• 제목/요약/키워드: Secure System

검색결과 3,573건 처리시간 0.03초

EDI 정보보호 시스템의 구조 및 서비스 환경 분석 (Analysis of Secure EDI System Architecture and Sevice Environment)

  • 이정현;윤이중;이대기;김대호
    • 정보보호학회지
    • /
    • 제7권3호
    • /
    • pp.99-121
    • /
    • 1997
  • 매년 급증하고 있는 통신망을 이용한 EDI 서비스에서 정보보호 서비스의 제공은 필수적인 요소임에는 틀림없다. 이러한 전자문서를 통한 상거래시에 필수적인 정보보호 서비스를 제공하는 EDI 시스템을 SEDI(Secure EDI) 시스템이라 하며, 본 논문에서는 이 SEDI 시스템에서 제공하는 정보보호 서비스를 개발하고자 할 때 사용되는 프로토콜의 구조와 해당 포트 및 관련 오퍼레이션들과 이들 모듈들의 구성, 각 서비스 모듈들의 연관관계들을 분석하였다.

  • PDF

Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices

  • Koo, Han-Seung;Kwon, O-Hyung;Lee, Soo-In
    • ETRI Journal
    • /
    • 제32권2호
    • /
    • pp.204-213
    • /
    • 2010
  • In this paper, we investigate the possible security threats to downloadable conditional access system (DCAS) host devices. We then propose a DCAS secure micro (SM) and transport processor (TP) security protocol that counters identified security threats using a secure key establishment and pairing management scheme. The proposed protocol not only resists disclosed SM ID and TP ID threats and indirect connection between TA and TP threats, but also meets some desirable security attributes such as known key secrecy, perfect forward secrecy, key compromised impersonation, unknown key-share, and key control.

A Study on Secure Interaction of DHCP Server with DNS Server

  • Ham Young Hwan;Chung Byung Ho;Chung Kyo Il
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 학술대회지
    • /
    • pp.544-548
    • /
    • 2004
  • DHCP(Dynamic Host Configuration Protocol) is a protocol which dynamically allocates an IP address and/or host configuration parameters to a host. The DHCP client's address can be changed dynamically any time. For the possible communication with other system, the DHCP client has to inform its address to the DNS system with dynamic update facility. But the DNS dynamic update has a problem related to the security. So we proposed the efficient mechanism for the secure integration of DHCP and DNS by using DNS security extensions. The system also uses the DNS server as the certificate repository for the storing & retrieval of each other's certificate.

  • PDF

초기인증에서 키 분배 및 복구를 지원하는 공개키 암호 인증시스템에 관한 연구 (A Study on Public Key Cryptographic Authentication System Providing Key Distribution and Recovery in the Initial Authentication)

  • 신광철;조성제
    • 인터넷정보학회논문지
    • /
    • 제7권3호
    • /
    • pp.83-91
    • /
    • 2006
  • 본 논문에서는 인증서를 사용하는 모든 암호시스템 분야에 응용될 수 있는 인증 및 키 복원 프로토콜로 PKINIT를 응용한 안전한 초기인증 공개키 암호시스템 모델을 연구하였다. 멤버들에 대한 인증은 서버와 사용자간에 인증서를 기반으로 공개 키 암호에 의한 초기인증과 세션 키 분배, 응용자원 서버들과의 비밀통신에서 키의 유실을 고려한 키 복구지원 프로토콜을 제안하였다.

  • PDF

고속철도의 중점과제와 경쟁력 확보 방안 (A Study on Major Challenges for Korean High-Speed Railway and How to Secure Its Competitive Edge)

  • 강진규
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2003년도 추계학술대회 논문집(II)
    • /
    • pp.40-45
    • /
    • 2003
  • Korea selected to introduce high-speed railway system from advanced countries in order to accumulate railway technologies and develop exiting domestic logistics system. After many twists and turns, we adopted to introduce France's high-speed railway called 'TGV'. Despite many difficulties along with trials and errors, it is expected that Korean high-speed railway will be brilliantly launched in April 2004, although it has been commissioned for multi-discipline tests. It is forecast that the opening of high-speed railway will bring us the epoch-making development of logistics system. However, what if there are really some problems in the operation of high-speed railway? We cannot consider and highlight only the positive aspects of our own high-speed railway. In terms of many challenging aspects we would face in the future, there would be some matters we must consider and point out in this opportunity. In this regard, the direction for developing high-speed railway stations requires the harmony between profitability and public benefits, which must involve compatibility with other traffice systems and practical policies to secure competitive edges.

  • PDF

Secure Transmission for Interactive Three-Dimensional Visualization System

  • Yun, H.Y.;Yoo, Sun Kook
    • Journal of International Society for Simulation Surgery
    • /
    • 제4권1호
    • /
    • pp.17-20
    • /
    • 2017
  • Purpose Interactive 3D visualization system through remote data transmission over heterogeneous network is growing due to the improvement of internet based real time streaming technology. Materials and Methods The current internet's IP layer has several weaknesses against IP spoofing or IP sniffing type of network attacks since it was developed for reliable packet exchange. In order to compensate the security issues with normal IP layer, we designed a remote medical visualization system, based on Virtual Private Network. Results Particularly in hospital, if there are many surgeons that need to receive the streaming information, too much load on the gateway can results in deficit of processing power and cause the delay. Conclusion End to end security through the network method would be required.

A Strong Biometric-based Remote User Authentication Scheme for Telecare Medicine Information Systems with Session Key Agreement

  • An, Younghwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권3호
    • /
    • pp.41-49
    • /
    • 2016
  • Recently, many biometrics-based user authentication schemes for telecare medicine information systems (TMIS) have been proposed to improve the security problems in user authentication system. In 2014, Mishra et al. proposed an improvement of Awasthi-Srivastava's biometric based authentication for TMIS which is secure against the various attacks and provide mutual authentication, efficient password change. In this paper, we discuss the security of Mishra et al.'s authentication scheme, and we have shown that Mishra et al.'s authentication scheme is still insecure against the various attacks. Also, we proposed the improved scheme to remove these security problems of Mishra et al.'s authentication scheme, even if the secret information stored in the smart card is revealed. As a result, we can see that the improved biometric based authentication scheme is secure against the insider attack, the password guessing attack, the user impersonation attack, the server masquerading attack and provides mutual authentication between the user and the telecare system.

Quorum based Peer to Peer Key Sharing Protocol over Wireless Sensor Networks

  • Yang, Soong-Yeal;Won, Nam-Sik;Kim, Hyun-Sung;Lee, Sung-Woon
    • 한국산업정보학회:학술대회논문집
    • /
    • 한국산업정보학회 2008년도 추계 공동 국제학술대회
    • /
    • pp.445-448
    • /
    • 2008
  • The key establishment between nodes is one of the most important issues to secure the communication in wireless sensor networks. Some researcher used the probabilistic key sharing scheme with a pre-shared key pool to reduce the number of keys and the key disclosure possibility. However, there is a potential possibility that some nodes do not have a common share in the key pool. The purpose of this paper is to devise a peer to peer key sharing protocol (PPKP) based on Quorum system and Diffie-Hellman key exchange scheme (DHS). The PPKP establishes a session key by creating a shared key using the DHS and then scrambles it based on Quorum system to secure that. The protocol reduces the number of necessary keys than the previous schemes and could solve the non-common key sharing possibility problem in the probabilistic schemes.

  • PDF

CIM and OPC-UA based Integrated Platform Development for ensuring Interoperability

  • Kim, Jun-Sung;Park, Hee-Jeong;Choi, Seung-Hwan
    • KEPCO Journal on Electric Power and Energy
    • /
    • 제2권2호
    • /
    • pp.233-244
    • /
    • 2016
  • Smart grid is called it as a system of systems. There are diverse types of systems in smart grid environment. Therefore, one of key factors to achieve smart grid successfully is interoperability among diverse systems. To secure interoperability, smart grid operating system should be developed complied with standards in terms of the data representation and communication. Common Information Model (CIM) and OLE Process for Control - Unified Architecture (OPC-UA) are the representative international standards in smart grid domain. Each standard defines data representation and communication by providing common information model and the unified architecture. In this paper, we explain a smart grid platform that we have developed to comply with CIM and OPC-UA standards for secure interoperability among numerous legacy systems.

어머니의 양육체계와 유아의 애착체계간의 관계 (Relationships Between Maternal Caregiving System and Child's Attachment System)

  • 유영미;이영
    • 아동학회지
    • /
    • 제26권4호
    • /
    • pp.125-143
    • /
    • 2005
  • This study focused on the importance of the attachment/caregiving system at a dyadic level, and examined relationships between maternal representations of caregiving, maternal caregiving behavior, and child attachment. Seventy-five middle-class mothers and their preschool children(ages 3-4) participated in the study. Results indicated a strong correspondence between maternal representations of caregiving and maternal caregiving behavior at the secure/insecure and ordered/disordered level. The correspondence between maternal representations of caregiving and their preschooler's attachment, and between maternal caregiving behavior and their preschooler's attachment at the secure/insecure level were also strong. The correspondence between maternal representations of caregiving and their preschooler's attachment was mediated by maternal caregiving behavior.

  • PDF