• Title/Summary/Keyword: Hierarchical Security

Search Result 266, Processing Time 0.032 seconds

A Study of node Authentication in Ad-hoc Network using Java Card (자바 카드를 이용한 Ad-hoc망의 노드 인증에 관한 연구)

  • Lee, Cheol-Seung;Shin, Myeong-Sook;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.902-905
    • /
    • 2005
  • In this paper we challenge the mobile node Authentication using Java Card authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc rooting protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Java Card Authentication of mobile node can possibly be applied to the area of M-Commerce, Wireless Security, and Ubiquitous Computing and so on.

  • PDF

Smart Contract's Hierarchical Rules Modularization and Security Mechanism (스마트 컨트랙트의 계층형 규칙 모듈화와 보안 메커니즘)

  • An, Jung Hyun;Na, Sung Hyun;Park, Young B.
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.1
    • /
    • pp.74-78
    • /
    • 2019
  • As software becomes larger and network technology develops, the management of distributed data becomes more popular. Therefore, it is becoming increasingly important to use blockchain technology that can guarantee the integrity of data in various fields by utilizing existing infrastructure. Blockchain is a distributed computing technology that ensures that servers participating in a network maintain and manage data according to specific agreement algorithms and rules to ensure integrity. As smart contracts are applied, not only passwords but also various services to be applied to the code. In order to reinforce existing research on smart contract applied to the blockchain, we proposed a dynamic conditional rule of smart contract that can formalize rules of smart contract by introducing ontology and SWRL and manage rules dynamically in various situations. In the previous research, there is a module that receives the upper rule in the blockchain network, and the rule layer is formed according to this module. However, for every transaction request, it is a lot of resources to check the top rule in a blockchain network, or to provide it to every blockchain network by a reputable organization every time the rule is updated. To solve this problem, we propose to separate the module responsible for the upper rule into an independent server. Since the module responsible for the above rules is separated into servers, the rules underlying the service may be transformed or attacked in the middleware. Therefore, the security mechanism using TLS and PKI is added as an agent in consideration of the security factor. In this way, the benefits of computing resource management and security can be achieved at the same time.

Genetic Distances of Paralichthys olivaceus Populations Investigated by PCR

  • Yoon, Jong-Man
    • Development and Reproduction
    • /
    • v.22 no.3
    • /
    • pp.283-288
    • /
    • 2018
  • The author carried out PCR-based genetic platform to investigate the hierarchical polar dendrogram of Euclidean genetic distances of one bastard halibut population, particularly for Paralichthys olivaceus, which was further connected with those of the other fish population, by involving with the precisely designed oligonucleotide primer sets. Eight oligonucleotides primers were used generating excessively alterating fragments, ranging in size of DNA bands from larger than approximately 100 bp to less than 2,000 bp. As regards average bandsharing value (BS) results, individuals from Hampyeong population (0.810) displayed lower bandsharing values than did individuals from Wando population (0.877). The genetic distance between individuals approved the existence of close relationship in the cluster II. Relatively, individuals of one bastard halibut population were fairly related to that of the other fish population, as shown in the polar hierarchical dendrogram of Euclidean genetic distances. The points of a noteworthy genetic distance between two P. olivaceus populations demonstrated this PCR procedure is one of the quite a few means for individuals and/or populations biological DNA investigates, for species security and proliferation of bastard halibut individuals in coastal region of the Korea.

Correlates of Physical Activity among Korean Navy Personnel: An Ecological Approach (함정 근무 장병의 신체활동 관련 요인: 생태학적 접근)

  • Roh, Mi-Young;Lee, Hyeonkyeong;Lee, Chung-Yul;Kim, Gwang-Suk
    • Research in Community and Public Health Nursing
    • /
    • v.23 no.3
    • /
    • pp.296-306
    • /
    • 2012
  • Purpose: This study was conducted to measure the relationships between ecological factors and Navy personnel's physical activity (PA) based on McLeroy's Ecological model. Methods: A cross-sectional survey was conducted with a convenience sample of 184 Navy personnel working in 10 Navyships. A self-reporting questionnaire consisted of measures of intrapersonal, interpersonal, organizational and community factors related to Navy personnel` s PA. Data were analyzed by descriptive statistics, $x^2$-test, t-test, analysis of variance, and hierarchical multiple regression using SPSS/WIN 17.0 programs. Results: Their mean PA level was $2,848.1{\pm}3,344.5$ MET-min/week, and mostly moderate level (50.5%). Hierarchical multiple regression analysis showed that religion, working department, working type, perceived health status and community environment were significant PA correlates. Conclusion: Community environmental factors as well as intrapersonal factors were significantly associated with Navy personnel's PA, indicating that community health nurses should expand an approach for individual-level behavioral change to incorporate Navy personnel specific community environmental barriers into PA interventions.

A Multilevel Key Distribution using Pseudo - random Permutations (의사 랜덤치환을 이용한 다중레벨 키분배)

  • Kim, Ju-Seog;Shin, Weon;Lee, Kyung-Hyune
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2493-2500
    • /
    • 1997
  • We propose a new key management scheme for multiuser group which is classified as hierarchical structure (sometimes it is called a multilevel security hierarchy) in the symmetric key cryptosystem. The proposed scheme is based on the trapdoor one-way permutations which are generated by the pseudo-random permutation algorithm, and it is avaliable for multilevel hierarchical structure composed of a totally ordered set and a partially ordered set, since it has advantage for time and storage from an implemental point of view. Moreover, we obtain a performance analysis by comparing with the other scheme, and show that the proposed scheme is very efficient for computing time of key generation and memory size of key storage.

  • PDF

Optimal Hierarchical Design Methodology for AESA Radar Operating Modes of a Fighter (전투기 AESA 레이더 운용모드의 최적 계층구조 설계 방법론)

  • Heungseob Kim;Sungho Kim;Wooseok Jang;Hyeonju Seol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.281-293
    • /
    • 2023
  • This study addresses the optimal design methodology for switching between active electronically scanned array (AESA) radar operating modes to easily select the necessary information to reduce pilots' cognitive load and physical workload in situations where diverse and complex information is continuously provided. This study presents a procedure for defining a hidden Markov chain model (HMM) for modeling operating mode changes based on time series data on the operating modes of the AESA radar used by pilots while performing mission scenarios with inherent uncertainty. Furthermore, based on a transition probability matrix (TPM) of the HMM, this study presents a mathematical programming model for proposing the optimal structural design of AESA radar operating modes considering the manipulation method of a hands on throttle-and-stick (HOTAS). Fighter pilots select and activate the menu key for an AESA radar operation mode by manipulating the HOTAS's rotary and toggle controllers. Therefore, this study presents an optimization problem to propose the optimal structural design of the menu keys so that the pilot can easily change the menu keys to suit the operational environment.

Adjustment Effect for Coping Strategy from Fatigue Scale of Security Guard's on Emotional Labor (시큐리티요원의 감정노동이 피로도에 미치는 영향 및 스트레스 대처방식의 조절효과)

  • Kim, Eui Young;Cho, Sung Jin
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.283-302
    • /
    • 2019
  • This study was conducted to provide the basic data for improving the working environment and welfare level of the security guard by identifying the primary effects of stress response on fatigue with emotional labor and identifying the adjustment effects with coping strategy. The data were collected from 214 security personnel using questionnaire and the statistical tests of correlation, heavy return analysis and hierarchical return analysis using the SPSS 18.0 statistics program were used to reach the conclusion that: First, it has been shown that the emotional labor of a security guard affects fatigue Second, the effects of emotional labor on fatigue of a security guard have been shown to have the effect of coping strategy. Based on the above studies, it was concluded that the emotional labor of a security guard was affected by fatigue and could be controlled by a stress coping strategy. Therefore, it is believed that there is a need to seek an autonomous corporate culture based on the organization's performance by changing the management system for employees at the organizational level so that security guards can use an active way of coping.

Secure MAP Discovery Schemes in Hierarchical MIPv6 (계층적 Mobile IPv6에서의 안전한 MAP 검색 기법)

  • Choi, Jong-Hyoun;Mun, Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.41-47
    • /
    • 2007
  • The Hierarchical Mobile IPv6 (HMIPv6) has been proposed to accommodate frequent mobility of the Mobile Node and to reduce the signaling load. A Mobility Anchor Point is a router located in a network visited by the Mobile Node. The Mobile Node uses the Mobile Anchor Point as a local Home Agent. The absence of any protections between Mobile Node and Mobile Anchor Point may lead to malicious Mobile Nodes impersonating other legitimate ones or impersonating a Mobile Anchor Point. In this paper, we propose a mechanism of the secure Mobile Anther Point discovery in HMIPv6. The performance analysis and the numerical results presented in this paper show that our proposal has superior performance to other methods.

Factors Influencing Utilization of Medical Care Among Osteoarthritis Patients in Korea: Using 2005 Korean National Health and Nutrition Survey Data (우리나라 골관절염 환자의 의료이용과 관련된 요인: 2005년 국민건강영양조사 자료를 이용하여)

  • Kim, Min-Young;Park, Jong-Ku;Koh, Sang-Baek;Kim, Chun-Bae
    • Journal of Preventive Medicine and Public Health
    • /
    • v.43 no.6
    • /
    • pp.513-522
    • /
    • 2010
  • Objectives: The purpose of this study was to define the association between the medical utilization of osteoarthritis patient and its related factors. Methods: We used the 2005 Korean National Health and Nutrition Survey data and we enrolled 2833 participants who were forty or older and who were diagnosed as having osteoarthritis by a doctor within 1 year and who had suffered from osteoarthritis for more than 3 months. The Andersen behavioral model was used as the analytic framework, and the variables were categorized into predisposing, enabling, and need factors. To determine the influence of each variable on the medical utilization of osteoarthritis patient, we applied hierarchical logistic regression analysis with two stages: the first stage included the predisposing and enabling factors and the second stage included the need factors. Results: On the hierarchical logistic analysis, the variables of personal income, the type of medical security, the duration of arthritis related symptoms within 1 month, the subjective health status and the duration of osteoarthritis showed a statistically significant association with medical utilization in men. And the variables of age, limitation activity due to osteoarthritis, arthritis related symptoms within 1 month, and the subjective health status had a statistically significant association with medical utilization in women. Conclusions: The patients who tend to receive less care are those who suffer less from symptoms of osteoarthritis, those who are within the initial phase, or those with a low-level severity of osteoarthritis. It is necessary to encourage patients to receive the treatment in the initial phase.

Digital License Prototype for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스 프로토타입)

  • Cha, Byung-Rae;Jeong, Jong-Geun;Oh, Soo-Lyul
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.95-108
    • /
    • 2006
  • The digital contents expand into software source code and maintenance of technology and IPR about source code have a very important meaning to international competition, The recognition about software security is very low specially among these Intellectual Property Rights. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code, Also, it is hard to accurate decision that is correct to complexity and the lack of read and understand ability even if software is reproduced. In this paper, we don't enforce distinction about software reproduction by one individual code unit. And we developed digital license prototype of XML that can distinguish reproduction based on structural conformability of whole source codes. Software has Context Free Grammar in structure and presents BNF notation type, it is apt to present hierarchical structure. Then, we can express architecture of software source code by hierarchical structure to discriminate structural conformability. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code.

  • PDF