• Title/Summary/Keyword: Authenticity verification

Search Result 31, Processing Time 0.021 seconds

A Verification Strategy for the Origin of Electronic Records (전자기록의 출처확인 지원전략)

  • Song, Byoungho
    • The Korean Journal of Archival Studies
    • /
    • no.25
    • /
    • pp.47-89
    • /
    • 2010
  • The target of managing electronic records should be the trusted record services to the end-users. The natural characteristics of electronic records yields the drawback in the authenticity aspect and in the integrity aspect, and current standards and methodologies have beed developed to treat this drawback. However the authenticity and the integrity concepts is hardly separated each other and too completed, so alternative "source" concept is introduced and a verification strategy for the origin of electronic records is discussed in this paper. According to this concept, current standards and methodologies may be criticized for the negligence of necessary information organizing/verification, the doubtful long-term verification, and the missing counter-strategy for the verification-failed records. To solve this, needed facters for origin verification is described, new preservation format divided into temporally-fluctuating (variable) part and immutable (fixed) part is proposed, and a strategy to prevent, avoidance, and detection/recovery important records is suggested.

A Study on the Authenticity, Job Satisfaction, Organizational Commitment, Quality of Life and Job Performance of the Business Sport Team Players

  • Min-Kyu, Choi;Kyung-Won, Byun
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.181-189
    • /
    • 2022
  • The purpose of this study is to verify study models and examine a causal relationship among authenticity, job satisfaction, organizational commitment, quality of life and job achievement for amateur business team player. In order to achieve the purpose, this study conducted structural equation model analysis for study models consisting of extraneous variables after examining the authenticity(organization, leader) that amateur business players perceive and endogenous variables including job satisfaction, organizational commitment, quality of life, and job performance. The object of questionnaires in this study selected sports business team players nationwide as a population and 348 players were chosen as final effective samples by applying a convenient sampling method for offline and online questionnaires. The research tool for this study is a questionnaire. The two dimensions of authenticity were used by developing a scale. For all endogenous variables, the scales used in previous studies were modified and used according to the purpose of the study. This study analyzed the collected data, applying SPSS Win ver. 23.0 and AMOS 20.0 programs in order to analyze the characteristics of the study objects, describe questionnaires, and verify selected study hypothesis, individual hypothesis was verified after identifying the reliability and validity of measurement model, and the fitness verification of study models. In the results, all of the 8 hypothesis were adopted and the reciprocal relationship among each factors in the study model were observed.

The Effect of CSR Perception On Creativity : The Mediating Effect of Compassion and the Moderating Effect of CSR Authenticity (기업의 사회적 책임(CSR) 인식이 조직 구성원들의 창의성에 미치는 영향 : 컴페션의 매개효과와 CSR진정성의 조절효과)

  • Ko, Sung-Hoon;Choi, Yongjun
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.59-70
    • /
    • 2020
  • This study aims to examine the effect of employees' CSR perception on creativity via compassion along with the moderating effect of CSR authenticity. For the research procedure, frequency analysis and CFA analysis were performed after sample collection, hypothesis verification and moderating effect verification were performed. We conducted an empirical analysis using 360 employees from large-sized companies in Korea. First, the results showed that CSR perception was positively related to employees' compassion. Second, compassion was also positively related to creativity. Third, the positive relationship between CSR perception and creativity was mediated by compassion, and the aforementioned mediated relationship was moderated by CSR authenticity. Therefore, our study findings imply that, when employees perceive CSR, they will not only form compassion emotions but also will display more creativity especially when they perceive the authenticity of CSR.

The Model of Appraisal Method on Authentic Records (전자기록의 진본 평가 시스템 모형 연구)

  • Kim, Ik-Han
    • The Korean Journal of Archival Studies
    • /
    • no.14
    • /
    • pp.91-117
    • /
    • 2006
  • Electronic Records need to be appraised the authenticity as well as the value itself. There has been various kinds of discussion about how records to be appraised the value of themselves, but there's little argument about how electronic records to be appraised the authenticity of themselves. Therefore this article is modeling some specific authenticity appraisal methods and showing each stages those methods should or may be applied. At the Ingest stage, integrity verification right after records creation in the organization which produced the records, quality and integrity verification about the transferred in the organization which received the records and integrity check between SIP and AIP in the organization which received and preserved the records are essential. At the Preservation stage, integrity check between same AIPs stored in different medium separately and validation of records where or not damaged and recovery damaged records are needed. At the various Processing stages, suitability evaluation after changing the record's management control meta data and changing the record's classification, integrity check after records migration and periodical validation and integrity verification about DIPs are required. For those activities, the appraisal methods including integrity verification, content consistency check, suitability evaluation about record's meta data, feasibility check of unauthorized update and physical status validation should be applied to the electronic records management process.

Secure Fragmentation Technique for Content-Centric Networking (콘텐츠 중심 네트워크를 위한 안전한 패킷 단편화 기술)

  • Hyun, Sangwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.831-841
    • /
    • 2017
  • This paper presents a secure and DoS-resistant fragment authentication technique for Content-Centric Networking (CCN). Our approach not only guarantees the authenticity of each fragment, but also provides a high resistance to DoS attacks through the immediate verification of fragment authenticity at interim nodes on the routing path. Our experimental results demonstrate that the proposed approach provides much stronger security than the existing approach, without imposing a significant overhead.

A Strongly Unforgeable Homomorphic MAC over Integers (강한 위조 불가능성을 갖는 정수 기반 준동형 메시지 인증 코드)

  • Joo, Chihong;Yun, Aaram
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.461-475
    • /
    • 2014
  • Homomorphic MAC is a cryptographic primitive which protects authenticity of data, while allowing homomorphic evaluation of such protected data. In this paper, we present a new homomorphic MAC, which is based on integers, relying only on the existence of secure PRFs, and having efficiency comparable to the practical Catalano-Fiore homomorphic MAC. Our scheme is unforgeable even when MAC verification queries are allowed to the adversary, and we achieve this by showing strong unforgeability of our scheme.

The Effect of CSR Motivation of K-Beauty Brands on CSR Authenticity and Brand Trust -Focusing on Comparison of Korean and Chinese Consumers- (K-뷰티 브랜드의 CSR동기가 CSR 진정성과 브랜드 신뢰에 미치는 영향 -한·중 소비자 비교를 중심으로-)

  • Sun-Joo Lee;Yun-Hee Jeong
    • Journal of the Korean Applied Science and Technology
    • /
    • v.40 no.2
    • /
    • pp.210-222
    • /
    • 2023
  • This study conducted a comparative study using Korean and Chinese consumer data to confirm the impact of K-beauty brand's CSR motivation on CSR authenticity and brand trust, and the effect of CSR authenticity and brand trust on brand support. Of the collected data, 392 copies were used for verification and analyzed using a two-step approach and maximum likelihood measure. As a result of the study, it was found that value-driven, stakeholder-driven, and strategic motivations, excluding egoistic motivations, had a positive effect on CSR authenticity and brand trust. In addition, CSR authenticity had a positive effect on brand trust, which was found to support the brand. As a result of comparing Korean and Chinese consumers, it was found that CSR motives in both countries affect authenticity and brand trust, but Chinese consumers showed higher results in more areas than Korean consumers. These results show that K-beauty brands in order to expand the Chinese market, it has implications that it is necessary to understand Chinese consumers and strengthen the CSR motivation strategy they pursue.

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages

  • Yang, Haomiao;Kim, Hyunsung;Li, Hongwei;Yoon, Eunjun;Wang, Xiaofen;Ding, Xuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2544-2560
    • /
    • 2013
  • As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.

A Study on the Authenticity Verification of UxNB Assisting Terrestrial Base Stations

  • Kim, Keewon;Park, Kyungmin;Kim, Jonghyun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.131-139
    • /
    • 2022
  • In this paper, to verify the authenticity of UxNB that assists terrestrial base stations, the solutions for SI (System Information) security presented in 3GPP TR 33.809 are analyzed from the perspective of UxNB. According to the definition of 3GPP (Third Generation Partnership Project), UxNB is a base station mounted on a UAV (Unmanned Aerial Vehicle), is carried in the air by the UAV, and is a radio access node that provides a connection to the UE (User Equipment). Such solutions for SI security can be classified into hash based, MAC (Message Authentication Codes) based, and digital signature based, and a representative solution for each category is introduced one by one. From the perspective of verifying the authenticity of UxNB for each solution, we compare and analyze the solutions in terms of provisioning information and update, security information leakage of UxNB, and additionally required amount of computation and transmission. As a result of the analysis, the solution for verifying the authenticity of the UxNB should minimize the secret information to be stored in the UxNB, be stored in a secure place, and apply encryption when it is updated over the air. In addition, due to the properties of the low computing power of UxNB and the lack of power, it is necessary to minimize the amount of computation and transmission.

Research on Development of Digital Forensics based Digital Records Migration Procedure and Tool (디지털 포렌식 기반의 전자기록물 이관 절차 및 도구 개발에 관한 연구)

  • Lee, Seokcheol;Yoo, Hyunguk;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.571-580
    • /
    • 2014
  • Digital Records, which are created, stored, and managed in digital form, contains security vulnerability such as data modification, due to the characteristic of digital data. Therefore it is necessary to guarantee the reliability by verification of integrity and authenticity when managing digital records. This paper propose digital forensics based migration process for electronic records by analyzing legacy digital forensics process, and derives the requirements to develop digital forensics based electronic records migration tool through analyzing trends of abroad digital records migration technique and tool. Based on these develop digital forensic based digital records migration tool to guarantee integrity and authenticity of digital records.