• Title/Summary/Keyword: Key Exposure

Search Result 445, Processing Time 0.023 seconds

Investigation on the Main Exposure Sources of Nanomaterials for Nanohazards Assessment (나노위해성 관리를 위한 나노물질 주요 배출원 파악)

  • Kim, Young-Hun;Park, Jun-Su;Kim, He-Ro;Lee, Jeong-Jin;Bae, Eun-Joo;Lee, Su-Seung;Kwak, Byoung-Kyu;Choi, Kyung-Hee;Park, Kwang-Sik;Yi, Jong-Heop
    • Environmental Analysis Health and Toxicology
    • /
    • v.23 no.4
    • /
    • pp.257-265
    • /
    • 2008
  • Nanotechnology is emerging as one of the key technologies of the 21 st century and is expected to enable one to broaden the applicability across a wide range of sectors that can benefit public and improve industrial competitiveness. Already, consumer products containing nanomaterials are available in markets including coatings, computers, clothing, cosmetics, sports equipment and medical devices. Recently, Institute of Occupational Medicine in UK reported an occupational hygiene review for nanoparticles in the viewpoint of nanotoxicity. They reported that the exposure control is very important issues in workplace for exposure assessment, but no proper methods are available to measure the extent of exposures to nanoparticles in the workplace. Therefore, for the estimation of exposure of nanomaterials, we have to approach the material-balance methodology, which similarly carried out in TRI (toxic release inventory) for hazardous chemicals. In order to use this methodology, the exposure source of nanomaterials should be determined firstly. Therefore, herein we investigated the main sources and processes for the exposure to nanomaterals by conducting the survey. The results could be used to define and assess nanohazard sources.

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

Applied to Satellite Network of Modified Diffie-Hellman Scheme (Diffie-Hellman 방법의 위성망에서의 응용)

  • Park, Jeong-Hyun;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.23-30
    • /
    • 1996
  • This paper presented a key distribution scheme based on the Yacobi scheme that does not use the secret key provided by key distribution center as a power, but uses instead a random number generated by the user. The scheme is independent of the exposure of the secret key. Then this paper described modified Diffie-Hellman schemes based on the discrete logarithm and prime resolution into factors. The modified DH scheme was applied to point-to-multicasting, and broadcasting networks via satellite.

Design of Secure Information Center Using a Conventional Cryptography

  • Choi, Jun-Hyuk;Kim Tae-Gap;Go, Byung-Do;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.53-66
    • /
    • 1996
  • World Wide Web is a total solution for multi-media data transmission on Internet. Because of its characteristics like ease of use, support for multi-media data and smart graphic user interface, WWW has extended to cover all kinds of applications. The Secure Information Center(SIC) is a data transmission system using conventional cryptography between client and server on WWW. It's main function is to support the encryption of sending data. For encryption of data IDEA(International Data Encryption Algorithm) is used and for authentication mechanism MD5 hash function is used. Since Secure Information Center is used by many users, conventional cryptosystem is efficient in managing their secure interactions. However, there are some restrictions on sharing of same key and data transmission between client and server, for example the risk of key exposure and the difficulty of key sharing mechanisms. To solve these problems, the Secure Information Center provides encryption mechanisms and key management policies.

Adaptation of a Key Distribution Scheme for VSAT Satellite Communications (VSAT 위성통신 보호를 위한 키 분배 방식의 적용)

  • Park, Jeong-Hyeon;Im, Seon-Bae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.115-122
    • /
    • 1999
  • This paper presents a key distribution scheme based on the Yacobi scheme that does not use the secret key provided by key distribution center, but uses instead a random number generated y the user. The scheme is independent of the exposure of the secret key. this paper also presented the key distribution schemes based on the Diffie-Hellman (DH) and ID (identity). The schemes based on the solving of the discrete logarithm and prime resolution into factors are better on the expose of secret key. The proposed scheme based on the DH was applied to VSAT satellite communications and simulated on PC using Montgomery algorithm for modular and MD5 (Message Digest) for hashing function.

  • PDF

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

A heat shock cognate 70 gene in the endoparasitoid, Pteromalus puparum, and its expression in relation to thermal stress

  • Wang, Huan;Dong, Sheng-Zhang;Li, Kai;Hu, Cui;Ye, Gong-Yin
    • BMB Reports
    • /
    • v.41 no.5
    • /
    • pp.388-393
    • /
    • 2008
  • The Pphsc70 (heat shock cognate 70) gene was isolated from the endoparasitoid Pteromalus puparum and then characterized. The full-length cDNA was 2204 base pair (bp) and contained a single 1968 bp ORF that encoded a polypeptide of 656 amino acids with a predicted molecular mass of 71.28 kDa. Phylogenetic analysis based on Hsc70 amino acid sequences from fifteen insect species agreed with the present phylogeny. In addition, genomic DNA confirmed the presence of three introns located at the coding region as well as the 5'UTR. A significant elevation of Pphsc70 expression was observed following heat treatment, however, continued exposure to heat shock or recovery caused the expression of induced mRNA to gradually decline to levels that were significantly lower than those of control pupae (P < 0.05). In addition, a significant increase was observed in the emergence rate of pupae that were preheated at $40^{\circ}C$ and then exposed to $50^{\circ}C$ for 1 h when compared with the pupae that were not preheated, but instead directly exposed to $50^{\circ}C$. Taken together, these results revealed that exposure to gradually increasing temperatures can enhance an insects thermo-tolerance.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

Hepatic Expression of Cu/Zn-Superoxide Dismutase Transcripts in Response to Acute Metal Exposure and Heat Stress in Hemibarbus mylodon (Teleostei: Cypriniformes)

  • Cho, Young-Sun;Bang, In-Chul;Lee, Il-Ro;Nam, Yoon-Kwon
    • Fisheries and Aquatic Sciences
    • /
    • v.12 no.3
    • /
    • pp.179-184
    • /
    • 2009
  • Hemibarbus mylodon (Cypriniformes) is an endemic freshwater fish species in the Korean peninsula, for which urgent conservation efforts are needed. To understand their stress responses in relation to metal toxicity and thermal elevation, we performed a real-time RT-PCR-based expression assay of hepatic copper/zinc-superoxide dismutase (Cu/Zn-SOD), a key antioxidant enzyme, in response to experimental heavy metal exposure or heat treatment. The transcription of hepatic Cu/Zn-SOD was differentially modulated by acute exposure to Cu, cadmium (Cd), or Zn. Exposure to each metal at $5{\mu}M$ for 24 h revealed that Cu stimulated the mRNA expression of Cu/Zn-SOD to a greater extent than the other two heavy metals. The elevation in Cu/Zn-SOD transcripts in response to Cu exposure was dose-dependent (0.5 to $5{\mu}M$). Time course analysis of Cu/Zn-SOD expression in response to Cd exposure ($5{\mu}M$) revealed a transient pattern up to day 7. Exposure to thermal stress (an increase from 22 to $30^{\circ}C$ at a rate of $1^{\circ}C/h$ followed by $30^{\circ}C$ for 18 h) did not significantly alter SOD transcription, although heat shock protein 90 kDa (HSP90) transcription was positively correlated with an increase in temperature.

Service life evaluation of HPC with increasing surface chlorides from field data in different sea conditions

  • Jong-Suk Lee;Keun-Hyeok Yang;Yong-Sik Yoon;Jin-Won Nam;Seug-Jun Kwon
    • Advances in concrete construction
    • /
    • v.16 no.3
    • /
    • pp.155-167
    • /
    • 2023
  • The penetrated chloride in concrete has different behavior with mix proportions and local exposure conditions, even in the same environments, so that it is very important to quantify surface chloride contents for durability design. As well known, the surface chloride content which is a key parameter like external loading in structural safety design increases with exposure period. In this study, concrete samples containing OPC (Ordinary Portland Cement), GGBFS (Ground Granulated Blast Furnace Slag), and FA (Fly Ash) had been exposed to submerged, tidal, and splash area for 5 years, then the surface chloride contents changing with exposure period were evaluated. The surface chloride contents were obtained from the chloride profile based on the Fick's 2nd Law, and the regression analysis for them was performed with exponential and square root function. After exposure period of 5 years in submerged and tidal area conditions, the surface chloride content of OPC concrete increased to 6.4 kg/m3 - 7.3 kg/m3, and the surface chloride content of GGBFS concrete was evaluated as 7.3 kg/m3 - 11.5 kg/m3. In the higher replacement ratio of GGBFS, the higher surface chloride contents were evaluated. The surface chloride content in FA concrete showed a range of 6.7 kg/m3 to 9.9 kg/m3, which was the intermediate level of OPC and GGBFS concrete. In the case of splash area, the surface chloride contents in all specimens were from 0.59 kg/m3 to 0.75 kg/m3, which was the lowest of all exposure conditions. Experimental constants available for durability design of chloride ingress were derived through regression analysis over exposure period. In the concrete with GGBFS replacement ratio of 50%, the increase rate of surface chloride contents decreased rapidly as the water to binder ratio increased.