• Title/Summary/Keyword: Access authority

Search Result 243, Processing Time 0.029 seconds

Design of the Function for User Program Execution Control in the Windows Environments (윈도우 환경에서 사용자 프로그램 실행 권한 제어 기능 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1553-1560
    • /
    • 2016
  • In this paper, we design a program that controls the execution permissions for the running application in the Windows system environment. It does not allow general users to execute the program converting the specific location information of the execution program, to any of the bit values with the formal structure information in window program. The converted bit value can be returned to the original bit value in the case of an authorized user, so that the original program can be normally performed. By doing so, it can be more safely used in the risk of reverse engineering for Windows executable program. We implemented the control program for the program execution authority we proposed in this paper, and the experiment was performed. At the results of experiments, it was confirmed that the control function to permit execution for the user program was working properly in the Windows environment.

A Study on the Development of Digital Library Model for PUST in North Korea (북한 PUST 디지털도서관 모델 개발 연구)

  • Lee, Jong-Moon
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.3
    • /
    • pp.143-158
    • /
    • 2008
  • This study was conducted under the premise of providing the model for the construction of the library and the digital library in PUST, the joint construction from South and North Korea. First, we determined the problems in the construction of digital libraries as well as possible issues that may rise from the construction of the digital library in PUST. The results of the research showed that there were imminent problems from the operation of a digital library with the inadequate progress in the Held of copyright. In addition, the difference in the language system and the knowledge foundations of the two countries will produce problems in the homepage access, database construction, and information retrieval. In order to overcome these predictable problems, this research proposes the following: (1) parallel operation of both digital and high-drive libraries; (2) duplexing the homepage through the application of unicode concerning the digital library; (3) development and application of converted letter codes through the establishment of NCHAR data type; and (4) construction of an authority database.

A Secure and Effective Optimal Path Searching Method on Certificate Chains in Mobile Ad hoc NETworks (모바일 애드흑 네트워크의 안전하고 효과적인 치적의 인증경로 탐색 기법)

  • Choi, Sung-Jae;Kim, Yong-Woo;Lee, Hong-Ki;Song, Joo-Seok;Nyang, Dae-Mon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.310-317
    • /
    • 2005
  • In opposition to conventional networks, mobile ad hoc networks usually do not offer trust about nodes or online access through certificate authorities or centralized servers. But, nodes in those systems need process that can search path as well as trust each other to exchange data in safety For these reasons, traditional security measures that require online trusted authorities or certificate storages are not well-suited for securing ad hoc networks. In this paper, I propose a secure and effective method to search the optimized path using profitable flooding techniques on certificate chains in MANETS(Mobile Ad hoc NETworks). This system includes not only using routing protocols that are generally broadcasting packets but also finding nodes securely and verifing the process through tiust relationships between nodes that are searched.

A Study on The Internet Connectivity in The Philippines

  • Salac, Romeo Agan;Kim, Yun Seon
    • Asia Pacific Journal of Business Review
    • /
    • v.1 no.1
    • /
    • pp.67-88
    • /
    • 2016
  • This study aims to help address concerns about the growing demand of wider bandwidth Internet connection in the Philippines. Using articles and research of international organizations and content from official websites of the Philippine government, this paper has carefully examined the slow Internet connectivity and the high cost that the end-users pay for it. This paper suggests that this inefficiency hampers the motivation of users to innovate in a way that could contribute to inclusive growth and the development of an inclusive information society. Through a comparison of the current global ICT situation with the current situation in the Philippines, this paper shows that the country's Internet infrastructure lags behind among those of contemporary developing countries in Asia, particularly in terms of Internet connectivity. In 2015, Thailand had an average Internet speed of 7.4 Mbps, Sri Lanka 7.4, and Malaysia 4.3. Meanwhile, the Philippines had a meager average Internet speed of 2.8 Mbps, placing the country at 104 among 160 countries, with developed countries in Asia such as South Korea (23.6 Mbps) and Singapore (12.9 Mbps) ranking 1 and 12, respectively. Findings show that the lack of competition in the Internet connectivity market, among other reasons, is at the root of the dilemma of slow and costly Internet connection. Assessing the accomplishments of the Republic of Korea and other broadband-leading countries has provided practical insights and recommendations that can promote competitiveness. Furthermore, related literature argues how ISP practices may affect Internet speed and cost. This study offers an approach in improving Internet connectivity in the Philippines by bridging the gap between the Internet infrastructure market and government policies.

Analysis of Information Structure and Contents on the Web Sites for Catering Services (출장요리서비스 웹 사이트의 구성 및 내용 분석)

  • Jo, Seon-Yeong;Gang, Hye-Gyeong;Lee, Seon-Yeong;Gang, Myeong-Hui
    • Journal of the Korean Dietetic Association
    • /
    • v.11 no.3
    • /
    • pp.273-285
    • /
    • 2005
  • This study examined the structure and contents of the information provided by the web sites, in terms of clarity, business goal, authority, sustainment of operation and responsibility of customer care, as well as menus. The findings from the analysis of 217 web sites selected from 5 major portal sites, are 1) most of catering business over internet are located around Seoul area, 2) almost 80% of the selected sites are administered by professional agents or firms while the remnants by individuals, 3) except menu and price, any additional information is hardly shown, 4) about three quarter of the sites opened after 2001, that is coherent with the trend of the growth of internet users and eating-out, 5) it is strongly required to create healthful cyber space for the customers, 6) a small number of the sites(12.4%) try to manage access from customers, 7) many sites(73.7%) open the channels for feedback from the customers 8) among the types of catering services offered by the sites, home party is the most popular and the kinds of cuisine, Korean, Japanese, and Chinese, are divided into almost same proportion of the sites, 9) the average number of dishes is 33.5, 10) they offer 7 to 8 different dishes of grain, 4 to 6 of meat, 4 to 10 of fishes, 5 to 13 of vegetables, 1 of fruits, and 1 to 3 of dairy products, 11) The majority of price level is ₩15,001 - ₩20,000.

  • PDF

A study on the send and receive of the message in the TEDI system (TEDI 시스템상의 메시지 송수신에 관한 고찰)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.43-56
    • /
    • 2004
  • The purpose of this paper is to study the send and receive of the message in the TEDI System. The TEDI System replaces a series of trade documents with electronic date, and it realizes secure and reliable transactions of data among parties by means of open networks, such as the Internet. The TEDI system is composed of Web browsers, TC Serves, a RSP Server, and Certification Servers. TEDI has development the system and legal frame work. Exporters, importers, carriers, banks insurance and companies those who engage in the trade releated business have tested TEDI system and evaluated the legal frame work from the practical point of view. TEDI is now refining the system and preparing for the service. A fundamental feature of the TEDI System is the attribution to participants of data messages through public key certificates issued by certification authorities that allow for verification of digital signatures. Access to servers maintained by such certification authorities also takes place through the internet. In principle, certificates used by any reputable certification authority may be employed as long as they are compatible with X.509 V3.

  • PDF

A Design of Smart Banking System using Digital Signature based on Biometric Authentication (바이오인증 기반의 전자서명을 이용한 스마트 뱅킹 시스템 설계)

  • Kim, Jae-Woo;Park, Jeong-Hyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6282-6289
    • /
    • 2015
  • Today, there is an increasing number of cases in which certificate information is leak, and accordingly, electronic finance frauds are prevailing. As certificate and private key a file-based medium, are easily accessible and duplicated, they are vulnerable to information leaking crimes by cyber-attack using malignant codes such as pharming, phishing and smishing. Therefore, the use of security token and storage toke' has been encouraged as they are much safer medium, but the actual users are only minimal due to the reasons such as the risk of loss, high costs and so on. This thesis, in an effort to solve above-mentioned problems and to complement the shortcomings, proposes a system in which digital signature for Internet banking can be made with a simply bio-authentication process. In conclusion, it was found that the newly proposed system showed a better capability in handling financial transitions in terms of safety and convenience.

A Study of Authentication Design for Youth (청소년을 위한 인증시스템의 설계에 관한 연구)

  • Hong, Ki-Cheon;Kim, Eun-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.952-960
    • /
    • 2007
  • Most Websites perform login process for authentication. But simple features like ID and Password have no trust because most people worry about appropriation. So the youth can easily access illegal media sites using other's ID and Password. Therefore this paper examine features be adaptable to authentication system, and propose a design of authentication system using multiple features. A proposed authentication system has two categories, such as low-level and high-level method. Low-level method consists of grant of authentication number through mobile phone from server and certificate from authority. High-level method combines ID/Password and features of fingerprint, character, voice, face recognition systems. For this, this paper surveys six recognition systems such as fingerprint, face, iris, character, vein, voice recognition system. Among these, fingerprint, character, voice, face recognition systems can be easily implemented in personal computer with low cost accessories. Usage of multiple features can improve reliability of authentication.

  • PDF

A Study on the Remote Library Users : Needs of Library Services and Preferences (원거리 이용자들의 도서관 서비스 이용과 선호도에 관한 연구)

  • Kim, Mi-Hyeon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.34 no.3
    • /
    • pp.61-76
    • /
    • 2000
  • A study on the remote library users showed that remote users preferred online databases and internet as information resources because of easy access and easy of use. However, they have used books and journals, which are printed resources, as main information resources because online databases and internet cannot satisfy their information needs. Also, 86.7 percent of remote users consider library services as an important issue to choose a distance learning program, and remote users extremely motivated by their professors to use library so that there are needs to have partnership between distance learning programs and library services. Finally, remote users consider authority and accuracy and contents of obtained information as important issues for their information rather than design of the databases, so that library should secure more digitalized information for remote users needs. This study is to contribute to improve quality of information services for remote users, however, it is not thoroughgoing enough, and there should be successive researches in the future.

  • PDF

Analysis of Smart Grid Network Vulnerability Using Smart Phone (Smart Phone을 통한 Smart Grid 네트워크 접속에서 취약성)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.240-243
    • /
    • 2010
  • Smart Phone supplies are diffused and substitute the Internet PC with Mobile communications which they are applied. Smart Phone in Smart Grid where electric power watch and the IT of existing amalgamate are used with business. Consequently from Smart Grid network connections which lead Smart Phone in about connection and control in about security vulnerabilities and Smart Grid networks the research is necessary in about vulnerability. It uses Smart Phone from the present paper and when approaching electric power watch systems which lead Smart Grid networks, it researches in about connection vulnerability. Also it uses Smart Phone and after connecting in Smart Grid networks a vulnerability in seizure possibility and, electric power information and control information, about private data etc. access authority it analyzes with the problem point which occurs it confronts it researches. And the research direction for a security reinforcement under presenting boil in about Smart Grid network security vulnerabilities which lead Smart Phone.

  • PDF