• Title/Summary/Keyword: Secure System

Search Result 3,559, Processing Time 0.034 seconds

Secure-ReXpis System with Internet Environment

  • Ahn, Kyeong-Rim
    • Proceedings of the CALSEC Conference
    • /
    • 2001.08a
    • /
    • pp.165-176
    • /
    • 2001
  • * Extension of EC(Electronic Commerce) * Standard of Message -EDI : UN/EDIFACT, ANSI X12, etc -XML : ebXML, CML, MathML, WIDL, etc * Various of Information -Business Transaction Data -Private Data : ID, Password, Personal Information -Charge Data : Accounts, Card, etc * Message Level Security(omitted)

  • PDF

Analysis of Data Structure for Secure X.435 EDI System (X.435 EDI 정보보호 서비스 데이터 구조 분석)

  • 이정현;윤이중;김대호;이대기
    • Review of KIISC
    • /
    • v.5 no.3
    • /
    • pp.69-85
    • /
    • 1995
  • ITU-T X.435 EDI 시스템에서의 정보보호 서비스는 크게 MHS 정보보호 서비스와 Pedi 정보보호 서비스로 나눌 수 있다. 본 논문에서는 X.435 EDI 정보보호 서비스의 종류를 살펴보고, 이들의 데이타 구조의 분석뿐만 아니라 정보보호 서비스를 제공하기 위해 사용되는 각 필드들이 의미하는 바를 분석, 정리하였다.

  • PDF

Development of on-site application system for CLSM(Controlled Low Strength Material) for ground restoration which can secure Traffic Opening strength within 4 hours by utilizing industrial by-products from thermal power plants and steel mills (화력발전소와 제철소 발생 산업부산물을 활용하여 4시간 이내 개방강도 확보가 가능한 지반복원용 고유동성 채움재 현장적용 시스템 개발)

Design and Implementation of Image Encryption Method for Multi-Parameter Chaotic System (다중변수 혼돈계를 이용한 이미지 암호화 방법의 설계 및 구현)

  • Yim, Geo-Su
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.57-64
    • /
    • 2008
  • The Security of digital images has become increasingly more important in highly computerized and interconnected world. Therefore, The chaos-based encryption algorithms have suggested some new and efficient ways to develop secure image encryption method. This paper is described for the point at issue in all chaos-based encryption method for distribution of a chaotic signals. It has a method for generation of uniformly distributed chaotic signals that we designed secure algorithm of multi-parameter chaotic systems. So we are present validity of the theoretical models for results of image encryption and decryption for proposed method.

  • PDF

Design and Implementation of High-Speed Certification Path Discovery Server on Public Key Infrastructure (공개키 기반 구조에서의 고속 인증 경로 탐색 서버의 설계 및 구현)

  • Lee, Ju-Nam;Yu, Jong-Duk;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.21 no.B
    • /
    • pp.75-83
    • /
    • 2001
  • In the field of secure information systems including electronic commerces, public key infrastructure(PKI) is widely used for secure services. The more PKI domains are established, the more needs are required for cross-domain certifications. Furthermore, each country has many certificate authorities(CA) which require more complex cross certification: We may need a fast algorithm in order to find the possible certification paths. This will be more indispensible in the growing PKI systems. We designed and implemented the high-speed certification path discovery algorithm. Also, we investigated the feature of operation of the system.

  • PDF

Analysis of Stability for Overhead Crane Systems (천정 크레인시스템의 안정성 해석)

  • Ban Gab Su;Lee Kwang Ho;Mo Chang Ki;Lee Jong Gyu
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.22 no.4
    • /
    • pp.128-135
    • /
    • 2005
  • Overhead crane systems consist of trolley, girder, rope, objects, trolley motor, girder motor, and hoist motor. The dynamic system of these systems becomes a nonlinear state equations. These equations are obtained by the nonlinear equations of motion which are derived from transfer functions of driving motors and equations of motion for objects. From these state equations, Lyapunov functions of overhead crane systems are derived from integral method. These functions secure stability of autonomous overhead crane systems. Also constraint equations of driving motors of trolley, girder, and hoist are derived from these functions. From the results of computer simulation, it is founded that overhead crane systems is secure.

Implementation of a function translator converting vulnerable functions for preventing buffer overflow attacks (버퍼 오버플로우 공격 방지를 위한 취약 함수 변환기 구현)

  • Kim, Ik Su;Cho, Yong Yun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.105-114
    • /
    • 2010
  • C language is frequently used to develop application and system programs. However, programs using C language are vulnerable to buffer overflow attacks. To prevent buffer overflow, programmers have to check boundaries of buffer areas when they develop programs. But vulnerable programs frequently result from improper programming habits and mistakes of programmers. Existing researches for preventing buffer overflow attacks only inform programmers of warnings about vulnerabilities and not remove vulnerabilities in advance so that the programs still include vulnerabilities. In this paper, we propose a function translator which prevents creating programs including buffer overflow vulnerabilities. To prevent creating binary from source including vulnerabilities, the proposed translator searches vulnerable functions which cause buffer overflows, and converts them into secure functions. Accordingly, developing vulnerable programs by programmers which lack in knowledge on security can be prevented.

A Study on the Implementation of Cryptography Scheme for Secure Data Transmission on WWW (웹에서의 데이터 기밀성을 위한 암호방식 적용방안 및 응용)

  • 김동현;안선후;이성주
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.3
    • /
    • pp.671-679
    • /
    • 2000
  • In this study, the messages sent at application layer are encrypted by using RSA Public Keys before sending. Then we developed the information security system devised for the secure WWW data transmission by extending the functions of the Netscape browser and by using application programs such as Java applications and by using the plug-in methods. Not only can these technologies reduce and make it easier to perform key management or encryption transmission process, but they can also reduce the processing time of encryption correspondence.

  • PDF

PSpice Implementation of Secure Communication with Embedding Drive Synchronization using SC-CNN (SC-CNN 임베딩 구동 동기기법을 이용한 비밀통신의 PSpice 구현)

  • 배영철;김주완;손영우
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.509-513
    • /
    • 2003
  • In this paper, we configured secure communication circuit with PSpice through Embedding Drive Synchronization using SC-CNN, SC-CNN provide us a good method to separate interconnected state variables of a system respectively and to make it possible to change current component to voltage component in the state variables.

  • PDF