• Title/Summary/Keyword: 최소권한

Search Result 36, Processing Time 0.024 seconds

A New Key Management Mechanism and Performance Improvement for Conditional Access System (제한수신시스템을 위한 키 관리 메카니즘과 성능향상 방안)

  • 조현숙;이상호
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.75-87
    • /
    • 2001
  • The Conditional Access System is the complete system for ensuring that broadcasting services are only accessible to those who are entitled to receive them. Four major parts to this system are scrambling, descrambling, authentication and encryption. For the proper operation, which means hard-to- break and uninterrupted service, secure key management and efficient delivery mechanism are very important design factors to this system. Performance analysis is another important factor to this system that is used in massive subscriber environment. In this thesis, one of the secure and efficient key management mechanisms is proposed. For the secrecy of this mechanism, hierarchical stacking of keys and key generation matrix are proposed. For the proof of efficient delivery of those keys, simulation results and performance analysis. which is based on queuing analysis, are presented. Lastly, optimal key generation and delivery period, maximal and minimal key deliver time, and communication capacity for data collection are presented for various subscriber volume.

  • PDF

BubbleDoc: Document Forgery and Tamper Detection through the Agent-Free File System-Awareness in Cloud Environment (BubbleDoc: 클라우드 환경에서의 agent-free 파일시스템 분석을 통한 문서 위/변조 탐지)

  • Jeon, Woo-Jin;Hong, Dowon;Park, Ki-Woong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.429-436
    • /
    • 2018
  • Electronic documents are efficient to be created and managed, but they are liable to lose their originality because copies are created during distribution and delivery. For this reason, various security technologies for electronic documents have been applied. However, most security technologies currently used are for document management such as file access privilege control, file version and history management, and therefore can not be used in environments where authenticity is absolutely required, such as confidential documents. In this paper, we propose a method to detect document forgery and tampering through analysis of file system without installing an agent inside the instance operating system in cloud computing environment. BubbleDoc monitors the minimum amount of virtual volume storage in an instance, so it can efficiently detect forgery and tampering of documents. Experimental results show that the proposed technique has 0.16% disk read operation overhead when it is set to 1,000ms cycle for monitoring for document falsification and modulation detection.

Study on Technologies of Mobile Communication based Train Control and its Radio Communication Requirements (이동통신기반 열차제어 기술과 무선통신 요구사항 연구)

  • Yoon, Byungsik;Choi, Minsuk;Kim, Dong Joon;Oh, Woo-Sik;Sung, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.457-460
    • /
    • 2018
  • The mobile communication based train control is the train control system by utilizing wireless communication rather than conventional wired communication. Traditional train control operates train occupation, safety integrity and moving authority using fixed block wired railway signal system. Since introduction of mobile communication in railway area, railway operators can provide improved passager services. Futhermore, it can replace inefficient train onboard equipments and railway ground facilities for economic benefits. In this paper we introduce mobile communication based railway system currently in operation around the world. Moreover, we provide the minimum requirements of the radio communication performance. Proposed minimum requirements of the radio communication improve more secure and efficient mobile communication based train control system.

  • PDF

Contents Based Partial Encryption of GIS Vector Map (GIS 벡터맵의 콘텐츠 기반 선택적 암호화 기술)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.88-98
    • /
    • 2011
  • Recently, according as the importance of GIS(geography information system) database security is embossed, much researches had been achieved about GIS network security. But most such researches are weak against sourceful illegal reproductions and distributions of GIS vector data map. In this paper, we proposed an efficient layer unit contents based partial encryption technique in the vector map compression domain to prevent illegal distributions and unauthorized accesses. This method achieves a partial encryption about each central coordinate and directional parameters of a MCA(minimum coding attribute) that is created at the vector map compression processing in the vector space. First, the position encryption is applied as permutating randomly the center coordinate of each record that is minimum unit of vector map shape. And second, the direction encryption that changing shapes of vector map topography is applied as encrypting the direction of vertices's coordinates of each record. In experimental results, we confirmed that our proposed method can encipher the large volumed vector map data effectively in low computational complexity. Also, we could minimize the decline of compression efficiency that occurred by conventional contents based encryption schemes using AES or DES algorithms.

Technical and Policy Lessons for the Domestic Future Nuclear-powered Submarine learned from the U.S. Naval Nuclear Propulsion Program (미해군 원자력추진 프로그램으로부터 얻은 미래 원자력추진 잠수함 확보를 위한 기술 및 정책적 교훈)

  • Park, Jin-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.142-149
    • /
    • 2019
  • In the early 2000s, the Korean government first attempted to acquire nuclear-powered submarines as strategic assets. Acquisition of nuclear-powered submarines must overcome the challenges of the initial costs and operating costs of trillions of US dollars per ship, must be agreed to by the international community (including neighboring countries) and in a national consensus, and must have an established technical infrastructure (including manpower). The US navy has been working with governments that want to acquire nuclear propulsion warships since the 1950s, and in 1982, they enacted an executive order called the United States Naval Nuclear Propulsion Program to consolidate efforts and prepare for the future, which sets out the organizational structure, authority, and responsibilities of US governmental management, and integrates national efforts. This paper is to gain valuable wisdom from the U.S. Naval Nuclear Propulsion Program by analyzing all of its histories and contributions, thereby providing valuable lessons for a future program in Korea. It might not be possible to follow the U.S.A. one-on-one because of the scale of national and military forces, but at least we can avoid time and effort spent on trial and error.

A Study on the Record Management of National Archives of Korea (국가기록물 관리의 현황에 관한 발전적 제언)

  • Kim, Sung-Soo
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.3 no.1
    • /
    • pp.159-184
    • /
    • 2003
  • In this research the issues of record management of national archives in Korea are classified into four categories: 1) improving the status of the Central Archives of Korea, 2) constructing a new national archives, 3) revising the law on the record management, 4) creating qualifications for a professional administrator for Archivist. 1) In order to strengthen the function of the Central Archives of Korea, it is very urgent to create a systematic mechanism in which the Central Archives oversees and administers public archives(documents) collected from all the public institutions not only under the Administration but also the legislature and the judicial authorities. 2) This paper suggests that a new National Archives should be a symbolic building representing Korea as archives. Considering the fact that Presidents archives will be a part of this new National Archives, it also suggests that artistic and decorative pieces which embody Korea's representative archives or people should be included in the building. The budget for these should be supplied by the government. 3) This paper looks at the matter of revising the law on Record Management in two respects: (1)strengthening the function of the Central Archives of Korea, (2)making it obligatory to produce archives not open to the public, or making a protection clause for secret archives. This paper proposes that the Central Archives of Korea will be able to collect all the public archives from all the public institutions, and to oversee and administer them by revising the 5th and 6th clauses of the current law on the record management. It also proposes that some laws which make it obligatory to produce archives for documents not open to the public, and which protect those secrecy. 4) Regarding the qualifications for a professional administrator for the record management, this paper suggests lowering the qualification a little to the bachelor's degree of the record management. Also it suggests taking into consideration the persons in charge of the record management in public institutions and acknowledging their qualifications after a certain period of training at the Central Archives of Korea or something like that. In addition, it classifies the ranks of the professional administrators according to their qualifications.