• Title/Summary/Keyword: Information secure service

Search Result 861, Processing Time 0.03 seconds

Design and Implementation of the SSL Component based on CBD (CBD에 기반한 SSL 컴포넌트의 설계 및 구현)

  • Cho Eun-Ae;Moon Chang-Joo;Baik Doo-Kwon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.3
    • /
    • pp.192-207
    • /
    • 2006
  • Today, the SSL protocol has been used as core part in various computing environments or security systems. But, the SSL protocol has several problems, because of the rigidity on operating. First, SSL protocol brings considerable burden to the CPU utilization so that performance of the security service in encryption transaction is lowered because it encrypts all data which is transferred between a server and a client. Second, SSL protocol can be vulnerable for cryptanalysis due to the key in fixed algorithm being used. Third, it is difficult to add and use another new cryptography algorithms. Finally. it is difficult for developers to learn use cryptography API(Application Program Interface) for the SSL protocol. Hence, we need to cover these problems, and, at the same time, we need the secure and comfortable method to operate the SSL protocol and to handle the efficient data. In this paper, we propose the SSL component which is designed and implemented using CBD(Component Based Development) concept to satisfy these requirements. The SSL component provides not only data encryption services like the SSL protocol but also convenient APIs for the developer unfamiliar with security. Further, the SSL component can improve the productivity and give reduce development cost. Because the SSL component can be reused. Also, in case of that new algorithms are added or algorithms are changed, it Is compatible and easy to interlock. SSL Component works the SSL protocol service in application layer. First of all, we take out the requirements, and then, we design and implement the SSL Component, confidentiality and integrity component, which support the SSL component, dependently. These all mentioned components are implemented by EJB, it can provide the efficient data handling when data is encrypted/decrypted by choosing the data. Also, it improves the usability by choosing data and mechanism as user intend. In conclusion, as we test and evaluate these component, SSL component is more usable and efficient than existing SSL protocol, because the increase rate of processing time for SSL component is lower that SSL protocol's.

A Study on the standardization of ETCS (Focused on RF) (자동요금징수시스템(ETCS) 표준화 연구(주파수방식을 중심으로))

  • Kwon, Han-Joon;Lee, Ki-Hyun;Kim, Yong-Deak
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.3
    • /
    • pp.62-73
    • /
    • 2008
  • In this paper, domestic standard revision plan of dynamic frequency method which is used both in unmanned automatic toll collection system and manned collection system of the express highway is presented. For such ETCS, the infrared rays (870 nm) of active frequency method and the frequency integrated method (5.8 GHz) are adopted and extended to be operated to the all around the Toll Gate. This standardization plan is based on inter connection reference model between OSI (Open System Interconnection) in process of ITS short range radio communication standardization of 5.8 GHz bandwidth to support traffic information and control system service, and the derived revision plan by starting from physical layer which support interoperability for multiple access between RSE (Road Side Equipment) and OBE (On Board Equipment), in which is categorized into physical layer, data link layer, and application layer. In case of radiation power, existing standard is divided by class1 (within 10 m) and Class2 (within 100 m) according to transmission lengthwhile it is operated with just single standard 'Class1' because of notification of Ministry of Information and Communication in 2004. In the case of the limitation value of incident power in communication area, considering operation plan of ETCS that is on actuality operation the measurements are reflected to the standard. In other wort this paper proposed the improvement standard of incident power, pseudo response in the communication area and radiated power in order to secure stability and compatibility among operator systems about the needed part on ETCS operation.

  • PDF

A Secure Route Optimization Mechanism for Mobile VPN users in Foreign Networks (모바일 VPN 사용자를 위한 보안 강화 경로 최적화 방안)

  • Kim, Kyoung-Min;Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.348-359
    • /
    • 2007
  • The conventional mobile VPN services assumed the mobile communications occur between the MN in foreign networks and the CN in the home network. However, if a MN wants to communicate with another MN in a foreign network, it could degrade the performance of the mobile VPN service because of the triangular routing problem. In this paper, we propose a route optimization mechanism based on the mobile VPN using an x-HA allocated by diameter MIP in order to support the efficient communication between the mobile VPN users in foreign networks. The i-HA maintains the VPN-TIA as well as the x-HoA as the CoAs to solve the security problem and to provide an efficient route optimization simultaneously. Moreover, we proposed revised IPSec tunnel configuration to reduce the IPSec tunnel overheads at a MN when the MN communicates with several MNs in the foreign networks at the same time. The VPN server, a security management entity in the home network, notifies an additional IPSec tunnel establishment between the x-HAs where the communication peers are registered. The simulation result showed that the proposed scheme decreases the end-to-end packet delay time and improves the throughput after the handoff compared to the existing mechanism.

An Efficient and Secure Handover Mechanism for MVPN Services (MVPN 서비스 제공을 위한 효율적이고 안전한 핸드오버 메커니즘)

  • Woo, Hyun-Je;Kim, Kyoung-Min;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.62-72
    • /
    • 2007
  • Mobile Virtual Private Network (MVPN) provides VPN services without geographical restriction to mobile workers using mobile devices. Coexistence of Mobile IP (MIP) protocol for mobility and IPsec-based VPN technology are necessary in order to provide continuous VPN service to mobile users. However, Problems like registration failure or frequent IPsec tunnel re-negotiation occur when IPsec-based VPN Gateway (GW) and MIP are used together. In order to solve these problems, IETF proposes a mechanism which uses external home agent (x-HA) located external to the corporate VPN GW. In addition, based on the IETF proposal, a mechanism that assigns x-HA dynamically in the networks where MN is currently located was also proposed with the purpose to reduce handover latency as well as end-to-end delay. However, this mechanism has problems such as exposure of a session key for dynamic Mobility Security Association (MSA) or a long latency in case of the handover between different networks. In this paper, we propose a new MVPN protocol in order to minimize handover latency, enhance the security in key exchange, and to reduce data losses cause by handover. Through a course of simulation, the performance of proposed protocol is compared with the existing mechanism.

A Study on the Cognition Distance of Separately Shelved Items by Multi-dimensional Scaling Analysis in Children's Libraries (다차원척도법을 이용한 어린이도서관 별치 자료에 대한 인지 거리 연구)

  • Kim, Hyoyoon;Cho, Jane
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.1
    • /
    • pp.51-71
    • /
    • 2017
  • This study conducted a survey to measure recognition distance between the materials which are located separately in a children's library targeting 200 elementary school lower grade students, higher grade students, and school parents(adults). And compared recognition distance between the elements of materials of individual visitor group with multidimensional scaling and K-mean group analysis. Multidimensional Scaling (MDS) is a technique for projecting the cognitive state in space by evaluating the similarity or attribute of the analysis target. Even though it is mainly used for market diagnosis in marketing, It can also be applied to present an ideal physical layout plan by analyzing the distance. As a result of analysis, the main discoveries are as follows. First, elementary school students cognize child, baby and computer materials should be adjacent as a same group. But recognition of adults(school parents) is reflected by differing from elementary school students vastly. They cognize that computer materials should be formed as a special group separated from child and baby's materials. Second, elementary school higher graders and adults(school parents) groups also want to separate their main reading materials from baby's book, therefore They both want to secure silent reading space separating from baby. Third, as a result to confirming how this recognition distance system of materials is reflected in a real children's library through three children's libraries in Y-gu, Incheon, there is no library with structure according perfectly with a recognition system of a particular class, but a recognition system of adults and elementary school students is partially reflected because baby, child and computer materials, and baby and child materials are commonly separated and placed. It is difficult to insist that a recognition system of a visitor group, especially a recognition system of children is absolute consideration conditions in material placement of a children's library. However, understanding cognition of the user groups can be an important evidentiary factors to offer differentiated service space according to visitors and effective placement of the elements of library resources.

A case study on the conditions of direct transport for the preferential tariff treatment through Korea-EU FTA(Free Trade Agrement) (한.EU FTA하에서 협정관세적용을 위한 직접운송 요건의 충족여부에 관한 사례연구)

  • Han, Sang-Hyun
    • International Commerce and Information Review
    • /
    • v.15 no.2
    • /
    • pp.207-232
    • /
    • 2013
  • FTA(Free Trade Agreement) of South Korea and European Union(EU) took effect from July 1, 2011. Korea signed a contract FTA with the European Union by first among Asian country, and Korea EU FTA is evaluated that it is wide, comprehensive and high level FTA. Therefore, Korea EU FTA will become FTA that dimension is high, and FTA fermentation with the European Union may activate the Korean economy through extension of export. By the way, in Korea EU FTA, the stipulations on import and export clearance system is different compared with other FTA. Therefore, exporter and importers should compare thoroughly on essential factor of origin standard and preferential tariff which is set in FTA Agreement. In this study, I analyzed 'conditions of direct transport' that is prescribed in article 13 of Korea EU FTA. Particular, I analyzed recently example of appeal for review that decision is made in the Korea Customs Service(KCS). Laying stress on counter measure of business, conclusion in this study is as following. First, companies must understand correctly a single consignment and a single transport document under Korea EU FTA. Second, companies must not analyze wrong 'conditions of direct transport'. Third, when simplicity transshipment or temporary custody is consisted, companies must secure documentary evidence as soon as possible. Fourth, in case goods pass third country, companies must understand uprightly 'a single consignment'. Finally, companies should keep in mind to truth that European Union and EFTA are different FTA.

  • PDF

State of Information Technology and Its Application in Agricultural Meteorology (농업기상활용 정보기술 현황)

  • Byong-Lyol Lee;Dong-Il Lee
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.6 no.2
    • /
    • pp.118-126
    • /
    • 2004
  • Grid is a new Information Technology (IT) concept of "super Internet" for high-performance computing: worldwide collections of high-end resources such as supercomputers, storage, advanced instruments and immerse environments. The Grid is expected to bring together geographically and organizationally dispersed computational resources, such as CPUs, storage systems, communication systems, real-time data sources and instruments, and human collaborators. The term "the Grid" was coined in the mid1990s to denote a proposed distributed computing infrastructure for advanced science and engineering. The term computational Grids refers to infrastructures aimed at allowing users to access and/or aggregate potentially large numbers of powerful and sophisticated resources. More formally, Grids are defined as infrastructure allowing flexible, secure, and coordinated resource sharing among dynamic collections of individuals, institutions and resources referred to as virtual Organizations. GRID is an emerging IT as a kind of next generation Internet technology which will fit very well with agrometeorological services in the future. I believe that it would contribute to the resource sharing in agrometeorology by providing super computing power, virtual storage, and efficient data exchanges, especially for developing countries that are suffering from the lack of resources for their agmet services at national level. Thus, the establishment of CAgM-GRID based on existing RADMINSII is proposed as a part of FWIS of WMO.part of FWIS of WMO.

An Analysis of the Economic Effects for the IoT Industry (사물인터넷 산업의 경제적 파급효과 분석)

  • Jeong, Woo-Soo;Kim, Sa-Hyuk;Min, Kyoung-Sik
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.119-128
    • /
    • 2013
  • As ICT technology becomes advanced, the importance of future internet is emphasized and in part of that, M2M (Machine-to Machine communications) is magnified in terms of importance and usage in public and private sector. M2M is emerging as a next generation strategic industry but there is no existing analyzed data or market classification, so it disrupts establishing policies on the M2M industry. As the technology is progressing, the evolution from M2M to IoT (Internet of Things) has started and many countries actively try to find technological trend through market analysis in order to develop new growth engine. Therefore, in order to strengthen competitiveness, we should secure differentiated capabilities in industry and service. This article examines Korea's domestic market and international market trends in IoT and analyses the economic impact of the IoT industry using quantitative methodology and evaluates relations between the IoT industry and other relevant industries. As a result, the effect of IoT industry on production inducement is KRW474.6 billion; the effect on value-added inducement is KRW314.7 billion; and it is measured that 3,628 jobs will be created by the IoT industry.

A Preliminary Study on Public Private Partnership in International Forestry Sector to Climate Change Based on Awareness Analysis of Private Enterprises (민간 기업의 인식조사를 바탕으로 한 기후변화 대응 국제산림분야 민관파트너십 사업 활성화 방안 기초 연구)

  • Kim, Jiyeon;Yoon, Taekyung;Han, Saerom;Park, Chanwoo;Lee, Suekyung;Kim, Sohee;Lee, Eunae;Son, Yowhan
    • Journal of Climate Change Research
    • /
    • v.3 no.4
    • /
    • pp.281-291
    • /
    • 2012
  • Forests act as carbon sinks and also improve water resources and biodiversity to climate change. Secure funding, administrative support, and sustainable management systems are essential to conserve forests and to implement international forestry related projects to climate change. Public private partnership (PPP) could be an effective way for forestry sector in developing countries. Awareness analysis should be preceded in order to encourage participation of enterprises for the diversification of funding and the enhancing quality of projects. We conducted a survey targeting more than 129 private enterprises for awareness analysis. As a result, lack of information, complexity of processes and low profit resulted in low interest on forest projects from private enterprises. Improving awareness of recipient countries on forest resources, financial and institutional supports from the public sector, information sharing, performance management and equal partnership between sectors were suggested to encourage PPP in international forestry related projects to climate change.

A Study on the Analysis of Disaster Prevention Characteristics According to the Surrounding Environments of State-designated Cultural Properties in Gyeongsangnam-do and Gyeongsangbuk-do Provinces (경상남·북도 국가지정 중요목조문화재 주변 환경에 따른 방재특성 분석 연구)

  • Koo, Wonhoi;Baek, Minho
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.1-11
    • /
    • 2019
  • Purpose: This study intends to determine how disaster prevention characteristics of important state-designated wooden cultural properties in Gyeongsangnam-do vary according to the surrounding environments and to examine disaster prevention measures for wooden cultural properties that fit their surrounding environments accordingly. Method: The designation status and characteristics of cultural properties in Gyeongsangnam-do and Gyeongsangbuk-do were identified, and the damage status of cultural properties in Gyeongsangnam-do and Gyeongsangbuk-do was reviewed based on the history of disasters. Also, the disaster prevention environments for 58 state-designated wooden cultural properties in Gyeongsangnam-do and Gyeongsangbuk-do were analyzed separately into mountainous area, rural area and urban area, topographic characteristics were drawn. Results: For cultural properties located in urban areas, it was found that security guards were arranged properly and disaster prevention training was carried out well. In addition, access condition to the cultural properties was adequate; prompt access to such properties was possible. In rural areas, flame retardant works have been undertaken properly and many cultural properties were found to be located on a flat ground. Mountainous areas had highly inadequate access condition to cultural properties and disasters occurred most frequently in these areas in the past. Conclution: First, for wooden cultural properties located in urban areas, it is necessary to secure the self-defense fire service manpower for an initial response and reinforce the disaster prevention education. Second, for wooden cultural properties located in rural areas, prevention projects such as insect control project and disaster prevention insurance should be carried out in order to protect the cultural properties. Third, as for wooden cultural properties located in mountainous areas, it is necessary to prepare establish to reinforce self-response capability.