• Title/Summary/Keyword: Secure System

Search Result 3,573, Processing Time 0.025 seconds

A Prototype of Trusted Authentication (신뢰성이 보장되는 사용자 인증 프로토타입)

  • Doo, So-Young;Kim, Jeong-Nyeo;Kong, Eun-Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.979-982
    • /
    • 2002
  • 본 논문에서는 로컬 또는 리모트에서 사용자가 서버 시스템에 접근하기 위해서 가장 먼저 거치게 되는 인증 절차 수행에 관련된 것으로 허가된 사용자의 접근만을 허용하고, 인증요청 메시지의 진위 여부를 확인시켜주는 기능과 사용자가 입력하는 중요 정보가 다른 사용자에게 유출되지 않도록 보장하는 기능을 추가한 신뢰성이 보장되는 인증방법을 소개한다. 본 논문에서는 역할기반의 접근제어 시스템을 커널 내부에 추가하고. 사용자인증에 비밀번호와 하드웨어 장치인 스마트카드를 사용함으로써 강화된 사용자 인증 시스템을 구현하였다.

  • PDF

A Secure on the Design Model of the Payment System on Bluetooth (블루투스를 이용한 안전한 지불 시스템 모델에 관한 연구)

  • Seo Dae-Hee;Kang Se-ll;Leem Im-Yeong;Park Hea-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1610-1619
    • /
    • 2004
  • While researches and studies on short distance wireless communications have been actively carried out, studies on many applications of short distance wireless communications focusing on user-oriented Mobile device are also in progress. Since Bluetooth has several advantages that existing short distance communication does not have, studies on standardization have been carried out focusing on SIG, and IEEE has also jointly studied on this. Bluetooth is a short distance wireless communication technology that can be usefully applied to various kinds of applications. In this regard, this thesis presents payment system using Bluetooth, out of several application technologies of Bluetooth. This payment system is based on the scenario in which secure piconet is formed focusing on the user, the user gets in the car, fill up the gas at the gas station using his own Mobile device and pay The secure payment system presented in this thesis is designed to complement the weakness of existing Bluetooth in terms of security and to secure several requirements of security required for payment using short distance wireless communication.

  • PDF

A Study on Intensified scheme to WLAN Secure based on IEEE 802.1x Framework (IEEE 802.1x 프레임워크 기반에서의 무선랜 보안 강화 방안에 관한 연구)

  • Lee Joon;Hong Seong-pyo;Shin Myeong-sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.136-141
    • /
    • 2006
  • The IEEE 802.1x can be using various user authentication mechanisms: One-Time Password, Certificate-Based TLS, Challenge/Response and Keberos through EAP(Extended Authentication Protocol). But, IEEE 802.1x also has vulnerabilities about the DoS, the session hijacking and the Man in the Middle attack due to the absence of AP authentication. In this paper, we propose a WLAN secure system which can offer a safety secure communication and a user authentications by intensified the vulnerability of spoofing and DoS attacks. The suppose system offers a safe secure communication because it offers sending message of integrity service and also it prevents DoS attack at authentication initial phase.

A Study on Chaotic Secure Communication of Chua's Circuit with Transmission Line (전송 선로를 가진 Chua 회로에서의 카오스 암호화 통신에 관한 연구)

  • 배영철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.4
    • /
    • pp.611-617
    • /
    • 1998
  • In this paper, a transmitter and a receiver using two identical Chua's circuits are proposed and wire secure communications are investigated. A secure communication method in which the desired information signal is synthesized with the chaos signal created by the Chua's circuit is proposed and an information signal is demodulated also using the Chua's circuit. The proposed method is synthesizing the desired information with the chaos circuit by adding the information signal to the chaos signal in the wire transmission system. After transmitting the synthesized signal through the wire transmission system, it is confirmed the feasibility of the secure communication from the result of the demodulated signals and the recovered wire tapped signals.

  • PDF

A Study on Chaotic Secure Communication of Chua's Circuit with Lossy Transmission Line (손실 전송 선로를 가진 Chua 회로에서의 카오스 비밀 통신에 관한 연구)

  • 배영철;고재호;유창완;홍대승;임화영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1539-1545
    • /
    • 1999
  • In this paper, a transmitter and a receiver using two identical Chua's circuits are proposed and a wire secure communications are investigated. A secure communication method in which the desired information signal is synthesized with the chaos signal created by the Chua's circuit is proposed and information signal is demodulated also using the Chua's circuit. The proposed method is synthesizing the desired information with the chaos circuit by adding the information signal to the chaos signal in the wire transmission system. After transmitting the synthesized signal through the wire transmission system, it is confirmed the feasibility of the secure communication from result of demodulated signals recovered wire tapped signals.

  • PDF

ESES: XML based Secure E-Commerce Services (ESES: XML 기반의 안전한 전자상거래 서비스)

  • 나중찬;손승원;조현숙
    • Proceedings of the CALSEC Conference
    • /
    • 2001.02a
    • /
    • pp.305-311
    • /
    • 2001
  • Recently, XML(extensible Markup Language) Document is widely accepted as the standard for electronic documents in the electronic commerce. Therefore, a security mechanism for XML documents must be provided In the first place. ESES(ETRI Secure I-commerce Services) provides a system designed specifically for securing XML documents and existing non-XML documents that are exchanged in the Electronic Commerce and is essential to various electronic commerce platform as a fundamental system. In this paper, we provide an overview of these aspects of the ESES and design and implemented the secure I-Commerce Platform to support security services such as authentication, integrity and confidentiality for Electronic Document Interchange.

  • PDF

SDRM: The Design and Analysis of Secure DRM Systems Based on PKI using Steganography (SDRM: PKI기반의 스테가노그래피를 이용한 Secure DRM 시스템 설계 및 분석)

  • 도경화;전문석
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.4
    • /
    • pp.167-181
    • /
    • 2003
  • The contents for multimedia are very activated along to revolution of Internet. So this fact allows the contents for multimedia to be commercialized. These contents , however, included much vulnerability that it is difficult to be commercialized because attackers easily reproduce that. Many developers want to use watermarking method as the technique to protect the contents for multimedia, but it is very vulnerable to use only one method. This paper proposes the Secure DRM system which protects the contents for multimedia using Public Key Infrastructure and steganography methods. The SDRM system is more powerful than general DRM systems in that it has the special feature of watermarking and steganography techniques. We can prevent the attackers from reproducing and stealing the contents illegally, and authenticating users through SDRM systems.

  • PDF

A Secure Clustering Methodology and an Arrangement of Functional Firewall for the Enhancement of Performance in the Inbound Network (인바운드 네트워크의 성능향상을 위한 보안 클러스터링 기법과 기능성방화벽의 배치)

  • Jeon, Sang-Hoon;Jeon, Jeong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7B
    • /
    • pp.1050-1057
    • /
    • 2010
  • Nowadays, the network attack occurs frequently. At the same time, the inbound network is also attacked. Even though the security system has been continuously developed in order to prevent from attacks, the network performance is sacrificed for the network security. Therefore, a security system which obtains performance and security together is urgently needed. In this paper, an arrangement of functional firewall and a secure clustering methodology, obtained from distributing functions of a conventional firewall, are proposed based on the idea that performance and security should be obtained together.

A Reliable Secure Storage Cloud and Data Migration Based on Erasure Code

  • Mugisha, Emmy;Zhang, Gongxuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.436-453
    • /
    • 2018
  • Storage cloud scheme, pushing data to the storage cloud poses much attention regarding data confidentiality. With encryption concept, data accessibility is limited because of encrypted data. To secure storage system with high access power is complicated due to dispersed storage environment. In this paper, we propose a hardware-based security scheme such that a secure dispersed storage system using erasure code is articulated. We designed a hardware-based security scheme with data encoding operations and migration capabilities. Using TPM (Trusted Platform Module), the data integrity and security is evaluated and achieved.

The Design and Implementation of Secure XML Messaging System (안전한 XML 메시징 시스템 설계 및 구현)

  • 이영교;안경림
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.9
    • /
    • pp.1233-1238
    • /
    • 2001
  • Security is very important at EC(Electronic Commerce) Environments. The reason is that exchanged data(that is user private information(accounts, card-no, password), transaction items, etc) is various and is very sensitive. In this paper, we propose the Secure-XML Messaging System(S-XMS) which is implemented to support Message Level Security, Encryption and Digital Signature. And we implement Message Confidentiality Service, User Authentication & Message Integrity Service and Non-Repudiation Service among the various Security Services.

  • PDF