• Title/Summary/Keyword: Secure System

Search Result 3,559, Processing Time 0.034 seconds

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

Development and Evaluation of Key Recovery System for Secure Recovery of Cryptographic Files in PC (PC상의 암호파일의 안전한 복구를 위한 키복구 시스템의 개발 및 평가)

  • 장수진;고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.167-186
    • /
    • 2002
  • The encryption of a file on a PC before saving can maintain security of the file. However, if the key for the encrypted file is lost or damaged, the encrypted file can not be decrypted, resulting in serious economical loss to the user or the user group. In order to minimize the economical loss a secure and reliable key recovery technology is required. Presented in this paper is the development and evaluation of PKRS (PC based Key Recovery System) which supports encryption and decryption of file and recovery of the encrypted file in emergency. The encapsulating method, which attaches key recovery information to encrypted file, is applied to the PKRS. In addition, the PKRS is developed and evaluated according to the requirements of Requirements for Key Recovery Products proposed by NIST and requirements of Common Criteria 2.0 to prove the safety and reliability of the information security system. This system is applicable to a PC and can be further extended to internet or intranet environment information system where in encryption and recovery of file is possible.

  • PDF

Suggestion of Development and Assessment Procedure for Railway Software (철도소프트웨어 개발 및 평가프로세스 제안)

  • Joung, Eui-Jin;Shin, Kyung-Ho
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.378-383
    • /
    • 2008
  • One of the main concerns of railway system is to secure safety. Nowadays digital technology has been rapidly applied to safety critical system. The digital system performs more varying and highly complex functions efficiently compared to the existing analog system because software can be flexibly designed and implemented. The flexible design makes it difficult to predict the software failures. For this reason, the safety criteria are suggested to secure the software safety for the field of railway system. Following them, the railway software have to be examined whether it is properly developed according to the safety criteria and certification process. Because the articles suggested in safety criteria are written in legal term, it is difficult to apply the criteria to develop railway software. This paper suggests and discusses a development and assessment procedure to solve these issues for railway software with more detail description.

  • PDF

Running safety analysis of tilting vehicle when speed-up limited speed 40 km/h in curved track (곡선선로에서 제한속도를 40 km/h 증속 운행시 틸팅차량의 주행안전성 분석)

  • Ham, Young-Sam;Seo, Jung-Won;Lee, Dong-Hyong;Kwon, Seok-Jin;Kim, Jae-Chul;Lee, Chan-Woo
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.1587-1591
    • /
    • 2009
  • Safety of railroad is result of reliability which is received from test & evaluation of system. Railroad system is consisted of various sub system such as vehicle, supply of electric power, signal, communication, rail track construction, operation. To secure safety of railroad, evaluation about parts, assembly, sub system, whole system etc.. that compose railroad is essential. In this paper, I wish to describe for results that analyze korean tilting vehicle's derailment coefficient developed by national research achievement. Result that evaluation korean tilting vehicle's running safety, verified that secure even if speed-up 30 km/h than operating speed of present in curved track.

  • PDF

A Basic Study of Construction Procurement Management using Block Chain & Big Data Technology (블록체인과 빅데이터 기술을 이용한 건설 조달 관리 기초 연구)

  • Kim, Ki-Ho;Son, Seung-Hyun;Kim, Sun-Kuk
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2019.05a
    • /
    • pp.127-128
    • /
    • 2019
  • The cost of procurement in construction projects varies depending on the type of project, but the proportion of the cost component is very large. Therefore, efficient procurement system operation affects the success of the project. However, difficulties arise in procurement management due to problems such as availability of data due to limited information, inaccurate scheduling and integration of costs. Therefore, the purpose of this study is to develop a procurement management system to help efficient communication decision by combining Big Data which can analyze a lot of information and Block Chain technology which can secure information and record reliability to satisfy the above requirements. The results of this study are used to develop a system to develop academically improved procurement management system and practically to develop a system to secure business competitiveness and to facilitate rapid communication among project participants.

  • PDF

Measurement & analysis of derailment coefficient for korean tilting vehicle (한국형 틸팅차량의 탈선계수 측정 및 분석)

  • Ham, Young-Sam;Seo, Jung-Won;Lee, Dong-Hyong;Kwon, Seok-Jin;Kim, Jae-Chul;Lee, Chan-Woo
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.1628-1633
    • /
    • 2008
  • Safety of railroad is result of reliability which is received from test & evaluation of system. Railroad system is consisted of various sub system such as vehicle, supply of electric power, signal, communication, rail track construction, operation. To secure safety of railroad, evaluation about parts, assembly, sub system, whole system etc.. that compose railroad is essential. In this paper, I wish to describe for results that analyze korean tilting vehicle's derailment coefficient developed by national research achievement. Result that evaluation korean tilting vehicle's running safety, verified that secure even if speed-up 30 km/h than operating speed of present in curved line.

  • PDF

Automatic Fortified Password Generator System Using Special Characters

  • Jeong, Junho;Kim, Jung-Sook
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.4
    • /
    • pp.295-299
    • /
    • 2015
  • The developed security scheme for user authentication, which uses both a password and the various devices, is always open by malicious user. In order to solve that problem, a keystroke dynamics is introduced. A person's keystroke has a unique pattern. That allows the use of keystroke dynamics to authenticate users. However, it has a problem to authenticate users because it has an accuracy problem. And many people use passwords, for which most of them use a simple word such as "password" or numbers such as "1234." Despite people already perceive that a simple password is not secure enough, they still use simple password because it is easy to use and to remember. And they have to use a secure password that includes special characters such as "#!($^*$)^". In this paper, we propose the automatic fortified password generator system which uses special characters and keystroke feature. At first, the keystroke feature is measured while user key in the password. After that, the feature of user's keystroke is classified. We measure the longest or the shortest interval time as user's keystroke feature. As that result, it is possible to change a simple password to a secure one simply by adding a special character to it according to the classified feature. This system is effective even when the cyber attacker knows the password.

Secure Subgroup and Group Communication Service for TETRA System (TETRA 시스템을 위한 안전한 소그룹과 그룹통신 서비스)

  • 이수연;정진욱
    • Convergence Security Journal
    • /
    • v.3 no.1
    • /
    • pp.31-37
    • /
    • 2003
  • This paper proposed a model supporting secure mechanism both group communication service and subgroup communication service of TETRA system that the standard developed by the technical committee Radio Equipment and Systems(RES) of the European Telecommunications Standards Institute(ETSI) provides a pure digital information technology for the transmission of speech and data. In each scheme, members in a subgroup maintains its subgroup key, which is not distributed, but computed by each member in the subgroup only with his own secret information and public values and secure subgroup members in a same subgroup can communication securely each other by using their subgroup key. Also, all members in group can share securely a group key. In communication services of TETRA system, this model supports mechanism for both group and subgroup communication are simultaneously needed.

  • PDF

Design and Implementation of a Secure Electronic Payment System on Internet (안전한 인터넷 전자지불 프로토콜의 설계 및 구현)

  • Park, Hyeon-Dong;Lee, Eun-Seong;Song, Sang-Heon;Gang, Sin-Gak;Park, Jeong-Su;Ryu, Jae-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2145-2157
    • /
    • 1999
  • One of the most popular services among the various application services provided in Internet is electronic commerce. However, it is true that the most of payment systems in existing shopping server are not secure enough even if they provide security services. In this paper, we pointed out some problems in existing shopping server. And, we designed and implemented the secure electronic payment system, SafePay to solve the problems in existing payment system.

  • PDF

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.