• Title/Summary/Keyword: Common Information

Search Result 6,157, Processing Time 0.038 seconds

Selection and Ranking of Common Attack Patterns for Developing Secure Web Applications (안전한 웹 애플리케이션 개발을 위한 공통 공격패턴의 선별 및 순위화)

  • Moon, Jae-Chan;Kim, Dae-Gyeong;Cho, Seong-Je
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.226-228
    • /
    • 2012
  • 최근 HTML5, AJAX(Asynchronous JavaScript XML) 등으로 구현된 웹 애플리케이션이 널리 이용됨에 따라 웹 애플리케이션에 존재하는 취약점을 악용하는 공격 사례가 증가하고 있다. 웹 애플리케이션의 안전한 개발과 유지보수를 위해, 설계/구현 단계에서의 취약점 완화를 통한 예방, 그리고 운영 단계에서의 공격 탐지 및 대응이 필요하다. 더불어, 위험한 취약점들 및 공격 패턴들을 분석하고 우선순위를 부여하여, 웹 애플리케이션 개발 단계 및 운영 단계에서 심각한 취약점과 공격들을 우선 고려해야 한다. 본 논문에서는 OWASP Top 10과 CWE(Common Weakness Enumeration)를 연동시켜 CAPEC(Common Attack Pattern Enumeration and Classification)에서 웹 관련 주요 공격 패턴을 선별하고 순위화하였다. CWE는 취약점 예방에 도움을 주며, 순위화된 공격 패턴은 웹 애플리케이션에서 주요 공격들을 효율적으로 방어할 수 있게 하여 준다.

Maximizing Use of Common Parts in Complex System Design through Organizing 3D Design Process (3D 설계 프로세스 정립을 통한 복잡한 시스템 설계에서의 공용부품 사용 극대화)

  • Choi, Y.W.;Park, K.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.3
    • /
    • pp.209-219
    • /
    • 2007
  • Designing a complex system such as an LCD developing system becomes inefficient when many designers are involved and create their own parts even though they can be used repeatedly in other sections. Thus, this paper proposes a new design process that can maximize the number of common parts in complex system design by organizing the 3D design process. The proposed design process consists of 5 stages: analysis of design intention, definition of initial product structure, definition of skeleton model, sharing design intention with all assembles, control of correlation between components. The proposed design process can maximize common parts in design process, which results in shorter lead time, less production cost, and greater economic benefits.

The Plural Subject Account of Group Beliefs Using Grounding Concept

  • Koo, Ja-Rok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.11
    • /
    • pp.17-23
    • /
    • 2015
  • In this paper, we propose a plural subject account of group beliefs using grounding concept, which bridges the gap between the two main approaches of ACLs, the mentalistic accounts and the social commitment accounts. The key idea of this Gilbert's plural subject account of group beliefs is to extend the grounding logic into the common ground framework for the semantics of ACLs which is fully verifiable, fully formalized and easily applicable. Thus, we formalize the proper group belief concept using common ground framework and we define the semantics of the primitive speech acts of FIPA-ACL such as inform, request and confirm as case studies. Also, we illustrate our framework on an e-commerce agent purchase negotiation and compare this proposed framework with two traditional semantics for ACLs.

International Time Comparisons in Common-View via Global Positioning System (GPS) Satekkutes (GPS위성 동시수신법에 의한 국제시각비교)

  • 이창복;전인덕;정낙삼
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.2
    • /
    • pp.81-87
    • /
    • 1990
  • International time comparisons using a commercial GPS receiver, with the common-view program of GPS satellite time links, have been carried out between Korea Standards Research Institute(KSRI) and Communications Research Laboratory(CRL) of Japan, and also between KSRI and United Stated Neval Observatory(USNO). The frequency stability is about 1.5 parts in $10^-13$ for the averaging time of 1day. The result of time comparisons obtained by the GPS common-view technique was about 10 times better than that by the LORAN-C(Long Range Navigation) ground wave technique.

  • PDF

A Secure Operating System Architecture Based on Linux against Communication Offense with Root Exploit for Unmanned Aerial Vehicles

  • Koo, KwangMin;Lee, Woo-yeob;Cho, Sung-Ryung;Joe, Inwhee
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.42-48
    • /
    • 2020
  • This paper proposes an operating system architecture for unmanned aerial vehicle (UAV), which is secure against root exploit, resilient to connection loss resulting in the control loss, and able to utilize common applications used in Linux. The Linux-based UAVs are exposed to root exploit. On the other hand, the microkernel-based UAVs are not able to use the common applications utilized in Linux, even though which is secure against root exploit. For this reason, the proposed architecture uses a virtualized microkernel on the Linux operating system to isolate communication roles and prevent root exploit. As a result, the suggested Operating system is secure against root exploit and is able to utilize the common applications at the same time.

An Efficient ID-Based Multisignature Scheme Based on the High Residuosity Problem (고차잉여류 문제에 기반을 둔 다중서명 방식)

  • Lee, Bo-Yeong;Park, Taek-Jin;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.664-671
    • /
    • 1999
  • Itakura and Nakamura proposed the first multisignature scheme based on RSA signature scheme. But if many users sign on one paper, then their scheme has a reblocking problem. In 1991, Ohta and Okamoto proposed a multisignature scheme by using Fiat-Shamir signature scheme. But in this scheme, the group of signers must generate common random number in the first round, and in the second round, they sign the message with common random number. Also L.Harn proposed a multsignature scheme which is based on the ElGamal's. In korea, S.D.Kim et al. at ICEIC'95 conference, proposed an efficient sequential multisignature scheme by using the modified Park-Won scheme. This scheme is not require an additional round to generate common random number, and has fixed signature length. In this paper, we analyze problem of Kim's multisignature scheme, and propose a new multisignature scheme based on ${\gamma}$\ulcorner residuosity problem.

  • PDF

Design of Leveled Incorrect Analysis System Based on Common Cartridge (Common Cartridge 기반의 수준별 오답분석 시스템 설계)

  • Kim, Sun-Ju;Park, Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1226-1229
    • /
    • 2013
  • 우리의 교육은 다양한 매체의 등장과 기술의 발달로 인해 이러닝, 모바일 러닝, 소셜 러닝, 스마트 러닝에 이르기까지 다양한 방식으로 발전 하고 있다. 빠르게 변화하는 교육환경 속에서 우리가 지금 해야 하는 것은 기술의 발전이 가져다준 미래지향적인 교육 패러다임의 방향을 알고, 교육 현장에 적용하는 것이다. 스마트 시대에 적합한 학습환경을 마련하기 위해서는 이러닝의 주요 학습 환경 구성요소인 학습관리시스템(LMS: Learning Management Systems)의 변화가 매우 중요한 역할을 담당한다. 국내 외 이러닝 분야의 표준은 빠르게 신규 버전이 개발되고 새로운 영역의 표준들이 등장하고 있다. 본 논문에서는 디지털 콘텐츠 및 출판의 융합모델에 대한 표준으로 급부상중인 IMS의 Common Cartridge를 기반으로 하는 수준별 오답분석 시스템을 설계하였다.

Product Information Extraction System Based on STEP in CPC Environment (협업적 제품 거래 환경에서 STEP 기반의 제품정보 추출 시스템)

  • Keem, Joon-Hyoung;Park, Sang-Ho;Kim, Hyun
    • Proceedings of the KSME Conference
    • /
    • 2003.11a
    • /
    • pp.1840-1845
    • /
    • 2003
  • Collaborative product commerce (CPC) supports a collaboration that a global enterprise and customer related to life cycle of product share product information and a collaboration process for the collaboration, and integrating applications. In this paper, we use common data schema in order to solve a interoperability problem about shared product information between enterprises. And we map to common data schema from each other different data format. Therefore we implement CPC Adaptor in order to integrate distributed product information.

  • PDF

Rendezvous Issues in AD Hoc Cognitive Radio Networks

  • Joshi, Gyanendra Prasad;Nam, Seung Yeob;Kim, Sung Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3655-3673
    • /
    • 2014
  • Rendezvous is a process of two or more cognitive radio nodes gathering on the same channel at the same time for a negotiation to establish data communications. This paper discusses rendezvous issues in cognitive radio networks. It details why rendezvous is an issue in cognitive radio networks and how rendezvous works. It classifies channel access methods, and details sequence-based channel-hopping methods. It surveys existing works on blind rendezvous and compares the proposed algorithms in terms of the maximum time to rendezvous. This paper discusses the properties that an efficient channel-hopping rendezvous algorithm should have and illustrates common issues in the existing rendezvous methods. It also explains open research issues in the rendezvous area.

Product Information Extraction System Based on STEP in CPC Environment (협업적 제품 거래 환경에서 STEP 기반의 제품정보 추출 시스템)

  • Park, Sang-Ho;Keem, Joon-Hyoung;Kim, Hyun
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.28 no.5
    • /
    • pp.648-653
    • /
    • 2004
  • Collaborative product commerce (CPC) supports a collaboration that a global enterprise and customer related to lift cycle of product share product information and a collaboration process for the collaboration, and integrating applications. In this paper, we use common data schema in order to solve a interoperability problem about shared product information between enterprises. And we map to common data schema from each other different data format. Therefore we implement CPC Adaptor in order to integrate distributed product information.