• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.05 seconds

The Design and Implementation of a Security System of User Information using SAM (SMA를 이용한 사용자 정보의 암호화 시스템 설계 및 구현)

  • Seo, Bok-Jin;Jeong, Hwa-Young
    • Annual Conference of KIPS
    • /
    • 2003.05c
    • /
    • pp.2217-2220
    • /
    • 2003
  • 정보의 편리성 및 효용성에 따라 점차적으로 생활의 일부가 되었으며, 이에 따라 타인의 정보에 접근하여 악용하는 피해사례가 늘고 있다 따라서, 인증되지 않은 외부 침입자로부터 시스템의 정보보호를 위한 많은 노력과 연구가 병행되어왔다. 즉, 침입탐지 시스템 및 암호화, 복호화 알고리즘을 적용하여 소프트웨어 측면에서의 보안기법과 방호벽 통의 하트웨어적인 보안기술이 도입 및 실용화 되고있는 것이다. 그러나, 이를 적용하기 위해서는 많은 전문전인 지식과 기술이 필요하여 일반적으로 쉽게 적용하기 어렵다. 따라서, 본 논문은 간단히 사용자의 정보를 변형함으로서 사용자정보를 갖는 데이터베이스가 노출되어도 이를 보호할 수 있도록 하였다. 즉, 정보 보호 방안으로 내부적 안전을 위한 프로그램적 기법으로 데이터를 저장할 때 중요한 자료들 데이터베이스 혹은 Mapping Array에 보관된 임의의 암호화 코트를 이용하여 암호화하여 서장하고 필요할 때 복호화 하는 시스템 내부적인 보안 방법을 제시하고자 한다.

  • PDF

Combination-mode BLE Device Profile for Connection & Non-connection Methods

  • Jiang, Guangqiu;Joe, Inwhee
    • Annual Conference of KIPS
    • /
    • 2016.04a
    • /
    • pp.897-899
    • /
    • 2016
  • In recent years, BLE technology has received extensive attention and has been applied to all aspects of life. The existing BLE device has two methods, one is the connection method, and the other is a non-connection method. The representative profile of the connection method is the proximity file. The most typical example of Non-connection method BLE device is a beacon. However, they are both independent and have their own shortcomings. Connection method device can provide service for only one user, others can't use. Security performance of Non-connection method BLE device is poor and the device can't be controlled by the user. In this paper, a combination-mode BLE device profile design scheme is presented, which combines with the previous two methods, and solves the defaults. And We define a dual purpose advertising package that can be used in a normal environment as well as in a disaster environment. Finally, a unidirectional Control idea is proposed. Through performance evaluation, we found that the device has strong stability and low power consumption.

Security Log collection and analysis System Design Using Big Data System (빅 데이터 시스템을 이용한 보안 로그 수집 및 분석 시스템 설계)

  • Kim, Du-Hoe;Shin, Dong-Kyoo;Shin, Dong-Il
    • Annual Conference of KIPS
    • /
    • 2016.04a
    • /
    • pp.321-323
    • /
    • 2016
  • 최근 SNS, 클라우드 서비스, IoT 등 신기술이 발전함에 따라서 개인 정보 보호와 보안에 관심이 대두 되었다. 때문에 기업들은 고객 정보 보호를 위한 보안 솔루션 구축이 필수불가결해졌다. 이러한 기업의 니즈를 충족시키기 위해 ESM이라는 보안 관리 시스템이 등장하고 최근에는 SIEM으로 넘어가고 있는 추세이다. SIEM은 관리자가 로그들을 모니터링 하는 방식으로 많은 양의 로그가 발생하거나 축적된 로그들을 분석하는 것은 한계가 있다. 따라서 본 논문에서는 빅 데이터 시스템을 이용하여 로그들을 축적하고 머하웃을 이용하여 축적된 로그들을 분석하는 자동화 시스템을 제안한다.

Developing Relationship between Tax Structure, Pension Funds and Economic Growth in OECD Nations

  • Singh, Tarika;Mehta, Seema;Tomar, Yogesh;Srivastava, Brajesh
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.1 no.2
    • /
    • pp.22-29
    • /
    • 2013
  • Purpose: The present study combines both tax structures and pension funds as the factors of economic importance and explores the impact of both (pension funds and tax rates) on the economic growth in context of OECD nations. Research Design, Data and Methodology: Last forty years data on these variables is taken for study purpose. A Sample size of thirty four nations which form the part of OECD nations was taken for study purpose. Results: Regression analysis (linear) was used to find out relationship between tax structure, Pension funds and economic growth. Conclusion: The results are important for nations increasing their expenditure for social contribution.

Design of a High Performance Exponentiation VLSI in Galois Field through Effective Use of Systems Constants (시스템 상수의 효과적인 사용을 통한 Galois 필드에서의 고성능 지수제곱 연산 VLSI 설계)

  • Han, Young-Mo
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.47 no.1
    • /
    • pp.42-46
    • /
    • 2010
  • Encapsulation for information security is often carried out in Galois field in the form of arithmetic operations. This paper proposes how to efficiently perform exponentiation of arithmetic information on Galois field. Especially, by improving an existing bit-parallel exponentiator to exclude elements with heavy gate counts and to take advantage of system constants, this paper proposes how to implement a VLSI architecture with high performance even for large m.

A Design of WBAN Data Integration System for the HL7-based patient management

  • Hwang, Chigon;Shin, Hyoyoung;Lee, Jongyong;Jung, Kyedong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.66-69
    • /
    • 2015
  • Recently with the development of IT technology, the medical technology have been developed in various ways. Among them, WBAN can check the state of the patient in real time. However, the data generated by these techniques have a problem that they have heterogeneous properties depending on the type of sensors and devices. In this paper, we proposed a method using meta repository as a way to provide the sensing data of WBAN for the health care system by integrating along the HL7 standard item.

A Design of Broker Platform for a services interoperability on the collaboration cloud

  • Jung, Kyedong;Hwang, Chigon;Shin, Hyoyoung;Lee, Jongyong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.70-74
    • /
    • 2015
  • The cloud computing are provided various ways for accessing resources and services through collaboration. In this paper, we present a cloud computing model for collaboration in cloud environment. By introducing a model, it is possible to introduce and develop an application required for the database and business services. SaaS model can be applied overall or partially. In particular, business operations need various software. Since cost reduction and applying immediate service are available, it is possible to realize the business environment and high quality service.

One-Wire In-Vehicle Controller Design by DC-PLC Scheme (DC-PLC 방식의 차량용 One-Wire 컨트롤러 설계)

  • Lee, Geum-Boon;Kim, Nam-Gon;Lee, Ji-Min
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.13-14
    • /
    • 2016
  • 본 논문은 차량 컨트롤러 메인보드 개발에 있어 DC-PLC 방식으로 One-wire만으로 전원 공급 및 접지로 사용하도록 하여 센서 데이터 처리 및 구동 장치를 작동시키는 방법을 제안한다. 복잡한 배선을 피하기 위해 별도의 통신선을 설치하지 않고 기존 배선(wire)를 이용하며, 센서로부터 수집된 데이터를 처리하여 구동 장치를 작동시키는 명령을 전달하도록 설계한다. 본 논문은 제어장치에 들어가는 배선을 간단히 하고 차량 내부 상태를 점검하고 제어하는 기술을 설계하고 구현코자 한다.

  • PDF

Secure Coding Guide of Design Step-Verification and Expression of Input Data (설계 단계의 보안 코딩 지침-입력 데이터 검증 및 표현)

  • Shin, SSeong-Yoon;Lee, Hyun-Chang;Ahn, Woo-Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.105-106
    • /
    • 2016
  • 본 논문에서는 S/W 개발 보안 지침에서 설계 단계의 보안 코딩 지침을 알려준다. 크로스 사이트 스크립트 공격 취약점(XSS)에서부터 자원 삽입 까지 S/W 보안 취약점의 주요 내용을 입력 데이터의 검증 및 표현에 맞추어 지침을 전달하도록 한다.

  • PDF

Study on Developing a Monitoring System for Safe Fire Testing (안전한 탄 발사시험을 위한 모니터링 시스템 개발에 관한 연구)

  • Ki Jae Sug
    • Journal of the Korea Safety Management & Science
    • /
    • v.7 no.2
    • /
    • pp.65-72
    • /
    • 2005
  • On this research, we show some concrete examples as software design, 2D/3D display, graph display, and gage display to develop a data monitoring system for real time safe fire testing. Developed software which is simulation software for live fire testing, has been designed to display informations about whole test status in a live fire testing, and with this, user can control a live fire testing under the safe environment. Beside, we increase a security by using a authority of user to access on this software. and we develop it based on module designed to apply a requirement of user later on.