• 제목/요약/키워드: Security design

Search Result 3,411, Processing Time 0.03 seconds

A study on the application of PbD considering the GDPR principle (GDPR원칙을 고려한 PbD 적용 방안에 관한 연구)

  • Youngcheon Yoo;Soonbeom Kwon;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.109-118
    • /
    • 2022
  • Countries around the world have recognized the importance of personal information protection and have discussed protecting the rights of data subjects in various forms such as laws, regulations, and guidelines. PbD (Privacy by Design) is one of the concepts that are commonly emphasized as a precautionary measure for the protection of personal information, and it is starting to attract attention as an essential element for protecting the privacy of information subjects. However, the concept of PbD to prioritize individual privacy in system development or service operation in advance is still only at the declarative level, so there is relatively little discussion on specific methods to implement it. Therefore, this study discusses which principles and rights should be prioritized to implement PbD based on the basic principles of GDPR and the rights of data subjects. This study is meaningful in that it suggests a plan for the practical implementation of PbD by presenting the privacy considerations that should be prioritized when developing systems or services in the domestic environment.

Study on Basic Design of Maritime Information Gateway System for Sharing Information with Related Organizations about Korean e-Navigation Service (유관기관 정보 공유를 위한 지능형 해상교통정보 체계의 대용량 해양 정보 연계 시스템 기본 설계에 대한 연구)

  • Yong-hak Song;Hyun Kim;Do-yeon Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.308-309
    • /
    • 2022
  • The Ministry of Oceans and Fisheries is providing maritime safety services using combine limited artificial intelligence technologies through the operation of the Korean e-Navigation service, and research is needed to improve reliability and quality to secure the competitiveness of the system. However, linking real-time operating systems requires a separate system configuration that can be linked after processing personal information security with minimal performance impact. To solve this problem, this study will make a basic design of a big-data maritime information gateway system of the Korean e-Navigation service that minimizes the impact of performance and reflects the security of personal information.

  • PDF

Conception and Modeling of a Novel Small Cubic Antenna Design for WSN

  • Gahgouh Salem;Ragad Hedi;Gharsallah Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.53-58
    • /
    • 2024
  • This paper presents a novel miniaturized 3-D cubic antenna for use in wireless sensor network (WSN) application. The geometry of this antenna is designed as a cube including a meander dipole antenna. A truly omnidirectional pattern is produced by this antenna in both E-plane and H-plane, which allows for non-intermittent communication that is orientation independent. The operating frequency lies in the ISM band (centered in 2.45 GHz). The dimensions of this ultra-compact cubic antenna are 1.25*1.12*1cm3 which features a length dimension λ/11. The coefficient which presents the overall antenna structure is Ka=0.44. The cubic shape of the antenna is allowing for smart packaging, as sensor equipment may be easily integrated into the cube hallow interior. The major constraint of WSN is the energy consumption. The power consumption of radio communication unit is relatively high. So it is necessary to design an antenna which improves the energy efficiency. The parameters considered in this work are the resonant frequency, return loss, efficiency, bandwidth, radiation pattern, gain and the electromagnetic field of the proposed antenna. The specificity of this geometry is that its size is relatively small with an excellent gain and efficiency compared to previously structures (reported in the literature). All results of the simulations were performed by CST Microwave Studio simulation software and validated with HFSS. We used Advanced Design System (ADS) to validate the equivalent scheme of our conception. Input here the part of summary.

Neutral Reference Model for the Sharing and Propagation of Engineering Change Information in a Collaborative Engineering Development (협업 개발 내 설계 변경 정보의 공유 및 전파를 위한 중립 참조 모델)

  • Hwang, Jin-Sang;Mun, Du-Hwan;Han, Soon-Hung
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.4
    • /
    • pp.243-254
    • /
    • 2008
  • As modular production becoming increasingly widespread in globalized manufacturing industries, sub modules or parts of the final product are being provided by many suppliers. Some part suppliers design their own products for themselves. In some cases, part suppliers provide the same type of product to multiple OEM companies. Because all part suppliers and OEM companies typically cannot use the same CAD system, engineering change in the CAD model of one company cannot be directly propagated to related CAD models of other companies. Even if two companies use the same CAD system, it may be difficult to share their CAD model owing to corporate security policy. In this paper, a neutral reference model that consists of a neutral skeleton model and an external reference data model is proposed as a new medium for the sharing and propagation of engineering change information among collaborating companies.

Hardware Design of 352-bit Cipher Algorithm (352-비트 암호 알고리즘의 하드웨어 설계)

  • Park, Young Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.51-61
    • /
    • 2009
  • Conventional DES has been not only shown to have a vulnerable drawback to attack method called 'Meet in the Middle', but also to be hard to use that it is because software implementation has a number of problem in real time processing. This paper describes the design and implementation of the expanded DES algorithm using VHDL for resolving the above problems. The main reason for hardware design of an encryption algorithm is to ensure a security against cryptographic attack because there is no physical protection for the algorithm written in software. Total key length of 352 bits is used for the proposed DES. The result of simulation shows that the inputted plaintext in cryptosystem are equal to the outputted that in decryptosystem.

Encryption and Compression Design of The COMS

  • Seo Seok-Bae;Park Durk-Jong;Kang Chi-Ho;Ku In-Hoi;Ahn Sang-IL
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.264-267
    • /
    • 2005
  • COMS (Communication, Ocean, and Meteorological Satellite) will be launch at end of year 2008. For speedy and security communication of COMS, KARl (Korea Aerospace Research Institute) decided encryption and compression design. Encryption design is based on DES (Data Encryption Standard), so that encryption key generation and management are important issues in COMS operation. And Compression is based on loss and lossless JPEG (Joint Photographic Export Group) standard. JPEG is one of generally using compression algorithm in image.

  • PDF

A study on the Exit Areas in Vertical Type of Multiplex Cinema (수직형 복합상영관의 퇴장공간에 관한 연구)

  • Lee, Mi-Suk;Kwak, Jae-Hoon;Han, Hae-Ryon
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2004.05a
    • /
    • pp.60-65
    • /
    • 2004
  • This dissertation is focalized on examining research on the actual condition and problem in the exit-space-form of Multiplex Cinema and mutual relation of user and finding more efficient and reasonable project method through valuation of design elements which the user can feel. In result, 4 place which is newly opened after 1990's is analyzed in Seoul. It is researched that Many user feel inconvenience and discomfort when they recognize exit-space. In order to improve itthey want to feel at ease naturally with light-embeded sign and landscape space. The exit-space should be recognized that it is a part of cinema which have to be developed and planed for the inner part of cinema and security of user. Not death-space.

  • PDF

A Study on the Spatial Factors in Traditional Retail Market Remodeling (재래시장 리모델링 사업에서의 공간 구성요소에 관한 연구)

  • Oh, Bong-Seok;Kim, Nam-Hyo
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2004.05a
    • /
    • pp.112-115
    • /
    • 2004
  • The government is in progress the traditional retail market redevelopment and remodeling due to atrophy of the traditional retail market in accordant to opening of the circulation market and changing of the consuming patterns. However, it seemed that primitive project was limited to the environment improvement scope. As the shopping environment which is comfortable to the consumers is provided and the design which considers a traditional retail market specific quality is applied from business plan early. It will be useful for the management normalization of traditional retail market actually. The spatial factors were analyzed as follows. 1. The circulation of consumer should be secured to make boundary line of the pass way. 2. The display booth should be standardized for the security of sight. 3. The signage panel should be consolidated in according to the plan. 4. The street vendor's handcart and tent should be arranged for circulations and the vision line.

  • PDF

A case study on efficient non pilot 2-Arch Tunnel in the urban (도심지에서 효율적인 무도갱 2-Arch 터널의 설계사례)

  • Yoon, Il-Byung;Kang, Hee-June;Kim, Hong-Dae;Kim, Dong-Sik
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.543-552
    • /
    • 2010
  • Due to increase in urban tunnelling as urban population and traffic volume increase, problems related with site security and civil appeal also increase. This paper presents a comparative analysis between conventional 2-arch tunnel method and non-pilot 2 arch tunnel method, which were performed in the basic design of Wie-Rae region. According to the analysis results, non-pilot 2-arch tunnel method is more efficient in terms of stability, constructability, and economic aspect. It is authors' wish that design procedure and method presented in this paper could help the design and construction of non-pilot 2-arch tunnel that should be planned in the near future.

  • PDF

A VLSI Design of IDEA Cipher Algorithm Based On a Single Iterative Round Method (단일 라운드 프로세스 방식의 IDEA 암호 알고리즘의 하드웨어 설계)

  • 최영민;권용진
    • Proceedings of the IEEK Conference
    • /
    • 2000.11b
    • /
    • pp.144-147
    • /
    • 2000
  • Data security is an important issue in today's computer networks. In order to construct a safe infra in the open communication network, a cryptography is necessarily applied to several communication application fields like a high-speed networking system supporting real-time operation. A cryptography which has already realized by a software is designed by using a hardware to improve a throughput. In this paper, we design hardware architecture of IDEA by using a single iterative round method to improve a encryption throughput. In addition, we intend to develop a hardware design methodology that a specific cryptography operate with high-speed. The hardware model is described in VHDL and synthesized by the Samsung KG 80 Library in the Synopsys development software tool. With a system clock frequency 20MHz, this hardware permits a data conversion rate of more than 116 Mbit/s.

  • PDF