• Title/Summary/Keyword: ID management system

Search Result 197, Processing Time 0.027 seconds

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.13-18
    • /
    • 2011
  • Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.

Design and Implementation of a Flexible Application Permission Management Scheme on Android Platform (안드로이드 플랫폼에서 유연한 응용프로그램 권한관리 기법 설계 및 구현)

  • Kim, Ik-Hwan;Kim, Tae-Hyoun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.151-156
    • /
    • 2011
  • Google Android, which is one of the popular smart phone platforms, employs a security model based on application permissions. This model intends to reduce security threats by protecting inappropriate accesses to system resources from applications, but this model has a few problems. First, permission requested by an application cannot be granted selectively. Second, once the permission has been granted it is maintained until the application is uninstalled. Third, applications may acquire powerful permissions through user ID sharing without any notice to users. In order to overcome these limitations, we designed and implemented a flexible application permission management scheme. The goal of our scheme is to enhance security and user convenience while keeping compatibility to original platform. We also verified the operation of our scheme with real applications on Android emulator.

BIM-Based Generation of Free-form Building Panelization Model (BIM 기반 비정형 건축물 패널화 모델 생성 방법에 관한 연구)

  • Kim, Yang-Gil;Lee, Yun-Gu;Ham, Nam-Hyuk;Kim, Jae-Jun
    • Journal of KIBIM
    • /
    • v.12 no.4
    • /
    • pp.19-31
    • /
    • 2022
  • With the development of 3D-based CAD (Computer Aided Design), attempts at freeform building design have expanded to small and medium-sized buildings in Korea. However, a standardized system for continuous utilization of shape data and BIM conversion process implemented with 3D-based NURBS is still immature. Without accurate review and management throughout the Freeform building project, interference between members occurs and the cost of the project increases. This is very detrimental to the project. To solve this problem, we proposed a continuous utilization process of 3D shape information based on BIM parameters. Our process includes algorithms such as Auto Split, Panel Optimization, Excel extraction based on shape information, BIM modeling through Adaptive Component, and BIM model utilization method using ID Code. The optimal cutting reference point was calculated and the optimal material specification was derived using the Panel Optimization algorithm. With the Adaptive Component design methodology, a BIM model conforming to the standard cross-section details and specifications was uniformly established. The automatic BIM conversion algorithm of shape data through Excel extraction created a BIM model without omission of data based on the optimized panel cutting reference point and cutting line. Finally, we analyzed how to use the BIM model built for automatic conversion. As a result of the analysis, in addition to the BIM utilization plan in the general construction stage such as visualization, interference review, quantity calculation, and construction simulation, an individual management plan for the unit panel was derived through ID data input. This study suggested an improvement process by linking the existing research on atypical panel optimization and the study of parameter-based BIM information management method. And it showed that it can solve the problems of existing Freeform building project.

A Study on the Management of Name Identifier System for ISNI-based Data Integration (ISNI 기반 데이터 융합을 위한 저자식별체계 운용에 관한 연구)

  • Lee, Seungmin;Kwak, Seung-Jin;Oh, Sanghee;Park, Jin Ho
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.30 no.1
    • /
    • pp.29-51
    • /
    • 2019
  • Most fields of society have constructed and utilized various name identifier systems such and International Standard Name Identifier(ISNI), Open Researcher and Contributor ID(ORCID), and Interested Parties Information System(IPI) in order to uniquely identify individual authors and institutions and to associate them to data related to creative works. Although it might be inevitable to apply name identifier systems in the current data environment with rapid association and integration of data across fields, there are many problems to be addressed when utilizing those systems. In order to overcome these problems and construct better information ecological system by associating and linking data from various fields, this research analyzed advanced cases for data integration based on ISNI. Through the analysis, it suggested managemental refinements for efficiently utilizing ISNI in data integration and association.

The Development of Attendance Management System Using the RFID (RFID를 이용한 출석관리 시스템 개발)

  • Park, So-Hee;Moon, Byeong-Cheoul
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.2
    • /
    • pp.139-146
    • /
    • 2007
  • Today, using RFID(Radio Frequency Identification) card is extended in diversity as medical treatment, circulation market, military affairs, manufacture, security, etc. The RFID technology is an automatic identification method, relying on storing and remotely retrieving data for the purpose of identification using radio waves. This advantage of the RFID will be as a replacement for traditional Barcoding. Besides, book-lending system and attendance management system become the center of educational institution in interest. This paper presents a attendance management system using the RFID card which provides directly information of attendance for professors with mobile and students with web. Also, the students only have ID card that embed RFID tag which is recognized attendance through DB that storages to is received a information of student from RFID card Reader. And it is possible management or report for attendance and time table not only for professors by management program but also for students by web program.

  • PDF

A Voting Method Selection Support System for GDSS (그룹의사결정지원시스템을 위한 투표기법 선택 지원시스템 개발에 관한 연구)

  • Kim, Seong-Hui;Lee, Jae-Gwang;Lee, Jin-U;Kim, Seon-Uk;Park, Heung-Guk
    • Asia pacific journal of information systems
    • /
    • v.6 no.2
    • /
    • pp.5-17
    • /
    • 1996
  • There are various cases that we vote for making a decision or combining ideas (i.e. human being's opinions) in group meetings. Group Decision Support System(GDSS) provides us with a number of voting methods for decision making or aggregation of the ideas. It is generally difficult to select a voting method appropriate for given a meeting situation, without any aid of experts or computers having a knowledge on voting. In this paper we propose a supporting system for selecting an appropriate voting method. Since the selected method is recommended to the facilitator of GDSS, a part of time and effort related with the voting would be reduced. The knowledge in the system is represented as rules that are inductively generated from examples of voting. We used UNiK-INDUCE with ID3 algorithm so as to learn, which is a tool of developing expert systems.

  • PDF

A Comparative Study of Medical Data Classification Methods Based on Decision Tree and System Reconstruction Analysis

  • Tang, Tzung-I;Zheng, Gang;Huang, Yalou;Shu, Guangfu;Wang, Pengtao
    • Industrial Engineering and Management Systems
    • /
    • v.4 no.1
    • /
    • pp.102-108
    • /
    • 2005
  • This paper studies medical data classification methods, comparing decision tree and system reconstruction analysis as applied to heart disease medical data mining. The data we study is collected from patients with coronary heart disease. It has 1,723 records of 71 attributes each. We use the system-reconstruction method to weight it. We use decision tree algorithms, such as induction of decision trees (ID3), classification and regression tree (C4.5), classification and regression tree (CART), Chi-square automatic interaction detector (CHAID), and exhausted CHAID. We use the results to compare the correction rate, leaf number, and tree depth of different decision-tree algorithms. According to the experiments, we know that weighted data can improve the correction rate of coronary heart disease data but has little effect on the tree depth and leaf number.

Design and Implementation of the Smart Attendance Management System based on a Beacon (비콘 기반의 스마트 출석관리를 위한 시스템의 설계 및 구현)

  • Ahn, Sungwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.437-440
    • /
    • 2015
  • 대학 강의의 출석정보는 학생들의 강의 참여 상태를 확인하여 성적부여뿐만 아니라 학생들의 태도를 파악하기 위한 중요한 자료로 활용된다. 따라서 교수는 매 강의시간 출석확인을 통하여 학생들의 강의참여도를 파악하고, 이를 평가에 활용하고 있다. 대부분의 출석확인은 교수의 수작업에 의존하고 있기 때문에 강의시간 중 일부를 할애하여 처리하고 있으며, 이 시간동안은 강의내용과 관련된 활동이 거의 이루어지기 힘들다. 이러한 문제를 개선하여 강의의 질을 향상시키기 위해 자동 출석체크가 가능한 시스템을 도입하는 대학교가 최근 늘어나고 있다. 그러나 기존의 시스템은 출석관리를 위해서 도입되어야 하는 단말기, ID 카드 등의 초기 도입비용이 매우 큰 문제가 있다. 본 논문에서는 자동 출석체크가 가능할 뿐만 아니라 시스템의 초기 도입 비용을 줄이기 위해서 비콘 기반의 스마트 출석관리 시스템을 설계하고 구현하였다. 제안된 시스템은 학생들이 소지하고 있는 스마트폰을 출석체크에 활용함으로써 강의실에 설치된 비콘 이외에 추가적인 단말기나 ID 카드 등이 필요하지 않다. 또한, 강의실에 부착된 비콘과 스마트폰 간에 BLE(Bluetooth Low Energy) 통신을 통하여 출석정보를 자동으로 수집하고 실시간으로 파악하도록 함으로써 강의의 질을 높일 수 있도록 하였다.

  • PDF

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption

  • Hu, Shengzhou;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5100-5119
    • /
    • 2018
  • Most of existing privacy-preserving multi-authorities attribute-based encryption schemes (PP-MA-ABE) only considers the privacy of the user identity (ID). However, in many occasions information leakage is caused by the disclosing of his/her some sensitive attributes. In this paper, we propose a collusion-resisting ciphertext-policy PP-MA-ABE (CRPP-MACP-ABE) scheme with hiding both user's ID and attributes in the cloud storage system. We present a method to depict anonymous users and introduce a managerial role denoted by IDM for the management of user's anonymous identity certificate ($AID_{Cred}$). The scheme uses $AID_{Cred}$ to realize privacy-preserving of the user, namely, by verifying which attribute authorities (AAs) obtain the blinded public attribute keys, pseudonyms involved in the $AID_{Cred}$ and then distributes corresponding private keys for the user. We use different pseudonyms of the user to resist the collusion attack launched by viciousAAs. In addition, we utilize IDM to cooperate with multiple authorities in producing consistent private key for the user to avoid the collusion attack launched by vicious users. The proposed CRPP-MACP-ABE scheme is proved secure. Some computation and communication costs in our scheme are finished in preparation phase (i.e. user registration). Compared with the existing schemes, our scheme is more efficient.

A License Administration Protocol Providing User Privacy in Digital Rights Management (디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜)

  • 박복녕;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.189-198
    • /
    • 2003
  • As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.