• Title/Summary/Keyword: Security Cooperation

Search Result 886, Processing Time 0.03 seconds

Three-Factor authentication system based on one time password (일회용 패스워드를 기반으로 한 3-factor 인증 시스템)

  • Kim, Donk-Kwan;Shin, Seung-Soo
    • Proceedings of the KAIS Fall Conference
    • /
    • 2008.11a
    • /
    • pp.25-28
    • /
    • 2008
  • 최근 인터넷과 같은 통신 기술 및 컴퓨터의 계산 능력이 급속도로 발전함에 따라, 많은 업무들이 온라인을 통해서 이루어지고 있다. 온라인 서비스의 편리함 이면에는, 전자 금융의 보안 허점을 노린 해킹시도가 끊이지 않고 있으며 금전적인 이득을 노린 금융 보안 사고들이 자주 발생하고 있다. 이러한 보안 사고를 막기 위해서 사용되는 기존의 인증 방식을 확인하고 인증 방식의 문제점을 분석한다. 본 논문에서 새로운 3-factor 인증 방식을 제안함으로써 기존의 인증 방식의 문제점을 해결하고, 기존 인증 방식보다 보안성이 강화된 인증 체계의 구현과 다양한 보안 서비스 제공, 안전한 금융 서비스 제공이 가능할 것으로 기대 된다.

  • PDF

A Study on Licence Management Model for Contents Circulation which Ubiquitous Environment is Safe (유비쿼터스 환경의 안전한 콘텐츠 유통을 위한 라이센스 관리 모델 연구)

  • Cho, Hyun-Seob;Oh, Myoung-Kwan
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.05a
    • /
    • pp.366-370
    • /
    • 2011
  • This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

A Study on Efficient Group Member Authentication and Key Management Scheme for Multicast Security in MANET (MANET에서 멀티캐스트 보안을 위한 효율적인 그룹 멤버 인증 및 키 관리 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.115-123
    • /
    • 2017
  • The mutual cooperation among nodes is very important because mobile nodes participating in MANET communicate with limited resources and wireless environment. This characteristic is important especially in environment that supports group communication. In order to support the secure multicast environment, it is important enough to affect performance to provide accurate authentication method for multicast group members and increase the integrity of transmitted data. Therefore, we propose a technique to provide the multicast secure communication by providing efficient authentication and group key management for multicast member nodes in this paper. The cluster structure is used for authentication of nodes in the proposed technique. In order to efficient authentication of nodes, the reliability is measured using a combination of local trust information and global trust information measured by neighboring nodes. And issuing process of the group key has two steps. The issued security group key increases the integrity of the transmitted data. The superiority of the proposed technique was confirmed by comparative experiments.

Development of Evaluate Model of Enterprise Security Management (ESM) Product (기업보안관리(ESM) 제품의 평가모델 개발)

  • Kang, Sang-Won;Jeon, In-Oh;Ynag, Hae-Sool
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.408-411
    • /
    • 2010
  • 보안관리가 진화하고 있다. 보안의 중요성이 강조되면서 도입된 수많은 보안 솔루션은 관리의 어려움을 증가시키고 있고, 각기 다른 장비가 쏟아내는 수많은 정보들로 효율적인 전사적 보안 체계 마련의 필요성이 대두되고 있기 때문이다. 국내에서는 ESM(Enterprise Security Management)이 보안관리를 대표했지만, 이를 더욱 고도화해야 한다는 요구가 증가하고 있다. 본 연구에서는 기업보안관리(ESM) 제품의 질적인 면을 평가하고 품질수준을 파악하여 개선방향을 도출함으로써 품질향상을 지원할 수 있는 보안성 평가모델과 시험 방법론에 대해서 개발하였다.

  • PDF

On Location Security Solutions in Vehicular Ad Hoc Networks

  • Hussain, Rasheed;Son, Junggab;Oh, Heekuck
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.1053-1056
    • /
    • 2012
  • Location information is considered to be of prime importance in Vehicular Ad Hoc NETworks (VANETs) because important decisions are made based on accurate and sound location information. Vehicles exchange their whereabouts in the form of scheduled beacon messages with their neighbors. These messages contain location, speed, time, and lane information etc. In this paper we aim at the location security in VANET and emphasize on the confidentiality and integrity of location information in case of Nonline-of-Sight (NLoS). For location confidentiality we propose a geolock-based mechanism whereas for location integrity we leverage cooperation among neighbors. In case of NLoS, the verifier vehicle asks its one-hop neighbors in an efficient way to verify the claimed location of the node on his behalf. On the basis of trust values and weightage assigned to neighbors, it is decided whether the verification is sound.

Psychological and Pedagogical Cooperation as a Factor in Increasing the Level of Tolerance for Innovation

  • Kirdan, Olena;Kovalenko, Nataliia;Miloradova, Natalia;Sabat, Nataliia;Kovalchuk, Olena;Hirnyak, Andriy
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.684-688
    • /
    • 2021
  • The article highlights the features of professional activity teacher on the basis of tolerance, the content and types of this phenomenon are stated, the value bases of education of tolerance in students are substantiated, psychological, culturological and communicative aspects of pedagogical tolerance of the teacher are considered. Methodical recommendations on self-training of the teacher, tolerant interaction with subjects of educational process are included.

Interpretive Structural Modeling in the Adoption of IoT Services

  • Kim, Yonghee;Park, Youngju;Song, Gwangsuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1184-1198
    • /
    • 2019
  • This study aims to use ISM to identify the enablers affecting the acceptance of IoT services. For this purpose, this study conducted an ISM analysis and a MICMAC analysis, extracted the enablers from Internet of Things - An Action Plan for Europe published by the EU for the research, and conducted interviews and surveys. The study found that it would be preferentially necessary to prepare the base for successful IoT services through international cooperation and the security of objective data. In addition, it turned out that it would be necessary to make efforts to spread and develop IoT services by conducting R&D and implementing projects through public-private partnerships and the organization of a consultative group. Lastly, since information security and standardization are the desired objects of the IoT industry, it was found that both the government and the industrial world should focus on them. This study has significance in that it can provide practical implications for the effective acceptance of IoT services.

Models of State Clusterisation Management, Marketing and Labour Market Management in Conditions of Globalization, Risk of Bankruptcy and Services Market Development

  • Prokopenko, Oleksii;Martyn, Olga;Bilyk, Olha;Vivcharuk, Olga;Zos-Kior, Mykola;Hnatenko, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.228-234
    • /
    • 2021
  • The article defines the problems of forming the models of government regulation of clustering, marketing management and labor market in the context of globalization, business bankruptcy risk and services market development. The clustering models based on the optimal partner network cooperation were proposed in order to ensure the strategic development of territories, to attract budget leading enterprises and to support small businesses. A descriptive model of government regulation of clustering, marketing management and labor market in the context of globalization, business bankruptcy risk and Covid-19 was determined.

Features Of The Implementation Of Inclusive Education: The Role Of The Teacher

  • Klochko, Oksana;Pohoda, Olena;Rybalko, Petro;Kravchenko, Anatoly;Tytovych, Andrii;Kondratenko, Viktoriia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.109-114
    • /
    • 2022
  • The article theoretically analyzed and specified definitions such as: "professional development of personality, competence, professional competence of a teacher". Structural components of professional competence are defined, namely: theoretical involves deep knowledge in the field of special pedagogy, special psychology; technological involves the use of acquired knowledge in practical activities and personal in which important personal characteristics of a special teacher are noted. Criteria and levels of development of professional competence of future special teachers are determined. The article analyzes the peculiarities of the professional activity of a teacher in the conditions of an inclusive educational space, in particular, the special training of a teacher as an integral component of this process. Emphasis is placed on the cooperation of teachers in an inclusive educational institution for the socialization of a child with special needs and her preparation for independent life.

Trends and Implications of Cybersecurity Policies in Major Countries (주요국 사이버보안 정책 동향 및 시사점)

  • J.S. Lee;S.M. Choi;C.M. Ahn;Y. Yoo
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.4
    • /
    • pp.58-69
    • /
    • 2023
  • Cyberspace is emerging as a critical domain requiring national-level governance and international cooperation owing to its potential financial and societal impacts. This research aims to investigate the cybersecurity policies from major countries for understanding with comprehensive perspectives. Global trends emphasize a comprehensive command-centered approach, with top leadership directing cybersecurity policies. Key policy areas include security across technology ecosystems, protection of critical infrastructure, and software supply chain security. Investment is being focused on zero-trust architectures, software bills, and new technologies like artificial intelligence. For countries like Korea, immediate response and adaptation to these trends are crucial to develop and enforce national cybersecurity policies.