anywhere, anytime. However, Today's E-mail security threats have being changed intelligently to attack against the specific agency. The threat is a limit to respond. Therefore precise definition and development of security technology is needed to analyze changing environment and technologies of e-mail so that remove fundamental security threat. we proposed Next Generation E-mail System Security Structure and the Next Generation fusion System using authentication As a result, in this study, we development of Next Generation E-mail System Security Structure. This system can protect E-mail user from social engineering hacking technique, spam, virus, malicious code and fabrication.

  • PDF

Key Generation and Management Scheme for Efficient Interoperability among Different Downloadable Conditional Access Systems (서로 다른 DCAS 간 효율적 상호운용을 위한 키 생성 및 관리 기법)

  • Lee, Hoonjung;Eun, Hasoo;Oh, Heekuck
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.2
    • /
    • pp.75-82
    • /
    • 2013
  • CAS (Conditional Access System) is a content protection solution that restricts access to the system according to user's standing and only authorized users can access the content in a pay-TV system. DCAS (Downloadable Conditional Access System) can download CAS client which is a software implemented via network. In recent years, research and development has been carried out on DCAS to solve the problems of compatibility among heterogeneous devices and internetworking with other services. In this paper, we propose key generation and management scheme for efficient interoperability among different DCASs based on PBC (Pairing Based Cryptography).

A Study on Encryption Techniques for Digital Rights Management of MPEG-4 Video Streams (MPEG-4 비디오 스트림의 디지털 저작권 관리를 위한 암호화 기법 연구)

  • Kim Gunhee;Shin Dongkyoo;Shin Dongil
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.175-182
    • /
    • 2005
  • This paper presents encryption techniques for digital right management solutions of MPEG-4 streams. MPEG-4 is a format for multimedia streaming and stored in the MPEG-4 file format. We designed three kinds of encryption methods, which encrypt macro blocks (MBs) or motion vectors (MVs) of I-, P-VOPs (Video Object Planes), extracted from the MPEG-4 file format. We used DES to encrypt MPEG-4 data Based on theses three methods, we designed and implemented a DRM solution for an Internet broadcasting service, which enabled a MPEG-4 data streaming, and then compared the results of decryption speed and quality of rendered video sequences to get an optimal encryption method.

The Analysis of the TETRA Authentication Protocol (TETRA 인증 프로토콜 분석)

  • Park Yong-Seok;Ahn Jae-Hwan;Jung Chang-Ho;Ahn Joung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1070-1075
    • /
    • 2006
  • TETRA system provides the radio authentication service which permits only authorized radio to access network. Radio authentication is the process which checks the sameness of authentication-key(K) shared between radio and authentication center by challenge-response protocol. TETRA standard authentication protocol can prevent the clone radio to copy ISSI from accessing network, but can't prevent the clone radio to copy ISSI & authentication-key. This paper analyzes authentication-key generation/delivery/infection model in TETRA authentication system and analyzes the threat of clone radio caused by authentication-key exposure. Finally we propose the new authentication protocol which prevent the clone radio to copy ISSI & authentication-key from accessing network.

No-load Database Security using Network Packet Control (패킷제어를 이용한 무부하 데이터베이스 접근보안)

  • Sin, Sung Chul;Lee, Kyeong Seok;Ryu, Keun Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.540-543
    • /
    • 2014
  • 수많은 데이터를 사용하는 기업 및 기관들은 전용 데이터베이스를 구축하여 모든 정보들을 저장, 관리하고 있다. 개인정보를 포함하여 비인가된 중요 정보들이 저장되어있음에도 불구하고 대부분의 경우 데이터베이스에 대한 보안적용이 되어있지 않거나 아주 미비한 상태이다. 보안사고의 대부분이 데이터베이스에 저장된 중요 정보가 유출되는 점을 보았을 때 데이터베이스 자체에 대한 보안시스템을 구축하여 예방하는 것이 보안사고의 피해를 막을 수 있는 가장 핵심적인 방법이라 할 수 있다. 이에 본 연구에서는 네트워크 패킷을 모니터링하여 데이터베이스의 성능에 영향을 미치지 않고 보안기능을 수행할 수 있는 Sniffing 을 이용한 방안을 제안한다. 제안 보안시스템은 별도의 하드웨어에서 기능을 수행하며 운영 중인 데이터베이스에 서비스의 중단 없이 보안시스템을 구축할 수 있도록 하였다. Sniffing 방식에서 접근제어 기능을 수행 할 수 있도록 알고리즘 설계를 하였으며 감사 로그를 기록할 때 가장 많은 부분을 차지하는 SQL 에 대해 MD5 해시함수를 적용하여 해당 로그에 대한 데이터크기를 크게 줄일 수 있었다. 운영중인 데이터베이스 환경에 영향을 주지 않으면서 높은 수준의 감사성능을 제공하고 다양한 보안 정책을 간단하게 적용할 수 있도록 구현하였으므로 데이터베이스에 저장된 중요정보의 유출을 예방하고, 보안사고가 일어났을 때 추적 및 증거자료로 활용할 수 있을 것이다.

Determinants of Customer Satisfaction, Loyalty and Happiness in Chinese Fast-food Restaurants in the 4th Industrial Revolution Era; Is Convenience of Mobile Ordering Services a New Determinant? (4차 산업혁명 시대 중국 패스트푸드점의 고객만족, 충성도와 행복감의 결정요인; 모바일주문 서비스의 편리성이 새로운 결정요인인가?)

  • Zhong, Yongping;Chung, Jae-Eun;Moon, Hee-Cheol
    • Korea Trade Review
    • /
    • v.44 no.6
    • /
    • pp.151-168
    • /
    • 2019
  • This study aims to investigate the determinants that can influence customer satisfaction and loyalty. Compared to some of the determinants that have been investigated by other scholars before, this study also includes a new approach to mobile food-ordering that has only appeared within the Chinese fast-food industry in recent years. It is very important to test if the convenience of mobile ordering services can influence customer satisfaction, as more and more customers are using mobile apps to order food, especially in the 4th Industrial Revolution Era. Research data mostly was collected from customers who visited one of five famous Western fast-food restaurants (KFC, McDonald's, Pizza Hut, Subway, and Burger King) in China. The results show that not only price, service quality, food quality, and the physical environment can significantly affect customer satisfaction but also the convenience of mobile ordering services, a new determinant accompanied by the fast development of IoT technology.

Interoperable Attribute-based Access Control Framework for Heterogeneous IoT Platforms (이기종 사물인터넷 플랫폼 간의 상호운용 가능한 속성기반 접근제어 프레임워크)

  • Kang, Giluk;Koo, Jahoon;Kim, Young-Gab
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.219-221
    • /
    • 2022
  • 현재 사물인터넷 플랫폼이 활발히 개발됨에 따라, 이를 기반으로 사용자에게 많은 서비스가 제공되고 있다. 그러나 플랫폼들이 독자적으로 개발되고 있어 상호운용이 보장되지 못하고 있는 상황이다. 특히, 플랫폼마다 리소스를 표현하는 방식이 서로 불일치하여 리소스가 공유되더라도 이기종 플랫폼의 사용자는 리소스를 사용할 수 없는 문제가 있다. 더욱이 각각의 플랫폼들이 다양한 접근제어 모델을 사용함에 따라, 이기종 플랫폼의 사용자가 리소스 접근을 요청하더라도 인증/인가를 수행할 수 없는 상황이다. 결과적으로, 이러한 상호운용성 문제는 사물인터넷의 주요 목적인 초연결성을 달성하는 데 한계를 가져오고 있다. 이에, 본 논문에서는 이기종 사물인터넷 플랫폼 간의 상호운용이 가능한 속성기반 접근제어 프레임워크를 제안하고자 한다. 본 프레임워크는 MDR(Metadata Registry)를 기반으로 속성기반 접근제어를 위한 속성 불일치 문제를 해결하고 허가형 블록체인을 이용하여 속성기반 접근제어를 사용하지 않는 플랫폼이라도 접근제어에 대한 상호운용을 달성할 수 있도록 한다.

Does Social Enterprise Provide a Decent Work to Women? (사회적기업은 괜찮은 여성일자리인가?)

  • Kwag, Seon-Hwa
    • Management & Information Systems Review
    • /
    • v.32 no.4
    • /
    • pp.53-79
    • /
    • 2013
  • Social enterprises can be identified roughly as social purpose-oriented business ventures. They often fill the gaps left by governmental and commercial ventures in providing for certain vulnerable sectors of society. Though social enterprises often adopt market mechanisms in their organizational structures, their emphasis on particular social outcomes means that they intentionally pursue double/triple-bottom lines, thus distinguishing them from many traditional for-profit businesses. Among the Korean laborers, women have been hardest hit by the global economic crisis. As the movements have substantially been taken to strengthen women's economic activities in the recent years, many policies are formulated with these trends, connecting women's employment with social enterprises. This study focused on analyzing social enterprises to be friendly and to provide decent work to women. Data were collected from 491 social enterprises and 830 workers. The main results are as follows. First, the women's employment in social enterprises has accounted for a relatively high rate and the women's wage also is similar to men's one. Second, as for work conditions and types, most women have preferred irregular and non-managerial work. Thus, social enterprises have showed a positive response for the women's job opportunities, while social enterprises have had a negative one for enhancing the women's status at the labor market. In conclusion, social enterprises should institutionalize how to provide more stable working condition to women and to improve their's capacity.

  • PDF

Social Worker's Perceptions and Working Experiences of Older Adults Who Live Alone in Severe Social Isolation Based on the Case of 「Making Friends of Older Adults who Live Alone」 (「독거노인 친구만들기」를 통해 살펴본 '숨겨진 이웃', 사회적 고립이 심각한 노인 1인 가구에 대한 사회복지사의 인식과 경험에 관한 연구)

  • Kim, Yujin
    • 한국노년학
    • /
    • v.38 no.4
    • /
    • pp.1149-1171
    • /
    • 2018
  • The purpose of this study is to increase understanding of the social intervention for severely isolated older adults who live alone and are in serious isolation as if they were 'hidden'. Through qualitative descriptive methods, it intends to describe how social workers in the "Making Friends of Older Adults who Live Alone" project have perceived older adults living alone in serious isolated situation, whether there have been changes in the perception of the elderly according to the progress of the project, and what kinds of experiences these social workers have had while providing case management to older adults. In-depth interviews with 40 social workers, case management records of 70 senior citizens, and research journals were collected and analyzed using qualitative content analysis methods. The results of data analysis were presented in two categories and four subcategories each. Based on the research findings, four kinds of implications were suggested.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.