• Title/Summary/Keyword: Database security

Search Result 643, Processing Time 0.03 seconds

The Effects of Microcomputer Networking on the Perception of Threats to Security : the Military User크s Case (마이크로컴퓨터의 네트워크화 여부가 보안 위협 인식에 미치는 영향 : 군조직을 대상으로)

  • 이찬희;김준석;서길수
    • The Journal of Information Technology and Database
    • /
    • v.6 no.2
    • /
    • pp.1-18
    • /
    • 1999
  • The purpose of this study was to identify the effect of microcomputer networking on user perception of potential threats to security employing user attitudes as a moderating variable. A research model consisting of microcomputer networking as the independent variable, user perception of potential threats to security as the dependent variable, and user attitude toward security control as the moderating variable was developed through literature review. The results of this study provide an empirical evidence of the importance of environmental change(information systems networking) on user perception of potential threats to security. Further-more the result imply that in order to improve security performance through the reinforcement of user perception of threats to security in the organization, user attitudes should be made favorable.

  • PDF

Comparing Recoverability of Deleted Data According to Original Source Collection Methods on Microsoft SQL Server (Microsoft SQL Server의 원본 수집 방식에 따른 삭제 데이터의 복구 가능성 비교)

  • Shin, Jiho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.859-868
    • /
    • 2018
  • Previous research related to recovering deleted data in database has been mainly based on transaction logs or detecting and recovering data using original source files by physical collection method. However there was a limit to apply if the transaction log does not exist in the server or it is not possible to collect the original source file because a database server owner does not permit stopping the database server because of their business loss or infringement at the scene. Therefore it is necessary to examine various collection methods and check the recoverability of the deleted data in order to handling the constraints of evidence collection situation. In this paper we have checked an experiment that the recoverability of deleted data in the original database source according to logical and physical collection methods on digital forensic investigation of Microsoft SQL Server database.

A Study on The Design of Network and Database Structure of The Integrated System for Power System Operational Planning and Analysis (전력수급계획 및 운용해석 종합시스템을 위한 네트워크 및 데이터베이스구조 설계에 관한 연구)

  • Ahn, Yang-Keun;Park, Si-Woo;Nam, Jae-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.1009-1011
    • /
    • 1998
  • This paper presents a design of network and database structure of the integrated system for power system operational planning and analysis that will be more economical and stable of power system operation. An alias of this system is Highly Integrated Total Energy System(HITES). The Client/server model of HITES is designed as a remote data management model. The input/output-type of application programs and Oracle server is standardized. The separated user-databases from main-database strengthen security of HITES. It is plan to do that tables and relationships are defined by database designs. The connection of application program and DBMS of HITES will be tested through database design and data construction.

  • PDF

A Study of an Effective Database Design Method for Power System Protection (효율적인 계통보호 데이터베이스 디자인 방법에 관한 연구)

  • Ahn, Y.T.;Choi, M.S.;Lee, S.J.;Kang, S.H.;Kim, H.P.;Choi, H.S.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.905-907
    • /
    • 1998
  • The setting of protective relays, which is critical to the system security, requires a huge volume of data and a lot of repetitive calculations. Since an effective design of a database is essential. The relay setting database must accommodate a variety of protective devices. Also its information can be viewed and updated with easy by humans and by computer programs. This paper describes several existing database designs for power system protection, their advantages and disadvantages. Also this paper develops an effective database for power system protection with their advantages.

  • PDF

Configuring RBAC to Object-Oriented Database Security Model (역할기반 접근제어를 적용한 객체지향 데이터베이스의 보안모델)

  • Cho, Ki-Cheon;Kim, Eun-Hee;Shin, Moon-Sun;Ryu, Keun-Ho;Shin, Ki-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10a
    • /
    • pp.93-96
    • /
    • 2001
  • 객체지향 데이터베이스 보안모델은 객체지향 패러다임의 각 속성에 대한 보안정책을 정의한다. 객체지향 데이터베이스의 보안 목적은 데이터베이스에 대한 권한이 없는 사용자의 접근을 제어함으로써 정보의 고의적인 파괴나 변경을 방지하고, 우발적인 사고로부터 데이터를 보호하는 것이다. 일반적인 데이터베이스 보안모델은 임의접근제어(DAC)나 강제접근제어(MAC)를 이용하여 보안문제를 해결하였지만, 이 논물에서는 역할기반 접근제어를 객체지향 데이터베이스에 적용해서 보안문제를 해결한다. 따라서, 기존의 객체지향 데이터베이스의 보안속성과 보안정책에 기반한 주체, 객체, 접근모드들을 정의하였고, 개념적인 클래스를 설계해서 객체지향 데이터베이스의 보안모델을 제시하였다.

  • PDF

A Study for Efficiency of Database Encrypting and Searching Systems (데이터베이스 암호화 및 검색 시스템의 효율성에 관한 연구)

  • Lee Yu-Jeong;Park Hyun-A;Byun Keun-Duck;Lee Dong-Hoon
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.707-711
    • /
    • 2006
  • 암호화 문서 검색 시스템은 사용자의 비밀키를 이용하여 데이터베이스 서버에 저장되어 있는 암호화 문서를 키워드를 이용하여 검색하는 시스템이다. 이러한 시스템은 데이터베이스 서버 관리자조차도 사용자들에 의해 저장되고 검색되는 문서에 대한 어떠한 정보도 노출시키지 않는 장점이 있다. 즉, 암호화 문서 검색 시스템은 일반 사용자들이 자신의 정보가 손쉽게 노출되는 것을 원치 않는 사회적 변화에 발맞추어 앞으로 지속적으로 발전할 수 있는 연구 주제이다. 하지만, 지금까지 제안된 대부분의 기법들은 이론적인 안전성에만 치우친 나머지 현실적인 적용 가능성이 고려되지 않았다. 이에 본 연구에서는 기존에 제안된 대표적인 기법들을 현실 상황에 맞게 구현하여 검색 시스템의 효율성에 대해 판단한다. 더불어 해당 결과를 바탕으로 앞으로 암호화된 검색 시스템이 나아가야 할 방향을 제시한다.

  • PDF

A Study of Security Level Conversion Scheme for Security Documents (보안 문서의 보안 수준 변환을 위한 기법 연구)

  • Cho, Do-Eun;Yeo, Sang-Soo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.3
    • /
    • pp.405-411
    • /
    • 2011
  • The value of information becomes very high, a large number of research works has been made for acquiring, managing, and using information. In a specific company (or organization), they are classifying company data documents with managed security levels, and they are securing their secured documents. In this paper, we introduce essential technologies enabling to inspect documents securely and to change specific keywords to normal words, in case that a higher security level document should be converted to a lower security level document.

Policy-based Security System Modeling using Vulnerable Information (취약성 정보를 활용한 정책 기반 보안 시스템 모델링)

  • Sea, Hee-Suk;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Information Technology Services
    • /
    • v.2 no.2
    • /
    • pp.97-109
    • /
    • 2003
  • As the importance and the need for network security is increased, many organization uses the various security systems. They enable to construct the consistent integrated security environment by sharing the vulnerable information among firewall, intrusion detection system, and vulnerable scanner. And Policy-based network provides a means by which the management process can be simplified and largely automated. In this article we build a foundation of policy-based network modeling environment. The procedure and structure for policy rule induction from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Based) is conducted. It also transforms the policy rules into PCIM (Policy Core Information Model).

Efficient RFID Authentication protocol for Distribution Database Environment (분산시스템 환경에 적합한 효율적인 RFID 인증 시스템)

  • Choi, Eun-Young;Lee, Su-Mi;Lim, Jong-In;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.25-35
    • /
    • 2006
  • Radio Frequency identification (RFID) will become an important technology in remotely object identification systems. However, the use of RFID tags may create new threats to the sniな and Privacy of individuals holding RFID tags. These threats bring several problems which are information leakage of a tag, location trace of individuals and impersonation of a tag. Low-cost RFID systems have much restrictions such as the limited computing power, passive power mechanism and low storage space. Therefore, the cost of tag's computation should be considered as an important factor in low-cost RFID systems. We propose an authentication protocol, OHLCAP which requires only one one-way hash function operation and hence is very efficient. Furthermore, our protocol is suitable to distribution database environment. Hence our scheme can be applied to ubiquitous computing environment.

Embedding a Signature to Pictures under Wavelet Transformation (웨이브렛변환을 이용한 영상으로의 서명데이터 삽입)

  • Do, Jae-Su
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.83-89
    • /
    • 2007
  • This paper is to suggest the method of embedding a signature to pictures secretly under the orthogonal wavelet transform which represents pictures as multi-resolution representations. As it is focused upon the differential output under the multi-resolution representation of pictures, this method can embed bit series to pictures. In doing so, it can compound approximately 6K byte of information with gray-level image $256{\times}256$. The method can include not only the database which designates copyright of pictures but also the author and usage of pictures, and the information of the picture itself. Therefore, this method can easily discriminate the inspection of picture database.

  • PDF