• Title/Summary/Keyword: Security Target

Search Result 693, Processing Time 0.03 seconds

The Study of Security System for Candidates for the 17th President (제17대 대통령선거후보자 경호제도에 관한 연구)

  • Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.43-67
    • /
    • 2007
  • This is the study of efficient security system for candidates for the 17th President. The president election will be held in 20 countries this year. As conflicts between interest groups are expected to emerge, they are afraid of accidental raid in the campaign tour in addition to revival of regionalism and possibility of confrontation between interest groups with issues of anti-FTA In our country. The purpose of this study is to suggest appropriate method through study of security system for president candidate as just 6 months are left for the 17th president election. Also this study covers security environment for the president election, principle of security, and theoretical study for cause of terror, security system domestic and abroad and its analysis and how to provide the efficient security for president candidate. Therefore first, for desirable security the security should be provided by professional org like president security department. Second, combined security for target by current rules should be done. Fourth, total security is necessary to prevent security threats in advance. Third, the public security should be provided for every president candidates. Fifth, example of secret service in America should be studied and economical security should be considered Sixth, we should increase the use of Security Company and martial artists.

  • PDF

A Study on the Improvement of Aquaculture Security System to Insure the Lawful Evidence of Theft (도적행위의 법적증거확보를 위한 양식장 보안 시스템 개선에 관한 연구)

  • Yim, Jeong-Bin;Nam, Taek-Keun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.4
    • /
    • pp.55-63
    • /
    • 2007
  • The Group Digital Surveillance System for Fishery Safety and Security (GDSS-F2S) is to provide the target tracking information and the target identification information in order to secure an huge aquaculture farm-field from a thief. The two information, however, is not enough to indict the thief due to the lack of lawful evidences for the crime actions. To overcome this problem, we consider the target image information as one of solutions after discussion with the effective countermeasure tools for the crime actions with scenario-based analysis according to the geological feature of aquaculture farm-field. To capture the real-time image for the trespassing targets in the aquaculture farm-field area, we developed the image capture system which is consists of ultra sensitive CCD(Charge-Coupled Device) camera with 0.0001 Lux and supplementary devices. As results from the field tests for GDSS-F2S with image capture system, the high definite images of the vehicle number plate and shape, person's actions and features are obtainable not only day time but also very dark night without moon light. Thus it is cleary known that the improved GDSS-F2S with image capture system can provide much enough lawful evidences for the crime actions of targets.

  • PDF

Fuel Mix of Electricity Generating System Considering Energy Security and Climate Change Mitigations : Focusing on Complementarity between Policy Objectives (에너지 안보 및 기후변화 대책을 고려한 발전구성비의 도출 : 정책 목표간의 상호보완성을 중심으로)

  • Ryu, Hanee;Kim, Kyunam;Kim, Yeonbae
    • Environmental and Resource Economics Review
    • /
    • v.20 no.4
    • /
    • pp.761-796
    • /
    • 2011
  • The purpose of this paper is to derive fuel mix of electricity generating system with the lowest cost considering energy security and climate change mitigations as the target of energy policy. Energy Security Price Index(ESPI), based on the measure of market concentration in fossil fuel market and political risk of exporting countries, is chosen to assess the level of energy security. The methodology of Energy Conservation Supply Curve(CSC) is applied to fuel mix to meet the carbon emission mitigation through increasing the alternatives participation and introduction of new technologies. These also represent an improvement on the level of energy security, having the complementarity between two objectives. The alternative measure for improving energy security is exploration and production(E&P) of fossil fuel for energy sufficiency. Fuel mix of electricity generating system to achieve certain objectives in 2020 can be derived with the lowest cost considering energy security and carbon emission mitigations.

  • PDF

A Study on Cloud Database Management System Protection Profile for the Secure Cloud Environment (안전한 클라우드 환경을 위한 클라우드 데이터 관리 시스템에 적용 가능한 보호프로파일에 관한 연구)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.411-429
    • /
    • 2014
  • As cloud computing has enabled, a variety of cloud services has come into wide use. Thus, cloud computing products can be easily identified in the IT market. Common Criteria is international standards for security evaluation performed of IT products. In addition, Consumers can be used as a objective guideline for the evaluation results. And, it is a provides for protection profile(security target of security products). For general, IT products are providing the protection profile. However, for cloud-related products of protection profile is not being provided. Thus, about cloud security products, there is no way for evaluation. Therefore, in this paper, we propose protection profile on cloud database management system for the secure cloud environment in common criteria.

A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model

  • Lu, Yang;Li, Jiguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1502-1522
    • /
    • 2019
  • Leakage of secret keys may be the most devastating problem in public key cryptosystems because it means that all security guarantees are missing. The forward security mechanism allows users to update secret keys frequently without updating public keys. Meanwhile, it ensures that an attacker is unable to derive a user's secret keys for any past time, even if it compromises the user's current secret key. Therefore, it offers an effective cryptographic approach to address the private key leakage problem. As an extension of the forward security mechanism in certificate-based public key cryptography, forward-secure certificate-based signature (FS-CBS) has many appealing merits, such as no key escrow, no secure channel and implicit authentication. Until now, there is only one FS-CBS scheme that does not employ the random oracles. Unfortunately, our cryptanalysis indicates that the scheme is subject to the security vulnerability due to the existential forgery attack from the malicious CA. Our attack demonstrates that a CA can destroy its existential unforgeability by implanting trapdoors in system parameters without knowing the target user's secret key. Therefore, it is fair to say that to design a FS-CBS scheme secure against malicious CAs without lying random oracles is still an unsolved issue. To address this problem, we put forward an enhanced FS-CBS scheme without random oracles. Our FS-CBS scheme not only fixes the security weakness in the original scheme, but also significantly optimizes the scheme efficiency. In the standard model, we formally prove its security under the complexity assumption of the square computational Diffie-Hellman problem. In addition, the comparison with the original FS-CBS scheme shows that our scheme offers stronger security guarantee and enjoys better performance.

Side Channel Analysis with Low Complexity in the Diffusion Layer of Block Cipher Algorithm SEED (SEED 블록 암호 알고리즘 확산계층에서 낮은 복잡도를 갖는 부채널 분석)

  • Won, Yoo-Seung;Park, Aesun;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.993-1000
    • /
    • 2017
  • When the availability of embedded device is considered, combined countermeasure such as first-order masking and hiding countermeasures is quite attractive because the security and efficiency can be provided at the same time. Especially, combined countermeasure can be applied to the confusion and diffusion layers of the first and last rounds in order to provide the efficiency. Also, the middle rounds only employs first-order masking countermeasure or no countermeasure. In this paper, we suggest a novel side channel analysis with low complexity in the output of diffusion layer. In general, the attack target cannot be set to the output of diffusion layer owing to the high complexity. When the diffusion layer of block cipher is composed of AND operations, we show that the attack complexity can be reduced. Here, we consider that the main algorithm is SEED. Then, the attack complexity with $2^{32}$ can be reduced by $2^{16}$ according to the fact that the correlation between the combination of S-box outputs and that of the outputs of diffusion layer. Moreover, compared to the fact that the main target is the output of S-box in general, we demonstrate that the required number of traces can be reduced by 43~98% in terms of simulated traces. Additionally, we show that only 8,000 traces are enough to retrieve the correct key by suggested scheme, although it fails to reveal the correct key when performing the general approach on 100,000 traces in realistic device.

Generation of ISAR Image for Realistic Target Model Using General Purpose EM Simulators (범용 전자기파 시뮬레이터를 이용한 사실적 표적 모델에 대한 역합성 개구면 레이다 영상 합성)

  • Kim, Seok;Nikitin, Konstantin;Ka, Min-Ho
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.2
    • /
    • pp.189-195
    • /
    • 2015
  • There are many research works on the SAR image generation using EM(Electro Magnetic) simulation. Particularly, there are several dedicated S/Ws for SAR image generation and analysis. But, most of them are not available to the public due to the reason for defense and security. In this paper, we describe the generation of ISAR images for a realistic target model using the general purpose EM simulator like FEKO. This method can benefit us many advantages like building the database of many targets for target recognition with cost-and-time effective way.

Target segmentation in non-homogeneous infrared images using a PCA plane and an adaptive Gaussian kernel

  • Kim, Yong Min;Park, Ki Tae;Moon, Young Shik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2302-2316
    • /
    • 2015
  • We propose an efficient method of extracting targets within a region of interest in non-homogeneous infrared images by using a principal component analysis (PCA) plane and adaptive Gaussian kernel. Existing approaches for extracting targets have been limited to using only the intensity values of the pixels in a target region. However, it is difficult to extract the target regions effectively because the intensity values of the target region are mixed with the background intensity values. To overcome this problem, we propose a novel PCA based approach consisting of three steps. In the first step, we apply a PCA technique minimizing the total least-square errors of an IR image. In the second step, we generate a binary image that consists of pixels with higher values than the plane, and then calculate the second derivative of the sum of the square errors (SDSSE). In the final step, an iteration is performed until the convergence criteria is met, including the SDSSE, angle and labeling value. Therefore, a Gaussian kernel is weighted in addition to the PCA plane with the non-removed data from the previous step. Experimental results show that the proposed method achieves better segmentation performance than the existing method.

Automatic identification of ARPA radar tracking vessels by CCTV camera system (CCTV 카메라 시스템에 의한 ARPA 레이더 추적선박의 자동식별)

  • Lee, Dae-Jae
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.45 no.3
    • /
    • pp.177-187
    • /
    • 2009
  • This paper describes a automatic video surveillance system(AVSS) with long range and 360$^{\circ}$ coverage that is automatically rotated in an elevation over azimuth mode in response to the TTM(tracked target message) signal of vessels tracked by ARPA(automatic radar plotting aids) radar. This AVSS that is a video security and tracking system supported by ARPA radar, CCTV(closed-circuit television) camera system and other sensors to automatically identify and track, detect the potential dangerous situations such as collision accidents at sea and berthing/deberthing accidents in harbor, can be used in monitoring the illegal fishing vessels in inshore and offshore fishing ground, and in more improving the security and safety of domestic fishing vessels in EEZ(exclusive economic zone) area. The movement of the target vessel chosen by the ARPA radar operator in the AVSS can be automatically tracked by a CCTV camera system interfaced to the ECDIS(electronic chart display and information system) with the special functions such as graphic presentation of CCTV image, camera position, camera azimuth and angle of view on the ENC, automatic and manual controls of pan and tilt angles for CCTV system, and the capability that can replay and record continuously all information of a selected target. The test results showed that the AVSS developed experimentally in this study can be used as an extra navigation aid for the operator on the bridge under the confusing traffic situations, to improve the detection efficiency of small targets in sea clutter, to enhance greatly an operator s ability to identify visually vessels tracked by ARPA radar and to provide a recorded history for reference or evidentiary purposes in EEZ area.

Development of Risk Assessment Index in Special Management Target Facilities According to the Fire Occurrence Factors (화재발생 요인에 따른 특정관리대상시설등의 위험도 평가 지수의 분석 및 개발)

  • Park, Mi Yun;Park, Jong Bok;Park, Jae Hak
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.61-70
    • /
    • 2012
  • The range of special management target facilities is seperated by the building sector and the field of civil engineering. In the present study, the risk analysis was performed, related to fire occurred for the last five years, in the field of residential and non-residential facilities in buildings. Most of fire incidents occurred in residential and non-residential facilities was the cause of the electrical, and the resulting casualties were also very high. Therefore, based on the results, the risk evaluation index was developed, identifying the causes of fire occur and doing the fire vulnerability analysis for each facility. The result of this study can be utilized safety management to these facilities for the future, especially, inducing a more specialized and intensive safety management.