• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.03 seconds

Development of Framework for Trusted Financial Service in N-Screen Environment (N-스크린 환경 내 신뢰할 수 있는 금융프레임워크 개발)

  • Kim, Kyong-Jin;Seo, Dong-Su;Hong, Seng-Phil
    • Journal of Internet Computing and Services
    • /
    • v.13 no.3
    • /
    • pp.127-137
    • /
    • 2012
  • With the spread of the new technologies like a smart phone, a smart pad, N-Screen service for financial transaction quickly became commonplace through the Internet. Although it has been developed related technologies and policies since the N-Screen has been provided in Korea, infrastructure for financial services is still lacking. It also has many potential problems including phishing or malware attacks, privacy information exposure & breaches, etc. This work suggests the financial security framework in the side of information protection through threat vulnerability analysis. Further, we examine the possibility of effective application methods based on political technical design.

Efficient Authorization Method for XML Document Security (XML 문서 보안을 위한 효율적인 권한부여 방법)

  • Jo, Sun-Moon;Chung, Kyung-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.113-120
    • /
    • 2009
  • XML can supply the standard data type in information exchange format on a lot of data generated in running database or applied programs for a company by using the advantage that it can describe meaningful information directly. Therefore, as it becomes more and more necessary to manage and protect massive XML data in an efficient way, the development of safe XML access control techniques needs a new method. In this study access authorization policies are defined to design access control systems. The findings demonstrated that algorithm suggested in this study improved system performance which was low due to the complex authorization evaluation process in the existing access control techniques. It is consequently proved that the safe XML access control policy presented in this study is in an improved form as compared with the existing access control methods.

A Study on the Effective WTLS Processor Design adapted in RFID/USN Environment (RFID/USN 환경에 적합한 효율적인 WTLS 프로세서 설계에 관한 연구)

  • Lee, Seon-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2754-2759
    • /
    • 2011
  • With information communications and RFID/USN environments merged wire/wireless networks are generalized. In this viewpoint, WAP is used by communication protocol for the data communication in the field of wireless environment. WTLS developed for the secure communications optimize TLS adapted wireless environment in the TCP/IP internet protocol. But WTLS denote WAP security problem, end-to-end problem, and power consumption, etc. Therefore in this paper we proposed WTLS cryptographic algorithm eliminated WTLS disadvantages. Proposed algorithm solved power consumption, calculated complexity, and security problems because it is not unique but hybrid form.

Design and Implementation of CVM on Real-Time Operating System, UbiFOSTM (실시간 운영체제 UbiFOSTM에서의 CVM 설계 및 구현)

  • Choi, chan-woo;Lee, cheol-hoon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.812-816
    • /
    • 2007
  • Having been speedy development of the IT industry, devices such as set-top box and smart phone are used in the broad filed. Because Java has merits that are platform independency, security and mobility, that is important software platform to offer stable services in the small device. This needs JVM(Java Virtual Machine) to execute Java application in the small device. CVM(Classic Virtual Machine) which is the kind of JVM is designed for embedded device to have limited resources. In this paper, CVM which is defined by CDC has designed and implemented on the Real-Time Operating System, UbiFOS$^{TM}$.

  • PDF

Multi-Mediation Effects of Personal Self-Congruity and Social Self-Congruity to Perceived Value and Brand Attitude on Chinese Airlines Customers

  • WU, Xuan-Wen;KIM, Moon-Hong
    • Journal of Distribution Science
    • /
    • v.18 no.1
    • /
    • pp.35-45
    • /
    • 2020
  • Purpose- This study examines the multi-mediation effect of personal self-congruity and social self-congruity to perceived value and brand attitude on aircraft customers in China. Research design, data and methodology- Survey was conducted on Chinese citizens who had flown via Chinese airlines and lived mainly in the Yangtze River delta. 727 cases were analyzed. SPSS 22.0 and AMOS 24.0 were used to analyze the data. Results - First, perceived economic value has a positive impact on personal self-congruity and social self-congruity but has no effect on brand attitude. Second, perceived functional value has a positive impact on personal self-congruity, social self-congruity, and brand attitude. Third, based on this, perceived economic value is not directly related to brand attitude. However, there is a relationship between perceived functional value and brand attitude, with personal self-congruity and social self-congruity having mediation effects. Conclusions - The Results show that perceived economic and functional value such as competitive airfare, mileage membership, check-in processes, diversified vouchers and coupons, and also basic services such as flight security and flight attendant service having an effect on personal self-congruity. To improve consumer brand attitude, airlines should take into consideration personal self-congruity factors such as their values and lifestyles, and their social self-congruity factors such as their social status and social security.

Strategies for Stimulating Customer Relationship: A Study of Some Public and Private Sector Banks

  • Kiran, Ravi;Sharma, Ridhima
    • Journal of Distribution Science
    • /
    • v.11 no.3
    • /
    • pp.31-37
    • /
    • 2013
  • Purpose - The present research has been undertaken to examine the Customer Relationship Management (CRM) strategies adopted by public and private sector banks in India. The initial part of research helps to identify the factors of overall satisfaction of customers. The study also tries to identify the key determinants of CRM of Indian banking. Research design, data, methodology - The present research uses a self-structured questionnaire having a reliability score of 0.817 to elicit responses from customers in New Delhi and surrounding areas in India to examine the CRM used by public and private sector banks for enhancing customer satisfaction. The scale had 32 questions covering customer perceptions related to overall satisfaction and factors contributing to CRM. Results - The results highlight that overall satisfaction comprises of two factors namely personalised Services; and reliability and dependability. The determinants of CRM as identified through survey are: Speed, safety and security; Employee CRM; on time services; customer targeting; and friendly and helpful staff. The results also highlight that safety and security was preferred to other factors by the respondents. Conclusions - The findings of this study show that in terms of performance private sector banks fared better in providing CRM services than public sector banks.

  • PDF

Effects of Website Characteristics and Delivery Service Quality on Repurchase Intention

  • Dai, Wenqian;Lee, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.5
    • /
    • pp.17-24
    • /
    • 2018
  • Purpose - Through the analysis of the characteristics of overseas direct purchase websites and the relevant empirical analysis of the quality of service delivery, the activated theory/strategy and significance of the overseas direct purchase are sorted out. Research design, data, and methodology - In the process, to make more effective analysis, several analysis tools and analysis programmes are used, IBM SPSS Statistics 23.0 and IBM SPSS AMOS 23.0. Results - Among the characteristics of the overseas direct purchase website, the security, convenience and information provided by the overseas direct purchase have already had a positive impact on the satisfaction. The quality of the delivery service is composed of four factors: rapidity, reliability, intimacy and correctness. The research results indicate that the satisfaction level has a positive impact on the re-purchase intention. Conclusions - The significance of this study has the characteristics of overseas direct purchase sites which have confirmed that security convenience and intelligence availability have a positive impact on satisfaction and re-purchase intent. It is important to have a safe and reliable access to shopping sites on overseas direct purchase sites. In the characteristics of overseas direct purchase sites, the interaction have no positive effect on satisfaction and re-purchase intention.

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.

Design of a Mobile DAA Model through Java Test Module for the DAA Protocol (DAA 자바 실험모듈 구현을 통한 모바일 DAA 모델 설계)

  • Yang, Seok-Hwan;Lee, Ki-Yeal;Chung, Mok-Dong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.8
    • /
    • pp.773-777
    • /
    • 2008
  • Today's mobile devices have characteristic of random mobility in the heterogeneous networks. Thus they should have various kinds of security requirements. To satisfy these requirements, there are many researches on security and authentication for mobile devices. TCG(Trusted Computing Group) designed TPM(Trusted Platform Module) for providing privacy and authentication to users. Also TCG suggest a protocol, called DAA(Direct Anonymous Attestation) which uses zero knowledge proof theory. In this paper, we will implement DAA protocol using Java and show the efficiency and the problems in the DAA protocol. Finally, we will suggest an efficient mobile DAA model through Java test module for the DAA protocol.

An Efficient Architecture for Modified Karatsuba-Ofman Algorithm (불필요한 연산이 없는 카라슈바 알고리즘과 하드웨어 구조)

  • Chang Nam-Su;Kim Chang-Han
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.3 s.345
    • /
    • pp.33-39
    • /
    • 2006
  • In this paper we propose the Modified Karatsuba-Ofman algorithm for polynomial multiplication to polynomials of arbitrary degree. Leone proposed optimal stop condition for iteration of Karatsuba-Ofman algorithm(KO). In this paper, we propose a Non-Redundant Karatsuba-Ofman algorithm (NRKOA) with removing redundancy operations, and design a parallel hardware architecture based on the proposed algorithm. Comparing with existing related Karatsuba architectures with the same time complexity, the proposed architecture reduces the area complexity. Furthermore, the space complexity of the proposed multiplier is reduced by 43% in the best case.