• 제목/요약/키워드: Full security

Search Result 298, Processing Time 0.028 seconds

Safe Bike : Secure your Bicycle with this smart Arduino based GPS device

  • Godfrey, Daniel;Song, Mi-Hwa
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.16-26
    • /
    • 2016
  • This proposed project is about a bicycle anti theft devised system which helps people protect the bicycle from theft and helps to track the stolen bicycle's location using a smart phone. Safety bike uses two main devices to keep the bicycle secured, the vibration sensor and GPS sensor. The purpose of this project is to put all these small devices into one well connected system which will help the bicycle owner have more control over the security of his own bicycle. The whole system can be divided into two main parts. The first part is about the hardware development whereby all electronics components are connected via the circuit design using wire wrapping technique. This hardware part includes, a vibrations sensor, a GPS receiver, a toggle switch, LED light, Bluetooth and a buzzer. Wireless Bluetooth signals are used as the means of communication between the smartphone and the microcontroller. The second part is the software part which is being to program and control the whole system. The program is written using MikroBasic, a full-featured Basic compiler for microcontroller based systems. In conclusion, this system is designed to enable user to have control in securing his/her bicycle also being able to find and locate it at any time using GPS receiver and mobile android application.

A Study on Analysis and Prevention for Cargo Handling Accidents in Incheon Port (인천항 항만하역 재해분석 및 예방대책에 관한 연구)

  • Nam, Young-Woo;Kim, Young-Min;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.3
    • /
    • pp.27-36
    • /
    • 2006
  • The port, differently from general working place, is a closed area to execute security, customs, and quarantine procedures. The loading and unloading is being done differently by cargoes, ships, berths, and equipments. To load and unload a lot of equipments and different types of labor are required, in which work flow is very complicated. As above mentioned the port is very unique and deteriorated working place including danger. The purpose of this thesis is to propose ways to analyze and establish the preventive measure for cargo handling accidents in port. We have collected 923 accidents happened at Incheon Port during the period from 1994 to 2003. And to analyze and establish the preventive measure we have employed an advanced 6sigma DMAIC technology presently in spotlight as the best tool for management innovation. For the purpose of effective safety management of cargo handling in port, this thesis will help to revise and establish the law, system, standard, and standard working manual with respect to the port loading and unloading system. Now frequency of cargo handling accidents in port is highest for the second time among all industries, so we proposed the new safety management system to substitute port safety committee and to take full charge of safety in Ministry of Maritime Affairs and Fisheries.

A Study of Password Management Methods for System in Access Control (시스템 접근통제를 위한 패스워드 관리 방안에 대한 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.303-306
    • /
    • 2011
  • System solutions for access control to the user's personal when you want to authenticate to the system is used. The valid user is really just a part of authorized users, the suitability of a valid user has been authenticated are not sure whether the problem is the fact. For example, one developer in the Unix operating system can be valid, but do not have permission to access the system should be limited for. In this paper, a single account for multiple users to use the system operational issues to improve the fine-grained delegation of authority, the session audit, the administrator account's policy-based management, with full rights the administrator account of distribution management and auditing the system overall is the study of access control measures.

  • PDF

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

Zero-Watermarking Algorithm in Transform Domain Based on RGB Channel and Voting Strategy

  • Zheng, Qiumei;Liu, Nan;Cao, Baoqin;Wang, Fenghua;Yang, Yanan
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1391-1406
    • /
    • 2020
  • A zero-watermarking algorithm in transform domain based on RGB channel and voting strategy is proposed. The registration and identification of ownership have achieved copyright protection for color images. In the ownership registration, discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) are used comprehensively because they have the characteristics of multi-resolution, energy concentration and stability, which is conducive to improving the robustness of the proposed algorithm. In order to take full advantage of the characteristics of the image, we use three channels of R, G, and B of a color image to construct three master shares, instead of using data from only one channel. Then, in order to improve security, the master share is superimposed with the copyright watermark encrypted by the owner's key to generate an ownership share. When the ownership is authenticated, copyright watermarks are extracted from the three channels of the disputed image. Then using voting decisions, the final copyright information is determined by comparing the extracted three watermarks bit by bit. Experimental results show that the proposed zero watermarking scheme is robust to conventional attacks such as JPEG compression, noise addition, filtering and tampering, and has higher stability in various common color images.

Enabling Dynamic Multi-Client and Boolean Query in Searchable Symmetric Encryption Scheme for Cloud Storage System

  • Xu, Wanshan;Zhang, Jianbiao;Yuan, Yilin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1286-1306
    • /
    • 2022
  • Searchable symmetric encryption (SSE) provides a safe and effective solution for retrieving encrypted data on cloud servers. However, the existing SSE schemes mainly focus on single keyword search in single client, which is inefficient for multiple keywords and cannot meet the needs for multiple clients. Considering the above drawbacks, we propose a scheme enabling dynamic multi-client and Boolean query in searchable symmetric encryption for cloud storage system (DMC-SSE). DMC-SSE realizes the fine-grained access control of multi-client in SSE by attribute-based encryption (ABE) and novel access control list (ACL), and supports Boolean query of multiple keywords. In addition, DMC-SSE realizes the full dynamic update of client and file. Compared with the existing multi-client schemes, our scheme has the following advantages: 1) Dynamic. DMC-SSE not only supports the dynamic addition or deletion of multiple clients, but also realizes the dynamic update of files. 2) Non-interactivity. After being authorized, the client can query keywords without the help of the data owner and the data owner can dynamically update client's permissions without requiring the client to stay online. At last, the security analysis and experiments results demonstrate that our scheme is safe and efficient.

Analysis methodology of local damage to dry storage facility structure subjected to aircraft engine crash

  • Almomani, Belal;Kim, Tae-Yong;Chang, Yoon-Suk
    • Nuclear Engineering and Technology
    • /
    • v.54 no.4
    • /
    • pp.1394-1405
    • /
    • 2022
  • The importance of ensuring the inherent safety and security has been more emphasized in recent years to demonstrate the integrity of nuclear facilities under external human-induced events (e.g. aircraft crashes). This work suggests a simulation methodology to effectively evaluate the impact of a commercial aircraft engine onto a dry storage facility. A full-scale engine model was developed and verified by Riera force-time history analysis. A reinforced concrete (RC) structure of a dry storage facility was also developed and material behavior of concrete was incorporated using three constitutive models namely: Continuous Surface Cap, Winfrith, and Karagozian & Case for comparison. Strain-based erosion limits for concrete were suitably defined and the local responses were then compared and analyzed with empirical formulas according to variations in impact velocity. The proposed methodology reasonably predicted such local damage modes of RC structure from the engine missile, and the analysis results agreed well with the calculations of empirical formulas. This research is expected to be helpful in reviewing the dry storage facility design and in the probabilistic risk assessment considering diverse impact scenarios.

Development of a novel reconstruction method for two-phase flow CT with improved simulated annealing algorithm

  • Yan, Mingfei;Hu, Huasi;Hu, Guang;Liu, Bin;He, Chao;Yi, Qiang
    • Nuclear Engineering and Technology
    • /
    • v.53 no.4
    • /
    • pp.1304-1310
    • /
    • 2021
  • Two-phase flow, especially gas-liquid two-phase flow, has a wide application in industrial field. The diagnosis of two-phase flow parameters, which directly determine the flow and heat transfer characteristics, plays an important role in providing the design reference and ensuring the security of online operation of two-phase flow system. Computer tomography (CT) is a good way to diagnose such parameters with imaging method. This paper has proposed a novel image reconstruction method for thermal neutron CT of two-phase flow with improved simulated annealing (ISA) algorithm, which makes full use of the prior information of two-phase flow and the advantage of stochastic searching algorithm. The reconstruction results demonstrate that its reconstruction accuracy is much higher than that of the reconstruction algorithm based on weighted total difference minimization with soft-threshold filtering (WTDM-STF). The proposed method can also be applied to other types of two-phase flow CT modalities (such as X(𝛄)-ray, capacitance, resistance and ultrasound).

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

Efficacy of UN's Sanctions on North Korea's Nuclear and North Korea's Regime Survival Strategy (유엔의 북핵 대북제재조치의 실효성과 북한의 체제생존전략)

  • KIM, JOO-SAM
    • Korea and Global Affairs
    • /
    • v.2 no.1
    • /
    • pp.69-92
    • /
    • 2018
  • North Korea conducted a total of six nuclear tests from the 1st test of 2006 to September, 2017. North Korea developed an armed forces security strategy at the level of regime protection and defense to respond to U.S. hostile policy. However, it is certain that strategic goals of North Korea's nuclear test were to overcome a crisis in North Korea's regime through US-North Korea negotiation and complete nuclear armed forces for socialist unification on the Korean Peninsula. North Korea's continuous nuclear test is a direct factor in threatening peace on the Korean Peninsula and an indirect factor in security dynamics of Northeast Asia. The U.N. Security Council has enforced sanctions against North Korea through six resolutions against North Korea's reckless nuclear test for the past 10 years. However, Kim Jong-Un's regime is in a position to stick to simultaneous pursuit of nuclear and economic development in spite of anti-North sanction of international society including U.N. and U.S.A. It is understood that North Korea was stimulated to conduct intense nuclear test as U.N. and U.S.A's anti-North sanction was not effective on North Korea. Full-scale and local wars are expected as military options, one of anti-North sanctions of the Trump administration. The Trump administration has attempted diplomatic pressure strategy as a secondary boycott unlike previous administrations. Nevertheless, North Korea has stood against U.N. and U.S.A's anti-North sanction with brinkmanship tactics, announcing full-scale military confrontation against U.S. It is judged that North Korea will pursue simultaneous nuclear weapons and economic development in terms of regime survival. North Korea will have less strategic choices in that its regime may collapse because of realistic national strategy between U.S.A. and China.