• 제목/요약/키워드: Information Protection Mechanism

검색결과 234건 처리시간 0.025초

Management Mechanism for the Protection of Information in Smart Phone

  • Jang, Eun-Gyeom
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권6호
    • /
    • pp.43-50
    • /
    • 2015
  • In order to protect important information of smart phone from these security threats, this paper has studied a mechanism for protecting information from the leakage of various information and personal information stored in the smart phone. This paper has configured the basic protection scope for the information protection and applied real time encodement when new contents were created. Also, this paper has applied a security function so that the content of the protected scope can be managed and erased remotely in preparation for loss and burglary.

RFID-based Secure Communication for Smart Device in Future Home Network Environment

  • Li, Nong-Jun;Choi, Kee-Hyun;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제5권1호
    • /
    • pp.18-22
    • /
    • 2013
  • We introduce, in this paper, a novel approach of protection mechanism for data which are transmitted not only between the networked devices but also between the digital media devices. As the devices are getting more powerful and more storage capacity, they can process the encoded/encrypted data autonomously. However, all devices must know the secret key that used to encrypt data, and also use secure method to distribute that key. Moreover, there are no protection mechanisms supporting end-to-end copy protection which result in the fact that the data passed through various devices can be manipulated or captured. Therefore, we propose a RFID-based key distribution and protection mechanism to resolve these problems.

리눅스 기반 자원 접근제어 모듈(LPM)을 이용한 데몬 프로세스 보호 시스템에 관한 연구 (A Study on Daemon Process Protection System Using Linux Based Resource Access Control Module(LPM))

  • 나형준;이병호
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 Ⅲ
    • /
    • pp.1593-1596
    • /
    • 2003
  • In this paper, we propose mechanism of system call control, monitor, and manage by user level, and for this purpose we propose the mechanism using system call intercept and a logging system. Proposed mechanism is more convenient in that there is no necessity for modification of linux source code, so general users can actively apply and modify. As an application model for the mechanism, we can explain for the Daemon Process Protection System which can have a complete control on system daemon processes.

  • PDF

A Fast and Scalable Inter-Domain MPLS Protection Mechanism

  • Huang, Chang-Cheng;Messier, Donald
    • Journal of Communications and Networks
    • /
    • 제6권1호
    • /
    • pp.60-67
    • /
    • 2004
  • With the fast growth of Internet and a new widespread interest in optical networks, the unparalleled potential of Multi-Protocol Label Switching (MPLS) is leading to further research and development efforts. One of those areas of research is Path Protection Mechanism. It is widely accepted that layer three protection and recovery mechanisms are too slow for today’s reliability requirements. Failure recovery latencies ranging from several seconds to minutes, for layer three routing protocols, have been widely reported. For this reason, a recovery mechanism at the MPLS layer capable of recovering from failed paths in 10’s of milliseconds has been sought. In light of this, several MPLS based protection mechanisms have been proposed, such as end-to-end path protection and local repair mechanism. Those mechanisms are designed for intra-domain recoveries and little or no attention has been given to the case of non-homogenous independent inter-domains. This paper presents a novel solution for the setup and maintenance of independent protection mechanisms within individual domains and merged at the domain boundaries. This innovative solution offers significant advantages including fast recovery across multiple nonhomogeneous domains and high scalability. Detailed setup and operation procedures are described. Finally, simulation results using OPNET are presented showing recovery times of a few milliseconds.

A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking

  • Zhu, Yi;Kang, Haohao;Huang, Ruhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6123-6138
    • /
    • 2018
  • Named data networking (NDN) is a new network architecture designed for next generation Internet. Router-side content caching is one of the key features in NDN, which can reduce redundant transmission, accelerate content distribution and alleviate congestion. However, several security problems are introduced as well. One important security risk is cache privacy leakage. By measuring the content retrieve time, adversary can infer its neighbor users' hobby for privacy content. Focusing on this problem, we propose a cache privacy protection mechanism (named as CPPM-DAM) to identify legitimate user and adversary using Bloom filter. An optimization for storage cost is further provided to make this mechanism more practical. The simulation results of ndnSIM show that CPPM-DAM can effectively protect cache privacy.

CMOS 회로의 ESD에대한 신뢰성 문제 및 보호대책 (Reliability Analysis of CMOS Circuits on Electorstatic Discharge)

  • 홍성모;원태영
    • 전자공학회논문지A
    • /
    • 제30A권12호
    • /
    • pp.88-97
    • /
    • 1993
  • Electrostatic Discharge(ESD) is one of the major reliability, issues for today's VLSI production. Since the gate oxide with a thickness of 100~300$\AA$ is vulnerable to several thousand volt of ESD surge, it is necessary to control the ESD events and design an efficient protection circuit. In this paper, physical mechanism of the catastrophic ESD damage is investigated by transient analysis based upon Human Body Model(HBM). Using two-dimensional electrothermal simulator, we study the failure mechanism of the output protection devices by ESD and discuss the design issues for the optimun protection network.

  • PDF

CR-LDP 우회를 통한 GMPLS LSP의 보호 및 복구 (Protection and Restoration of GMPLS LSP using CR-LDP Detours)

  • 김진형;정재일
    • 한국통신학회논문지
    • /
    • 제28권12B호
    • /
    • pp.1051-1059
    • /
    • 2003
  • GMPLS는 신호 및 라우팅 기술을 기반으로 트래픽의 요구가 있을 때 동적으로 네트워크에서 경로를 설정하고 자원을 할당하는 기술이다. 또한 많은 양의 트래픽을 처리하는 특성상 네트워크의 실패(failure)가 일어났을 때 동적으로 트래픽을 보호하는 경로 보호 및 복구 메커니즘을 포함한다. 본 논문에서는 GMPLS의 신호 프로토콜 기술인 CR-LDP의 오브젝트를 확장하여 매 노드에서 자동적으로 우회 경로를 설정하여 주 경로를 보호 및 복구하기 위한 정적 우회 기법 및 동적 우회 기법을 제안하고 기존의 경로 보호 및 복구 기법과 성능을 비교 평가한다.

ATM-PON망에서 망 생존성을 위한 자동보호절체 (Automatic Protection Switching Schemesfor Network Survivability in ATM-PON Networks)

  • 김영구
    • 한국통신학회논문지
    • /
    • 제25권9A호
    • /
    • pp.1441-1451
    • /
    • 2000
  • There are two types of protection switching : a) automatic switching and b) forced switching. The switching mechanism is generally realised by OAM functions, therefore, the required OAM information field should be reserved in the PLOAM cells. This paper proposes an unidirectional and a bidirectional protection switching method and potential advantages. The unidirectional protection switching method can be faster than the bidirectional method because the unidirectional method does not require an APS protocol for protection switching. The bidirectional protection switching method uses APS K1 byte and K2 byte, which is included in octets of a PST message through downstream or upstream PLOAM cells, for protection switching. As making comparisons between the unidirectional and the bidirectional protection. switching method, this paper proposes an effective constructing method for ATM-PON network.

  • PDF

License Distribution Mechanism for the Rights Sharing Between Consumers

  • Liu, Zong-Hua;Lee, Byung-Wook;Han, Myung-Mook
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.981-984
    • /
    • 2007
  • Most existing DRM systems give too much power to rights holders and have not concerned the requirements of the consumers. In this paper, we propose a mechanism for license distribution that considers the distribution of rights between consumers. we describe the protection of digital content in two digital licenses, formal license and peer license. Also we propose an extending mechanism to control the distribution of rights between consumers. For this mechanism, we define it by extending the ODRL model in the end.

  • PDF

정전기에 의한 CMOS DRAM 내부 회오의 파괴 Mechanism과 입력 보호 회로의 개선 (ESD damage mechanism of CMOS DRAM internal circuit and improvement of input protection circuit)

  • 이호재;오춘식
    • 전자공학회논문지A
    • /
    • 제31A권12호
    • /
    • pp.64-70
    • /
    • 1994
  • In this paper, we inverstigated how a parricular internal inverter circuit, which is located far from the input protection in CMOS DRAM, can be easily damaged by external ESD stress, while the protection circuit remains intact. It is shown in a mega bit DRAM that the internal circuit can be safe from ESD by simply improving the input protection circuit. An inverter, which consists of a relatively small NMOSFET and a very large PMOSFET, is used to speed up DRAMs, and the small NMOSFET is vulnerable to ESD in case that the discharge current beyond the protection flows through the inverter to Vss or Vcc power lines on chip. This internal circuit damage can not be detected by only measuring input leakage currents, but by comparing the standby and on operating current before and after ESD stressing. It was esperimentally proven that the placement of parasitic bipolar transistor between input pad and power supply is very effective for ESD immunity.

  • PDF