• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.039 seconds

A Study on the U-learning Service Application Based on the Context Awareness (상황인지기반 U-Learning 응용서비스)

  • Lee, Kee-O;Lee, Hyun-Chang;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.81-89
    • /
    • 2008
  • This paper introduces u-learning service model based on context awareness. Also, it concentrates on agent-based WPAN technology, OSGi based middleware design, and the application mechanism such as context manager/profile manager provided by agents/server. Especially, we'll introduce the meta structure and its management algorithm, which can be updated with learning experience dynamically. So, we can provide learner with personalized profile and dynamic context for seamless learning service. The OSGi middleware is applied to our meta structure as a conceptual infrastructure.

  • PDF

Design of Multimedia data Retrieval System based on MPEG-7 (MPEG-7 기반의 멀티미디어 데이터 검색 시스템 설계)

  • Kim, Kyungl-Soo
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.91-96
    • /
    • 2008
  • An increasing in quantity of multimedia data brought a new problem that expected data should be retrieved fast and exactly. The adequate representation is a key element for the efficient retrieval. For this reason, MPEG-7 standard was established for description of multimedia data in 2001. In this paper, we designed a Audio/Image Retrieval System based on MPEG-7 that can retrieve multimedia data like audio, image efficiently. And we integrated high-level and low-level schemas to retrieve datas for users.

  • PDF

High Embedding Capacity and Robust Audio Watermarking for Secure Transmission Using Tamper Detection

  • Kaur, Arashdeep;Dutta, Malay Kishore
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.133-145
    • /
    • 2018
  • Robustness, payload, and imperceptibility of audio watermarking algorithms are contradictory design issues with high-level security of the watermark. In this study, the major issue in achieving high payload along with adequate robustness against challenging signal-processing attacks is addressed. Moreover, a security code has been strategically used for secure transmission of data, providing tamper detection at the receiver end. The high watermark payload in this work has been achieved by using the complementary features of third-level detailed coefficients of discrete wavelet transform where the human auditory system is not sensitive to alterations in the audio signal. To counter the watermark loss under challenging attacks at high payload, Daubechies wavelets that have an orthogonal property and provide smoother frequencies have been used, which can protect the data from loss under signal-processing attacks. Experimental results indicate that the proposed algorithm has demonstrated adequate robustness against signal processing attacks at 4,884.1 bps. Among the evaluators, 87% have rated the proposed algorithm to be remarkable in terms of transparency.

Design and implementation of The crime prevention security solution based on Android System (안드로이드 기반의 실시간 범죄방지 보안솔루션 설계 및 구현)

  • Bong, Sun-Jong;Youn, Hee-Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.385-386
    • /
    • 2014
  • 최근 강력범죄와 빈집을 대상으로 하는 범죄가 증가함에 따라 언제 어디서나 실시간으로 주거지를 확인하고 대응을 할 수 있는 보안 솔루션에 대한 요구가 증가하고 있다. 본 논문에서 구현된 보안솔루션은 서버와의 통신을 통해 실시간으로 사용자의 스마트폰 애플리케이션에서 내부 침입을 확인할 수 있으며, 내부의 개폐장치를 스마트폰 애플리케이션을 통해 동작하는 보안 솔루션을 제안한다.

  • PDF

Security Coding Guide of Design Phase (설계 단계의 보안 코딩 지침)

  • Shin, Seong-Yoon;Lee, Sang-Won;Lee, Hyun-Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.75-76
    • /
    • 2015
  • 본 논문에서는 S/W 개발 보안 지침을 알려준다. S/W 개발 보안에서 S/W의 보안 취약점 유형에 대하여 설명한다. S/W 보안 취약점 유형인 입력 데이터 검증 및 표현, API 악용, 보안 특성, 시간 및 상태, 에러처리 코드품질, 그리고 캡슐화에 대하여 설명하도록 한다. 즉, 본 논문에서는 보안 취약점에 대한 소스코드 레벨에서의 대응조치에 대한 가이드를 제시하고자 한다.

  • PDF

Design and Implementation of Utility-Pipe Conduit Access Control System Using Smart Phone (스마트 폰을 이용한 지하공동구 출입관리시스템 설계 및 구현)

  • Lim, Ji-yong;Oh, Am-suk;Kim, Gwan-Hyung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.327-328
    • /
    • 2015
  • 본 논문은 지하공동구에서의 출입자의 통제를 위해 스마트폰을 이용한 출입관리시스템을 제안한다. 제안하는 시스템은 지하공동구 자동개폐기의 MCU를 통해 온습도, 개폐기의 상태, 출입자의 기록 등 다양한 정보를 취득하여 관리한다. 이때 취득한 정보는 블루투스4.0 모듈을 통해 ECB 암호화 방식을 사용하여 스마트폰에 전송한다. 본 논문에서 제안하는 출입관리시스템은 기존 물리적인 키에 의존하던 출입 방식을 대체하여 신뢰성 있는 보안 및 체계적인 관리가 가능할 것으로 기대한다.

  • PDF

Ozone disinfection criteria for contactor design (오존접촉조 설계를 위한 소독 기준)

  • Dumeau C;Boisdon V
    • 수도
    • /
    • v.24 no.6 s.87
    • /
    • pp.23-31
    • /
    • 1997
  • Ozonation is an effective process in providing microbiologically safe drinking water. The operation of the ozonation stage is often based on disinfection criteria which include security factors, such as the CT criterion. This type of ozonation management, which mat include large safety margins, will no longer be possible, since formation of ozonation byproducts has to be avoided. In order to reduce the security factor, a computerized tool to predict with more accuracy inactivation of micro-organisms in the ozonation process has been developed.

  • PDF

Development of Optical Burst Switching System for Next Generation Internet Services (차세대 인터넷 서비스를 위한 광버스트 교환 노드 설계)

  • Jang, Hee-Seon;Shin, Hyeun-Cheul;Aum, Ki-Chul;Lee, Sung-Hoon
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.45-52
    • /
    • 2005
  • In this paper, the development specification of the optical burst switching system (OBS) for next generation internet services is presented. The development specification includes the number of input/output nodes, the number of wavelengths, buffer capacity, the capacity/queue size of the controller and maximum burst assembly delay. From the performance parameters related to the OBS design, an mathematical model to maximize the throughput and minimize the data loss is presented, and then efficient heuristic algorithm is also presented to analyze the sensitivity of the system parameters.

  • PDF

Design and Implementation about Trust Evaluation Mechanism of Distributed Services In Mobile Ad-hoc Network (Mobile Ad-hoc Network 상의 분산된 서비스에 대한 신뢰도 평가 기법 설계 및 구현)

  • Jang, Jong-Deok;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.29-34
    • /
    • 2009
  • The many transaction occurs because of service will not be able to trust in mobile Ad-hoc Network. Overcomes like this problem point with the plan for, This paper proposes the trust evaluation mechanism which is the possibility becoming the standard of the node selection which provides a better service by using the transaction message which is basic occurs from within the mobile Ad-hoc network and in the transaction message which is additional. At last, this paper embodies the trust mechanism which proposes, confirms the trust value which is evaluated with NS2 simulator.

  • PDF

Analysis and Design of Security Policy Server Applied Security Management Interface (보안관리 인터페이스를 적용한 보안정책 서버 분석 및 설계)

  • Choi, Byoung-Son;Lee, Seoung-Hyeon;Lee, Won-Gu;Lee, Jae-Kwang
    • Annual Conference of KIPS
    • /
    • 2003.11c
    • /
    • pp.1755-1758
    • /
    • 2003
  • 본 논문에서는 리눅스 상에 효율적인 보안 정책 관리를 위한 보안 정책 서버를 분석하고, 보안 정책 변경을 위한 인터페이스를 설계하였다. 리눅스는 소스가 공개된 운영체제이기 때문에, 보안상의 취약점을 이용하여 수많은 공격을 당하게 된다. 이러한 보안상의 문제를 해결하기 위하여 본 논문에서는 효율적인 정책 서버를 분석하여 리눅스에 적용함으로써, 리눅스가 가지는 보안상의 취약점을 해결하고자 하였다. 또한 관리자가 쉽게 정책을 적용할 수 있도록 보안 정책 적용을 위한 인터페이스를 설계하였다. 설계된 보안 정책 서버를 통하여 기존 리눅스 커널의 수정을 최소화하면서, 다른 접근제어 모델을 사용한 때에는 관련 모듈만 교체만 하면 되기 때문에 이미 설정된 보안 정책을 손쉽게 변화 할 수 있다

  • PDF