• Title/Summary/Keyword: Platform security

Search Result 821, Processing Time 0.03 seconds

Customize Service Platform using Beacon (Beacon을 활용한 사용자맞춤 서비스 플랫폼)

  • Kim, Heejoo;Yang, Seyoung;Lim, Sunghee;Kim, Hyungjong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.1198-1200
    • /
    • 2017
  • IoT기술이 발전함에 따라 기업에서도 Beacon을 활용하여 다양한 플랫폼서비스를 제공하고 있다. 하지만 오늘날 사용자들은 개인마다 필요로 하는 서비스기능이 다르고 제공되는 상황적 시나리오 또한 한정적이기 때문에 사용자들의 만족을 충족시켜주기에는 무리가 있다. 본 논문에서는 일반적으로 사용하는 기능을 바탕으로 사용자가 직접 기능을 추가할 수 있는 '사용자 지정'기능을 구현하며, 플랫폼의 한계를 극복하였다. 우리의 연구는 비콘이 제공하는 위치정보와 데이터베이스정보와의 효율적인 매핑을 통한 새로운 플랫폼을 구현한다. 비콘을 활용한 플랫폼서비스 연구에 좋은 시작이 될 것이다.

Elevator error detecting Using Intelligence Algorithm (지능형 알고리즘을 이용한 엘리베이터의 에러검출)

  • Kang, Doo-Young;Kim, Hyung-Gwon;Javid, Hossain;Ahn, Tae-Chon
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.2741-2743
    • /
    • 2005
  • In this paper, Elevator is designed for real time security & management. Security & Management System is designed for wireless communication between an Elevator and an manager, between Elevation and an manager. Also, to have remote control capability, embedded system platform with TCP/IP techniques are applied to process control system with independent open structure for the precise data transmission and without constraint of operating system. Security and Management system is designed to solve problem of network port by Bluetooth module. Moved recording, unworked table, life of device and replacement time of device are made database, database is applied to Fuzzy Rule for pre-detection unworked Elevator. Security & Management system is designed safety and convenience for customers using Elevator as well as rapidly treatment with unworked Elevator.

  • PDF

Implementation of Remote Management Service using Access Control on OSGi Computing Environment (OSGi 컴퓨팅 환경에서 접근 제어를 이용한 원격 관리 서비스 구현)

  • Choi, Kyu-Sang;Jung, Heoun-Mam;Lee, Se-Hoon;Beak, Yong-Tae
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.109-115
    • /
    • 2006
  • In this paper, we proposed service security model and remote management service on OSGi computing environment. The model is used to make access control decisions like permission-based security inside the java2 platform. In model, policies are defined using a flat text file and include bundles. It method granted flexibility and extendability of access control of bundles and services. Also, we proposed service architecture efficiently for remote management service.

  • PDF

Full-digital portable radiation detection system (디지털 휴대용 방사능 검출 시스템)

  • Lee, Seok Jae;Kim, Young Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.315-318
    • /
    • 2015
  • in recently the world trend of security system for shipping transport is much more important and stronger, so following the world trend, there is development to security system of shipping transport for national security logistics system construction. it is still ongoing. For the world trend of security system, there is attempt of portable radiation detection, which is possible to get detection of nuclide in south Korea. in this Paper, it will shows about Full-digital system to portable radiation detection platform.

  • PDF

A Reliable Secure Storage Cloud and Data Migration Based on Erasure Code

  • Mugisha, Emmy;Zhang, Gongxuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.436-453
    • /
    • 2018
  • Storage cloud scheme, pushing data to the storage cloud poses much attention regarding data confidentiality. With encryption concept, data accessibility is limited because of encrypted data. To secure storage system with high access power is complicated due to dispersed storage environment. In this paper, we propose a hardware-based security scheme such that a secure dispersed storage system using erasure code is articulated. We designed a hardware-based security scheme with data encoding operations and migration capabilities. Using TPM (Trusted Platform Module), the data integrity and security is evaluated and achieved.

The Study of Performance Improvement of Dejitter Algorithm applying Time Series Model for VoicePlatform Security Data (음성 플랫폼 보안 데이터 성능 개선을 위해 시계열 모델을 적용한 디지터 알고리즘의 성능 향상 연구)

  • Min, Sun-Ho;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.963-968
    • /
    • 2013
  • In this paper, a major factor in determining voice quality that corresponds to the jitter and dejitter algorithm for removing jitter will be described. We analyze legacy dejitter algorithm and propose the study applying Time Series Model to improve performance of the dejitter algorithm.

ISM Application Tool, A Contribution to Address the Barrier of Information Security Management System Implementation

  • Chandra, Nungky Awang;Sadikin, Mujiono
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.39-48
    • /
    • 2020
  • Information-security management systems (ISMSs) are becoming very important, even for micro, small, and medium enterprises (MSMEs). However, implementing an ISMS is not an easy task. Many obstacles must be overcome, e.g., complexity, document tracking, competency management, and even changing cultures. The objective of our study is to provide ISMS application tools, based on ISO 27001:2013 ISM frameworks. The application was developed on the Odoo Open Enterprise Resource Planning platform. To validate its feasibility for future improvement, the application was implemented by an MSME company. For this implementation, information-security-related users gave their feedback through a questionnaire. The distributed feedback questionnaire consists of nine assessment parameters, covering topics from the application's technical aspects to users' experiences. Based on the questionnaire feedback, all users of the application were satisfied with its performance.

A Novel Security Scheme with Message Level Security for Hybrid Applications

  • Ma, Suoning;Joe, Inwhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.215-217
    • /
    • 2016
  • With the popularity of smart device, mobile applications are playing more and more important role in people's daily life, these applications stores various information which greatly facilitate the user's daily life. However due to the frequent transmission of data in the network also increases the risk of data leakage, more and more developers began to focus on how to protect user data. Current mainstream development models include Native development, Web development and Hybrid development. Hybrid development is based on JavaScript and HTML5, it has a cross platform advantages similar to Web Apps and a good user experience similar to Native Apps. In this paper according to the features of Hybrid applications, we proposed a security scheme in Hybrid development model implements message-level data encryption to protect user information. And through the performance evaluation we found that in some scenario the proposed security scheme has a better performance.

A Study on Interoperability of Heterogeneous IoT Platform Device Identification (이종 IoT 플랫폼 디바이스 식별체계 상호연동에 대한 연구)

  • Koo, Ja-Hoon;Kim, Young-Gab
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.1279-1282
    • /
    • 2017
  • 현재 사물인터넷(Internet of Things; IoT) 기술을 이용한 스마트홈 환경을 구축하기 위해서는 같은 식별체계를 사용하는 플랫폼 디바이스를 사용해야 한다. 그러나 주요 IoT 플랫폼들은 각각 다른 식별체계를 사용하고 있기 때문에 이종 플랫폼 간 디바이스 식별이 어려운 상황이다. 이종 플랫폼 간 디바이스 식별체계 상호연동에 대한 연구는 진행 중이며 아직까지 해결책은 제시되지 않았다. 따라서 본 논문에서는 주요 IoT 플랫폼인 oneM2M, GS1 Oliot, IBM Watson IoT, OCF IoTivity의 디바이스 식별체계를 분석하고 비교하여 서로 다른 플랫폼 간 디바이스 식별체계에 대한 번역기 또는 해석기의 필요성과 개념모델을 제시한다.

Kerberos Authentication Deployment Policy of US in Big data Environment (빅데이터 환경에서 미국 커버로스 인증 적용 정책)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.435-441
    • /
    • 2013
  • This paper review about kerberos security authentication scheme and policy for big data service. It analyzed problem for security technology based on Hadoop framework in big data service environment. Also when it consider applying problem of kerberos security authentication system, it analyzed deployment policy in center of main contents, which is occurred in commercial business. About the related applied Kerberos policy in US, it is researched about application such as cross platform interoperability support, automated Kerberos set up, integration issue, OPT authentication, SSO, ID, and so on.