• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.031 seconds

On the Security Enhancement of the OTAR Protocol and Cryptosystems (무선 키 갱신 프로토콜 OTAR의 암호 시스템 개선 방안)

  • Lee HoonJae;Lee SangGon;Park Jongwook;Yoon JangHong
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.31-43
    • /
    • 2005
  • OTAR system is a highly authentic key management system that has functions with access control. data integrity and data confidentiality, In this paper, we analyze the existing TIA/EIA Over-The-Air-Rekeying key managements protocol. focused to symmetric ciphers. It can be used to understand the technical trend on technologies about TIA/EIA OTAR standardization. This results can be used to evaluate security properties of a remote rekeying, The proposed system contains a highly reliable system synchronization.

  • PDF

NIST 800-56 키 설정 스킴에 관한 연구

  • Won, Dong-Kyu;Kwak, Jin;Joo, Mi-Ri;Yang, Hyung-Kyu;Won, Dong-Ho
    • Review of KIISC
    • /
    • v.14 no.3
    • /
    • pp.36-48
    • /
    • 2004
  • 네트워크 기술의 발전으로 사회 여러 분야에서 인터넷을 이용하여 다양한 서비스들이 제공되고 있다. 이러한 서비스가 널리 확산됨에 따라 인터넷 상에서 전송되는 정보의 기밀성과 무결성을 보장하기 위한 암호 기술이 크게 주목을 받고 있다. 현재 널리 사용되고 있는 암호 알고리즘으로는 FIPS 197(Federal Information Processing Standard)에서 정의한 AES(Advanced Encryption Standard)와 FIPS 46-3에 채택된 Triple DES(Data Encryption Standard), FIPS 198에 정의된 HMAC 등이 있다. 이러한 알고리즘들은 시스템 사이의 상호 운용을 위해 제정되었으며, 공유 키 재료(Shared keying material) 설정이 사전에 이뤄져야 한다. 키 재료의 설정은 신뢰기관에 의해 분배가 가능하나, 객체의 수가 증가함에 따라 키 재료 분배 작업이 지수적으로 증가하게 되는 문제점이 있다. 그러므로, 본고에서는 이러한 키 재료 분배의 문제점과 효율적인 키 설정 스킴에 대하여 기술하고 있는 NIST 800-56을 분석하고자 한다.

TradeCard System for International Electronic Payment (국제전자결제를 위한 무역카드시스템에 관한 고찰)

  • Kang, Won-Jin
    • International Commerce and Information Review
    • /
    • v.2 no.2
    • /
    • pp.155-169
    • /
    • 2000
  • 본 연구는 새로운 국제 전자결제수단으로 개발된 무역카드(TadeCard)에 대한 검토와 활용 가능성에 관하여 검토한 것이다. 무역카드는 세계무역센터협회가 인터넷을 통하여 국제무역대금을 결제할 수 있는 전자결제시스템으로 개발되었다. 무역카드시스템은 제시되는 전자문서의 일치성 점검 및 국제무역거래의 모든 이행과정을 온라인(on-line) 상에서 전자적으로 이행되는 것을 특징으로 하고 있으며 부대비용 등 경제성 측면에서 여타 결제수단보다 우월한 결제시스템이라고 하고 있다. 그러나 가상공간을 통한 전자결제시스템은 거래당사자에게 대금지급의 확실성과 거래의 안정성 및 신속성 보장이 전제되어야 한다. 실제로 무역카드시스템은 특정 보증보험회사의 보증에 기반을 두고 있어 국제 기업간 거액거래상의 신용취급의 한계점과 금융네트워크 등에서의 취약점을 가지고 있다. 따라서 무역카드가 국제전자결제시스템으로 정착되기 위해서는 정보보안 등 기술적인 안정성이 검증되고 결제상의 신뢰성 보장을 위하여 상업은행들의 참여가 확대되어야 한다. 또한 인터넷상에서 결제가 이루어지기 위해서는 담보권과 유통성이 보장되는 볼레로전자선화 증권 등의 활용과 기존의 모든 종이문서에 의한 결제서류도 전자문서로 대체되어야 한다.

  • PDF

A study on the development of protocol modal and verificator (프로토콜 검증 모델 및 검증기 개발)

  • 민재홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.312-321
    • /
    • 1999
  • Advanced system and softwares are required for informal ion communications ions protocol in Information sharing. electronlc commerce and intranet applications with the increase of Internet usage. Therefore. the development methodology of telecommunications protocol to meet user's requirement and increase reliability becomes more important. This study aims to develop the verification model and tool for ATM protpcol using SDL formal description technique and will becomes basic technique for the implementation of integrated protocol development tool.

  • PDF

Design of a Firewall to restrict SOAP message in WebService Environment (웹 서비스 환경에서 작동하는 SOAP 메시지 접근제어를 위한 방화벽 설계)

  • 박수진;김운용;최영근
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.856-858
    • /
    • 2003
  • 기존의 인터넷 환경에서는 내부 자원들을 보호하기 위하여 인터넷과 같은 외부 네트워크와 내부 네트워크 사이에 방화벽을 설치하고 내부 네트워크에 존재하는 정보와 자원들에 대한 트래픽을 사전에 방어하거나, SSL, TLS, Ipsec 과 같은 보안 프로토콜을 사용함으로써 신뢰할 수 있는 통신을 제공하여 왔다. 그러나 최근 HTTP와 XML이라는 플랫폼 독립적인 업계 표준을 사용하는 웹 서비스의 등장과 더불어서 기존의 보안 시스템으로는 웹 서비스 보안문제를 완전히 해결해 줄 수 없게 되었다. 이는 웹 서비스의 전송 프로토콜이 HTTP를 사용함으로써, 전송되는 SOAP 메시지가 기존의 방화벽과 같은 보안 시스템에 영향을 받지 않기 때문이다. 이에 본 논문에서는 웹 서비스 환경에서 SOAP 메시지 전송에 대해 액세스를 제한하는 방화벽을 제안 및 설계한다.

  • PDF

A Classification of Medical and Advertising Blogs Using Machine Learning (머신러닝을 이용한 의료 및 광고 블로그 분류)

  • Lee, Gi-Sung;Lee, Jong-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.730-737
    • /
    • 2018
  • With the increasing number of health consumers aiming for a happy quality of life, the O2O medical marketing market is activated by choosing reliable health care facilities and receiving high quality medical services based on the medical information distributed on web's blog. Because unstructured text data used on the Internet, mobile, and social networks directly or indirectly reflects authors' interests, preferences, and expectations in addition to their expertise, it is difficult to guarantee credibility of medical information. In this study, we propose a blog reading system that provides users with a higher quality medical information service by classifying medical information blogs (medical blog, ad blog) using bigdata and MLP processing. We collect and analyze many domestic medical information blogs on the Internet based on the proposed big data and machine learning technology, and develop a personalized health information recommendation system for each disease. It is expected that the user will be able to maintain his / her health condition by continuously checking his / her health problems and taking the most appropriate measures.

A Resource Management Scheme Based on Live Migrations for Mobility Support in Edge-Based Fog Computing Environments (에지 기반 포그 컴퓨팅 환경에서 이동성 지원을 위한 라이브 마이그레이션 기반 자원 관리 기법)

  • Lim, JongBeom
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.4
    • /
    • pp.163-168
    • /
    • 2022
  • As cloud computing and the Internet of things are getting popular, the number of devices in the Internet of things computing environments is increasing. In addition, there exist various Internet-based applications, such as home automation and healthcare. In turn, existing studies explored the quality of service, such as downtime and reliability of tasks for Internet of things applications. To enhance the quality of service of Internet of things applications, cloud-fog computing (combining cloud computing and edge computing) can be used for offloading burdens from the central cloud server to edge servers. However, when devices inherit the mobility property, continuity and the quality of service of Internet of things applications can be reduced. In this paper, we propose a resource management scheme based on live migrations for mobility support in edge-based fog computing environments. The proposed resource management algorithm is based on the mobility direction and pace to predict the expected position, and migrates tasks to the target edge server. The performance results show that our proposed resource management algorithm improves the reliability of tasks and reduces downtime of services.

The Antecedents of eWOM Credibility and Its Impact on Secondary eWOM Intentions -Focused on the Moderating Effects of eWOM Involvement- (온라인 구전 신뢰성의 선행요인과 2차 구전의도에 미치는 영향 -온라인 구전 관여도의 조절효과를 중심으로-)

  • Zhang, Hai;Park, Ju-Sik
    • Management & Information Systems Review
    • /
    • v.34 no.1
    • /
    • pp.81-101
    • /
    • 2015
  • This study considered eWOM communication not as persuasion process but as diffusion process and identified factors affecting eWOM spread. eWOM diffusion process can be divided into initial transmitting process and retransmission process. The current study analyzed the effects of informational traits(level of agreement, vividness, neutrality) of eWOM on the intention to retranmit eWOM and moderating effect of eWOM involvement. Research sample was gathered from young people because they are familiar with online communication process. Statistical analysis showed informational traits of eWOM all had a significant effects on the credibility of eWOM, credibility of eWOM influenced on the intention to retransmit eWOM significantly, and eWOM involvement moderated the relation between information traits of eWOM and the intention to retransmit eWOM. And then academic and managerial implication was discussed based on these findings.

  • PDF

Drivers for Trust and Continuous Usage Intention on OTP: Perceived Security, Security Awareness, and User Experience (OTP에 대한 신뢰 및 재사용의도의 결정요인: 인지된 보안성, 보안의식 및 사용자경험을 중심으로)

  • Yun, Hae-Jung;Jang, Jae-Bin;Lee, Choong-C.
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.163-173
    • /
    • 2010
  • PKI(Public Key Infrastructure)-based information certification technology has some limitations to be universally applied to mobile banking services, using smart phones, since PKI is dependent on the specific kind of web browser, Internet Explorer. OTP(One Time Password) is considered to be a substitute or complementary service of PKI, but it still shows low acceptance rate. Therefore, in this research, we analyze why OTP has not been very popular, and provide useful implications of making OTP more extensively and frequently used in the mobile environment. Perceived security of OTP was set as a higher-order construct of integrity, confidentiality, authentication, and non-repudiation. Research findings show that security awareness and perceived security of OTP is positively associated, and the relationship between perceived security and trust on OTP is statistically significant. Also, trust is positively related to intention to use OTP continuously.

Design and Implementation of an Authentication Method for Secure Distribution and Use of E-documents in Online Environment (온라인 환경에서의 전자문서 안전배포 및 이용을 위한 인증방법 설계 및 구현)

  • Kim, Yong
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.1
    • /
    • pp.75-98
    • /
    • 2008
  • With explosive growth in the area of the Internet and IT services, various types of e-documents are generated and circulated. An e-Document is a sort of electronic records which a organization performs works and goals. In this study, we propose a security algorithm for secure use and distribution of e-documents. Especially, the proposed method can be applied to generate digital signature which can guarantee authenticity, integrity, confidentiality of an e-document and authenticate authorized users. Also, we can get higher security level as using a smart card that provides highly storing capacity and security. We carried out an experiment to verify efficiency and security of the proposed method.