• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.042 seconds

Design and Implementation of Client for OID Resolution System (OID 해석시스템 연동을 위한 클라이언트 프로그램 설계 및 구현)

  • Paik, Hyong Jong;Suh, Yung Jing;Jung, Euihyun
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.738-740
    • /
    • 2012
  • 최근 다양한 산업간 융 복합화 및 사물인터넷 출현에 따른 세계적으로 유일하게 객체를 식별할 수 있는 객체식별자(OID)의 중요성이 커지고 있으며 인터넷 기반으로 객체식별자 및 관련 정보를 해석할 수 있는 OID 해석시스템을 활용한 다양한 분야에서의 응용서비스 개발이 예상된다. 이에 본 논문에서는 OID 해석시스템 연동을 위한 클라이언트 프로그램의 설계 및 구현방안을 제안한다.

In order to prevent malicious attacks, physical security control to the virtual security control to link integrated control system design (악의적인 공격을 차단하기 위하여 가상보안관제와 물리보안관제를 연동한 통합관제시스템 설계)

  • Song, Jun-Ho;You, Jae-Hwe;Park, Tae-Sung;Jun, Moon-Seog
    • Annual Conference of KIPS
    • /
    • 2012.04a
    • /
    • pp.756-758
    • /
    • 2012
  • 클라우드 서비스가 발전됨에 따라 자원공유를 위한 가상머신의 활용도 점차 증진되고 있다. 그러나 이러한 가상머신의 활용으로 인하여 가상 영역에 따른 보안위협이 이슈가 되고 있다. 따라서 본 논문은 가상 영역에 따른 보안위협으로부터 보다 안전하고 유동적인 대처를 하기 위한 시스템을 제안하였다. 해당 시스템은 물리관제센터와 가상관제센터의 연동을 통하여 상호간의 현황을 알 수 있음으로써 가상머신 모니터링, 플랫폼 간 공격연관성 분석 등이 용이하며 자원고갈공격이나 DDoS 공격과 같은 위협으로부터 안전하다. 제안하는 시스템은 향후 클라우드 서비스 운용시 물리영역과 가상영역을 총괄적으로 관리하는 통합관제센터 활용에 적합할 것으로 보인다.

A Novel Method for Avoiding Congestion in a Mobile Ad Hoc Network for Maintaining Service Quality in a Network

  • Alattas, Khalid A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.132-140
    • /
    • 2021
  • Under the mobile ad-hoc network system, the main reason for causing congestion is because of the limited availability of resources. On the other hand, the standardised TCP based congestion controlling mechanism is unable to control and handle the major properties associated with the shared system of wireless channels. It creates an effect on the design associated with suitable protocols along with protocol stacks through the process of determining the mechanisms of congestion on a complete basis. Moreover, when bringing a comparison with standard TCP systems the major environment associated with mobile ad hoc network is regraded to be more problematic on a complete basis. On the other hand, an agent-based mobile technique for congestion is designed and developed for the part of avoiding any mode of congestion under the ad-hoc network systems.

Digital Competence As A Component Of Professional And Information Culture Of A Teacher

  • Kharlamov, Mykhailo;Sinelnikov, Ivan;Lysenko, Vladyslav;Yakobenchuk, Nazar;Tkach, Anna;Honcharuk, Оlena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.169-172
    • /
    • 2021
  • Based on the scientific and pedagogical analysis of the theory and experience of teaching computer science disciplines, the didactic mechanism for ensuring the continuity of the average (full) general and higher professional education of economists for practical implementation innovative technology of personal experience foundation. The pedagogical conditions for the formation of information competence, including laboratory, design, research work, the use of active teaching methods for acquiring management skills in production and activities of the enterprise. An indispensable requirement for the conditions for the implementation of basic of educational programs is the assessment of competencies. With this the goal was to develop criteria and levels of formation information competence of future economists and carried out complex diagnostics.

Evaluating Online Courses in light of Quality Matters (QM) Standards at Umm Al-Qura University

  • Alqarni, Ali Suwayid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.165-174
    • /
    • 2021
  • This study aimed to ascertain whether electronic courses at the deanship of electronic learning and distance education at Umm Al-Qura University meet the quality standards developed by the Quality Matters (QM) organization. This endeavor adopted a mixed method of an explanatory sequential research design for an in-depth understanding of the topic under scrutiny. The sample of the study consisted of ten courses designed at the deanship and reviewed using an evaluation form. The results showed that the courses in focus did not meet the criteria of QM. Based on this finding, a semi-structured interview was designed to collect relevant data from the syllabus designers at the deanship. The interviews yielded information on the difficulties the course designers faced when designing QM-criteria-based courses. The results obtained from the interviews showed that the designers experienced administrative, technical, and faculty-member-related challenges that, when producing online courses, intercepted their way to achieving the QM standards. The study closed with some recommendations, the most important of which is a call for re-developing online courses in alignment with the well-recognized QM standards.

Joint optimization of beamforming and power allocation for DAJ-based untrusted relay networks

  • Yao, Rugui;Lu, Yanan;Mekkawy, Tamer;Xu, Fei;Zuo, Xiaoya
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.714-725
    • /
    • 2018
  • Destination-assisted jamming (DAJ) is usually used to protect confidential information against untrusted relays and eavesdroppers in wireless networks. In this paper, a DAJ-based untrusted relay network with multiple antennas installed is presented. To increase the secrecy, a joint optimization of beamforming and power allocation at the source and destination is studied. A matched-filter precoder is introduced to maximize the cooperative jamming signal by directing cooperative jamming signals toward untrusted relays. Then, based on generalized singular-value decomposition (GSVD), a novel transmitted precoder for confidential signals is devised to align the signal into the subspace corresponding to the confidential transmission channel. To decouple the precoder design and optimal power allocation, an iterative algorithm is proposed to jointly optimize the above parameters. Numerical results validate the effectiveness of the proposed scheme. Compared with other schemes, the proposed scheme shows significant improvement in terms of security performance.

Information Security Activities of The Implementation Phase (구현단계의 정보보호 활동)

  • Shin, SY;Kim, DK;Lee, CW;Lee, HC;Lee, TW;Park, KH
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.747-748
    • /
    • 2016
  • The information protection scheme established in the design phase in the information security point of view, it is necessary to clearly determine whether implemented in the implementation phase. This paper goes in charge of how this information protected structure. This implementation is made be in a network, servers, applications, databases, and each client area.

  • PDF

The Effect of Individual Features on the Innovative Resistance in FinTech Service (핀테크 서비스에서 개인적 특성이 혁신저항요인에 미치는 영향)

  • Son, Dal-Ho
    • The Journal of Information Systems
    • /
    • v.28 no.3
    • /
    • pp.123-139
    • /
    • 2019
  • Purpose With the development of information and communication technologies. fintech industry is rapidly growing as a major financial service. Previous research literatures mainly focused on overall characteristics and technical aspects of fintech including security issues. Therefore, this study investigated the effect of individual features influencing the resistance of adopting a fintech service. Moreover, this paper included the guidelines in practical development of fintech mechanism. Design/methodology/approach For research purposes, this study developed research hypotheses in order to empirically examine the effect of the factors that might have a significant effect on the resistance of the wearable device. The empirical research was based on a survey which carried through 359 participants. Research hypotheses were evaluated via SPSS Statistics 21.0 and AMOS 19 statistical package program. Findings Results showed that self-efficacy and individual innovation had a significant effect on the technostress and switching cost. In addition, technostress, security and switching cost had a significant effect on the resistance of adopting a fintech service. However, more factors are needed to including in research model to generalize these results.

Design of Context Information based Access Control Model in Cloud Environment (클라우드 환경에 적합한 컨텍스트 정보 기반의 접근제어 모델 설계)

  • Byun, Yun Sang;Kwak, Jin
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.723-726
    • /
    • 2013
  • 최근 IT기술의 발전으로 인해 클라우드 컴퓨팅 기술이 도래됨과 동시에 다양한 분야에서 클라우드 컴퓨팅 기술을 융합하기 위한 연구가 진행되고 있다. 그 일환으로 데이터센터에도 클라우드 컴퓨팅 기술을 접목시켜 사용되고 있는 추세이다. 클라우드 데이터센터는 다양한 사용자들이 각기 다른 디바이스를 기반으로 데이터센터에 접근하여 저장된 데이터를 사용하여 업무를 수행하게 되며, 다양한 환경에서 사용자들이 동시다발적으로 저장된 데이터에 접근하게 된다. 클라우드 데이터센터는 시 공간에 관계없이 접근 가능하기 때문에 사용자의 상황이 자주 변경되며, 이에 따라 무분별한 데이터의 접근으로 인해 다양한 보안 위협이 발생할 수 있다. 본 논문에서는 이러한 보안 위협을 예방하기 위해 사용자의 상황을 인지하고, 그 상황에 따라 접근 여부를 결정하는 상황 인식 기반의 접근제어 모델을 제안한다.

Design of Secure Information Center Using a Conventional Cryptography

  • Choi, Jun-Hyuk;Kim Tae-Gap;Go, Byung-Do;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.53-66
    • /
    • 1996
  • World Wide Web is a total solution for multi-media data transmission on Internet. Because of its characteristics like ease of use, support for multi-media data and smart graphic user interface, WWW has extended to cover all kinds of applications. The Secure Information Center(SIC) is a data transmission system using conventional cryptography between client and server on WWW. It's main function is to support the encryption of sending data. For encryption of data IDEA(International Data Encryption Algorithm) is used and for authentication mechanism MD5 hash function is used. Since Secure Information Center is used by many users, conventional cryptosystem is efficient in managing their secure interactions. However, there are some restrictions on sharing of same key and data transmission between client and server, for example the risk of key exposure and the difficulty of key sharing mechanisms. To solve these problems, the Secure Information Center provides encryption mechanisms and key management policies.