• Title/Summary/Keyword: Permission

Search Result 735, Processing Time 0.028 seconds

CRYPTANALYSIS AND IMPROVEMENT OF A PROXY SIGNATURE WITH MESSAGE RECOVERY USING SELF-CERTIFIED PUBLIC KEY

  • Chande, Manoj Kumar;Lee, Cheng-Chi
    • Bulletin of the Korean Mathematical Society
    • /
    • v.53 no.4
    • /
    • pp.1051-1069
    • /
    • 2016
  • Combining the concept of self-certified public key and message recovery, Li-Zhang-Zhu (LZZ) gives the proxy signature scheme with message recovery using self-certified public key. The security of the proposed scheme is based on the discrete logarithm problem (DLP) and one-way hash function (OWHF). Their scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, their scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signer. In this paper, it is shown that in their signature scheme a malicious signer can cheat the system authority (SA), by obtaining a proxy signature key without the permission of the original signer. At the same time malicious original signer can also cheat the SA, he can also obtain a proxy signature key without the permission of the proxy signer. An improved signature scheme is being proposed, which involves the remedial measures to get rid of security flaws of the LZZ et al.'s. The security and performance analysis shows that the proposed signature scheme is maintaining higher level of security, with little bit of computational complexity.

Comparison between Ecotoxicity using Daphnia magna and Physiochemical Analyses of Industrial Effluent (산업폐수에 대한 이화학적 분석과 물벼룩 생태독성의 비교)

  • Lee, Sun Hee;Lee, Hak Sung
    • Journal of Environmental Science International
    • /
    • v.23 no.7
    • /
    • pp.1269-1275
    • /
    • 2014
  • Ecotoxicity assessments with the physiochemical water quality items and the bioassay test using Daphnia magna were conducted for 18 selected effluents of 6 industrial types (metal processing, petroleum refining, synthetic textile manufacturing, plating, alcohol beverage manufacturing, inorganic compound manufacturing) being detected toxicity from industrial effluent in Ulsan city, and the interrelationship between total toxic unit (${\Sigma}TU$) and concentrations of Water Quality Conservation Act in Korea were investigated. The average toxic unit(TU) of effluents for 6 industrial types displayed the following ascending order: petroleum refining (0.2) < synthetic textile manufacturing (0.6) < alcohol beverage manufacturing (0.9) < metal processing (1.3) ${\leq}$ inorganic compound manufacturing (1.3) < plating (3.0). These values were less than effluent permission standard. Based on the result of substances causing ecotoxicity, the correlation analysis was not easy because most of heavy metals were not detected or were less than effluent permission standard. Toxicological assessment of industrial effluent was suitable for the evaluation of the mixture toxicity for pollutant. The whole effluent toxicity test using a variety of species was needed for the evaluation of industrial wastewater.

A Study on the Applicability of Decision Support System for the Permission of Forest Land-Use Conversion (산지전용허가 의사결정지원시스템의 실제 운용가능성에 관한 연구)

  • Choi, Sang Hyun;Kim, Eun Jin;Nam, Joo Hee;Woo, Jong Choon
    • Journal of Forest and Environmental Science
    • /
    • v.30 no.1
    • /
    • pp.45-49
    • /
    • 2014
  • This study was tried to find out the applicability of decision support system for forest land use conversion, which developed based on algorithm for forest land-use conversion. Decision support system developed by Ministry of Safety Administration is free from the existing licensed laws omission. And it made the input requirements for each value of the final result so that you can determine whether the permit was available by the laws and regulations related to the algorithm for forest land use conversion. Also, in order to do field surveys, equal sampling interval method is used to extract samples for the operability by comparing and analyzing the actual area. As a result, 88 areas of total 100 areas are able to get permission by the decision support system for forest land use conversion, and it means if there is enough data with sufficient research, it can make the availability permits easily.

The Criteria Improvement on the Designation of Historic Cultural Environment Conservation Area and the Current Conditions Alteration in Non-Urbanized Area - A special Emphasis on Chosun Royal Tombs in Gyeonggi - (비시가화지역 역사문화환경 보존지역의 설정 기준 및 현상변경기준의 개선 방안 - 경기도 소재 조선왕릉을 중심으로 -)

  • Choi, Hyung-Seok
    • Journal of Korean Society of Rural Planning
    • /
    • v.19 no.3
    • /
    • pp.117-129
    • /
    • 2013
  • The Historic Cultural Environment Conservation Areas around Chosun Royal Tombs in Gyeonggi Province are larger than those around other Cultural Assets, so more efficient management tools on the Areas should be needed. This study aims to suggest the directions of policy to modify the existing management tools by analyzing the spatial extent and alteration standards of the 12 Historic Cultural Environment Conservation Areas around Chosun Royal Tombs in Gyeonggi Province. The results of this study are as follows: First, in most cases, the spatial extents of the Areas are 500m, but the spatial extents should be precisely classified in Gyeonggi Ordinance of Cultural Assets Protection, and be excluded according to the layout of Protection Areas and roads. And the outside view from the inside is more important in Chosun Royal Tombs, so the areas on the axis of the view must be controled by considering the development density(bulk or height of buildings). Second, the same zoning areas must be classified as the same section of the Area allowing for equity, and Finally, the Current Conditions Permission Criteria should be actualized to take into account the difference between the development densities of zoning araes and the Criteria.

An evaluation scenario of safety performance for extraordinary service permission of autonomous vehicle (자율주행 자동차 임시운행 허가를 위한 안전 성능 평가 시나리오)

  • Jeong, Yonghwan;Yi, Kyongsu;Choi, In Seong;Min, Kyong Chan
    • Journal of Auto-vehicle Safety Association
    • /
    • v.7 no.2
    • /
    • pp.44-49
    • /
    • 2015
  • This paper presents an evaluation scenario of safety performance for extraordinary service permission of autonomous vehicle driving on a motorway. Based on advanced driver assistance system (ADAS) which is already mass-production, an autonomous vehicle driving on motorway is tested on the public roads and also getting close to mass-production. Before the autonomous vehicle tested, the safety of autonomous driving system should be evaluated based on a proper test scenario. Prior to develop the test scenario, this paper reviews the licensing standards for an autonomous vehicle in California and Nevada, and the international regulations of each ADAS. To develop the scenario, the driving conditions of motorway are categorized into five modes and fundamental evaluation requirements of elements of autonomous driving system are derived. An evaluation scenario, which represents the real driving conditions, has been developed to assess the safety of autonomous vehicle. This scenario has validated by computer simulation using model predictive control (MPC) based autonomous driving algorithm.

A Study of the Personalization Marketing method for Electronic-Customer Relationship Management (E-CRM (Electronic-Customer Relationship Management)을 위한 개인화 마케팅(Personalization Marketing) 기법에 관한 연구)

  • 김종완;오기욱
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.179-186
    • /
    • 2002
  • In the web, the Personalization considering individual's habits and tastes is attracting the internet service companies and internet users in order to realize a custom-oriented e-CRM. that is, the Personalization is leaping the new competitive strategy of e-business. In this thesis, first I studies on the Personalization which is the base of e-CRM emphasized the custom relationship in the internet. second, I researched the ways of marketing strategy to realize the Personalization using the e-CRM as well as the problems of Personalization based on the current one-to-one marketing. finally, I showed the new Personalization adopting permission marketing of Seth Godin the vice-chairman of marketing department in yahoo.com for the better e-CRM.

  • PDF

A Method for Deciding Permission of the ATM Using Face Detection (사용자 얼굴 검출을 이용한 ATM 사용 허가 판별 방법)

  • Lee, Jung-hwa;Kim, Tae-hyung;Cha, Eui-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.403-406
    • /
    • 2009
  • In this paper, we propose a method for deciding permission from the ATM(Automated Teller Machine) using face detection. First, we extract skin areas and make candidate face images from an input image, and then detect a face using Adaboost(Adaptive Boosting) algorithm. Next, proposed method executes a template matching for making a decision on whether to wear accessories like sunglasses or a mask in detected face image. Finally, this method decides whether to permit ATM service using this result. Experimental results show that proposed method performed well at indoors ATM environment for detecting whether to wear accessories.

  • PDF

Intelligent Android Malware Detection Using Radial Basis Function Networks and Permission Features

  • Abdulrahman, Ammar;Hashem, Khalid;Adnan, Gaze;Ali, Waleed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.286-293
    • /
    • 2021
  • Recently, the quick development rate of apps in the Android platform has led to an accelerated increment in creating malware applications by cyber attackers. Numerous Android malware detection tools have utilized conventional signature-based approaches to detect malware apps. However, these conventional strategies can't identify the latest apps on whether applications are malware or not. Many new malware apps are periodically discovered but not all malware Apps can be accurately detected. Hence, there is a need to propose intelligent approaches that are able to detect the newly developed Android malware applications. In this study, Radial Basis Function (RBF) networks are trained using known Android applications and then used to detect the latest and new Android malware applications. Initially, the optimal permission features of Android apps are selected using Information Gain Ratio (IGR). Appropriately, the features selected by IGR are utilized to train the RBF networks in order to detect effectively the new Android malware apps. The empirical results showed that RBF achieved the best detection accuracy (97.20%) among other common machine learning techniques. Furthermore, RBF accomplished the best detection results in most of the other measures.

Constructing Java Vulnerable API List based on Java Access Permission Checking Tree (자바 접근 권한 검사 트리 기반의 자바 취약 API 리스트 생성)

  • Park, Hyo-Seong;Park, Chul-Woo;Lim, Young-Chan;Kim, Ki-Chang
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.5 no.2
    • /
    • pp.289-296
    • /
    • 2015
  • Java is an interpreted language that can run on a variety of platforms, also Java has a number of useful features for network. Due to theses features of Java language, Java is used in various fields. In this paper, we will talk about how the malware that threaten the Java Security Manager of the Java Virtual Machine is using the vulnerability of the Java Virtual Machine. And for corresponding measures, this paper suggest vulnerability analysis method of Java system class by using Java Call Graph and Java Access Permission Checking Tree. By suggesting that, we want to lay groundwork for preventing Java security threats in advance.

Measures of Improvement for Content Claims of Free Antibiotic Livestock Products (무항생제 축산물 인증 표시제 개선방안)

  • YounSang Choi;Yong Kwang Shin
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.25 no.4
    • /
    • pp.44-52
    • /
    • 2024
  • This study attempts to derive measures to improve content claims of free antibiotic livestock products(FLP) through analyzing situations for the FLP market and results of survey for its providers. Recently the number of certified farms has been decreasing, but shipments per farm has been increasing. Furthermore as the COVID-19 has increased health and environmental concern, shipments of FLP have showed a steady increase. The distribution channel of FLP, regardless of varieties, is similar to that of general livestock products(GLP). The major results from survey for providers of FLP are little difference in between content claims of GLP and FLP and low utilization of FLP in production of livestock processed products compared with its shipments. The policies for content claims of FLP suggested by this study are permission of FLP authentication labelling for livestock processed products and permission of those which contain FLP over 70% in the first step.