• Title/Summary/Keyword: Key Management System

Search Result 2,026, Processing Time 0.04 seconds

Agile Management (Management 3.0) as the Basis of the Management System in the Conditions of Globalization

  • Kopytko, Marta;Chуrva, Olha;Stavska, Yuliia;Karvatska, Nataliia;Chуrva, Hanna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.101-106
    • /
    • 2022
  • The main purpose of the study is to determine the key aspects of Agile management as the basis of a management system in the context of globalization. The research methodology includes several scientific and theoretical methods that have achieved this goal. Adaptation of enterprises engaged in the development, production, and sale of innovative products to constant and rapid changes in the external environment requires managers to apply appropriate management methods. The use of Agile management in the management of innovation processes can speed up their implementation, minimize and optimize the use of resources, time, and effort of staff, can increase customer and customer satisfaction with the end result and, consequently, improve the company's competitive position in the market. The results of the study identified key aspects of the application of Agile management in the management system in the context of globalization.

A Key-Frame Extraction Method based on HSV Color Model for Smart Vehicle Management System (스마트 차량 관리 시스템을 위한 HSV 색상모델 기반의 키 프레임 추출 기법)

  • Kwon, Young-Wook;Jung, Se-Hoon;Park, Dong-Gook;Sim, Chun-Bo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.4
    • /
    • pp.595-604
    • /
    • 2013
  • Currently, registered number of imported vehicles is increasing rapidly over the years. Accordingly, environment improvements of vehicle maintenance company for maintenance of luxury vehicle such as imported vehicle are continuously being made. In this paper, we propose a key frame extraction method based on HSV color model for smart vehicle management system implementation to offer for customer reliability of maintenance vehicle. After automatically recognize the license plates of the vehicle using vehicle license plate recognition system when the vehicle come in the car center, we check the repair history and request of the vehicle based on it. We implement mobile services which provide extracted key frame images to the user after extract key frames from vehicle repair video. In addition, we verify the superiority of key frame extraction method by applying a smart vehicle management system. Finally, we convert the RGB color to HSV color to improve the performance of proposed key frame extraction scheme. As a result, we confirmed that our scheme is more excellence about 30% in terms of recall than RGB color model from the performance evaluations.

A Reliable Group Key Management Scheme for Broadcast Encryption

  • Hur, Junbeom;Lee, Younho
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.246-260
    • /
    • 2016
  • A major challenge achieving scalable access control for a large number of subscribers in a public broadcast is to distribute key update messages reliably to all stateless receivers. However, in a public broadcast, the rekeying messages can be dropped or compromised during transmission over an insecure broadcast channel, or transmitted to receivers while they were off-line. In this study, we propose a novel group key management scheme. It features a mechanism to allow legitimate receivers to recover the current group key, even if they lose key update messages for long-term sessions. The scheme uses short hint messages and member computation. Performance analysis shows that the proposed scheme has the advantages of scalability and efficient rekeying compared to previous reliable group key distribution schemes. The proposed key management scheme targets a conditional access system in a media broadcast in which there is no feedback channel from receivers to the broadcasting station.

A Study Medium-based safe File Management Security System on the cloud Environment (클라우드 환경에서 매체기반의 안전한 파일관리 보안 시스템에 대한 연구)

  • Kim, Hee-Chul
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.142-150
    • /
    • 2019
  • This study is a file management security system that encrypts and decrypts computer and cloud data by using Bluetooth based cryptographic module. It is a necessary solution in terms of abuse of personal information and protection of social and national information. We developed H/W and S/W for SFMS(: Safe File Management Security) related Bluetooth module in cloud environment and implemented firmware development, encryption key generation and issuance, client program for system mobile and key management system. In the terminal internal encryption and decryption, SFMS was developed to ensure high security that the hacking itself is not possible because key values exist separately for each file.

Design of E-Document Management System Using Dynamic Group Key based on OOXML (OOXML기반의 동적 그룹키를 이용한 전자문서 관리 시스템의 설계)

  • Lee, Young-Gu;Kim, Hyun-Chul;Jung, Taik-Yeong;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1407-1417
    • /
    • 2009
  • We propose a e-document management system that can provide segmented page information on a document according to different levels of authority from access control environment. The proposed system creates hierarchy identifier using a one-way hash chain and therefore does not need to own key information for all users as in existing system. Also by creating group keys by compounding hash chain hierarchy identifier with randomly formed group identifier, the system can flexibly respond to dynamic changes from group member movements while at the same time resolving the problems of key formation and management in document encoding technique using symmetric key for each page. Lastly as a result of comparative analysis through an experiment with existing e-document management systems, the proposed system showed superiority in the efficiency of encoding and decoding document and the speed of encoding and decoding by the pages.

Determination of Key Factors and Evaluation of Their Importance in the Elevator Safety Quality Rating System for the Purpose of Adjusting the Elevator Inspection Cycle (승강기 검사주기 조정을 위한 안전품질 등급제 핵심항목 선정 및 중요도 평가)

  • Kyung-Min Roh;Kwan-Hee Han
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.45 no.4
    • /
    • pp.70-78
    • /
    • 2022
  • Recently, elevator inspection and self-examination were strengthened through the revision of the Elevator Safety Management Act, but there have been no significant reduction in serious accidents and major failures. Therefore, the government intends to lay the foundation for reflecting the safety quality rating system, which adjusts the elevator inspection cycle, as a policy to induce safety management of preemptive and active management entities. This study systematically reviewed and classified the safety quality rating system for elevator inspection cycle adjustment in previous studies, collected expert opinions, and reconstructed the key items into realistic evaluation items, and evaluated and scored the relative importance of each factor through the AHP technique.

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

Risk Management Qualitatively on Railway Signal System

  • Zhang, Ya-Dong;Guo, Jin
    • International Journal of Railway
    • /
    • v.2 no.3
    • /
    • pp.113-117
    • /
    • 2009
  • Risk management is an important part of system assurance and it is widely used in safety-related system. Railway signal system is one kind of safety-related system and its most important goal is to guarantee the safety of railway system. The method based on risk management can find and solve the security issues of railway signal system more effectively. This paper introduces the basic conception of risk management, studies the whole process of risk management and related tools and techniques and discusses some key points qualitatively combining with the particularity of railway signal system.

  • PDF

ID-Based Group Key Management Protocols for Dynamic Peer Groups (피어 그룹을 위한 ID 기반의 그룹키 관리 프로토콜)

  • Park, Young-Ho;Lee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.922-933
    • /
    • 2004
  • In recent years, peer-to-peer network have a greate deal of attention for distributed computing or collaborative application, and work of ID-based public key systems have been focusing on the area of cryptography. In this paper, we propose ID-based group key management protocols for secure communication in autonomous peer group. Each member obtains his public/private key pair derived from his identification string from Private Key Generator. No central server participates in group key management protocol instead, all group members share the burden of group key management by the collaboration of themselves, so that our scheme avoids the single point of failure problem. In addition, our scheme considers the nature of dynamic peer group such as frequent joining and leaving of a member.

  • PDF

Key Management for Secure Internet of Things(IoT) Data in Cloud Computing (클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리)

  • Sung, Soon-hwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • The Internet of Things(IoT) security has more need than a technical problem as it needs series of regulations and faultless security system for common purposes. So, this study proposes an efficient key management in order that can be trusted IoT data in cloud computing. In contrast with a key distribution center of existing sensor networks, the proposed a federation key management of cloud proxy key server is not central point of administration and enables an active key recovery and update. The proposed key management is not a method of predetermined secret keys but sharing key information of a cloud proxy key server in autonomous cloud, which can reduce key generation and space complexity. In addition, In contrast with previous IoT key researches, a federation key of cloud proxy key server provides an extraction ability from meaningful information while moving data.