• Title/Summary/Keyword: Public key infrastructure

Search Result 349, Processing Time 0.028 seconds

Design of the Certificate-based Authorization Policy Module in a PKI Environment (PKI 환경에서 인증서 기반 권한 정책 모듈 설계)

  • Shin, Myeong-Sook;Song, Gi-Beom;Lee, Jeong-Gi;Lee, Cheol-Seung;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.898-901
    • /
    • 2005
  • In this paper, we design an authorization policy module which provides the safty and reliable authorization of the user to provide the resolution for authorization in distributed environments. PKI have been utilized much by an information security-based structure for Internet electronic commerce, it is developing X.509-based in various application field such as a network security. Especially, it provides good resolution for the authentication of the user in the situation not to meet each other, but it is not enough to provide the resolution of the authorization in distributed computing environments. In this paper, We provide AAS model, which can be used distributed resources by distributed users, and design AAS model which is an authorization policy module in the Linux-based Apache Web server.

  • PDF

A Study on the Definition and Measure Development for EA Functions (전사 아키텍처(EA)의 기능 정의 및 측정지표에 관한 실증적 연구)

  • Jeon, Seung-Ryul;Kang, Jae-Hwa;Lee, Bong-Gyou
    • The KIPS Transactions:PartD
    • /
    • v.17D no.1
    • /
    • pp.77-86
    • /
    • 2010
  • Recently, Enterprise Architecture (EA) has emerged as the important keyword in both private and public sectors. With this phenomenon, there are tremendous need for the measures of EA functions, one of the key EA research variables, to provide academic insights and accumulate research findings in this area. Thus far, multiple definitions and concepts for EA functions exist, causing confusion among observers. Thus, in order to clarify the conceptual meaning behind the term "functions of EA" once and for all, this study reviews previous literature and provides conceptual definition. Then, we identify 24 items and rigorously develop and validate the measurement instrument for EA functions, which results in five domains: Infrastructure Systemization, Integration Management, IT Governance Support, Development and Operation Management, and Investment Management.

Privilege Management Technique for Unreliable Network Environments based on Tree Structure (신뢰도가 낮은 네트워크 환경을 위한 트리 구조 기반의 권한 관리 기법)

  • Yang, Soo-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.83-91
    • /
    • 2008
  • IISO/IEC 9594-8 defines the public key framework and attribute certificate framework. Attribute certificate framework deals with privilege management infrastructure(PMI). In PMI, for privilege management using attribute certificates, role assignment certificates and role specification certificates are used to assign and specify privileges independently. Role specification certificates includes privilege specifications and the details far privilege management of network environments. Privilege management of unreliable network environment tries to enhance the reliability and efficiency of privilege information transmission forwarding over unreliable routes in the presence of potentially faulty nodes and edges. Each node forms a role specification tree based on role specification relationship data collected from the network. In this paper privilege management cost with the role specification certificates tree structure is evaluated trying to reduce the overhead incurred by role creation and modification of privileges. The multicasting of packets are used for scalability. We establish management cost model taking into account the packet loss and node reliability which continuously join and leave for network. We present quantitative results which demonstrate the effectiveness of the proposed privilege management scheme.

e-Passport Security Technology using Biometric Information Watermarking (바이오정보 워터마킹을 이용한 전자여권 보안기술)

  • Lee, Yong-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.115-124
    • /
    • 2011
  • There has been significant research in security technology such as e-passport standards, as e-passports have been introduced internationally. E-passports combine the latest security technologies such as smart card, public key infrastructure, and biometric recognition, so that these technologies can prevent unauthorized copies and counterfeits. Biometric information stored in e-passports is the most sensitive personal information, and it is expected to bring the highest risk of damages in case of its forgery or duplication. The present e-passport standards cannot handle security features that verify whether its biometric information is copied or not. In this paper, we propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The proposed method, biometric watermarking, embeds the invisible date of acquisition into the original data during the e-passport issuing process so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased.

Analyzing the Spatial Transformation of Johannesburg: Background, Process and Effectiveness (约翰内斯堡空间转型的背景, 进程与效果研究)

  • Tang, Wei
    • Analyses & Alternatives
    • /
    • v.2 no.2
    • /
    • pp.93-110
    • /
    • 2018
  • Due to its speciality, Johannesburg has drawn wide attention from the international academia, which the existing urban theory cannot easily explain. This paper focuses on the spatial pattern of Johannesburg, and finds that it is highly fragmented: first North-South Division due to apartheid and gold mining, secondly, the continuous sprawl due to population densification, and thirdly formation of city-region due to the fill-in spatial policy. The fragmented spatial pattern undermines the social integration and weakens the potential economic sustainability, which make the balanced multi-core spatial pattern inevitable under the influence of the international planning thought. The Johannesburg's spatial transformation comes not only from social integration, but also from the development vison of world-class status of an African city. In reality, since the collapse of apartheid, the municipal government has released series of strategic planning in different executive phase. These different plannings unanimously focus on the world class status although since 2008, the social inclusiveness is more emphasized. Thus, Johannesburg implements some spatial policies, as promoting the corridor of freedom, identifying the key nodes in the city then developing with high density, implementing the in-filling policy, managing the urban growth boundary, effectively preserving the natural system. However, the industrial structure in Johannesburg is already quite high-ended which cannot produce many jobs and also require much investment in advanced infrastructure. Thus, the strategic goals of world-class status of an African city and social inclusiveness which really need widely shared public services to some extent are in tension. After evaluation, we can see that spatial transformation is quite limited. Obviously spatial transformation largely depends on the social-economy. The population is still in flow. In this sense Johannesburg must energetically support the employment-based industry, effectively control the spatial sprawl and carry out institutional innovation which further incentive investment, gradually build an integrated regional governance. In general, how Johannesburg combines globalization and its own condition is still worth thinking in both theory and practice.

  • PDF

A Study on System of OCSP server for Services (OCSP서버의 지속적인 서비스를 위한 시스템 연구)

  • Shin, Jaehoon;Choi, Haelahng;Shin, Donghwi;Won, Dongho;Kim, Seungjoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1270-1273
    • /
    • 2007
  • 최근 인터넷의 급속한 발달은 온라인 뱅킹, 인터넷 쇼핑몰 등에서의 실물 경제행위를 온라인상으로 처리할 수 있는 환경을 제공하지만 온라인상의 업무처리는 개인정보유출, 개인정보의 위조 및 변조 등의 문제를 가지고 있다. 사용자가 CA에게서 받은 인증서의 공개키로 전자서명 함으로써 개인정보유출, 정보의 위조 및 변조 등의 문제를 해결한 PKI(Public Key Infrastructure)기반의 인증서 검증시스템이 제안되어 사용되고 있다. 인증서 상태검증 방법에는 CRL(Certificate Revocation List)기반의 검증방식, OCSP(Online Certificate Status Protocol)기반의 검증방식 등이 있다. CRL기반의 인증서 검증방식은 인증서 취소목록을 검색해서 인증서의 유효성 여부를 응답하는 방식으로 시간이 지남에 따라 크기 증가와 오프라인 방식으로 인해서 목록을 다운받는 시간의 부담으로 인해서 OCSP방식이 제안되었다. 하지만 OCSP 방식 역시 서비스의 요청이 집중될 경우 문제가 발생될 수 있다. 그래서 분산된 OCSP를 구축하고 각 서버의 부하의 균형을 유지하기 위해 로드밸런싱 기법을 사용하고 있지만 그 방법 역시 지속적인 서비스 제공이 불가한 문제를 가지고 있다. 본 논문에서는 서비스 요청의 집중으로 인한 시스템 마비나 각 응답서버의 부하가 불균형적임으로써 생길 수 있는 문제를 해결할 수 있는 방법을 제안한다.

Effects of Seodaegu Station Development on the Surrounding Apartment Market: Focus on the Effects of Educational Environment (서대구역 개발이 주변 아파트 시장에 미치는 영향 분석: 교육환경이 미치는 영향을 중심으로)

  • Hyeontaek Park;Jinyhup Kim
    • Land and Housing Review
    • /
    • v.15 no.2
    • /
    • pp.89-106
    • /
    • 2024
  • Apartments constitute 64% of the housing type composition, representing the highest proportion among housing types. This proportion has been increasing annually. Given this trend, apartment prices are likely to have a significant impact on the national economy and people's livelihoods. This study examines the impact of the recent development of Seodaegu Station on the surrounding apartment market, with a specific focus on the effects of the educational environment. To this end, we conduct empirical analysis employing a hedonic price model and spatial autocorrelation analysis, based on actual transaction price data from the Ministry of Land, Infrastructure, and Transport. The study revealed three key findings: first, the development of Seodaegu Station positively impacted apartment prices. Second, this positive effect increases with the proximity to Seodaegu Station. Third, the enhancement of the educational environment nearby the Seodaegu Station development also positively influenced apartment prices. This study aims to serve as baseline research output for the public management of future metropolitan transportation facility development projects and for predicting apartment price trends.

Social Capital Formation Model in the Resident Participation Greening Projects - For the Greening Project of the Living Area in Seoul - (주민참여형 마을녹화사업의 사회적 자본 형성 모형 - 서울시 생활권녹화사업을 대상으로 -)

  • Lee, Ai-Ran;Cho, Se-Hwan
    • Ecology and Resilient Infrastructure
    • /
    • v.5 no.1
    • /
    • pp.35-44
    • /
    • 2018
  • Social, economic and environmental problems caused by rapid urbanization have been recently overcome by various civic participation projects. Local governance and resident - led partnership through field - based cooperative operating systems from urban regeneration to village projects are considered success factors. Among these, the village greening project which directly affects the residents and requires spontaneity requires the role and cooperation of the various participating actors due to the sharing of public space and private space. Social capital plays a key role in the sustainability and participation of the above - mentioned business as a relational capital centered on trust and participation, network and norms. Therefore, empirical research is needed. In this study, basic research was carried out to build a formation model of social capital in participation - type greening project expanding urban green space system to living area. We analyzed the elements of participation, the components of business progress, and the factors of social capital formation through literature review and in - depth interviews with participating experts. The purpose of this study is to provide basic data of social capital formation model for analyzing sustainability and activation strategies in the future.

Estimation of DNN-based Soil Moisture at Mountainous Regions (DNN 회귀모형을 이용한 산악 지형 토양수분 산정)

  • Chun, Beomseok;Lee, Taehwa;Kim, Sangwoo;Kim, Jonggun;Jang, Keunchang;Chun, Junghwa;Jang, Won Seok;Shin, Yongchul
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.62 no.5
    • /
    • pp.93-103
    • /
    • 2020
  • In this study, we estimated soil moisture values using the Deep Neural Network(DNN) scheme at the mountainous regions. In order to test the sensitive analysis of DNN scheme, we collected the measured(at the soil depths of 10 cm and 30 cm) soil moisture and DNN input(weather and land surface) data at the Pyeongchang-gun(relatively flat) and Geochang-gun(steep slope) sites. Our findings indicated that the soil moisture estimates were sensitive to the weather variables(5 days-averaged rainfall, 5 days precedent rainfall, accumlated rainfall) and DEM. These findings showed that the DEM and weather variables play the key role in the processes of soil water flow at the mountainous regions. We estimated the soil moisture values at the soil depths of 10 cm and 30 cm using DNN at two study sites under different climate-landsurface conditions. The estimated soil moisture(R: 0.890 and RMSE: 0.041) values at the soil depth of 10 cm were comparable with the measured data in Pyeongchang-gun site while the soil moisture estimates(R: 0.843 and RMSE: 0.048) at the soil depth of 30 cm were relatively biased. The DNN-based soil moisture values(R: 0.997/0.995 and RMSE: 0.014/0.006) at the soil depth of 10 cm/30 cm matched well with the measured data in Geochang-gun site. Although uncertainties exist in the results, our findings indicated that the DNN-based soil moisture estimation scheme demonstrated the good performance in estimating soil moisture values using weather and land surface information at the monitoring sites. Our proposed scheme can be useful for efficient land surface management in various areas such as agriculture, forest hydrology, etc.

A Study of Wireless LAN Cryptosystem for Supporting Realtime Mutual Authentication (실시간 상호인증 지원을 위한 무선랜 보안시스템에 관한 연구)

  • Lee Sang-Ryul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.161-170
    • /
    • 2005
  • The Certificate Revocation List(CRL) or the Online Certificate Status Protocol(OCSP)has been used to validate certificates. However, the CRL cannot validate certificates in realtime because of the Time-Gap problem and the OCSP server overloads in a large scale secure system. In addition, the client cannot access a wired LAN until the client has been authenticated by the authentication server on the IEEE 802. 1x framework. Therefore, the client cannot validate the authentication server's certificate using a certificate validation server. Thus, the client cannot authenticate the authentication server in realtime. To solve these problems this paper designed a secure system that can protect the content of communications and authenticate users in realtime on a wireless LAN The designed certificate validation protocol was proved that the stability and efficiency of the system was very high, the result of the validation had the presence, the speed of the validation was not affected by the system scale, the number of authorities user must trust was reduced to one, and the overload of the validation server was Protected. And the designed user authentication and key exchange protocols were Proved that the mutual authentication was possible in realtime and the fact of the authentication could be authorized by the CA because of using the authorized certificates.

  • PDF