• Title/Summary/Keyword: Interface Security

Search Result 372, Processing Time 0.022 seconds

3D Image Qube Password Interface Design and Implementation for Entrance/Exit of Sailors (선박승무원 출입관리를 위한 3차원 영상 큐브 암호 인터페이스 설계 및 구현)

  • Son, Nam-Rye;Jeong, Min-A;Lee, Seong-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.25-32
    • /
    • 2010
  • Recently a passenger ship and liner has been spread throughout men of diversity, the space and informations is not open to general passenger. Therefore security systems are necessary for special sailors to admit them. Although security systems has a variety usage methods which are organism recognition(finger printer, iritis and vein etc) a few years ago, these usages has a defect reusing other objects because of leaving a trace. Therefore this paper designs and implements using 3D Qube image password interface which hand gestures are recognized after acquiring from 2D input image for protective marker of finger printer.

Mind control interface technology for the military control instrument (군사용 제어기기를 위한 마인드 컨트롤 인터페이스 기술)

  • Kim, Eung-Su
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.249-267
    • /
    • 2003
  • EEG is an electrical signal, which occurs during information processing in the brain. These EEG signals have been used clinically, but nowadays we are mainly studying Brain-Computer Interface (BCI) such as interfacing with a computer through the EEG, controlling the machine through the EEG. The ultimate purpose of BCI study is specifying the EEG at various mental states so as to control the computer and machine. This research makes the controlling system of directions with the artifact that are generated from the subject's will, for the purpose of controlling the machine correctly and reliably. We made the system like this. First, we select the particular artifact among the EEG mixed with artifact, then, recognize and classify the signals' pattern, then, change the signals to general signals that can be used by the controlling system of directions.

  • PDF

Integration Facility Management: Interface Coordination in Process Management

  • Laksmana, Dimas Indra;Wijayaningtyas, Maranatha;Indriani, Sri;Kiswandono, Kiswandono
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.319-323
    • /
    • 2022
  • The information research system continues to be developed and directed at leading research National Institute of Technology (ITN) Malang in accordance with the Research Strategic Plan of ITN Malang. One of them is a computer system in a complete integrated facility management activity, such as this research scheme. The purpose of this research is to combine and integrate people, places, product, processes and technology. All of them are integrate existing organizational factors into a more effective, simplifying of complex processes, identifying and scheduling, notes, decision makers and more. This research was conducted in stages by design with a structured model stage for 3 (three) years (focus on humans, products and processes), research on Integration Facility Management: Interface Coordination in human resources and product management have been completed on 2019 and 2020. While the focus of research this year is to obtain an integrated facility management Interface Coordination in Process Management.

Emotional Preferences Analysis Using Kansei in Designing The Appearance of User Interface for E-Voting Application

  • Abdurrohman, Abdurrohman;Rahman, Aedah Abd;Hadiana, Ana;Lokman, Anitawati Mohd
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.193-198
    • /
    • 2021
  • The application of e-Voting plays an important role in order to support democracy activities in Indonesia, such as elections at different levels. E-Voting has the function of providing better service to people in order to participate in elections. This research attempts to develop the appearance of the user interface of e-Voting based on users' emotional preferences using Kansei Engineering. Kansei Engineering is used in this research to analyze emotional feelings regarding e-Voting applications' presented Kansei words and give a recommendation on the most suitable user interface to be considered in their development. This research observed two main users' emotional feelings ("calm" and "formal") selected from ten Kansei words. The final recommendation is a conceptual element designed for designing e-Voting applications based on the Kansei word "calm".

A Study on the Need of the Usable Security in the Corelation between IT Security and User Experience

  • Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.14-18
    • /
    • 2017
  • In this paper, an contemplate the direction for Usable Security in IT security and User Experience. To evaluate how the user interface is convenient to use, we examine the components such as the property, learnable property, memory simplicity, faults and satisfaction level. By considering for the security, we should bring positive effects on the user experience. By emphasizing usability and security at the same time, we should increase the satisfaction level of the user experience and then produce the valuable experience through participation, use and observation. The positive user experience is the important task for the software engineering, business administration and others., and this will result satisfaction of the users, brand trust, and success in the market. On the other hand, for the negative user experience, the users cannot achieve their desired goal and therefore, are unsatisfied due to emotional, rational and economic inconvenience. Due to this, we should try to maintain a certain level of usability and security of the system in IT security and User Experience.

Channel Coding Based Physical Layer Security for Wireless Networks (채널 부호화를 통한 물리계층 무선네트워크 보안기술)

  • Asaduzzaman, Asaduzzaman;Kong, Hyung Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.57-70
    • /
    • 2008
  • This paper introduces a new paradigm of physical layer security through channel coding for wireless networks. The well known spread spectrum based physical layer security in wireless network is applicable when code division multiple access (CDMA) is used as wireless air link interface. In our proposal, we incorporate the proposed security protocol within channel coding as channel coding is an essential part of all kind of wireless communications. Channel coding has a built-in security in the sense of encoding and decoding algorithm. Decoding of a particular codeword is possible only when the encoding procedure is exactly known. This point is the key of our proposed security protocol. The common parameter that required for both encoder and decoder is generally a generator matrix. We proposed a random selection of generators according to a security key to ensure the secrecy of the networks against unauthorized access. Therefore, the conventional channel coding technique is used as a security controller of the network along with its error correcting purpose.

  • PDF

Design of FPGA Hardware Accelerator for Information Security System (정보보호 시스템을 위한 FPGA 기반 하드웨어 가속기 설계)

  • Cha, Jeong Woo;Kim, Chang Hoon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.2
    • /
    • pp.1-12
    • /
    • 2013
  • Information Security System is implemented in software, hardware and FPGA device. Implementation of S/W provides high flexibility about various information security algorithm, but it has very vulnerable aspect of speed, power, safety, and performing ASIC is really excellent aspect of speed and power but don't support various security platform because of feature's realization. To improve conflict of these problems, implementation of recent FPGA device is really performed. The goal of this thesis is to design and develop a FPGA hardware accelerator for information security system. It performs as AES, SHA-256 and ECC and is controlled by the Integrated Interface. Furthermore, since the proposed Security Information System can satisfy various requirements and some constraints, it can be applied to numerous information security applications from low-cost applications and high-speed communication systems.

A Study on the Interface Model of Information sharing between nations for an efficient global SCM (효율적인 글로벌 SCM에 적합한 국가 간 정보 연계를 위한 인터페이스 모델 연구)

  • Park, Soo Min;Kim, Min Sik;Ahn, Kyeong Rim
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.217-230
    • /
    • 2012
  • To look at Korea trade environment, as increasing the quantity of goods transported in North-East Asia and deepening national competitive, information-oriented logistics environment is needed. That means it is automated work process and can provide value-added service. To do this, logistics business can be efficiently handled through "Electronic Means for the Clearance of Ships" and electronically data processing. Also, by increasing the risk of international terrorism, regulation regarding to logistics security has strengthened around the advanced country, such as USA and EU, etc. or international organization, such as IMO, ISO, etc.. Furthermore, because trade and logistics environment is changing and security becomes more important in logistics area, movement or status information of goods within the port or in entry in/out becomes more and more be needed in real time. In case cross-border logistics activities, international cooperation or agreement between countries is very important. However, different opinions much happened on defining the interface. If to follow one format or type using at a specific country or organization, it was occurred to difficulty in respect of interoperability as well as additional costs or time. Therefore, this paper proposes common interface model to exchange information for the efficient global SCM for using by the output of Korea R&D project, "National Logistics Standardization System Development".

Zkimi : Integrated Security Analysis Tool for UNIX Systems (지킴이: 유닉스 시스템을 위한 통합 보안 점검 도구)

  • 채흥석;이남희;김형호;김내희;차성덕;백석철;임규건;박승민;정종윤
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.23-40
    • /
    • 1997
  • There are a lot of security tools for the investigation and improvement of UNIX systems. However, most of them fail to provide a consistent and usable user interface. In addition, they concentrate on a specific aspect of a system, not the whole one. For the overall management, system administrators cannot help using several uncomfortable tools. This paper introduces an integrated security analysis tool, named "Zkimi", which provides a convenient user interface and investigates the various aspects of UNIX systems such as account security, system security, network security, and file system integrity. The Zkimi supports user-friendly WWW based interface, so administrators can examine the various aspects of system more easily. We tried the tool for a system of a moderate size, and were confirmed that the tool is very efficient for investigating various security aspects of a system. a system.

Secure User and Program Interface for SecuROS (SecuROS 에서 개발된 사용자 및 프로그램 인터페이스)

  • Doo, So-Young;Go, Jong-Guk;Eun, Seong-Gyeong;Kim, Jeong-Nyeo;Gong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.557-564
    • /
    • 2001
  • Many people use Linux and FreeBSD because it is freeware and excellent performance. The open source code is very important feature but it also has some problem which may be attacked by hackers frequently. This paper describes the SecuROS of secure operating system that is best solution to this problem and introduces user and programmer interface for active use of secure operating system. Developed secure operating system is composed of the access control method MAC and ACL and conforms to the POSIX which is universally used.

  • PDF