• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.029 seconds

Design of DRM Frame for Digital Contents Protection in Network (네트워크 상에서 디지털 콘텐츠 보호를 위한 DRM 프레임 설계)

  • Kim Jong-Woo;Han Seung-Jo;Yang Won-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.101-113
    • /
    • 2006
  • This study is intended to provide more secure contents authentication and user authentication by applying public key algorithm and hardware binding to the DRM system. The proposed system is capable of protecting distributed contents and copyrights as well as resetting any interoperability issues among those involved in transparent and secure contents distribution. The proposed algorithm also affords transparency in the DRM distribution system and protection from unauthorized distribution.

Information Technologies in Higher Education Institutions: Experience of Leading Countries of the World

  • Bachynska, Nadiia;Novalska, Tetiana;Kuchnarov, Valerii;Kasian, Vladyslav;Salata, Halyna;Larysa, Grinberg
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.47-51
    • /
    • 2021
  • The article analyzes and studies that pedagogical design of the educational process using information and communication technologies in educational institutions of higher education based on the development of a model and methodology personalization of training will improve the quality of the educational process at the university and solve the identified contradiction. A qualitative analysis of foreign countries in the possibility of using information and communication technologies in educational institutions of higher education is carried out.

Modeling in System Engineering: Conceptual Time Representation

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.153-164
    • /
    • 2021
  • The increasing importance of such fields as embedded systems, pervasive computing, and hybrid systems control is increasing attention to the time-dependent aspects of system modeling. In this paper, we focus on modeling conceptual time. Conceptual time is time represented in conceptual modeling, where the notion of time does not always play a major role. Time modeling in computing is far from exhibiting a unified and comprehensive framework, and is often handled in an ad hoc manner. This paper contributes to the establishment of a broader understanding of time in conceptual modeling based on a software and system engineering model denoted thinging machine (TM). TM modeling is founded on a one-category ontology called a thimac (thing/machine) that is used to elaborate the design and analysis of ontological presumptions. The issue under study is a sample of abstract modeling domains as exemplified by time. The goal is to provide better understanding of the TM model by supplementing it with a conceptualization of time aspects. The results reveal new characteristics of time and related notions such as space, events, and system behavior.

Theoretical And Technological Aspects Of Intelligent Systems: Problems Of Artificial Intelligence

  • Frolov, Denys;Radziewicz, Wojciech;Saienko, Volodymyr;Kuchuk, Nina;Mozhaiev, Mykhailo;Gnusov, Yurii;Onishchenko, Yurii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.35-38
    • /
    • 2021
  • The article discusses approaches to the definition and understanding of artificial intelligence, research directions in the field of artificial intelligence; artificial intelligence in the anthropological dimension; the importance of the systems approach as a methodological basis for the design of intelligent systems; structural and functional components of intelligent systems; intelligent systems in the technological aspect; problems and prospects of relations in the system "man - intellectual system".

XML-based Windows Event Log Forensic tool design and implementation (XML기반 Windows Event Log Forensic 도구 설계 및 구현)

  • Kim, Jongmin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.27-32
    • /
    • 2020
  • The Windows Event Log is a Log that defines the overall behavior of the system, and these files contain data that can detect various user behaviors and signs of anomalies. However, since the Event Log is generated for each action, it takes a considerable amount of time to analyze the log. Therefore, in this study, we designed and implemented an XML-based Event Log analysis tool based on the main Event Log list of "Spotting the Adversary with Windows Event Log Monitoring" presented at the NSA.

Integration Facility Management: Interface Coordination in Process Management

  • Laksmana, Dimas Indra;Wijayaningtyas, Maranatha;Indriani, Sri;Kiswandono, Kiswandono
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.319-323
    • /
    • 2022
  • The information research system continues to be developed and directed at leading research National Institute of Technology (ITN) Malang in accordance with the Research Strategic Plan of ITN Malang. One of them is a computer system in a complete integrated facility management activity, such as this research scheme. The purpose of this research is to combine and integrate people, places, product, processes and technology. All of them are integrate existing organizational factors into a more effective, simplifying of complex processes, identifying and scheduling, notes, decision makers and more. This research was conducted in stages by design with a structured model stage for 3 (three) years (focus on humans, products and processes), research on Integration Facility Management: Interface Coordination in human resources and product management have been completed on 2019 and 2020. While the focus of research this year is to obtain an integrated facility management Interface Coordination in Process Management.

A Novel Approach For Component Classifications And Adaptation Using JALTREE Algorithm

  • Jalender, B.;Govardhan, Dr. A
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.115-122
    • /
    • 2022
  • Component adaptation is widely recognized as one of the main problems of the components, used in component based software engineering (CBSE). We developed methods to adjust the components classified by the keywords. Three main methods are discussed in this article those methods are combined with several domain component interfaces, high level simple notation for the adapter design patterns. The automated process for classifying high-level components are using adaptation is novel to software engineering domain. All Specifications and many technologies for re-using software, CBD and further developments have been emerged in recent years. The effects of these technologies on program quality or software costs must be analyzed. The risk concerns a single technology and must identify its combinations. In this paper, we are going to discuss the methods to adapt components of different technologies

Emotional Preferences Analysis Using Kansei in Designing The Appearance of User Interface for E-Voting Application

  • Abdurrohman, Abdurrohman;Rahman, Aedah Abd;Hadiana, Ana;Lokman, Anitawati Mohd
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.193-198
    • /
    • 2021
  • The application of e-Voting plays an important role in order to support democracy activities in Indonesia, such as elections at different levels. E-Voting has the function of providing better service to people in order to participate in elections. This research attempts to develop the appearance of the user interface of e-Voting based on users' emotional preferences using Kansei Engineering. Kansei Engineering is used in this research to analyze emotional feelings regarding e-Voting applications' presented Kansei words and give a recommendation on the most suitable user interface to be considered in their development. This research observed two main users' emotional feelings ("calm" and "formal") selected from ten Kansei words. The final recommendation is a conceptual element designed for designing e-Voting applications based on the Kansei word "calm".

Design and Implementation of a Secure Smart Home with a Residential Gateway

  • Kim, Sang-kon;Kim, Tae-kon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.9-17
    • /
    • 2022
  • In this paper, we propose a secure smart home network model and a novel cryptographic protocol called the Smart Home Security Protocol (SHSP). Authentication, key distribution, and encryption functions are properly supported in order to make a smart home secure, and a residential gateway (RG) plays a central role in performing these functions. According to the characteristics of networks and attached devices, we classify smart homes into three different types of sub-networks and these networks are interconnected with one another by the RG. Depending on a sub-network, we use different types of secure schemes to reduce the burden of the process and the delay in devices while it provides proper security functions. The proposed secure smart home model is implemented and verified by using a variety of embedded system environments.

Flipping EFL Classrooms: Impacts on Students' Achievement and Life Skills Learning

  • Alsamadani, Hashem A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.229-236
    • /
    • 2022
  • This study investigates the impact of flipped classroom strategy in developing students' achievement and acquisition of life skills. The study employed a quasi-experimental design where students were divided into two groups: an experimental (N=22) and a control (N=22). The randomly selected and assigned sample consisted of sixth-year elementary school students studying English as a basic course. The findings revealed statistically significant differences between the two group's means in both achievement and life skills tests in favor of the experimental group. Students of the experimental group who studied using the flipped classroom strategy outperformed the control group who studied in the standard way in achieving the English language and in the life situations test, where the effect size of the use of the strategy was large in both dependent variables. The study is concluded with some recommendations to facilitate the use of flipped classroom strategy for EFL teachers. This can be achieved by training teachers on using the strategy and providing technological resources at schools to implement the strategy efficiently.