• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.029 seconds

A Design of Role-Based Access Control Model (직무기반 접근제어 모델 설계)

  • Lee, Ho;Chung, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.1
    • /
    • pp.60-66
    • /
    • 2001
  • We designed a role-based access control model that can resolve the complicated tasks of control requirements. The designed access control model can control permissions efficiently use of a role-based access control. It guarantees the confidentiality integrity and availa information making use of identity-based and rule-based access controls. It can also centre information flow. Our access control model protects resources from unauthorized accesses b multi-level security policies such as role, security level, integrity level and ownership.

  • PDF

Implementation of Secure POS SYSTEM (안전한 POS System의 구현)

  • 박동규;황유동
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.70-77
    • /
    • 2001
  • This paper focuses on the design and implementation of the secure POS SYSTEM We propose a secure POS SYSTEM with RSA, MD5, Triple-DES for security and with RBAC model for access control. The client authentication is implemented before the data transferred be4ween client and server in proposed POS SYSTEM. We apply security algorithms with it, so that it can maintain confidentiality and integrity In addition. we apply RBAC model for access control of data. We verified the proposed system's stability by applying the proposed system to real works.

Design of CAS for Digital Terrestrial Broadcasting (지상파 디지털 방송을 위한 CAS 설계)

  • Lee, Kangseok;Kim, Sangpil;Kim, Rakhyun;Ou, Yoon;Yeom, Heungyeol
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.387-400
    • /
    • 1997
  • 본 논문에서는 기존의 방송망에서의 다양한 한정 액세스 방식들을 살펴보고, ETSI 표준 한정 액세스 방식을 분석한다. 또한 스마트 카드 활용이 가능하고 다중 송신자 구조를 갖는 ECM(Entitlement Control Message) 과 EMM(Entitlement Management Message) 등의 메시지 분배를 위한 암호키 분배 방식을 살펴보고, 지상파 디지털 방송에 적용할 수 있는 공개키 알고리듬과 키된 MAC 를 이용한 자격 메시지 분배 기법을 제안한다.

  • PDF

Design and Implementation of Certification Authority for Internet/Intranet (인터넷/인트라넷 보안을 위한 공증 사무소의 설계와 구현)

  • 정주원;김종우;박성주
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.289-299
    • /
    • 1997
  • 인터넷의 기술은 인트라넷(Intranet), 익스트라넷(Extranet)이라는 이름으로 인터넷 기술을 활용한 기업 내 또는 기업간 네트워크 구성에 관한 연구들이 활발하게 진행되고 있다. 인터넷의 개방성으로 인해서 인터넷은 보안성이 떨어지는 문제점을 가진다. 이를 극복하기 위해서 최근 많은 암호기반 보안 기술들이 개발되고 있다 대부분의 암호기반 보안 기술들은 전체네트워크 객체의 증명을 책임지는 공증 기관을 필요로 하는데, 이를 공중 사무소(Certification Authority)라 한다. 본 논문에서는 인터넷과 인트라넷의 취약한 부분을 보완하기 위한 최근의 암호기반 보안 기술과 그들 간의 상관관계를 파악한다 보안의 기초인 공증사무소의 구조 및 역할을 조사하고, 실제로 공증 사무소를 운영하기 위한 점검 사항 및 운영 규칙 등을 제시한다. 또한, 공증 사무소에 필요한 소프트웨어를 구현한다.

  • PDF

Design and Implementation of Intrusion Evaluation Dataset Generator based on SSFNet (SSFNet 기반의 침입평가데이터 생성기 설계 및 구현)

  • Yi Young-Soo;Mun Gil-Jong;Kim Yong-Min;Noh Bong-Nam
    • Annual Conference of KIPS
    • /
    • 2006.05a
    • /
    • pp.917-920
    • /
    • 2006
  • 정보보호 분야에서 네트워크 시뮬레이터에 대한 관심이 커지고 있으나 여러가지 제약 때문에 연구 및 개발이 미흡하다. 특히 침입탐지 시뮬레이터의 평가를 위한 적절한 데이터가 존재하지 않아 침입탐지 시뮬레이터가 적절한지 판단할 근거 자료가 충분하지 않다. 본 논문에서는 네트워크 시뮬레이터에서 DARPA 99 데이터셋을 활용하는 방법으로 트래픽 생성기를 설계 및 구현 하였으며, 그 결과가 정상적으로 동작함을 확인하였다.

  • PDF

(The chip design for the cipher of the voice signal to use the SEED cipher algorithm) (SEED 암호 알고리즘을 적용한 음성 신호 암호화 칩 설계)

  • 안인수;최태섭;임승하;사공석진
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.1
    • /
    • pp.46-54
    • /
    • 2002
  • The world was opened by communication network because of fast improvement and diffusion of information communication. And information was effected in important factor that control economy improvement of the country. The country should improve the information security system because of necessity to maintain its information security independently. Therefore we have used the SEED cipher algorithm and designed the cipher chip of the voice band signal using the Xilinx Co. XCV300PQ240 chip. At the result we designed the voice signal cipher chip of the maximum frequency 47.895MHz and the total equivalent gate 27,285.

Design of ClientCA Operation and Mechanism for e-Commerce Certificate Management (전자거래 인증서 관리를 위한 ClientCA 운영 메커니즘 설계)

  • 김점구;나상엽
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.85-90
    • /
    • 2004
  • A certificate is important media for the purpose of offering user-authentication service on PKI system. In the paper we analyzed management implement which could make the efficient use of a certificate. This implement called ClientCA will make efficient use of the service about user-authentication consisting of the basis in the age of information through efficient management and partial use of each certificates. Especially, ClientCA could be used efficiently by grafting a small group of PKI system which is operated with particular purposes.

  • PDF

An Embedded System for Sensor Networks (센서 네트워크를 위한 임베디드 시스템)

  • Lee, Jong-Chan;Park, Sang-Joon
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.37-41
    • /
    • 2010
  • The object of this paper is to design a embedded system based on sensor networks. The proposed system can manage the heating by sensing and analyzing the temperature and humidity in apartment house and others. For implementing this system, we devide JAVA API into the platform-independent JAVA part and platform-dependent native part for the implementation of JAVA API to manage the linux based embedded system devices, and focus on the control of the embedded system devices using JAVA API.

Design of Inner Key scheduler block for Smart Card (스마트 카드용 내장형 키 스케쥴러 블록 설계)

  • Song, Je-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.4962-4967
    • /
    • 2010
  • Security of the electronic commercial transaction especially through the information communication network is gaining its significance due to rapid development of information and communication related fields. For that, some kind of cryptographic algorithm is already in use for the smart card. However, the growing needs of handling multimedia and real time communication bring the smart card into more stringent use of its resources. Therefore, we proposed a key scheduler block of the smart card to facilitate multimedia communication and real time communication.

An Efficient Anonymous Authentication and Vehicle Tracing Protocol for Secure Vehicular Communications

  • Park, Young-Shin;Jung, Chae-Duk;Park, Young-Ho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.6
    • /
    • pp.865-874
    • /
    • 2010
  • Recently, Hao et al. proposed a privacy preservation protocol based on group signature scheme for secure vehicular communications to overcome a well-recognized problems of secure VANETs based on PKI. However, although efficient group signature schemes have been proposed in cryptographic literatures, group signature itself is still a rather much time consuming operation. In this paper, we propose a more efficient privacy preservation protocol than that of Hao et al. In order to design a more efficient anonymous authentication protocol, we consider a key-insulated signature scheme as our cryptographic building block. We demonstrate experimental results to confirm that the proposed protocol is more efficient than the previous scheme.