• Title/Summary/Keyword: Full security

Search Result 298, Processing Time 0.029 seconds

Effects of Shift Pattern and Expertise on Perceived Workload and Performance for Aviation Security Screeners (항공보안검색요원의 교대근무유형과 경력에 따른 주관적 업무부하와 수행)

  • Chung, Eun Kyoung;Shin, Younghwan;Sohn, Young Woo
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.24 no.3
    • /
    • pp.1-9
    • /
    • 2016
  • The study examined the effects of shift pattern and expertise on perceived workload and performance for aviation security screeners. 18 security screeners participated in this study, in which data were analyzed by dividing them into two groups (experts vs. less-experts). We measured their perceived workloads and performances (i.e., reading time through X-ray) as a function of shift pattern and time condition. As a result, highly experienced screeners (experts) showed high workload during the morning shift, while lowly experienced screeners (less-experts) reported high workload during the full-day and the afternoon shifts. In addition, less-experts took a longer time to inspect the baggage when they worked for the full-day and the afternoon shifts. Particularly, in the last time slot of the full-dat shift, expert screeners had a high workload, while both groups showed a high-level of workload at around 17:30 in the afternoon shift.

Full-digital portable radiation detection system (디지털 휴대용 방사능 검출 시스템)

  • Oh, Jae-kyun;Lee, Seok-Jae;Kim, Young-kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1436-1442
    • /
    • 2015
  • In recently the world trend of security system for shipping transport is much more important and stronger, so following the world trend, there is development to security system of shipping transport for national security logistics system construction. it is still ongoing. For the world trend of security system, there is attempt of portable radiation detection, which is possible to get detection of nuclide in south Korea.

Cryptographic Analysis of the Post-Processing Procedure in the Quantum Random Number Generator Quantis (양자난수발생기 Quantis의 후처리 과정에 관한 암호학적 분석)

  • Bae, Minyoung;Kang, Ju-Sung;Yeom, Yongjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.449-457
    • /
    • 2017
  • In this paper, we analyze the security and performance of the Quantis Quantum random number generator in terms of cryptography through experiments. The Quantis' post-processing is designed to output full-entropy via bit-matrix-vector multiplication based on mathematical background, and we used the min-entropy estimating test of NIST SP 800-90B so as to verify whether the output is full-entropy. Quantis minimizes the effect on the random bit rate by using an optimization technique for bit-matrix-vector multiplication, and compared the performance to conditioning functions of NIST SP 800-90B by measuring the random bit rate. Also, we have distinguished what is in Quantis' post-processing to the standard model of NIST in USA and BSI in Germany, and in case of applying Quantis to cryptographic systems in accordance with the CMVP standard, it is recommended to use the output of Quantis as the seed of the approved DRBG.

Effects of early nonparental care on preschoolers' socioemotional behaviors (영·유아기 타인양육이 학령전 어린이의 사회정서적 행동에 미치는 영향)

  • Park, Kyung Ja
    • Korean Journal of Child Studies
    • /
    • v.13 no.2
    • /
    • pp.217-228
    • /
    • 1992
  • The purpose of this study is to examine the effects of early full-time nonparental care during infancy/toddlerhood on children's socioemotional behaviors during the preschool period. Subjects for this study were 105 three- to five-year-olds from middle-class families in the U. S. A. Children were assigned to one of three groups according to their early care history. Children's social interactions with peers and caregivers during indoor free-play sessions in day care centers were observed for 20 minutes. The head teachers rated the children's social and emotional behaviors on two questionnaires. Mothers completed the Attachment Q-sort for attachment assessment for the preschoolers. In addition, mothers were asked to fill out a questionnaire on their parenting practices. Children who had received full-time nonparental care during infancy and/or toddlerhood were rated by their teachers as being more intellectually competent than children who did not receive full-time nonparental care during first three years of life. They were, however, rated by teachers and were observed by the researcher as being more aggressive than children with no full-time nonparental care. These children were observed to engage in less wandering/onlooking behaviors than children who had not had any full-time nonparental care. Children's attachment security scores and dependency scores did not differ as a function of early nonparental care histories. When the effects of early care patterns, sex of child, and current attachment security to mothers on aggressive behaviors of the preschoolers were examined by a hierarchical regression model, then any "pure" effects of nonparental care and of attachment security on child aggression were minimal after controlling for family background, child care center quality, and maternal childrearing practices. Strong buffering factors for the preschool children (family characteristics, parenting styles, and high quality nonparental care) mediated a possible risk factor of early nonparental care and promoted optimal outcomes for the children.

  • PDF

High-Speed FPGA Implementation of SATA HDD Encryption Device based on Pipelined Architecture (고속 연산이 가능한 파이프라인 구조의 SATA HDD 암호화용 FPGA 설계 및 구현)

  • Koo, Bon-Seok;Lim, Jeong-Seok;Kim, Choon-Soo;Yoon, E-Joong;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.201-211
    • /
    • 2012
  • This paper addresses a Full Disk Encryption hardware processor for SATA HDD in a single FPGA design, and shows its experimental result using an FPGA board. The proposed processor mainly consists of two blocks: the first block processes XTS-AES block cipher which is the IEEE P1619 standard of storage media encryption and the second block executes the interface between SATA Host (PC) and Device (HDD). To minimize the performance degradation, we designed the XTS-AES block with the 4-stage pipelined structure which can process a 128-bit block per 4 clock cycles and has 4.8Gbps (max) performance. Also, we implemented the proposed design with Xilinx ML507 FPGA board and our experiment showed 140MB/sec read/write speed in Windows XP 32-bit and a SATA II HDD. This performance is almost equivalent with the speed of the direct SATA connection without FDE devices, hence our proposed processor is very suitable for SATA HDD Full Disk Encryption environments.

A Study on the Enterprise security convergence strategy in the IoT(the Internet of Things) Era (IoT시대의 기업 융합보안 전략에 대한 연구)

  • Noh, Jong-ho;Lee, Jong-hyeong;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.33-39
    • /
    • 2017
  • In the age of full scale IoT, concept of "security convergence" has been popularized widely. However, it is not clear whether current "security convergence" concept reflects IoT characteristics and traits. In this thesis, a new concept, complementing "security convergence" concept researches up to date, has been suggested considering IoT characteristics. Required governance methodology and key technical factors are suggested for re-establishment of "security convergence" concept and for enterprise security strategy development.

A Study on Multilevel Communication Drive of Full-Duplex Method with Security (보안성을 겸비한 전이중방식의 다중레벨 통신드라이브에 관한 연구)

  • Cho, Su-Eog;Park, Seong-Mi
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.23 no.1
    • /
    • pp.41-48
    • /
    • 2020
  • Currently, the industry uses MODBUS communication method using RS485 as a communication method used when constructing distributed equipment and networks. However, this method has a rather good transmission and reception distance, but has a disadvantage of being a half-duplex communication method. Therefore, there is a great need for a full-duplex communication method that can simultaneously transmit and receive two-wire communications. Therefore, in this paper, we propose a new communication hardware equipment that can implement full-duplex communication method by communication signal level to overcome the disadvantage of communication speed. The proposed communication hardware is a structure that can transmit and receive at the same time on the same communication line in two equipments communicating in a two-wire system. The characteristic of this communication hardware is that the transmitter generates two-level signal for data transmission, but the receiver generates three-level electric signal according to the status of the transmission data generated by the receiver. The data transmission signal information of the receiver is present at the same time. Therefore, the receiving side can analyze the received signal based on the information on the current transmission signal and can analyze the signal only in the two communicating devices, so it can be seen that the communication security is very excellent.

Modelling of Demand Determinants for Full-Time Bachelor's Degree Programs in Hospitality and Catering: The Case of Ukrainian Higher Education Institutions

  • Povorozniuk, Inna;Neshchadym, Liudmyla;Lytvyn, Oksana;Berbets, Tetiana;Filimonova, Iryna;Zotsenko, Liudmyla;Hushcha, Yevheniia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.347-357
    • /
    • 2022
  • The aim of the study is to model demand for full-time Bachelor's Degree Programs in Hospitality and Catering, taking into account the influence of the main determinants in the COVID-19 pandemic. The research used methods of algorithms, correlation and regression analysis, ANOVA, graphical method, deduction and induction, abstraction, etc. It was found that the demand for full-time Bachelor's Degree Programs in Hospitality and Catering is price elastic. It has been argued that it is useful to consider both price and non-price determinants when modelling demand for full-time Bachelor's Degree Programs in Hospitality and Catering. It is proved that the main determinants of demand for full-time Bachelor's Degree Programs in Hospitality and Catering are full-time tuition fee, maximum government order, license volume and Consolidated Ranking of a higher education institution (HEI). In this case, the applicant decides to enrol in a full-time Bachelor's Degree Program in Hospitality and Catering, guided by the optimal ratio of tuition fee and the prestige of the HEI.

The Conversion method from ID-based Encryption to ID-based Dynamic Threshold Encryption (ID기반 암호시스템을 이용하여 ID기반 동적 임계 암호시스템으로 변환하는 방법)

  • Kim, Mi-Lyoung;Kim, Hyo-Seung;Son, Young-Dong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.733-744
    • /
    • 2012
  • Dynamic threshold public-key encryption provides dynamic setting of the group of all users, receivers and the threshold value. Over recent years, there are many studies on the construction of scheme, called ID-based dynamic threshold encryption, which combines the ID-based encryption with dynamic threshold encryption. In this paper, we analyze the ID-based dynamic threshold encryption proposed by Xing and Xu in 2011, and show that their scheme has a structural problem. We propose a conversion method from ID-based encryption which uses the bilinear map to ID-based dynamic threshold encryption. Additionally, we prove this converted scheme has CPA security under the full model.

Network Security Situation Assessment Method Based on Markov Game Model

  • Li, Xi;Lu, Yu;Liu, Sen;Nie, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2414-2428
    • /
    • 2018
  • In order to solve the problem that the current network security situation assessment methods just focus on the attack behaviors, this paper proposes a kind of network security situation assessment method based on Markov Decision Process and Game theory. The method takes the Markov Game model as the core, and uses the 4 levels data fusion to realize the evaluation of the network security situation. In this process, the Nash equilibrium point of the game is used to determine the impact on the network security. Experiments show that the results of this method are basically consistent with the expert evaluation data. As the method takes full account of the interaction between the attackers and defenders, it is closer to reality, and can accurately assess network security situation.