• Title/Summary/Keyword: Platform security

Search Result 797, Processing Time 0.026 seconds

Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users (DApp 사용자의 프라이버시 보호 강화를 위한 공개형 블록체인 플랫폼 보안구조 강화방안)

  • Hwang, Seonjin;Ko, DongHyun;Bahk, Taeu;Choi, Yoon-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.1-9
    • /
    • 2020
  • Along with the growth of Blockchain, DApp (Distributed Application) is getting attention. As interest in DApp grows, market size continues to grow and many developers participate in development. Many developers are using API(Application Programming Interface) services to mediate Blockchain nodes, such as Infura, for DApp development. However, when using such a service, there is a serious risk that the API service operator can violate the user's privacy by 1 to 1 matching the account address of the Transaction executed by the DApp user with the IP address of the DApp user. It can have an adverse effect on the reliability of public Blockchains that need to provide users with a secure DApp service environment. The proposed Blockchain platform is expected to provide user privacy protection from API services and provide a reliable DApp use environment that existing Blockchain platforms did not provide. It is also expected to help to activate DApp and increase the number of DApp users, which has not been activated due to the risk of an existing privacy breach.

A study on the policy implementation strategy through public participation (정부의제의 국민참여를 통한 정책화 추진 전략에 관한 연구)

  • Lee, Hyangsoo;Lee, Seong-Hoon;Jung, Yonghun
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.45-54
    • /
    • 2022
  • This study examines the actual operation and performance of the public participation platform by analyzing various public participation processes from 2018 to 2021, when 'Gwanghwamun 1st Street', a representative public participation platform operated by the Ministry of Public Administration and Security, was launched. Through this, the influencing factors that were able to successfully induce the process of policyization through public participation were derived as follows. First, online participation channels were diversified to encourage public participation. Second, it is also important that the public opinion contest and compensation for public review were implemented to encourage and expand public participation. Third, the participation of experts was encouraged to refine and refine the people's ideas. Through these research results, it is judged that the Korean government will be able to contribute to inducing the policyization process through continuous public participation. In deriving success factors for policyization through public participation in the future, how influencing factors such as the public participation process, communication through online channels, and collaboration with experts affect the public participation process using quantitative analysis techniques A study to prove it will have to be conducted subsequently.

XMPP-based Vehicle messaging System for Collaboration and Contents Sharing (협업 및 콘텐츠 공유를 위한 XMPP기반 차량용 메시징 시스템)

  • Jung, Hun;Park, HaeWoo;KU, Jahyo
    • Journal of the Korea society of information convergence
    • /
    • v.5 no.2
    • /
    • pp.67-76
    • /
    • 2012
  • XML-based open protocol, XMPP users to pass messages to other users, which means that a decentralized communication network is the network infrastructure and enable it. In addition, XMPP servers using a professional server-to-server protocol to communicate with each other and decentralized social networks and collaboration framework provides an important possibility. In this paper, the features of XMPP messaging protocol is applicable to automotive telematics terminals XMPP-based platform design, and presence of two-way communication point for the problem, point-to-point session setup issues, security issues, compatibility issues, and to solve the scalability problem XMPP-based messaging system was implemented.

  • PDF

The Business Model of IoT Information Sharing Open Market for Promoting IoT Service (IoT 서비스 활성화를 위한 IoT 정보공유 오픈 마켓 비즈니스 모델)

  • Kim, Woo Sung
    • Journal of Information Technology Services
    • /
    • v.15 no.3
    • /
    • pp.195-209
    • /
    • 2016
  • IoT (Internet of Things) is a collective term referring to application services that provide information through sensors/devices connected to the internet. The real world application of IoT is expanding fast along with growing number of sensors/devices. However, since IoT application relies on vertical combination of sensors/devices networks, information sharing within IoT services remains unresolved challenge. Consequently, IoT sensors/devices demand high construction and maintenance costs, rendering the creation of new IoT services potentially expensive. One solution is to launch an IoT open market for information sharing similar to that of App Store for smart-phones. Doing so will efficiently allow novel IoT services to emerge across various industries, because developers can purchase licenses to access IoT resources directly via an open market. Sharing IoT resource information through an open market will create an echo-system conducive for easy utilization of resources and communication between IoT service providers, resource owners, and developers. This paper proposes the new business model of IoT open market for information sharing, and the requirements for ensuring security and standardization of open markets.

Republic of Korea Navy's Long-Term Development Plan to Acquire Operational Capabilities at Distant Ocean - Focused on Introduction of Aircraft Carrier and Nuclear-powered Submarine - (원양 작전 능력 확보를 위한 한국 해군의 장기(長期) 발전 방안 - 항공모함 및 원자력 잠수함 도입제안을 중심으로 -)

  • Kim, Jae-Yeop
    • Strategy21
    • /
    • s.34
    • /
    • pp.149-177
    • /
    • 2014
  • Today distant oceans around the world are regarded as a major 'global commons' for international trade and transportation. Korea is not an exception, because Korea hugely depends on sea lines of communication (SLOC) for supplying vital commodities such as food and energy resource. As a result, assuring a free and safe use of distant ocean beyond territory is also an important agenda for Korea's maritime security. However there are a number of challenges for Korea to enjoy a free and safe use of distant ocean; dangers of regional maritime conflict in East Asia, naval arms race of China and Japan, and concerns on possible decline of U.S naval presence and power projection capabilities. These factors provide a reasonable basis for Republic of Korea Navy (ROKN) to pursue capabilities for major naval operations at distant ocean in a long-term perspective toward the year 2030. The introduction of aircraft carrier and nuclear-powered submarine is a key requirement for achieving this goal. ROKN needs to acquire a 'multi-role strategic landing platform' type of light aircraft carrier, which takes a role to escort naval task force by providing air superiority at distant ocean. Additionally nuclear-powered submarine will offer ROKN a formidable power to carry out offensive missions effectively at distant ocean.

Global Value Chain in East Asia Under "New Normal": Ideology- Technology-Institution Nexus

  • Choi, Byung-il
    • East Asian Economic Review
    • /
    • v.24 no.1
    • /
    • pp.3-30
    • /
    • 2020
  • This paper analyzes how the current Global Value Chain (GVC) of East Asia has been established, and attempts to project the future trajectory of GVC under New Normal in the global trading system. For this purpose, the framework of Ideology-Technology-Institution nexus is presented with focus on the dynamics of interplay between ideology and technology, duly recognizing the dual-aspect of technology- a platform for business and also for national defense. The paper analyzes how the Information and Communication Technology (ICT) of the 1990s played a role of "facilitator" in shaping the GVC of East Asia, where China plays 'factory for final assembly' and the US plays 'the largest consumer'. Under New Normal, digital technology is likely to play the opposite role of "disrupting" the GVC of East Asia, unlike ICT. The paper explores the mechanism behind this great disruption. What is driving New Normal is the US-China power competition, seeking for dominance in East Asia and beyond. This paper argues that New Normal is not temporary shock, but will last for some time. Under this presumption, the paper presents three scenarios for the future trajectory of GVC in East Asia.

Genetic Distances of Paralichthys olivaceus Populations Investigated by PCR

  • Yoon, Jong-Man
    • Development and Reproduction
    • /
    • v.22 no.3
    • /
    • pp.283-288
    • /
    • 2018
  • The author carried out PCR-based genetic platform to investigate the hierarchical polar dendrogram of Euclidean genetic distances of one bastard halibut population, particularly for Paralichthys olivaceus, which was further connected with those of the other fish population, by involving with the precisely designed oligonucleotide primer sets. Eight oligonucleotides primers were used generating excessively alterating fragments, ranging in size of DNA bands from larger than approximately 100 bp to less than 2,000 bp. As regards average bandsharing value (BS) results, individuals from Hampyeong population (0.810) displayed lower bandsharing values than did individuals from Wando population (0.877). The genetic distance between individuals approved the existence of close relationship in the cluster II. Relatively, individuals of one bastard halibut population were fairly related to that of the other fish population, as shown in the polar hierarchical dendrogram of Euclidean genetic distances. The points of a noteworthy genetic distance between two P. olivaceus populations demonstrated this PCR procedure is one of the quite a few means for individuals and/or populations biological DNA investigates, for species security and proliferation of bastard halibut individuals in coastal region of the Korea.

Dynamic RBAC Model based on OSGi (OSGi 기반 동적 RBAC 모델)

  • Kim, In-Tae;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.53-60
    • /
    • 2009
  • In home network environments, the user authentication and authorization associated user's information and usability may be important security issue. The OSGi service platform, a well-known home network gateway already specifies the mechanism of that. The traditional authority method provided OSGi implements simple RBAC(Role Based Access Control) model. This is difficult to support efficient access control. In this paper, we propose the dynamic RBAC model based on OSGi. The proposed method describes the extended framework that manage two roles named as absolute role and relative role, extend existed framework with relative role and propose programming model to enable dynamic access control. Finally, we implement the proposed framework using AspectJ and Java annotation.

A Systems Engineering Approach to Implementing Hardware Cybersecurity Controls for Non-Safety Data Network

  • Ibrahim, Ahmad Salah;Jung, Jaecheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.12 no.2
    • /
    • pp.101-114
    • /
    • 2016
  • A model-based systems engineering (MBSE) approach to implementing hardware-based network cybersecurity controls for APR1400 non-safety data network is presented in this work. The proposed design was developed by implementing packet filtering and deep packet inspection functions to control the unauthorized traffic and malicious contents. Denial-of-Service (DoS) attack was considered as a potential cybersecurity issue that may threaten the data availability and integrity of DCS gateway servers. Logical design architecture was developed to simulate the behavior of functions flow. HDL-based physical architecture was modelled and simulated using Xilinx ISE software to verify the design functionality. For effective modelling process, enhanced function flow block diagrams (EFFBDs) and schematic design based on FPGA technology were together developed and simulated to verify the performance and functional requirements of network security controls. Both logical and physical design architectures verified that hardware-based cybersecurity controls are capable to maintain the data availability and integrity. Further works focus on implementing the schematic design to an FPGA platform to accomplish the design verification and validation processes.

A SOA based Framework Using AOP for Reliable Service Applications (AOP를 이용한 신뢰성 있는 서비스 어플리케이션의 SOA 기반 프레임워크)

  • Kim, Eun-Sun;Lee, Jae-Jeong;Lee, Byung-Jeong
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.223-234
    • /
    • 2011
  • Loosely coupled properties of SOA(Service Oriented Architecture) services do not guarantee that service applications always work properly. Service errors may also influence other services of SOA. These characteristics adversely affect software reliability. Therefore, it is a challenge to effectively manage system change and errors for operating services normally. In this study, we propose a SOA based framework using AOP(Aspect Oriented Programming) for reliable service applications. AOP provides a way to manipulate cross-cutting concerns such as logging, security and reliability and these concerns can be added to applications through weaving process. We define a service specification and an aspect specification for this framework. This framework also includes service provider, requester, repository, platform, manager, and aspect weaver to handle changes and exceptions of applications. Independent Exception Handler is stored to exhibited external Aspect Service Repository. When exception happened, Exception Handler is linked dynamically according to aspect rule that is defined in aspect specification and offer function that handle exception alternate suitable service in systematic error situation. By separating cross-cutting concerns independently, we expect that developer can concentrate on core service implementation and reusability, understanding, maintainability increase. Finally, we have implemented a prototype system to demonstrate the feasibility of our framework in case study.