• Title/Summary/Keyword: Digital Transaction

Search Result 288, Processing Time 0.026 seconds

Global Transaction Scheduling for One-Copy Quasi-Serializability with Secure Properties (보안성을 갖는 1-사본 준직렬성을 위한 전역트랜잭션 스케쥴링)

  • Jeong, Hyun Cheol
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.99-108
    • /
    • 2009
  • In the security environments of heterogeneous multidatabase systems, not only the existing local autonomy but also the security autonomy as a new constraint are required. From global aspects, transactions maintain consistent data value when they assure serializability. Also, secure properties must protect these transactions and data values to prevent direct or indirect information effluence. This paper proposes scheduling algorithm for global transactions to ensure multilevel secure one-copy quasi-serializability (MLS/1QSR) in security environments of multidatabase systems with replicated data and proves its correctness. The proposed algorithm does not violate security autonomy and globally guarantees MLS/1QSR without indirect information effluence in multidatabase systems.

Transaction Signing-based Authentication Scheme for Secure Distributed Spectrum Sensing in Cognitive Radio Networks (인지 라디오 네트워크의 안전한 분산 스펙트럼 센싱을 위한 트랜잭션 서명기법)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.75-83
    • /
    • 2011
  • Cognitive radio (CR) technology is to maximize the spectrum utilization by allocating the unused spectrums to the unlicensed users. This technology enables the sharing of channels among secondary (unlicensed) and primary (licensed) users on a non-interference basis after sensing the vacant channel and as a result, it is possible to harness wireless frequency more efficiently. To enhance the accuracy of sensing, RDSS was suggested. It is a fusion mechanism based on the reputation of sensing nodes and WSPRT (weighted sequential probability ratio test). However, in RDSS, the execution number of WSPRT could increase according to the order of inputted sensing values, and the fast defense against the forged values is difficult. In this paper, we propose a transaction signing-based authentication scheme for secure distributed spectrum sensing to response the forged values. The validity of proposed scheme is provided by BAN logic.

A Study on the Development of Phased Big Data Distribution Model Based on Big Data Distribution Ecology (빅데이터 유통 생태계에 기반한 단계별 빅데이터 유통 모델 개발에 관한 연구)

  • Kim, Shinkon;Lee, Sukjun;Kim, Jeonggon
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.95-106
    • /
    • 2016
  • The major thrust of this research focuses on the development of phased big data distribution model based on the big data ecosystem. This model consists of 3 phases. In phase 1, data intermediaries are participated in this model and transaction functions are provided. This system consists of general control systems, registrations, and transaction management systems. In phase 2, trading support systems with data storage, analysis, supply, and customer relation management functions are designed. In phase 3, transaction support systems and linked big data distribution portal systems are developed. Recently, emerging new data distribution models and systems are evolving and substituting for past data management system using new technology and the processes in data science. The proposed model may be referred as criteria for industrial standard establishment for big data distribution and transaction models in the future.

The Impact of Customer Value on Relationship Continuity -Focusing on transaction value, relationship value, appraisal value- (기업 간 거래에서 고객가치가 거래지속성에 미치는 영향 -거래가치, 관계 가치, 평가적 가치를 중심으로-)

  • Kim, Hyang-Mi;Lee, So-Young
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.123-132
    • /
    • 2016
  • This study starts from the research question that "Why some companies decide to keep working in partnership even when they are not satisfied with the partner companies simply because they are old business partners." The authors try to find the answer in terms of customer value considering the phases of B2B transaction spectrum: transaction value, relationship value and appraisal value implementing empirical research. The result shows that the intension to retain the relation with an existing partner is formed by the trade-off between the benefit and cost of both contract value and relationship value and not the sole value was dominant. The unique point of the study is that current study is considering these two factors as dependent variables which affect the relationship continuity which is not the case in existing researches.

Study on Intelligence (AI) Detection Model about Telecommunication Finance Fraud Accident (전기통신금융사기 사고에 대한 이상징후 지능화(AI) 탐지 모델 연구)

  • Jeong, Eui-seok;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.149-164
    • /
    • 2019
  • Digital Transformation and the Fourth Industrial Revolution, electronic financial services should be provided safely in accordance with rapidly changing technology changes in the times of change. However, telecommunication finance fraud (voice phishing) accidents are currently ongoing, and various efforts are being made to eradicate accidents such as legal amendment and improvement of policy system in order to cope with continuous increase, intelligence and advancement of accidents. In addition, financial institutions are trying to prevent fraudulent accidents by improving and upgrading the abnormal financial transaction detection system, but the results are not very clear. Despite these efforts, telecommunications and financial fraud incidents have evolved to evolve against countermeasures. In this paper, we propose an intelligent over - the - counter financial transaction system modeled through scenario - based Rule model and artificial intelligence algorithm to prevent financial transaction accidents by voice phishing. We propose an implementation model of artificial intelligence abnormal financial transaction detection system and an optimized countermeasure model that can block and respond to analysis and detection results.

A Study for Used Transaction Analysis System using Big Data (빅데이터를 이용한 중고 거래 분석 시스템 연구)

  • Ahn, Byeongtae
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.259-264
    • /
    • 2021
  • Recently, as the number of used trading sites supporting used trading increases, users want to search for a variety of information in real time. This new change has enabled a new type of C2C (Commerce to Commerce) transaction in the e-commerce base. However, since each used trading site has its own characteristics, it is difficult to standardize the whole. Therefore, in this paper, we studied a system that provides the transaction data used by the user in real time and provides the desired information quickly. In this paper, we researched the crawler system necessary for the development of the integrated trading system for used goods through Internet e-commerce, and made it possible to provide information in the web environment desired by the user through the defined morpheme analyzer. Therefore, in this study, we designed a system that provides information desired by users without accessing various used goods sites.

Implementation of Digital Contents Safety Trade System using Encryption Technology (암호 기술을 이용한 디지털 콘텐츠 안전 거래 시스템 구현)

  • Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.119-125
    • /
    • 2013
  • The amount of digital content grows exponentially by the development of the internet and the change of computing environments and the target also is getting wider. The industry using this digital content has been growing greatly. However, the distribution of pirated digital content is increasing using internet because digital content is easy to store and transmit and the damage is growing. In this paper, we propose safety trading system which can conceal the author's information safely in digital content in order to block illegal distribution of digital content. ARIA encryption algorithm is used to protect the concealed information of author in digital content and it is a help to track the illegal traders by doing fingerprinting of buyer information to digital content and managing the transaction information. The technical support for copyright dispute is to allow by providing the capability to verify illegal edit to original digital contents.

A Study on construction of extranet using wireless data communication of mobile device (모빌 디바이스의 무선데이터통신을 활용한 엑스트라넷 구축연구)

  • 유우식
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.22 no.51
    • /
    • pp.139-149
    • /
    • 1999
  • Developed in this paper is a prototype extranet using mobile device such as Personal Digital Assistance(PDA) or Handheld PC(HPC). Especially an adjustment transaction system for auto insurance using wireless data communications is described. Using infrastructures such as PCS, Cellular, Private Radio, wireless communications offers tremendous applications in Korea. A survey of such applications is presented in this paper. Also an analysis of currently available infrastructures of wireless communications is described in this paper. The scheme of an adjustment transaction consists of seven steps: (1) get list of adjustment, (2) obtain insurance information, (3) check police record, (4) get an accident record, (5) get bluebook value, (6) examine the car, (7) file report. Comparing with the previous on-line method that spends much time on gathering data, the proposed system guarantees more rapid transaction using wireless communications.

  • PDF

A Study on the Relationship Factors Between Buyer and Seller in Industrial Market (산업재 시장에서 구매자와 공곱자간 관계형성 요인에 관한 연구)

  • Lee, Seung-Hui;Kim, Hye-Gyeong
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.255-271
    • /
    • 2005
  • This paper aimed to exam core factors of the relationship factors and analyze their effects on structural bonds and social bonds. And this paper analysis structural bonds and social bonds effects on relationship commitment. To accomplish this purpose, this study examined previous studies and summarized core factors of the relationship making. The result of this study are as follow: First, we examined that 6 factors-tech-shared, product characteristic, transaction specific asset, reputation, trust, communication-were relationship factors of buyer-seller industrial market. Second, it is shown that tech-shared, product characteristic, transaction specific asset factors have a positi-ve influence on the structural bonding. Third, it is shown that reputation, trust, communication factors have a positive influence on the social bonding. Fourth, it is shown that structural bonding, social bonding have a positive influence on the relationship commitment.

  • PDF

Major Criteria for Channel Selection in Banking Transaction

  • Cho, Nam-Jae;Park, Ki-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.1
    • /
    • pp.169-183
    • /
    • 2009
  • The purpose of this research, based on the Media Selection Theory, the Technology Acceptance Model, and the Social Influence Theory, is to investigate the influential factors that affect media selection in banking transactions. Analyses showed that for location sensitive bank windows and ATMs(automatic teller machines), defined as offline-based transaction channels, convenience was the variable affecting media selection. However, in the case of online media not related to location, (phone banking, internet banking, and mobile banking) reliability was the significant variable influencing use. The findings show that banking organizations may benefit from identifying traits of media affecting use, and should differentiate customer services for competitive advantage.

  • PDF