• Title/Summary/Keyword: Internet E-mail

Search Result 293, Processing Time 0.069 seconds

WWW Security Mechanism Using Plug-in and PGP (Plug-in 기법을 이용한 PGP 기반의 Web 보안 시스템 개발)

  • 김태갑;조은경;박정수;류재철
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.205-218
    • /
    • 1996
  • World Wide Web(WWW) has a lot of useful charaters. Easiness of use, multi-media data supporting and interactive communication capability are typical reasons why people want to use WWW. But because WWW is based on Internet, it has some security problems which originate in plain format data transmission on physical transmission line. The unique solution fer this problems is data encryption. Since theoritically proved encryption algorithms ensure data confidentiality, a unauthorized user can not know what is transmitted on network. In this paper, we propose a cryptography system which uses public key system. In detail, our public key based web security mechanism is using PGP module. PGP is a e-mail security system implemented by Phil Zimmermann. The basic idea of our propose is data encryption and integrity checking for all data which is transmitted on Web. To implement these facilities, we. use netscape browser extension technology, plug-in. Through these technology, security mechanisms are added on netscape browser.

  • PDF

A Exploratory Study of Confidential Document Circulation System Design (기밀문서 유통체계 설계에 관한 탐색적 연구)

  • Chang, Hang-Bae;Kim, Heung-Gook
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.3
    • /
    • pp.462-470
    • /
    • 2011
  • Since, Davis(1991) has proposed the TAM(Technology Acceptance Model) through a literature review of informatization promotion, which insists that a user conveniency is judged by the degree of effectiveness caused by IT, the advancement of IT such as the Internet, e-mail, electronic data exchange, and groupware have brought into various changes in ordinary corporations and public institutions. However, with the right function, the advancement of IT has provided various benefits including additional reverse functions. Based on an integrated environment of business process, unauthorized user could access to information and a management of information becomes more difficult than before due to informatization of critical information. Furthermore, external hacking or information leakage by insider becomes easier owing to advancement in communication technology. This study has tried to develop a specified management procedure and implementation method for confidential documents.

A Study on Recognition of Artificial Intelligence Utilizing Big Data Analysis (빅데이터 분석을 활용한 인공지능 인식에 관한 연구)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.129-130
    • /
    • 2018
  • Big data analysis is a technique for effectively analyzing unstructured data such as the Internet, social network services, web documents generated in the mobile environment, e-mail, and social data, as well as well formed structured data in a database. The most big data analysis techniques are data mining, machine learning, natural language processing, and pattern recognition, which were used in existing statistics and computer science. Global research institutes have identified analysis of big data as the most noteworthy new technology since 2011. Therefore, companies in most industries are making efforts to create new value through the application of big data. In this study, we analyzed using the Social Matrics which a big data analysis tool of Daum communications. We analyzed public perceptions of "Artificial Intelligence" keyword, one month as of May 19, 2018. The results of the big data analysis are as follows. First, the 1st related search keyword of the keyword of the "Artificial Intelligence" has been found to be technology (4,122). This study suggests theoretical implications based on the results.

  • PDF

Performance Analysis of Multimedia CDMA Mobile Communication System Considering Diverse Qos Requirements (멀티미디어 CDMA 이동통신 시스템에서의 다양한 QoS 요구조건을 고려한 성능 분석)

  • Kim, Baek-Hyun;Shin, Seung-Hoon;Kwak Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1B
    • /
    • pp.1-12
    • /
    • 2002
  • In the multimedia CDMA mobile communication service, it is required to support various applications, such as voice, video, file transfer, e-mail, and Internet access, with guaranteed QoS. In the mixed traffic environment ,which consists of voice, stream data, and packet data, we analyze the network where preemptive priority is granted to delay-intolerant voice service and a buffer is offered to delay-tolerant stream data service. And, for best-effort packet data service, the access control by transmission permission probability is applied to obtain prominent throughput. To analyze the multimedia CDMA mobile communication system, we build a 2-dimensional markov chain model about prioritized-voice and stream data services and accomplish numerical analysis in combination with packet data traffic based on residual capacity equation.

A Study on Composition Factor of Online Game Community using Case Analysis of Cyworld (싸이월드의 사례 분석을 이용한 온라인 게임의 커뮤니티 구성 요소에 대한 연구)

  • Lee, Myoun-Jae;Kim, Kyoung-Nam
    • Journal of Korea Game Society
    • /
    • v.4 no.1
    • /
    • pp.3-13
    • /
    • 2004
  • On today, online community that is irrespective to geometrical area and time has been appeared by information technology and development of internet. It has been significant decision method of a personal and company. And online community is variously classified by it's purpose. Among online community, online game community is be roughly classed as community in online game and community in related online game. Community in related online game community is means for interchanging informations using e-mail, bulletin board, so as on. These information contain game playing, game contents so as on. And community in online game is implemented as team, item exchange, chatting etc. Importance of community in online game and community in related online game have been increased. But online game community is not distinguished, comparing with importance of it. So, in this paper, we study on the case analysis of cyworld's community that developed characteristic community. Cyworld community is suitable for new generation and korean life style, method of adaption online game. This paper should be profitable for community in re lated online game, community company to planning, developing a characteristic community.

  • PDF

Development of LX GNSS On-line Data Processing System Based on the GIPSY-OASIS (GIPSY-OASIS 기반 LX GNSS 온라인 자료처리 시스템 개발)

  • Kim, Hyun-Ho;Ha, Ji-Hyun;Tcha, Dek-Kie
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.555-561
    • /
    • 2014
  • Data processing service via internet help user to get the GNSS data processing result more precise and easily. Thus, online data process system is operated and developed by various research groups and national. But this service is difficult to use in domestic cadastral survey. In this study, we developed the online data processing system for a domestic cadastral survey. This is calculated coordinate using NGII CORS(SUWN) fiducially. And use PPP technique by GIPSY-OASIS. If user choose the observation data which want to calculate the coordinate, then is uploaded to GIPSY-OASIS server through FTP. After upload is complete, server automatically calculate coordinate, and send the report about result using e-mail. And it takes 2 minutes runtime on the basis of the 3 sessions. To verify the result, we used the data on SOUL, JUNJ as compared with notified-coordinate from NGII. As a result, got the difference for east-west 1.4 cm, north-south -1.0 cm, vertical 0.5 cm.

Design and Analysis of the Web Stegodata Detection Systems using the Intrusion Detection Systems (침입탐지 시스템을 이용한 웹 스테고데이터 검출 시스템 설계 및 분석)

  • Do, Kyoung-Hwa;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.39-46
    • /
    • 2004
  • It has been happening to transfer not only the general information but also the valuable information through the universal Internet. So security accidents as the expose of secret data and document increase. But we don't have stable structure for transmitting important data. Accordingly, in this paper we intend to use network based Intrusion Detection System modules and detect the extrusion of important data through the network, and propose and design the method for investigating concealment data to protect important data and investigate the secret document against the terrorism. We analyze the method for investigating concealment data, especially we use existing steganalysis techniques, so we propose and design the module emphasizing on the method for investigating stego-data in E-mail of attach files or Web-data of JPG, WAVE etc. Besides, we analyze the outcome through the experiment of the proposed stego-data detection system.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

The analysis of technology of the connected car (커넥티드 카의 기술 분석)

  • Shim, Hyun-Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.211-215
    • /
    • 2015
  • It comes into the spotlight as the new Blue Ocean in which the connected car industry in which the car and mobile communication technology is convergence. All sorts of infortainments services connecting with the portable electronic device(Smart phone, tablet PC, and MP3 player) and car are rapidly grown. The Connected car emphasizes the vehicle connectivity with the concept that the car has communication with the around on a real time basis and it provides the safety and expedience to the operator and using the thing of Internet (IoT) in the car and supports the application, presently, the entertainment service including the real-time Navigation, parking assistant function, not only the remote vehicle control and management service but also Email, multimedia streaming service, SNS and with the platform. Intelligent vehicle network is studied as the kind according to MANET(Mobile Ad Hoc Network) for the safety operation of the cars of the road and improving the efficiency of the driving. The intelligent vehicle network is comprised for the driving information offering changing rapidly of the communication(V2V: Vehicle to Vehicle) between the car and the car, communication(V2I : Vehicle to Infrastructure) between the infrastructure and the car, and V2X (Vehicle to Nomadic).

  • PDF

A Review of Influencing Aronia Intake on Human Body in Korea (국내 아로니아 습취가 인체에 미치는 영향에 관한 문헌분석)

  • Nam, Soo-Tai;Yu, Ok-Kyeong;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.149-152
    • /
    • 2017
  • Big data analysis is an effective analysis techniques of unstructured data such as internet, social network services, web documents generated in mobile environment, e-mail, and social data, as well as formal data well organized in the database. Thus, meta-analysis is a statistical integration method that delivers an opportunity to overview the entire result of integrating and analyzing many quantitative research results. Today, regardless of gender and age is increasing interest in whether you can lead a younger and healthier life. With this change of life which has been developed with a variety of functional health food. Aronia melanocarpa called black chokeberry is a fruit of berry plants belonging to the Rosaceae originally growing in the North America region. In the studies for factors related to quality characteristics and antioxidant activities as the extracts of Aronia in this study, which it is only targeted factors as total sugar, acidity, polyphenol, anthocyanin, antioxidant. Thus, we present the theoretical and practical implications of these results.

  • PDF