• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.031 seconds

Antecedent Factors Influencing the Continued Use of Smart Banking by Different Mobile Platforms: Android OS vs. iOS (모바일 플랫폼에 따른 스마트 뱅킹의 지속사용에 영향을 미치는 선행요인: Android OS vs. iOS)

  • Kim, Do-Hyung;Ha, Sung-Ho;Park, KyungBae
    • The Journal of Information Systems
    • /
    • v.24 no.2
    • /
    • pp.209-240
    • /
    • 2015
  • Purpose This study investigates the relationships between various attributes of smart banking (convenience, security, convergence, and economy), user features (familiarity and innovativeness), perceived usefulness, trust, satisfaction, and continuance intentions and provides a comparison of Google's Android OS and Apple's iOS. Design/methodology/approach We considered a sample of 245 respondents and used structural equation modeling to analyze the data. Findings The results indicate that convergence and familiarity significantly affected perceived usefulness and that security and economy significantly affected perceived trust in smart banking services. The relationships of security, economy, and innovativeness to perceived usefulness and those of convenience and familiarity to perceived trust were stronger for the Android OS than for iOS. The study contributes by proposing an integrated framework and providing a comparison between the Android OS and iOS in the context of smart banking.

A Design of Authentication Method for Secure Communication based on Wearable Device (웨어러블 디바이스 기반의 안전한 통신을 위한 인증기법 설계)

  • Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.

Smart CCTV Security Service in IoT(Internet of Things) Environment (사물인터넷 환경에서 스마트 CCTV 방범 서비스)

  • Cho, Jeong-Rae;Kim, Hye-Suk;Chae, Doo-Keol;Lim, Suk-Ja
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1135-1142
    • /
    • 2017
  • In this paper, we propose IoT based smart CCTV security service to prevent crime in blind spot and prevent unexpected fire or danger. In the proposed method, a RC (Radio Control) car is made using Raspberry pie, and a camera and various modules are installed in an RC car. It was then implemented using Raspbian O / S, Apache Web Server, Shell script, Python, PHP, HTML, CSS, Javascript. The RC car provides a security service that informs the manager of the situation by judging the risk of the scene with modules such as video, voice and temperature. Experimental results show that the transmission time of video and audio information is less than 0.1 second. In addition, real-time status transmission was possible in AVG, emergency, and manual mode. It is expected that the proposed method will be applied to the development of smart city by applying it to unmanned vehicles, drones and the like.

Investments on Pro-poor Development Projects on Goats: Ensuring Success for Improved Livelihoods

  • Devendra, C.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.26 no.1
    • /
    • pp.1-18
    • /
    • 2013
  • The elements that determine the success of development projects on goats and the prerequisites for ensuring this are discussed in the context of the bewildering diversity of goat genetic resources, production systems, multifunctionality, and opportunities for responding to constraints for productivity enhancement. Key determinants for the success of pro-poor projects are the imperatives of realistic project design, resolution of priorities and positive impacts to increase investments and spur agricultural growth, and appropriate policy. Throughout the developing world, there exist 97% of the total world population of 921 million goats across all agroecological zones (AEZs), including 570 breeds and 64% share of the breeds. They occupy a very important biological and socioeconomic niche in farming systems making significant multifunctional contributions especially to food, nutrition and financial security, stability of farm households, and survival of the poor in the rural areas. Definitions are given of successful and failed projects. The analyses highlighted in successful projects the value of strong participatory efforts with farmers and climate change. Climate change effects on goats are inevitable and are mediated through heat stress, type of AEZ, water availability, quantity and quality of the available feed resources and type of production system. Within the prevailing production systems, improved integrated tree crops - ruminant systems are underestimated and are an important pathway to enhance C sequestration. Key development strategies and opportunities for research and development (R and D) are enormous, and include inter alia defining a policy framework, resolution of priority constraints using systems perspectives and community-based participatory activities, application of yield-enhancing technologies, intensification, scaling up, and impacts. The priority for development concerns the rainfed areas with large concentrations of ruminants in which goats, with a capacity to cope with heat tolerance, can be the entry point for development. Networks and networking are very important for the diffusion of information and can add value to R and D. Well formulated projects with clear priority setting and participatory R and D ensure success and the realisation of food security, improved livelihoods and self-reliance in the future.

Context-Aware Security System for Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 상황인식 보안 시스템)

  • Lee, Hyun-Dong;Chung, Mok-Dong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.19-27
    • /
    • 2010
  • Many security issues occur in cloud computing service environment such as authentication, access control, and so on. In this paper, we propose an effective authentication and access control model which provide integrated management and control when we access various resources in cloud computing environment. To address these problems, we suggest a context-aware single sign-on and access control system using context-awareness, integrated authentication, access control, and OSGi service platform in cloud computing environment. And we show design and implementation of context-aware single sign-on and access control system. Also we verified the flexibility and convenience of the proposed system through multi fact based integrated authentication in cloud computing environment. We could provide flexible and secure seamless security service by user context in cloud computing environment.

Modified Orbitozygomatic Approach without Orbital Roof Removal for Middle Fossa Lesions

  • Lopez-Elizalde, Ramiro;Robledo-Moreno, Edgar;O'Shea-Cuevas, Gabriel;Matute-Villasenor, Esmeralda;Campero, Alvaro;Godinez-Rubi, Marisol
    • Journal of Korean Neurosurgical Society
    • /
    • v.61 no.3
    • /
    • pp.407-414
    • /
    • 2018
  • Objective : The purpose of the present study was to describe an OrBitoZygomatic (OBZ) surgical variant that implies the drilling of the orbital roof and lateral wall of the orbit without orbitotomy. Methods : Design : cross-sectional study. Between January 2010 and December 2014, 18 patients with middle fossa lesions underwent the previously mentioned OBZ surgical variant. Gender, age, histopathological diagnosis, complications, and percentage of resection were registered. The detailed surgical technique is described. Results : Of the 18 cases listed in the study, nine were males and nine females. Seventeen cases (94.5%) were diagnosed as primary tumoral lesions, one case (5.5%) presented with metastasis of a carcinoma, and an additional one had a fibrous dysplasia. Age ranged between 27 and 73 years. Early complications were developed in four cases, but all of these were completely resolved. None developed enophthalmos. Conclusion : The present study illustrates a novel surgical OBZ approach that allows for the performance of a simpler and faster procedure with fewer complications, and without increasing surgical time or cerebral manipulation, for reaching lesions of the middle fossa. Thorough knowledge of the anatomy and surgical technique is essential for successful completion of the procedure.

ID-based Tripartite Multiple Key Agreement Protocol Combined with Key Derivation Function (키 유도함수를 결합한 ID 기반 3자 복수키 동의 프로토콜)

  • Lee Sang-Gon;Lee Hoon-Jae
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.133-142
    • /
    • 2006
  • The purpose of the multiple key agreement protocol is to get efficiency in computational and communicational aspects compared to multiple executions of single key agreement protocol. However ID based tripartite multiple key agreement protocols have been proposed, it is reported that they can not resist unknown key-share attack or impersonation attack. How to design a secure and efficient ID-based authenticated tripartite multiple key agreement scheme to prevent all kinds of attacks remains an open problem. This paper proposes a multiple key agreement scheme combing the existing single key agreement protocol with a key derivation function. The proposed scheme can not only increase computational efficiency compared to the existing multiple key agreement protocol, but can ensure security of the proposed schemes by using a security proofed single key agreement protocol and key derivation function.

  • PDF

A Design of Flexible Testbed for Network Security Evaluation (네트워크 보안 평가를 위한 유연한 테스트베드 설계)

  • Im, Yi-Jin;Choi, Hyoung-Kee;Kim, Ki-Yoon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.16-26
    • /
    • 2010
  • We present a testbed for collecting log information and evaluating network security under various attacks. This testbed is modeled on real Internet, where attack traffic coexists with normal traffic. Attacks can be produced either by attack tools directly or by data sets including attack traffic. It costs less time and money than existing ones which are both costly and often time consuming in constructing. Also, it can be easily revised or extended according to the traffic types or the uses. Therefore, using our testbed can make various tests more efficient and facilitate collecting log information of sensors with attacks. We discuss how to use our testbed through replay procedures of DDoS attack and worm. We also discuss how we surmount some difficulty in constructing the testbed.

Design and Implementation of e-Commerce User Authentication Interface using the Mouse Gesture (마우스 제스처를 이용한 전자상거래 사용자 인증 인터페이스)

  • 김은영;정옥란;조동섭
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.469-480
    • /
    • 2003
  • The accurate user- authentication technology is being raised as one of the most important in this current society, which is, so called, information society. Most authentication technology is used to identify users by using the special characteristics of users. This paper has established an e-commerce shopping mall based on conventional e-commerce systems. It also suggested and established the user authentication interface that uses the mouse gesture, which is the new authentication of what users have. The user authentication interface using the mouse gesture generates the status of recognition directly on the screen by comparing the stored pattern values with the unique pattern values that users entered. When users purchase products through the shopping mall and enter their another signature information together with payment information, security can be more increased. Experimental results show that our mouse gesture interface may be useful to provide more security to e-commerce server.

  • PDF

Design and Implementation of XML Encryption System based on WIPI Environment (WIPI 환경에서의 XML 문서 암호화 시스템의 설계 및 구현)

  • Hong, Xian-Yu;Lee, Jae-Seung;Moon, Ki-Young;Kim, Cang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.837-840
    • /
    • 2007
  • Recently, Not only PC environment but also movile environment using XML for translating data. But the mobile delevopment is more limited but need highler security than PC environment Because there is some important service such as mobile banking. In this paper, We development the system to encrypt and decrypt the XML data in order to protect data, And the system is observing the recommendation of the XML Encryption Syntax and Processing by W3C. When encrypting the data, We use the entryption algorithm DES, Triple-DES, AES, SEED and RSA. and consideration of the mobile environment Last, We test the system at WIPI environment.

  • PDF