• Title/Summary/Keyword: Security Practice

Search Result 374, Processing Time 0.023 seconds

Freedom of contract in the digital age and its implementation in modern technologies: theory and practice

  • Davydova, Iryna;Bernaz-Lukavetska, Olena;Tokareva, Vira;Andriienko, Iryna;Tserkovna, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.544-548
    • /
    • 2021
  • Scientific and technical development, as well as the emergence of new types of contracts, which do not have their expression in current legislation, force us to explore the issues of contract law to adapt to change. In this context, the principle of freedom of contract is fundamental, which states that each person has the right to enter into a contractual relationship at his discretion. However, such freedom is not absolute, because the freedom of one person should not violate the freedom of another. Together with the conflict of private and public interests, these phenomena are a field for the study of topical issues of theory and application of the principle of freedom of contract in practice. Research methods are philosophical, general scientific, and special scientific methods, in particular, system-structural, formal-legal, hermeneutic; methods of analysis, synthesis, etc. As a result of the research, the main characteristics of the principle of freedom of contract, its role for private law regulation of contract law are given; approaches to understanding the restriction of contract freedom are analyzed; typical examples and means of such restrictions are identified; demonstrated how contract freedom is embodied in the use of IT tools, which types of contracts are most common in the digital environment.

A Study on Standards for Performance Evaluation of Biometric Recognition Systems (국내 생체 인식 시스템 성능 평가를 위한 표준안 연구)

  • 문지현;김학일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.101-110
    • /
    • 2002
  • The purpose of this research is to establish Korean standards of best practice and common criteria for testing and evaluating the performance of biometric recognition systems. First of all, research activities in leading countries such as USA, Great Britain and Germany have been studied and analyzed. Then, the standards of best practice and common criteria are proposed in the aspects of sensors, algorithms, and application systems. The results of this work will be utilized fur test and evaluation of commercial biometric products by KISA and provided to private industries for their own evaluation of products.

Research on Effective Security Control Measures Against DDoS Attacks (DDoS 공격에 대한 효과적인 보안 관제 방안)

  • Jung, Il-Kwon;Kim, Jeom-Gu;Kim, Kiu-Nam;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.7-12
    • /
    • 2009
  • It is very difficult to completely block the DDoS attack, which paralyzes services by depleting resources or occupying the network bandwidth by transmitting a vast amount of traffic to the specific website or server from normal users' PCs that have been already infected by an outside attacker. In order to defense or endure the DDoS attack, we usually use various solutions such as IDS (Intrusion Detection System), IPS (Intrusion Prevention System), ITS (Intrusion Tolerance System), FW (Firewall), and the dedicated security equipment against DDoS attack. However, diverse types of security appliances cause the cost problem, besides, the full function of the equipments are not performed well owing to the unproper setting without considering connectivity among systems. In this paper, we present the effective connectivity of security equipments and countermeasure methodology against DDoS attack. In practice, it is approved by experimentation that this designed methdology is better than existing network structure in the efficiency of block and endurance. Therefore, we would like to propose the effective security control measures responding and enduring against discriminated DDoS attacks through this research.

  • PDF

A Study on the Stay of Enforcement of ICSID Arbitral Awards (ICSID 중재판정의 '집행정지'에 관한 고찰)

  • KIM, Yong-Il
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.68
    • /
    • pp.65-87
    • /
    • 2015
  • This article examines the Stay of Enforcement of ICSID Arbitration Award. The effect of the stay is that the award is not subject to enforcement proceedings under Article 54 of the ICSID Convention pending the outcome of the annulment application. The annulment committee must decide the stay, unless the applicant sought the stay with the request for annulment, in which case the ICSID Secretary -General must grant it automatically. This automatic stay -which can only relate to the entire award-remains in force until the committee is constituted and issues a decision on the request for stay. ICSID committees have taken different positions on whether a stay of enforcement is exceptional or not. Some committees have held that because the ICSID Convention explicitly recognizes that the rights of the award creditor could be subject to a stay, stays are not exceptional. ICSID practice shows that most committees have rejected the proposition that the merits and prospects of the application for annulment should influence the committee's decision whether to grant a stay. In addition, ICSID practice regarding the specific circumstances that will justify a stay of enforcement is unclear, and committees have focused on different factors to decide whether to grant a stay such as prospect of prompt compliance with the ward, hardship to one of the parties, risk of non-recovery and irreparable harm to the award debtor. Also, ICSID practice shows that even though the Convention is silent on this issue, committees have generally held that they are empowered to condition the stay of enforcement on the granting of security by the requesting party.

  • PDF

Legal framework and practices of public order management in England and Wales (잉글랜드와 웨일즈의 공공질서 관리 관련 법적 틀 및 법집행 형태)

  • Jung, Jeyong;Ellis, Tom
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.203-222
    • /
    • 2018
  • Public order management is one of the most important areas in policing. Drawing on the legal framework and policy, this study aims to assess practices of criminal justice practitioners, especially, police and prosecutors, in England and Wales. Using qualitative interviewing, four main themes are identified: (1) an emphasis on a right to protest, (2) police practices on public order management, (3) the development of police/prosecutor liaison, and (4) the value of video evidence. Based upon these findings, several legal, policy and practice implications are drawn. These implications involve a wide range of aspects concerning strategic, operational, and tactical interventions by the police, as well as collaboration between police and prosecutors. Although the criminal justice context in England and Wales is very different to South Korea, some practices and distinctions can be useful to consider in the Korean context. This study suggests that more gains can be made if legislation, policy, and practice across criminal justice nodes can be coordinated and approached holistically.

An Exploratory Study on Block chain based IoT Edge Devices for Plant Operations & Maintenance(O&M) (플랜트 O&M을 위한 블록체인 기반 IoT Edge 장치의 적용에 관한 탐색적 연구)

  • Ryu, Yangsun;Park, Changwoo;Lim, Yongtaek
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.1
    • /
    • pp.34-42
    • /
    • 2019
  • Receiving great attention of IoT and 4th industrial revolution, the necessity comes to the fore of the plant system which aims making it smart and effective. Smart Factory is the key realm of IoT to apply with the concept to optimize the entire process and it presents a new and flexible production paradigm based on the collected data from numerous sensors installed in a plant. Especially, the wireless sensor network technology is receiving attention as the key technology of Smart Factory, researches to interface those technology is actively in progress. In addition, IoT devices for plant industry security and high reliable network protocols are under development to cope with high-risk plant facilities. In the meanwhile, Blockchain can support high security and reliability because of the hash and hash algorithm in its core structure and transaction as well as the shared ledger among all nodes and immutability of data. With the reason, this research presents Blockchain as a method to preserve security and reliability of the wireless communication technology. In regard to that, it establishes some of key concepts of the possibility on the blockchain based IoT Edge devices for Plant O&M (Operations and Maintenance), and fulfills performance verification with test devices to present key indicator data such as transaction elapsed time and CPU consumption rate.

Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption

  • Youn, Taek-Young;Jho, Nam-Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1249-1262
    • /
    • 2020
  • Along with the increase of the importance of information used in practice, adversaries tried to take valuable information in diverse ways. The simple and fundamental solution is to encrypt the whole data. Since the cost of encryption is increasing along with the size of data, the cost for securing the data is a burden to a system where the size of the data is not small. For the reason, in some applications where huge data are used for service, service providers do not use any encryption scheme for higher security, which could be a source of trouble. In this work, we introduce a new type of data securing technique named Trapdoor Digital Shredder(TDS) which disintegrates a data to multiple pieces to make it hard to re-construct the original data except the owner of the file who holds some secret keys. The main contribution of the technique is to increase the difficulty in obtaining private information even if an adversary obtains some shredded pieces. To prove the security of our scheme, we first introduce a new security model so called IND-CDA to examine the indistinguishability of shredded pieces. Then, we show that our scheme is secure under IND-CDA model, which implies that an adversary cannot distinguish a subset of shreds of a file from a set of random shreds.

DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1402-1411
    • /
    • 2014
  • Buyer-seller watermarking protocol is defined as the practice of imperceptible altering a digital content to embed a message using watermarking in the encryption domain. This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce. Buyer-seller watermarking protocol is fundamentally based on public-key cryptosystem that is operating using the algebraic property of an integer. However, in general usage, digital contents which are handled in watermarking scheme mostly exist as real numbers in frequency domain through DCT, DFT, DWT, etc. Therefore, in order to use the watermarking scheme in a cryptographic protocol, digital contents that exist as real number must be transformed into integer type through preprocessing beforehand. In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol. We applied integral-processing in order to modify the decimal layer. And we designed a direction-adaptive watermarking scheme by analyzing distribution property of the frequency coefficients in a block using JND threshold. From the experimental results, the proposed scheme was confirmed to have a good robustness and invisibility.

An Empirical Study on Individual and Social Commerce Factors Impacting Shopping Value and Intention to Repurchase in Social Commerce and Moderating Effects of Perceived Security (소셜커머스의 쇼핑 가치와 재구매의도에 영향을 미치는 개인 및 소셜커머스 특성과 지각된 보안의 조절효과에 대한 연구)

  • Kim, Sanghyun;Park, HyunSun
    • Journal of Information Technology Services
    • /
    • v.12 no.2
    • /
    • pp.31-53
    • /
    • 2013
  • Web 2.0 has affected existing e-commerce and created a new business model of e-commerce, known as social commerce. Social commerce is a subset of e-commerce using social network services and is emerging as an important platform due to increased popularity of social networking services. This study focuses on analyzing the factors that influence the shopping value and intention to repurchase of social commerce users. Based on prior researches, we develop a research model, including individual characteristics of social commerce users (Collectivism, Price Sensitivity, Impulse Buying) and social commerce characteristics (Cost saving, Product Variety, Shopping Convenience). Furthermore, this study proposed the moderating effect of Perceived Security and the relationship between shopping value and intention to repurchase. To empirically validate, the data were collected from 220 social commerce users. The results indicated that individual characteristics (collectivism, price sensitivity, impulse buying) were positively related to hedonic shopping value. In addition, social commerce characteristics (cost saving, shopping convenience) were positively related to utilitarian value. The shopping value(hedonic and utilitarian) had a significant influence on intention to repurchase. The moderating effects of perceived security also was significant. Lastly, the implications for theory and practice are discussed.

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System

  • Zhou, Jing-xian;Yan, Jian-hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6243-6259
    • /
    • 2019
  • As a foundation of next-generation air transportation systems, automatic dependent surveillance-broadcast (ADS-B) helps pilots and air traffic controllers create a safer and more efficient national airspace system. Owing to the open communication environment, it is easy to insert fake aircraft into the system via spoofing or the insertion of false messages. Efforts have thus been made in academic research and practice in the aviation industry to ensure the security of transmission of messages of the ADS-B system. An identity-based batch verification (IBV) scheme was recently proposed to enhance the security and efficiency of the ADS-B system, but current IBV schemes are often too resource intensive because of the application of complex hash-to-point operations or bilinear pairing operations. In this paper, we propose a lightweight IBV signature scheme for the ADS-B system that is robust against adaptive chosen message attacks in the random oracle model, and ensures the security of batch message verification and against the replaying attack. The proposed IBV scheme needs only a small and constant number of point multiplication and point addition computations instead of hash-to-point or pairing operations. Detailed performance analyses were conducted to show that the proposed IBV scheme has clear advantages over prevalent schemes in terms of computational cost and transmission overhead.