• Title/Summary/Keyword: Secure System

Search Result 3,573, Processing Time 0.036 seconds

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

A Study on the Development Plan to Increase Supplement of Voice over Internet Protocol (인터넷전화의 보급 확산을 위한 발전방안에 관한 연구)

  • Park, Jae-Yong
    • Management & Information Systems Review
    • /
    • v.28 no.3
    • /
    • pp.191-210
    • /
    • 2009
  • Internet was first designed only for sending data, but as the time passed, internet started to evolve into a broadband multi-media web that is capable of transmitting sound, video, high-capacity data and more due to the demands of internet users and the rapid changing internet-communication technology. Domestically, in January, 2000 Saerom C&T, launched a free VoIP, but due to limited ways of conversation(PC to PC) and absence of a revenue model, and bad speech quality, it had hit it's growth limit. This research studied VoIP based on technological enhancement in super-speed internet. According to IDC, domestic internet market's size was 80,800 million in 2008, and it formed a percentage of 12.5% out of the whole sound-communication market. in case of VoIP, it is able to maximize it's profit by connecting cable and wireless network, also it has a chance of becoming firm-concentrated monopoly market by fusing with IPTV. Considering the fact that our country is insignificant in MVNO revitalization, regulating organizations will play a significant roll on regulating profit between large and small businesses. Further research should be done to give VoIP a secure footing to prosper and become popularized.

  • PDF

Optimal effect-site concentration of remifentanil to prevent hemodynamic changes during nasotracheal intubation using a video laryngoscope

  • Yoon, Ji-Young;Park, Chul-Gue;Kim, Eun-Jung;Choi, Byung-Moon;Yoon, Ji-Uk;Kim, Yeon Ha;Lee, Moon Ok;Han, Ki Seob;Ahn, Ji-Hye
    • Journal of Dental Anesthesia and Pain Medicine
    • /
    • v.20 no.4
    • /
    • pp.195-202
    • /
    • 2020
  • Background: Nasotracheal intubation is the most commonly used method to secure the field of view when performing surgery on the oral cavity or neck. Like orotracheal intubation, nasotracheal intubation uses a laryngoscope. Hemodynamic change occurs due to the stimulation of the sympathetic nervous system. Recently, video laryngoscope with a camera attached to the end of the direct laryngoscope blade has been used to minimize this change. In this study, we investigated the optimal effect-site concentration (Ce) of remifentanil for minimizing hemodynamic responses during nasotracheal intubation with a video laryngoscope. Methods: Twenty-one patients, aged between 19 and 60 years old, scheduled for elective surgery were included in this study. Anesthesia was induced by slowly injecting propofol. At the same time, remifentanil infusion was initiated at 3.0 ng/ml via target-controlled infusion (TCI). When remifentanil attained the preset Ce, nasotracheal intubation was performed using a video laryngoscope. The patient's blood pressure and heart rate were checked pre-induction, right before and after intubation, and 1 min after intubation. Hemodynamic stability was defined as an increase in systolic blood pressure and heart rate by 20% before and after nasotracheal intubation. The response of each patient determined the Ce of remifentanil for the next patient at an interval of 0.3 ng/ml. Results: The Ce of remifentanil administered ranged from 2.4 to 3.6 ng/ml for the patients evaluated. The estimated optimal effective effect-site concentrations of remifentanil were 3.22 and 4.25 ng/ml, that were associated with a 50% and 95% probability of maintaining hemodynamic stability, respectively. Conclusion: Nasotracheal intubation using a video laryngoscope can be successfully performed in a hemodynamically stable state by using the optimal remifentanil effect-site concentration (Ce50, 3.22 ng/ml; Ce95, 4.25 ng/ml).

Community Business and Regional Development: A Case Study of Sungmisan Village in Mapo-Gu, Seoul (커뮤니티 비즈니스와 지역발전 -서울특별시 마포구 성미산 마을을 사례로-)

  • Lee, Hongtaek;Jung, Sung-Hoon
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.15 no.4
    • /
    • pp.708-720
    • /
    • 2012
  • The main aim of paper is to analyse relationships of objects, methods and main agents for the sustainable growth of community business (CB). Since the 1990s, Korea central-local governments have carried out a variety of policies to revitalize the rural economy, but many policies did not work effectively. The main reason for this is that those policies were simply focused on construct the hardware-based infrastructure without considerations of community capabilities. Recently, to overcome these problems, various kinds of community business policies are carried out across the country. Therefore, to avoid previous problems, the concrete and thorough analysis on the current CB has to be required. To do this analysis, four case studies on Sungmisan Village (in Mapo-Gu, Seoul) were taken and analysed in this paper. Results for this are as follows; Firstly, for the sustained growth of CB, it has to be required that the needs and demands of communities and residents are reflected. In the case of Sungmisan CB, residents were relatively satisfied with their community products, even though tastes and prices of those products were not very attractive. The reason for this is that those products were created by needs of local people. In this process, a market within the village was created and the basis of the management was established. Secondly, in order to secure a stable profit's structure that is necessary at the early stage of business settlement, creating related networks with Sungmisan CB is necessary. The CB established a stable profit structure by using mutual commodities. In particular, they linked closely and mutually so that visitors can buy their commodities. Lastly, for the sustainable management of the CB a common target local people should be set up. Furthermore, a system for income distribution has to be needed for protecting and solving potential conflicts.

  • PDF

The Faunae before and after Creating the Solbangjuk Wetland Ecological Park Located in Jecheon-City were Compared (제천시 솔방죽 습지생태공원 조성 전과 후의 동물상 비교)

  • Kim, Do-Sung;Kang, Jong-Hyun;Lee, Se-Je;Lim, Hak-Sang;Kim, Na-Rae
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.42 no.3
    • /
    • pp.35-49
    • /
    • 2014
  • In this study, the faunae before and after creating the Solbangjuk Wetland Ecological Park located in Jecheon-city were compared. As a result, the change of the fauna according to the creation of the park showed the phenomenon that the species having the strong wilderness are reduced and the rate of general species become higher. In addition, the species which receive the restrictions for moving such as mammals, amphibians and reptiles are being gradually decreased by the increased visitors owing to the creation of the park. Moreover because there was the case where group of fishes have died caused by discharging and working the water in the reservoir during the creation process of the park, the supplementation work for this is required. However, it showed that the insects sucking the honey from flowers in the composed flower garden after creating the park, and the aquatic insects which live in this park that the stable water system for the growth of wetland plants is maintained, are increased, respectively. As a result of this survey, because the reservoir for agriculture adjacent to the residential area is generally small, the securing of the habitat space for the wild animals living in this park when creating the ecological parks seems to be necessary. The countermeasure should be considered so that some areas of the reservoir can be maintained in their natural state by adjusting the visitors' trails and the position of facilities for in order to secure the habitat of the wild animals.

Analysis of PLAN Modernization Trend and Prospects for Balance of U.S-China Naval power in the East Asia (중국해군(PLAN)의 현대화 추세와 동아시아 지역의 미·중 해군력 균형 전망)

  • Kwon, Jeong Wook
    • Strategy21
    • /
    • s.43
    • /
    • pp.5-28
    • /
    • 2018
  • The tensions between the U.S and China, which form the two pillars of the G2 era, seem to have persisted even after the Trump administration inaugurated. The strong confrontation between the two in recent foreign security issues may drive to develop an inadvertent military conflict, and it is high likely to occur in the maritime are. The purpose of this study is not only to analyze the balance of modernized naval forces in the PLAN through naval strategy changes and weapons system modernization trend, but also to predict the impact of the geographical proximity difference on the balance of naval forces in the disputed areas. It examined the impact of distance and geography on naval power by assessing the modernization pattern of the PLAN and capabilities in the context of two scenarios at different distances from China by 2020: one centered on Taiwan and the other on the Spratly Islands. The PLAN's strategy had impact on operational concept and forces construction. First, from the viewpoint of operation operational concept, it can be seen that the passive defense is changing into active defense. Second, in terms of power construction, it can threaten the surface and submarines of U.S power from a distance. And they generated follow three features; The ocean is not the focus of Chinese submarines, Horizontal and vertical expansion of Chinese naval vessels, The improvement of the suppression ability as the Chinese naval modernization ratio increases. The strength of the PLAN is dominant over the U.S in terms of reserves, and it can complement the qualitative deterioration by utilizing nearby bases in the vicinity of the mainland, such as the Taiwan Strait. However, due to the shortage of aircraft carriers, there is a possibility that it will take some time to secure the advantage of air and ocean in the amphibious operation. Therefore, as the dispute is prolonged, China may fail to achieve its original goal. In addition, the lack of cutting edge Commanding Ships may bring to weaken the C2 capabilities. At results, it is expected that PLAN will not be able to have a superiority in the short term due to lagging behind U.S advanced technology. Nevertheless, PLAN has strengthened its naval power through modernization sufficiently and it is highly likely to use force. Especially, it is more likely in the region where the naval power operation like the Taiwan Strait is possible with the almost equality to that of the United States. China will continue to use its naval forces to achieve a rapid and decisive victory over U.S in the close area from the land.

A Case Study of the Risk Identification in Construction Project (건설사업의 리스크 식별에 관한 사례연구)

  • Ahn, Sanghyun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.1
    • /
    • pp.15-23
    • /
    • 2015
  • In the construction industry, risk management has gained constant attention as the factor not only to evaluate global competitiveness of the country but also to secure competitiveness of public institutions and private companies. For effective construction risk management, the specific work process improvement that can be employed in the field in terms of risk management of the entire corporation such as financial, insurance and safety management is necessary. To manage construction risks, what is important is the step to identifying inherent risks in the construction project. The identification of risks will be followed by the step to seeking ways to establish and manage strategies responding to the risks. This study suggests ways and processes to make a checkslit to identify risks through case studies. To that end, the focus will be placed on working process improvement of risk identification among stages to manage construction risks such as risk identification and analyses, planning to respond to risks, risk monitoring and management. The case study checklists show that setting up the system to classify risks by stage is helpful to figure out causes of risks to reduce or eliminate risk factors. The checklist making process that considers features of the project is expected to contribute to successful completion of the project by enabling effective risk identification and systematic risk management.

ID-Based Proxy Re-encryption Scheme with Chosen-Ciphertext Security (CCA 안전성을 제공하는 ID기반 프락시 재암호화 기법)

  • Koo, Woo-Kwon;Hwang, Jung-Yeon;Kim, Hyoung-Joong;Lee, Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.64-77
    • /
    • 2009
  • A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. Recently, ID-based proxy re-encryption schemes are receiving considerable attention for a variety of applications such as distributed storage, DRM, and email-forwarding system. And a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security by Green and Ateniese. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest users' private keys and thereby decrypt ciphertexts intended for only the honest user. To solve this problem, we propose two ID-based proxy re-encryption scheme schemes, which are proved secure under CPA and CCA in the random oracle model. For achieving CCA-security, we present self-authentication tag based on short signature. Important features of proposed scheme is that ciphertext structure is preserved after the ciphertext is re-encrypted. Therefore it does not lead to ciphertext expansion. And there is no limitation on the number of re-encryption.

Estimation of Structural Deformed Shapes Using Limited Number of Displacement Measurements (한정된 계측 변위를 이용한 구조물 변형 형상 추정)

  • Choi, Junho;Kim, Seungjun;Han, Seungryong;Kang, Youngjong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.4
    • /
    • pp.1295-1302
    • /
    • 2013
  • The structural deformed shape is important information to structural analysis. If the sufficient measuring points are secured at the structural monitoring system, reasonable and accurate structural deformation shapes can be obtained and structural analysis is possible using this deformation. However, the accurate estimation of the global structural shapes might be difficult if sufficient measuring points are not secure under cost limitations. In this study, SFSM-LS algorithm, the economic and effective estimation method for the structural deformation shapes with limited displacement measuring points is developed and suggested. In the suggested method, the global structural deformation shape is determined by the superposition of the pre-investigated structural deformed shapes obtained by preliminary FE analyses, with their optimum weight factors which lead minimization of the estimate errors. 2-span continuous bridge model is used to verify developed algorithm and parametric studies are performed. By the parametric studies, the characteristics of the estimation results obtained by the suggested method were investigated considering essential parameters such as pre-investigated structural shapes, locations and numbers of displacement measuring points. By quantitative comparison of estimation results with the conventional methods such as polynomial, Lagrange and spline interpolation, the applicability and accuracy of the suggested method was validated.

A computer Hardware Selection Strategy for Information Systems Development : A Case of T Coil Service Center (정보시스템 구축시 컴퓨터 하드웨어의 선정전략 - T 철강회사의 시스템 선정 사례 -)

  • Yu, Sang-Jin;Jang, Yeong-Taek
    • Asia pacific journal of information systems
    • /
    • v.3 no.2
    • /
    • pp.3-54
    • /
    • 1993
  • Recently, executives learned of the strategic impact that information systems (IS) and information technology (IT) could provide to their organizations. In other words, through IS/IT companies could squelch competition, secure suppliers, obtain customer loyalty, reduce the threat of new entrants, and identify new opportunities. Because of these potential benefits, organizations are investing ever-increasing amount of organizational resources in IS/IT to make their organizations as information-based ones. Information-based organizations depend largely upon computer hardwares and softwares for their ongoing operations and management. Thus, organizations must manage their information resources, especially hardwares and softwares very effectively to remain competitive. Information resource management (IRI) is a program of activities directed at making effective use of information technology within an organization. These activities cover from corporate IS/IT planning to application system development, implementation, and maintenance. In more detail, IRV activities include planning for and acquiring computer hardwares and communication equipments, planning for, selection, and management of software development projects, and re-engineering business processes as IS/IT are integrated into organizational management. Among these activities, planning for and acquisition of computer hardwares, and planning for and management of software projects are the most critical ones since these activities require enormous amount of such important corporate resources as money, people, and time. Furthermore, corporate's eventual success largely depends upon whether corporate's policy on IS/IT is effective one or not. Numerous approaches and concepts to specific IRM activities have been proposed. However, many organizations have experienced various problems in the process of applying these approaches to their IRM activities mainly because existing methodologies and guidelines are too general to adapt to each firm's unigue situation. Also, these approaches are having its own strengths and weaknesses. Thus, people in charge of organization's IRM policy should come up with effective guidelines to maintain his position very long. In this study, we reviewed some existing approaches for planning, evaluation, and acquisition of computer hardware. Then, real experiences from Taechang Steel Co., Ltd. located in Taegu, which is one of the largest Coil Service Centers in Korea, are discussed. The major purposes of the study are : (1) to discuss the tradeoffs of existing approaches on hardware evaluation and acquisition, (2) to provide a real experience of a company to facilitate the application of theoretical concepts to the real environment.

  • PDF