• Title/Summary/Keyword: Security design

Search Result 3,415, Processing Time 0.026 seconds

Exploring the Moderating Effect of Interdependence on Performance and Satisfaction in Virtual Work Environment (품질 관점에서 가상 데스크탑 인프라(VDI)의 만족과 성과, 그리고 업무 상호의존성의 조절효과)

  • Lee, Hyejung;Lee, Jungwoo;Park, Jun-Gi;Lee, Yoon Gun
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.93-110
    • /
    • 2014
  • With the explosive proliferation of smart devices that may be connected to the fast Internet, virtual desktop interfaces(VDI) are being implemented in enterprises allowing employees to work anywhere anytime in the same technological environment. As this kind of systems are intended to raise the work performance, a research model is constructed from the review of research literature on service quality and work design. The model consists of VDI system service quality (ubiquity, availability, compatibility, security and ease of use), system satisfaction, task performance and job satisfaction. As VDI is designed as a support system for cooperative work, the task interdependence adopted from the work design theory is postulated here as moderating the effect of user satisfaction on task performance and job satisfaction. 147 data points were collected by a survey of VDI users in a global firm and subjected to PLS analysis. Interestingly, ubiquity and compatibility seem to be not statistically significant for user satisfaction while availability, security and ease of use of VDI system are statistically significant. Task interdependence is found to be a relatively strong mediator between system user satisfaction and task performance, however, interestingly, the coefficient come out as negative. This may indicate that the influence of VDI user satisfaction on task performance would not be high in highly interdependent tasks. Considering that VDI is intended for supporting 'interdependence' in cooperative work, this finding is a bit surprising. In-depth discussions are made in the discussion followed by future research directions.

Performance Evaluation of Motorcycle's Anti-theft Device using NFC Authentication and Solenoid Valve (NFC 보안인증과 솔레노이드 밸브를 이용한 이륜차 이동제한장치 성능평가)

  • Moon, Boram;Jin, Taeseok
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.1
    • /
    • pp.82-86
    • /
    • 2016
  • This paper proposes a method for the immobilization of motorbike brakes in conjunction with near-field communication (NFC) technology in order to meet the increasing demand for security and convenience of motorbike drivers. We thought about the concept of wireless key, NFC security devices and automatic solenoid valve for setting the lock and unlock module. This paper propose the design and development of an innovative anti-theft alarm system for motorcycles using NFC smart devices based on RFID system, the basis of IoT and AES(advanced encryption standard) encryption Algorithm. The design concept is based on NFC communication strategy between the vehicle and owner. To do this concept, we designed motorcycle smart key system with general-purpose NFC system and the automatic solenoid valve for setting the lock and unlock module. First, we designed control unit and NFC card reader for motorcycle smart key system. Then we propose an AES encryption algorithm and prove that the motorcycle key system is controllable by showing the result of implementing and testing, after installing.

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.

A Fundamental Study of a Neo-Grouting Technology for the Decreasing of a Ground Disaster in a High Water Pressure Conditions (고수압 조건에서의 지반재해 저감을 위한 최신 그라우팅 시공관리 기술 기초연구)

  • Kim, Jin-Chun;Yoo, Byung-Sun;Kang, Hee-Jin;Kwon, Young-Sam
    • Journal of Korean Society of Disaster and Security
    • /
    • v.7 no.1
    • /
    • pp.9-16
    • /
    • 2014
  • In the high water pressure construction conditions, it is important that the failures and damages occurrence in the neighboring ground and impermeable prevention methods (design and construction) for a inflow of seawater into structures. Grouting construction markets include a subway construction, a railway construction, a mountain tunnel construction, a new & reinforced construction of river & reservoir levee with big budget per every years. but, there are economic loss about design and construction management parts because that management criteria is not accurate but depends on experiences. Even though grouting technology are using vitally in the major constructions of national levels, it is still serious about the low-reliability problems and the no-criteria problems. therefor the purpose of this study is that provides the fundamental research about the neo-grouting technology for the decreasing of ground disaster in a high water pressure conditions.

Estimation on the Turbulence Characteristics of Daily Instantaneous Maximum Wind Velocity (일순간최대풍속의 난류특성에 관한 평가)

  • Oh, Jong Seop
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.75-84
    • /
    • 2017
  • This study is concerned with the estimation of daily instantaneous maximum wind velocity in the meteorological major cities (selected each 17 points) during the yearly 1973-2016. The purpose of this paper is to present the turbulence statistic characteristics (probability distribution, correlation coefficient, turbulency intensity, shear velocity, roughness length, turbulence integral length, skewness, and kurtosis) of the daily instantaneous maximum wind velocity. In the processes of analysis, used observations data obtained at Korea Meteorological Adminstration (KMA). The estimation of non-Gaussian load effects for design applications has often been treated tacitly by invoking a conventional wind design load on the basis of Gaussian processes. This assumption breaks down when the instantaneous wind velocity processes exhibits non-Gaussianity. From the analysis results, the probability distribution of the daily instantaneous maximum wind velocity shows a very closed with non-Gaussian in the ensemble population 748, the correlation coefficient shows larger at inland area more than coastal area.

One-round Protocols for Two-Party Authenticated Key Exchange (1-라운드 양자간 키 교환 프로토콜)

  • Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.1_2
    • /
    • pp.110-118
    • /
    • 2006
  • Cryptographic protocol design in a two-party setting has of tel ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channel). In particular, most protocols for two-party key exchange have been designed assuming that parties alternate sending their messages (i.e., assuming a bidirectional half-duplex channel). However, by taking advantage of the communication characteristics of the network it may be possible to design protocols with improved latency. This is the focus of the present work. We present three provably-secure protocols for two-party authenticated key exchange (AKE) which require only a single round. Our first, most efficient protocol provides key independence but not forward secrecy. Our second scheme additionally provides forward secrecy but requires some additional computation. Security of these two protocols is analyzed in the random oracle model. Our final protocol provides the same strong security guarantees as our second protocol, but is proven secure in the standard model. This scheme is only slightly less efficient (from a computational perspective) than the previous ones. Our work provides the first provably- secure one-round protocols for two-party AKE which achieve forward secrecy.

Design and Implementation of Multimedia CAI Program for Learning about Electricity in the Mechanics Curriculum (기술과 전기 학습을 위한 멀티미디어 CAI 프로그램 설계 및 구현)

  • Lee, Hyae-Joung;Shin, Hyun-Cheul;Joung, Suck-Tae
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.9-16
    • /
    • 2007
  • In today's society, the paradigm is converted to information where both this and knowledge become the source of value added. In order to answer societies' needs school education is subject to a large change, that is 'from supplier-centered learners to demand-centered learners'. This study is the design and implementation of multimedia CAI program for learning about electricity in the meddle school the mechanics curriculum with a focus in generating electricity. Based on multimedia, software, educational utilization of the multimedia, CAI, learning theory and form, both technology and multimedia elements related to curriculum are analyzed. This title is composed of object, contents, evaluation and related sites every chapter for students to study. Also, it is designed for students to take interest and participate in the learning process actively by combining lots of media such as characters, sound, images and animation. Specially it is composed in a way of repetition according to the student's level.

  • PDF

A Study on the Improvement of the Military Studies Curriculum at the Civilian Universities (일반대학 군사학 교육과정 개선에 관한 연구)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.121-131
    • /
    • 2013
  • It has been almost 10 years since the department of military studies was opened at the civilian universities. One of the important elements for the success of these new departments would be the curriculum. This paper tries to give an realistic answer to the question of curriculum. The factors influencing the design of curriculum of military studies are analyzed, such as the curricular of the military institutes that confer the B.S. in military studies, the domain of military studies and research areas, documentation classification of military studies and military engineering, scientific knowledge versus vocational capabilities in university education, relations between the B.S. courses and the master or doctorate courses, requirements asked by the Army, and moral education needed for the military officers. As a result of the analysis, the mandatory core courses should be total of 19, including 5 general courses and 14 major courses.

Slope stability method establish and carry out in vertical slope for tunnel excavation (터널의 굴착을 위한 수직사면의 안정대책 방안 수립 및 시행)

  • Park, Chal-Sook;Kim, Jun-Yong;Kwan, Han;Kim, Min-Jo;Choi, Yu-Kyung
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2008.10a
    • /
    • pp.992-1006
    • /
    • 2008
  • The tunnel type spillways is under construction to increasing water reservoir capacity in Dae-am dam. Cutting-slope adjacent to outlet of spillways had been originally designed to be 63 degrees and about 65m in height. Examination is carried out in preceding construction that it is caused to some problems possibility which of machine for slope cutting couldn't approach to the site, blasting for cutting slope might have negative influence on highway and roads nearby, and fine view along the Tae-hwa river would be eliminated. In order to establish stability of tunnel and more friendly natural environment that we are carry out detailed geological surface survey and analysis of slope stability. So, we are design and construct for tunnel excavation with possible method that it is keep up natural slope. The result of survey and analysis that natural slope was divided 3 zone(A, B, C zone). In A and B zone, in first removed floating rock, high tensile tension net is install that it prevent of release and falling of rock, in order to security during under working. In addition to, pre-stressed rock anchor is install purpose of security during tunnel excavation because of fault zone near vertical developed above excavation level. Zone C is relatively good condition of ground, design is only carry out random rock bolt. All zone are designed and constructed drainage hole for groundwater and surface water is easily drain. Desinged slpoe is harmony with near natural environment. Successfully, construction is completed.

  • PDF

Vector Data Hashing Using Line Curve Curvature (라인 곡선 곡률 기반의 벡터 데이터 해싱)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2C
    • /
    • pp.65-77
    • /
    • 2011
  • With the rapid expansion of application fields of vector data model such as CAD design drawing and GIS digital map, the security technique for vector data model has been issued. This paper presents the vector data hashing for the authentication and copy protection of vector data model. The proposed hashing groups polylines in main layers of a vector data model and generates the group coefficients by the line curve curvatures of the first and second type of all poly lines. Then we calculate the feature coefficients by projecting the group coefficients onto the random pattern and generate finally the binary hash from the binarization of the feature coefficients. From experimental results using a number of CAD drawings and GIS digital maps, we verified that the proposed hashing has the robustness against various attacks and the uniqueness and security by the random key.