• Title/Summary/Keyword: Database server

Search Result 839, Processing Time 0.029 seconds

Protecting Mobile Agent with VPN (VPN을 이용한 이동 에이전트의 보호)

  • 박재경;원유헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.3-12
    • /
    • 2001
  • In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.

Public Key Encryption with Equality Test with Designated Tester (고정된 검사자를 고려한 메시지 동일성 검사 공개키 암호시스템)

  • Lee, Young-Min;Koo, Woo-Kwon;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.3-13
    • /
    • 2011
  • In 2004, Boneh et.al. proposed a public key encryption with keyword search (PEKS) scheme which enables a server to test whether a keyword used in generating a ciphertext by a sender is identical to a keyword used in generating a query by a receiver or not. Yang et. al. proposed a probabilistic public key encryption with equality test (PEET) scheme which enables to test whether one message of ciphertext generated by one public key is identical to the other message generated by the other public key or not. If the message is replaced to a keyword, PEET is not secure against keyword guessing attacks and does not satisfy IND-CP A security which is generally considered in searchable encryption schemes. In this paper, we propose a public key encryption with equality test with designated tester (dPEET) which is secure against keyword guessing attacks and achieves IND-CPA security.

Public Key Encryption with Keyword Search for Restricted Testability (검증 능력이 제한된 검색 가능한 공개키 암호시스템)

  • Eom, Ji-Eun;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.3-10
    • /
    • 2011
  • To provide efficient keyword search on encrypted data, a public key encryption with keyword search (PEKS) was proposed by Boneh et al. A sender encrypts an e-mail and keywords with receiver's public key, respectively and uploads them on a server. Then a receiver generates a trapdoor of w with his secret key to search an e-mail related with some keyword w. However, Byun et al. showed that PEKS and some related schemes are not secure against keyword guessing attacks. In this paper, we propose a public key encryption with keyword search for restricted testability (PEKS-RT) scheme and show that our scheme is secure against keyword guessing attacks.

COVID-19 International Collaborative Research by the Health Insurance Review and Assessment Service Using Its Nationwide Real-world Data: Database, Outcomes, and Implications

  • Rho, Yeunsook;Cho, Do Yeon;Son, Yejin;Lee, Yu Jin;Kim, Ji Woo;Lee, Hye Jin;You, Seng Chan;Park, Rae Woong;Lee, Jin Yong
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.1
    • /
    • pp.8-16
    • /
    • 2021
  • This article aims to introduce the inception and operation of the COVID-19 International Collaborative Research Project, the world's first coronavirus disease 2019 (COVID-19) open data project for research, along with its dataset and research method, and to discuss relevant considerations for collaborative research using nationwide real-world data (RWD). COVID-19 has spread across the world since early 2020, becoming a serious global health threat to life, safety, and social and economic activities. However, insufficient RWD from patients was available to help clinicians efficiently diagnose and treat patients with COVID-19, or to provide necessary information to the government for policy-making. Countries that saw a rapid surge of infections had to focus on leveraging medical professionals to treat patients, and the circumstances made it even more difficult to promptly use COVID-19 RWD. Against this backdrop, the Health Insurance Review and Assessment Service (HIRA) of Korea decided to open its COVID-19 RWD collected through Korea's universal health insurance program, under the title of the COVID-19 International Collaborative Research Project. The dataset, consisting of 476 508 claim statements from 234 427 patients (7590 confirmed cases) and 18 691 318 claim statements of the same patients for the previous 3 years, was established and hosted on HIRA's in-house server. Researchers who applied to participate in the project uploaded analysis code on the platform prepared by HIRA, and HIRA conducted the analysis and provided outcome values. As of November 2020, analyses have been completed for 129 research projects, which have been published or are in the process of being published in prestigious journals.

Development of a distributed high-speed data acquisition and monitoring system based on a special data packet format for HUST RF negative ion source

  • Li, Dong;Yin, Ling;Wang, Sai;Zuo, Chen;Chen, Dezhi
    • Nuclear Engineering and Technology
    • /
    • v.54 no.10
    • /
    • pp.3587-3594
    • /
    • 2022
  • A distributed high-speed data acquisition and monitoring system for the RF negative ion source at Huazhong University of Science and Technology (HUST) is developed, which consists of data acquisition, data forwarding and data processing. Firstly, the data acquisition modules sample physical signals at high speed and upload the sampling data with corresponding absolute-time labels over UDP, which builds the time correlation among different signals. And a special data packet format is proposed for the data upload, which is convenient for packing or parsing a fixed-length packet, especially when the span of the time labels in a packet crosses an absolute second. The data forwarding modules then receive the UDP messages and distribute their data packets to the real-time display module and the data storage modules by PUB/SUB-pattern message queue of ZeroMQ. As for the data storage, a scheme combining the file server and MySQL database is adopted to increase the storage rate and facilitate the data query. The test results show that the loss rate of the data packets is within the range of 0-5% and the storage rate is higher than 20 Mbps, both acceptable for the HUST RF negative ion source.

Development of Daily Life Monitori ng System using RFID (RFID를 이용한 일상생활 모니터링 시스템 개발)

  • Jung, Kyung-Kwon;Park, Hyun-Sik;Choi, Woo-Seung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.49-56
    • /
    • 2009
  • In this paper, we present a daily activity monitoring system by using a wireless sensor network. The proposed system is installed in glove for activity monitoring. The RFID reader, to send data by using sensor network platform and RFID tag are small size, the shape of quadrangle, and operate in the frequency of 13.56 MHz. The sensor node can read RFID tags on the various objects used in daily living such as furniture, medicines, and kitchenwares. The sensor node reads the data of RFID tags, it transmits wireless packets to the sink node. The sink node sends the received packet immediately to a server system. The data from each RFID system is collected into a database, and then the data are processed to visualize the measurement of daily living activities of users. We provide a web-based monitoring system, and can see the number of RFID tag readings per day as bar charts. The result of experiments demonstrates that the way we propose can help to check the situation of life for people who live alone.

The Development of a Dormitory Management System Using the Ubiquitous and Automation Technology (유비쿼터스와 자동화 기술을 이용한 기숙사 관리 시스템 개발)

  • Jang, Jae-Hyuk;Sim, Gab-Sig
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • Today the use of RFID is extended in medical. circulation market, manufacture, security field, etc. Besides, the book-lending and the attendance management system are on an increasing trend in the use of RFID The developed dormitory management system is composed of a support program, a room management program, a manager program, and a mobile program etc.. In the support program a student(or a manager) can see his(or all member's) entrance and exit history. The room management program decides whether a student can enter the dormitory or not and manages the use of the power after or inquiring a RFID's input tag information into database server. The manager program is able to input and modify a room state and the fixtures information in the room required to operate the room management program, to set up and retrieve a student's entrance and exit information and a room state information. The mobile program enables a manager to check student's identity whether he is in or out, and the manager can know the personal information of being out in detail.

A Study on the ICT-based Disability Evaluation Applications for Special Needs Education (특수 교육을 위한 ICT 기반의 장애 평가 애플리케이션 연구)

  • Jeong, Jongmun;Jung, Daeyoung;Hwang, Mintae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.3
    • /
    • pp.889-899
    • /
    • 2017
  • Various efforts and technical development for integrating the ICT technologies to the area of special needs education have been continuing. In this paper we have studied and implemented various ICT-based disability evaluation websites and mobile applications for special needs education and also verified their usefulness from the field test at disability schools. The valuer can access the websites and mobile applications for autistic behavior or learning disability evaluation at the any places and by any devices such as laptop, PC, smartphone and tablet PC. And all the evalation results are stored into and managed at the server database and shared with websites and mobile applications to integrate together easily. From the study about disability evaluation and implementation results we have a confidence that they will be useful to support the seamless evaluation and the continuous monitoring services for the disabled at the special needs education fields.

Characterization of a Potential Probiotic Lactiplantibacillus plantarum LRCC5310 by Comparative Genomic Analysis and its Vitamin B6 Production Ability

  • Yunjeong Lee;Nattira Jaikwang;Seong keun Kim;Jiseon Jeong;Ampaitip Sukhoom;Jong-Hwa Kim;Wonyong Kim
    • Journal of Microbiology and Biotechnology
    • /
    • v.33 no.5
    • /
    • pp.644-655
    • /
    • 2023
  • Safety assessment and functional analysis of probiotic candidates are important for their industrial applications. Lactiplantibacillus plantarum is one of the most widely recognized probiotic strains. In this study we aimed to determine the functional genes of L. plantarum LRCC5310, isolated from kimchi, using next-generation, whole-genome sequencing analysis. Genes were annotated using the Rapid Annotations using Subsystems Technology (RAST) server and the National Center for Biotechnology Information (NCBI) pipelines to establish the strain's probiotic potential. Phylogenetic analysis of L. plantarum LRCC5310 and related strains showed that LRCC5310 belonged to L. plantarum. However, comparative analysis revealed genetic differences between L. plantarum strains. Carbon metabolic pathway analysis based on the Kyoto Encyclopedia of Genes and Genomes database showed that L. plantarum LRCC5310 is a homofermentative bacterium. Furthermore, gene annotation results indicated that the L. plantarum LRCC5310 genome encodes an almost complete vitamin B6 biosynthetic pathway. Among five L. plantarum strains, including L. plantarum ATCC 14917T , L. plantarum LRCC5310 detected the highest concentration of pyridoxal 5'-phosphate with 88.08 ± 0.67 nM in MRS broth. These results indicated that L. plantarum LRCC5310 could be used as a functional probiotic for vitamin B6 supplementation.

In silico annotation of a hypothetical protein from Listeria monocytogenes EGD-e unfolds a toxin protein of the type II secretion system

  • Maisha Tasneem;Shipan Das Gupta;Monira Binte Momin;Kazi Modasser Hossain;Tasnim Binta Osman;Fazley Rabbi
    • Genomics & Informatics
    • /
    • v.21 no.1
    • /
    • pp.7.1-7.11
    • /
    • 2023
  • The gram-positive bacterium Listeria monocytogenes is an important foodborne intracellular pathogen that is widespread in the environment. The functions of hypothetical proteins (HP) from various pathogenic bacteria have been successfully annotated using a variety of bioinformatics strategies. In this study, a HP Imo0888 (NP_464414.1) from the Listeria monocytogenes EGD-e strain was annotated using several bioinformatics tools. Various techniques, including CELLO, PSORTb, and SOSUIGramN, identified the candidate protein as cytoplasmic. Domain and motif analysis revealed that the target protein is a PemK/MazF-like toxin protein of the type II toxin-antitoxin system (TAS) which was consistent with BLASTp analysis. Through secondary structure analysis, we found the random coil to be the most frequent. The Alpha Fold 2 Protein Structure Prediction Database was used to determine the three-dimensional (3D) structure of the HP using the template structure of a type II TAS PemK/MazF family toxin protein (DB ID_AFDB: A0A4B9HQB9) with 99.1% sequence identity. Various quality evaluation tools, such as PROCHECK, ERRAT, Verify 3D, and QMEAN were used to validate the 3D structure. Following the YASARA energy minimization method, the target protein's 3D structure became more stable. The active site of the developed 3D structure was determined by the CASTp server. Most pathogens that harbor TAS create a crucial risk to human health. Our aim to annotate the HP Imo088 found in Listeria could offer a chance to understand bacterial pathogenicity and identify a number of potential targets for drug development.