• Title/Summary/Keyword: Private key

Search Result 691, Processing Time 0.027 seconds

Problems and Improvement Measures of Private Consulting Firms Working on Rural Area Development (농촌지역개발 민간컨설팅회사의 실태와 개선방안)

  • Kim, Jung Tae
    • Journal of Agricultural Extension & Community Development
    • /
    • v.21 no.2
    • /
    • pp.1-28
    • /
    • 2014
  • Private consulting firms that are currently participating in rural area development projects with a bottom-up approach are involved in nearly all areas of rural area development, and the policy environment that emphasizes the bottom-up approach will further expand their participation. Reviews of private consulting firms, which started out with high expectations in the beginning, are now becoming rather negative. Expertise is the key issue in the controversy over private consulting firms, and the analysis tends to limit the causes of the problems within firms. This study was conducted on the premise that the fixation on cause and structure results in policy issues in the promotion process. That is because the government authorities are responsible for managing and supervising the implementation of policies, not developing the policies. The current issues with consulting firms emerged because of the hasty implementation of private consulting through the government policy trend without sufficient consideration, as well as the policy environment that demanded short-term outcomes even though the purpose of bottom-up rural area development lies in the ideology of endogenous development focused on the changes in residents' perceptions. Research was conducted to determine how the problems of private consulting firms that emerged and were addressed in this context influenced the consulting market, using current data and based on the firms' business performance. In analyzing the types, firms were divided into three groups: top performers including market leaders (9), excellent performers (36), and average performers (34). An analysis of the correlation between the business performance of each type and managerial resources such as each firm's expertise revealed that there was only a correlation between human resources and regional development in excellent performers, and none was found with the other types. These results imply that external factors other than a firm's capabilities (e.g., expertise) play a significant role in the standards of selecting private consulting firms. Thus, government authorities must reflect on their error of hastily adopting private consulting firms without sufficient consideration and must urgently establish response measures.

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'

  • Khan, Muhammad Khurram;Kumari, Saru;Singh, Pitam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.967-979
    • /
    • 2013
  • Now a day, Wireless Sensor Networks (WSNs) are being widely used in different areas one of which is healthcare services. A wireless medical sensor network senses patient's vital physiological signs through medical sensor-nodes deployed on patient's body area; and transmits these signals to devices of registered medical professionals. These sensor-nodes have low computational power and limited storage capacity. Moreover, the wireless nature of technology attracts malicious minds. Thus, proper user authentication is a prime concern before granting access to patient's sensitive and private data. Recently, P. Kumar et al. claimed to propose a strong authentication protocol for healthcare using Wireless Medical Sensor Networks (WMSN). However, we find that P. Kumar et al.'s scheme is flawed with a number of security pitfalls. Information stored inside smart card, if extracted, is enough to deceive a valid user. Adversary can not only access patient's physiological data on behalf of a valid user without knowing actual password, can also send fake/irrelevant information about patient by playing role of medical sensor-node. Besides, adversary can guess a user's password and is able to compute the session key shared between user and medical sensor-nodes. Thus, the scheme looses message confidentiality. Additionally, the scheme fails to resist insider attack and lacks user anonymity.

The Study of Improvement of Personal Information Leakage Prevention in Mobile Environment (모바일 환경에서 개인정보 유출 방지를 위한 개선 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.53-62
    • /
    • 2015
  • Recently, number of tablet or Smartphone users increased significantly in domestic and around the world. But violation of personal information such as leakage, misuse and abuse are constantly occurring by using mobile devices which is very useful in our society. Therefore, in this paper it will talk about the problems in the network environment of the mobile environment such as tablet and Smartphone, Mobile Malware, hacking of the public key certificate, which could be potential threat to mobile environment. This thesis will research for people to use their mobile devices more reliable and safer in mobile environment from invasion and leakage of personal information. In order to use Smartphone safely, users have to use Wi-Fi and Bluetooth carefully in the public area. This paper will research how to use App safely and characteristic of risk of worm and Malware spreading. Because of security vulnerabilities of the public key certificate, it will suggest new type of security certification. In order to prevent from the information leakage and infect from Malware in mobile environment without knowing, this thesis will analyze the improved way to manage and use the mobile device.

Key Success Factors for ICT Service Startup Team : Team Creativity, Knowledge Sharing and Absorptive Capacity (ICT 서비스 스타트업의 성공조건 : 팀 창의성, 지식공유 그리고 흡수역량)

  • Park, Jun-Gi;Lee, Hyejung
    • Journal of Information Technology Services
    • /
    • v.17 no.1
    • /
    • pp.1-16
    • /
    • 2018
  • In this research, we tried to suggest the guidelines to stakeholder of ICT startup for picking up the excellent startups and nurturing them. We designed the research model focused on the good startup team's knowledge based interaction mechanism. A research model and hypotheses were developed from literature review and empirically validated. The research model consisted relationship among the knowledge sharing (knowledge donation and knowledge collection), absorptive capacity (member's ability and member's motivation), team creativity, and innovation capability. Data were collected from ICT Service Startups, and a partial least squares (PLS) analysis was made on 175 data points. The analysis results showed that absorptive capacity has significant effect on team creativity and innovation capability directly. And also it has indirect effect on the dependent variable through team creativity. On the contrary, knowledge sharing does not have statistically significant effect on team creativity and innovation capability; only have an effect on absorptive capacity. Based on the results, we proposed several team management skills for ICT startup leaders and members, and the guidelines to stakeholder such as government and private investors. Also there are some ideas for startup nurturing polices for government officers. Theoretical contributions are discussed at the end with limitations and further studies.

A Study on the Realtime Cert-Validation of Certification based on DARC (DARC 기반에서의 실시간 인증서 유효성 검증에 관한 연구)

  • Jang, Heung-Jong;Lee, Seong-Eun;Lee, Jeong-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.517-524
    • /
    • 2001
  • There are cases that revoke the certification because of disclosure of private key, deprivation of qualification and the expiration of a term of validity based on PKI. So, a user have to confirm the public key whether valid or invalid in the certification. There are many method such as CRL, Delta-CRL, OCSP for the cert-validation of certification. But these method many problems which are overload traffic on network and the CRL server because of processing for cert-validation of certification. In this paper we proposed the realtime cert-validation of certification method which solved problems that are data integrity by different time between transmission and receiving for CRL, and overload traffic on network and the CRL server based on DARC.

  • PDF

Key Concepts in Vygotsky's Theoretical Framework: L2 Classroom Interaction and Research

  • Nam, Jung-Mi
    • English Language & Literature Teaching
    • /
    • v.11 no.3
    • /
    • pp.71-87
    • /
    • 2005
  • The role of interaction in second language (L2) classrooms has been examined from different angles, ranging from early studies of foreigner talk to the studies of the teacher- and task-based talk. However, most of the research on L2 classroom interaction has been based on a traditional psycholinguistic view of language and learning, failing to reconceptualize a broad and holistic understanding of L2 learning. Currently, many researchers have attempted to explore and describe classroom interaction in L2 classrooms from a sociocultural perspective. The purpose of this paper is to discuss Vygotsky's theoretical framework in terms of L2 classroom interaction and research from a sociocultural perspective, by describing three key concepts (zone of proximal development, private speech, and activity theory) in Vygotsky's theoretical framework and relating them to L2 classroom interaction. The results demonstrated the importance of social interaction for second language acquisition with the review of the related research study. It was also suggested that the dynamic and interactive processes of second language learning in the classroom should be valued by L2 researchers as well as L2 teachers. Finally, implications for the concepts for L2 classroom research and pedagogy are presented in the conclusion.

  • PDF

A Design of XML Structure for Digital Signature (디지털 서명을 위한 XML 구조 설계)

  • 표성배
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.66-74
    • /
    • 2002
  • Circulation of documents and data has two serious problems in this web-based system. The first of the problems is standardization problem which the flowing documents and data are not always standardized. the other is security problem which secret data can be hacked or cracked, and non-authenticated Person can access and change the contents with malicious intent. Therefore two issues come out on the web-based system, the first is how we can standardize the documents and data and the second is how we can assure safe flowing of them. One way of the standardizing methods is Mark-UP language which uses XML which is extended from SGML to redefine and use documents. And to ensure security of flowing documents we adopt digital signature system using public key and private key The focus of this study is to specify procedures for digital signature on the XML base. and to design XML components for the digital signature to assure information security in circulation of documents and data.

  • PDF

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4576-4598
    • /
    • 2018
  • In big data age, flexible and affordable cloud storage service greatly enhances productivity for enterprises and individuals, but spontaneously has their outsourced data susceptible to integrity breaches. Provable Data Possession (PDP) as a critical technology, could enable data owners to efficiently verify cloud data integrity, without downloading entire copy. To address challenging integrity problem on multiple clouds for multiple owners, an identity-based batch PDP scheme was presented in ProvSec 2016, which attempted to eliminate public key certificate management issue and reduce computation overheads in a secure and batch method. In this paper, we firstly demonstrate this scheme is insecure so that any clouds who have outsourced data deleted or modified, could efficiently pass integrity verification, simply by utilizing two arbitrary block-tag pairs of one data owner. Specifically, malicious clouds are able to fabricate integrity proofs by 1) universally forging valid tags and 2) recovering data owners' private keys. Secondly, to enhance the security, we propose an improved scheme to withstand these attacks, and prove its security with CDH assumption under random oracle model. Finally, based on simulations and overheads analysis, our batch scheme demonstrates better efficiency compared to an identity based multi-cloud PDP with single owner effort.

Implementation of RFID Reader System using the Data Encryption Standard Algorithm (표준 암호화 알고리즘을 이용한 RFID 판독 시스템의 구현)

  • 박성욱
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.55-61
    • /
    • 2003
  • The Data Encryption Standard(DES) has been a worldwide standard for over 20 years. DES is one of the block encryption techniques which ciphers 64-bit input data blocks using a 56-bit private key. The DES algorithm transforms 64-bit input in a series of steps into a 64-bit output. Thus, it is impossible to deduce the plaintext from the ciphertext which encrypted by this algorithm without the key. This paper presents an implementation of RFID roader system using the DES algorithm. An implemented system enhances the credibility of the encryption algorithm by using the Cipher Block Chining(CBC). Experimental results also show that the implemented system has better performance over the conventional commercial product.

  • PDF

A study about the influence to the client system when using PKI-based authentication system (공개키 기반 인증체계의 사용이 클라이언트 시스템에 미치는 영향에 관한 연구)

  • Jeon, Jeong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.159-167
    • /
    • 2012
  • The authentication system of the PKI(public key infrastructure) provides the authenticity and security, accessibility, economic feasibility, and convenience to the service provider and users. Therefore the public and private companies in Korea widely use it as the authentication method of the web service. However, the safety client system is threatened by many vulnerable factors which possibly caused when using PKI-based authentication system. Thus, in this article vulnerable factors caused by using the PKI-based authentication system will be analyzed, which is expected to be the useful data afterwards for the construction of the new authentication system as well as performance improvement.