• Title/Summary/Keyword: Interface Security

Search Result 372, Processing Time 0.027 seconds

Comparative analysis for security technology to WiBro terminals's vulnerability (모바일 기기의 ERP 인터페이스 방안)

  • Park, Jong-Youel;Chang, Young-Hyun;Yoon, Kyung-Bae;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.281-283
    • /
    • 2013
  • In this paper, we have presented the implementation plan for the Server interface and how to implement the Client GUI interface of a form you can use Android considerations and ERP Interface methods available in mobile devices, with iOS. It provides in the form of Web services using TCP / IP, how to handle the data, communication of Client and Server in mobile devices, coordination of ERP that can be used in mobile devices by presenting how to send in XML format it presented a new method which can be performed more efficiently.

  • PDF

A Study on the Real-time Data Interface Technology based on SCM for Shipbuilding and Marine Equipment Production (조선해양기자재 제작을 위한 SCM 기반 실시간 데이터 인터페이스 기술에 관한 연구)

  • Myeong-Ki Han;Young-Hun Kim;Jun-Su Park;Won-Ho Lee
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.27 no.1
    • /
    • pp.143-149
    • /
    • 2024
  • The production and procurement of shipbuilding and offshore equipment is an important competitive factor in the shipbuilding and offshore industry. Recently, ICT-based digital technology has been rapidly applied to the manufacturing industry following the Fourth Industrial Revolution. Under the digital transformation, real-time data interface technology based on SCM (Supply Chain Management) is emerging as an important tool to improve the efficiency of the equipment manufacturing process. In this study, the characteristics and advantages and disadvantages of interface technologies of web-based data interface technologies were compared and analyzed. The performance was compared between theoretical evaluation based on technical features and practical application cases. As a result, it was confirmed that GraphQL is useful for selective data processing, but there is a problem with optimization, and REST API has a problem with receiving data due to a fixed data structure. Therefore, this study aims to suggest ways to utilize and optimize these data interface technologies.

A Study on Application Methodology of SPDL Based on IEC 62443 Applicable to SME Environment (중소기업환경에서 적용 가능한 IEC 62443 기반의 개발 보안 생애주기 프로세스 적용 방안 연구)

  • Jin, Jung Ha;Park, SangSeon;Kim, Jun Tae;Han, Keunhee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.6
    • /
    • pp.193-204
    • /
    • 2022
  • In a smart factory environment in a small and medium-sized enterprise (SME) environment, sensors and actuators operating on actual manufacturing lines, programmable logic controllers (PLCs) to manage them, human-machine interface (HMI) to control and manage such PLCs, and consists of operational technology server to manage PLCs and HMI again. PLC and HMI, which are in charge of control automation, perform direct connection with OT servers, application systems for factory operation, robots for on-site automation, and production facilities, so the development of security technology in a smart factory environment is demanded. However, smart factories in the SME environment are often composed of systems that used to operate in closed environments in the past, so there exist a vulnerable part to security in the current environment where they operate in conjunction with the outside through the Internet. In order to achieve the internalization of smart factory security in this SME environment, it is necessary to establish a process according to the IEC 62443-4-1 Secure Product Development Life cycle at the stage of smart factory SW and HW development. In addition, it is necessary to introduce a suitable development methodology that considers IEC 62443-4-2 Component security requirements and IEC 62443-3 System security requirements. Therefore, this paper proposes an application plan for the IEC 62443 based development security process to provide security internalization to smart factories in an SME environment.

Analysis of Network Security Policy Enforcement in Container Environments (컨테이너 환경에서의 네트워크 보안 정책 집행 분석)

  • Bom Kim;Seungsoo Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.961-973
    • /
    • 2023
  • With the changes in the modern computing landscape, securing containerized workloads and addressing the complexities of container networking have become critical issues. In particular, the complexity of network policy settings and the lack of cloud security architecture cause various security issues. This paper focuses on the importance of network security and efficiency in containerized environments, and analyzes the security features and performance of various container network interface plugins. In particular, the features and functions of Cilium, Calico, Weave Net, and Kube-router were compared and evaluated, and the Layer 3/4 and Layer 7 network policies and performance features provided by each plugin were analyzed. We found that Cilium and Calico provide a wide range of security features, including Layer 7 protocols, while Weave Net and Kube-router focus on Layer 3/4. We also found a decrease in throughput when applying Layer 3/4 policies and an increase in latency due to complex processing when applying Layer 7 policies. Through this analysis, we expect to improve our understanding of network policy and security configuration and contribute to building a safer and more efficient container networking environment in the future.

Developement of User Interface for Parameter Estimation of the Composite Load Model (복합부하모델의 파라미터 추정을 위한 User Interface 개발)

  • Kim, Byoung-Ho;Kim, Hong-Rae;Lee, Byoung-Jun;Song, Hwa-Chang
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.184-186
    • /
    • 2011
  • 부하 모델링을 위해서는 구성요소기반 부하모델링과 측정기반 부하모델링 두 가지 방법이 사용된다. 구성요소기반 부하모델링은 모선에 부하의 구성비에 기반으로 하는 부하모델 기법이고, 측정기반 부하모델링은 부하가 설치된 모선의 전압과 소비전력의 측정값으로부터 관계를 수학적으로 모델링하는 기법이다. 본 논문에서는 부하모델을 위해 복합부하모델이 적용되었다. 복합부하모델은 정적부하모델과 동적부하모델을 모두 포함하고 있으며, 정적부하모델로서는 ZIP 모델이 사용되고, 동적 부하모델로는 유도전동기 모델이 사용되었다. 측정기반 부하모델의 파라미터 추정을 위해 TSAT(trensient security assessment tool) 프로그램으로부터 얻은 측정데이터를 이용해 파라미터 추정을 한다. 또한 사용자 편의를 위한 GUI(graphical user interface)의 적용을 통한 부하모델 파라미터 추정 프로그램을 개발하였다.

  • PDF

A Study on Railway Vehicles Fire Detection using HMI Touch Screen (HMI 터치스크린을 이용한 철도차량용 복합화재수신기 개발 연구)

  • Park, In-Deok;Kim, Chang
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.30 no.1
    • /
    • pp.38-43
    • /
    • 2016
  • Recent social needs for promoting traffic safety increased and the demand social security in economic, increasing the demand for environmentally friendly rail transport. In particular, when train express such as to secure reliability KTX(Korea Train eXpress) from potential disaster(fire) in the train operation caused by the train express running has been very important. Railroad fire extinguishing system is operated to fire exploding before reaching the flashing point more important than early to quickly detect because of CAN(Controller Area Network) communication to fire suppression and fire receiver, interface, fire fighting equipment from HMI((Human Machine Interface) and fire high-performance to research and development for intelligent composite fire receiver is required.

ebXML Transport, Routing & Packaging Specification

  • 박찬규
    • Proceedings of the CALSEC Conference
    • /
    • 2001.02a
    • /
    • pp.427-444
    • /
    • 2001
  • ㆍ ebXML Message Services Requirements Specification - Working Draft 26-May-2000, v0.96 · ebXML Message Services Specification - Working Draft 13-Sep-2000, v0.21 ㆍ ebXML Collaboration Protocol Profile and Agreement Specification - Working Draft 24-Jan-2001, v0.29 · ebXML Technical Architecture Security Specification - Working Draft 5-Feb-2001, vl.02(Under development) ㆍ ebXML Message Service Interface Specification - Under development.(omitted)

  • PDF

A Phishing Attack using Website Fingerprinting on Android Smartphones (안드로이드 스마트폰에서 웹사이트 핑거프린팅을 통한 피싱 공격)

  • Ahn, Woo Hyun;Oh, Yunseok;Pyo, Sang-Jin;Kim, Tae-Soon;Lim, Seung-Ho;Oh, Jaewon
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.9-19
    • /
    • 2015
  • The Android operating system is exposed to a phishing attack of stealing private information that a user enters into a web page. We have discovered two security vulnerabilities of the phishing attack. First, an always-on-top scheme allows malware to place a transparent user interface (UI) on the current top screen and intercept a user input. Second, the Android provides some APIs that allow malware to obtain the information of a currently visited web page. This paper introduces a phishing that attacks a web page by exploiting the two vulnerabilities. The attack detects a visit to a security-relevant web page and steals private information from the web page. Our experiments on popular web sites reveal that the attack is significantly accurate and dangerous.

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

  • Seo, Dae-Hee;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.96-101
    • /
    • 2005
  • Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper's suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.

Analyses of Security Issues for Internet of Things in Healthcare Application (헬스캐어 시스템에서의 사물 인터넷 통신을 위한 보안 문제 분석)

  • Shin, Yoon-gu;Kim, Hankyu;Kim, Sujin;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.699-700
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other healthcare giver. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper defines a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic Personal Health Records. This security architecture is aimed to be used with a mobile e-health application (m-health) through a simple and intuitive interface, supported by RFID technology. This architecture, able to support secured and authenticated interactions, will enable an easy deployment of m-health applications. The special case of drug administration and ubiquitous medication control system, along with the corresponding Internet of Things context, is presented.

  • PDF