• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.028 seconds

Design and Implementation of a Web based Mail Agent System using Service Engine (서비스 엔진을 이용한 웹 기반 메일 에이전트 시스템의 설계 및 구현)

  • Im, Yang-Won;Gwon, Gi-Hun;Im, Han-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2S
    • /
    • pp.608-620
    • /
    • 2000
  • A web based E-mail system consists of serves which supply mail accounts and service, and clients which take part of interfacing with users. The web browsers such as Netscape Navigator and Internet Explorer are the popular clients. Users who cannot afford to get an E-mail id in general mail servers are, therefore, able to reach a e-mailing service in the web environment by using client programs in connection with a mail server. Although the quality of service has been upgraded a lot in recent days, it doesn't provide with satisfactory services anymore. In this paper, we intend to design a mail agent system based on the web environment. Through this system we could reach a convenient user interface based on Internet Explorer and could easily access administratory environment on the basis of NT Server 4.0. Using the service engine dominent in mail agent system, it could provide with convenient user interfacing tools like responding the absence of users, mail filtering and refusing messages, etc. And it would ultimately make possible a constant system security, by preventing system failure phenomena caused by extraordinary uses beyond its capability.

  • PDF

Design and Implementation of Scenario-based Attack Simulator using NS (NS를 이용한 시나리오기반 공격 시뮬레이터 설계 및 구현)

  • Choi, Hyang-Chang;Noh Bong-Nam;Lee Hyung-Hyo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.59-69
    • /
    • 2006
  • Generally, network attacks are based on a scenario composed of a series of single-attacks, scenario attacks are launched over a wide network environment and their targets are not apparent. it is required to analyze entire packets captured on the network. This method makes it difficult to detect accurate patterns of attacks because it unnecessarily analyzes even packets unrelated to attacks. In this paper, we design and implement a simulation system for attacks scenario, which helps packet classification connected with attacks. The proposed system constitutes a target network for analysis in a virtual simulation environment, and it simulates dumping TCPDUMP packets including scenario attacks under the constructed virtual environment, We believe that our proposed simulation system will be a useful tool when security administrators perform the analysis of patterns of attack scenarios.

  • PDF

Obstacles to Accessing Finance by Small Business Operators in the Buffalo City Metropolitan Municipality

  • Chimucheka, Tendai
    • Asian Journal of Business Environment
    • /
    • v.3 no.2
    • /
    • pp.23-29
    • /
    • 2013
  • Purpose - The study investigates the obstacles faced by small business owners (SBOs) in accessing finance in the Buffalo City Metropolitan Municipality. The study aims to identify the causes of inaccessibility to finance for SBOs, investigate the role of government agencies in supporting SBOs, assess the extent to which banks support SMMEs, and suggest solutions to ease the challenge of inaccessibility of finance. Research design, data, methodology -We used a triangulation research design, wherein SMME owners and managers in the Buffalo City Metropolitan Municipality were the target population. We used simple random sampling techniques to select respondents, and conducted in-depth interviews to collect qualitative data. Results - We analyzed quantitative data using descriptive statistics, Chi-square tests, and factor analysis. The qualitative data was analyzed using content analysis. The study identifies and discusses the obstacles in accessing finance; the main among which are the lack of collateral security, poor business plans, lack of knowledge, and lack of financial deposit. Conclusions -We urge the banks, government, and government agencies to support the SMME sector, for it remains the economic engine of many African countries and helps in reducing the impact of socio-economic challenges, like unemployment and poverty.

From wearing desires to the power of gazing hidden wearable technology algorithm (Based on system design) (웨어러블 기술 알고리즘에 숨겨진 입는 욕망에서부터 시선의 권력까지(시스템 설계 관점에서))

  • Kang, Jangmook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.205-210
    • /
    • 2018
  • This paper examines the wearable technology in two aspects. First, it is the desire that permeates the clothes that smart technology is embroidered. Second, it is a reflection on the gaze that looks at the user wearing clothes. This article is a study on clothes that will be newly appeared with wearable technology. But this is not just a technical issue. Rather, it is a system design that takes human instinct into clothes. Therefore, this study encompasses social scientific boundaries. This article does not refer to data collected from wearables as simple sensing based data. Rather, wearable technology reveals human life activities and emotions. This paper is an attempt to combine or combine humanities and technology.

Design of Low-area Encryption Circuit Based on AES-128 Suitable for Tiny Applications (소형 애플리케이션에 적합한 AES-128 기반 저면적 암호화 회로 설계)

  • Kim, Hojin;Kim, Soojin;Cho, Kyeongsoon
    • Journal of IKEEE
    • /
    • v.18 no.2
    • /
    • pp.198-205
    • /
    • 2014
  • As the development of information technology, the interests in tiny applications such as wearable devices, portable devices and RFID are increased and the importance of low-area encryption circuit is emphasized. This paper proposes a compact architecture of AES-based encryption circuit suitable for tiny applications. The circuit area is reduced by minimizing storage space and sharing computation resources. The synthesized gate-level circuit using 65nm standard cell library consists of 2,241 gates and two $8{\times}16$-bit SRAMs. It can process data at a rate of 50.57Mbits per second. Therefore, the proposed encryption circuit is suitable for various applications requiring very small encryption circuit.

A Study on Setting Direction of Managing the Building Facade on Street - With the Road on Border of Asian Culture Center in Gwangju - (가로변 건축물 파사드의 관리 방향 설정에 관한 연구 - 광주광역시 문화전당 경계부 가로를 중심으로 -)

  • Park, Sung-Jin;Kim, In-Ho
    • Journal of the Korean housing association
    • /
    • v.22 no.2
    • /
    • pp.131-139
    • /
    • 2011
  • This study is to examine architectural designers' views on the correlations between components and contextual principle of the roadside building facade with the roadside building facade on the border of Asian Culture Center in Gwangju which is expected to undergo a great change by public policies. For setting direction of the roadside building management at the region examined, height of facade, advertisement/signboard, security of continuity through surface pattern management, nodes building, array of height by story, awning/arcade and locality of advertisement/signboard should be induced to design with locality and consideration of local characteristics with silhouette, window and external colors is needed for discrimination from other cities. Regarding the realization method important thing was found that the planning and implementation of architectural design guidelines, architectural aesthetics of the pre-hearing enhancement, active citizen participation, and then additional landscape screening system, incentive schemes, landscape designation of landscape zone was found to be a major realization system.

The design of User authentication system by using Public key cryptography system and one time password (공개키 암호화 시스템과 일회성 패스워드를 이용한 사용자 인증 시스템 설계)

  • 이상준;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.498-501
    • /
    • 2002
  • In the process of Log-In to the system, clear User authentication is the beginning of the information protection service. In the open communication system of today, it is true that a password as security instrument and the inner mechanism of the system and cryptography algorithm for the support of this are also poor. For this reason, this dissertation had a final aim to design the user authentication system, which offer the accuracy and safety. It used RSA and CBC mode of DES as cryptography algorithm and used the Challenge-Response scheme at a authentication protocol and designed the User authentication system to which user access using one time password, output of token to guarantee the safety of the authentication protocol. Alto by using the Public key cryptography algorithm, it could embody the more safe User authentication system.

  • PDF

A Design and Implementation of a Network-type Electronic Payment System Optimized for Digital Goods (디지털 상품 거래를 위한 네트워크형 전자결재 시스템 설계 및 구현)

  • Han Jae-Kyun;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1537-1545
    • /
    • 2004
  • As the Internet continues to transform the commerce, the method of payment is one of critical components to conduct successful business across the internet. An electronic cash has all characteristics of traditional commodity cash and ensures security for all transactions. Accordingly an internet billing system based electronic cash is expected as the secure and efficient payment method in future electronic commerce. Digital Contents such as digital goods and services have the special characteristic that both the delivery of the goods and the transfer of money ran be accomplished on the same network. This allows the optimizations in the design of an electronic commerce system. In this paper, we propose an electronic payment protocol which is especially designed to purchase digital contents through internet. The proposed protocol guarantees anonymity by using a virtual ID, and minimizes payment processing steps.

Design of The Cyber Shipping Exchange (사이버 해운거래소 구축 방안)

  • 최형림;박남규;김현수;박영재;황성원;박용성
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2002.03a
    • /
    • pp.39-51
    • /
    • 2002
  • Online exchange is a cost-effective approach to trade goods and information among multiple sellers and buyers. Shipping industry includes lots of global entities such as shippers, liners, ship owners and shipping agents. Marine insurance companies and ship repairers and many other groups are also supporting the industry. However, international shipping exchanges are located on few cities in the world. Its our motivation that a shipping market can be online so that market participants do the dealing while sitting where they are with more efficient manner, preferable price and larger pool of candidates of trading partners. This paper presents Korean governmental project of building a cyber shipping exchange. The exchange covers ship sale and purchase, charter, insurance, freight futures, repairs, supplying of ships oil and database service. The workflows of each business were analyzed and designed to fit for online environment. The project includes design of trading mechanism, online documents, data flow, data storage and security. Online match making and trading mechanisms such as auction, reverse auction, bid are used. The whole trading process involves multiple organizations and business processes. So, this Paper focuses on how each organization would play their roles so that users can complete transactions with integrated and transparent view. The online exchange selves also as maritime portal site that links to other sites for cooperation vertically or horizontally, and serves database and information in global perspective. This paper also issues and discusses the justification of an online shipping exchange

  • PDF

Optical and Thermal Influence Analysis of High-power LED by MCPCB temperature (MCPCB의 온도에 따른 고출력 LED의 광학적, 열적 영향력 분석)

  • Lee, Seung-Min;Yang, Jong-Kyung;Jo, Ju-Ung;Lee, Jong-Chan;Park, Dae-Hee
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.12
    • /
    • pp.2276-2280
    • /
    • 2008
  • In this paper, we present thermal dependancy of LED package element by changing temperature of MCPCB for design high efficiency LED lamp, and confirmed influence of LED chip against temperature with analysis of thermal resistance and thermal capacitance. As increasing temperature, WPOs were decreased from 25 to 22.5 [%] and optical power were also decreased. that is decreased reason of optical power that forward voltage was declined by decrease of energy bandgap. Therefore optical power by temperature of MCPCB should consider to design lamp for street light and security light. Moreover, compensation from declined optical efficiency is demanded when LED package is composed. Also, thermal resistances from chip to metal PCB were decreased from 12.18 to 10.8[$^{\circ}C/W$] by changing temperature. Among the thermal resistances, the thermal resistance form chip to die attachment was decreased from 2.87 to 2.5[$^{\circ}C/W$] and was decreased 0.72[$^{\circ}C/W$] in Heat Slug by chaning temperature. Therefore, because of thermal resistance gap in chip and heat slug, reliability and endurance of high power LED affect by increasing non-radiative recombination in chip from heat.