• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.031 seconds

Web Application Security using Distributed Encipherment (분산 암호화를 이용한 웹 어플리케이션 보안)

  • Heo, Jin-Kyoung
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.10-16
    • /
    • 2008
  • Quantity of encrypted data that transmitted through the network are increasing by development of encipherment technology. We have many problems; it is caused by technical development and service increase of user requests. It is necessary that create a many encryption key in one web application system. As a result, service quality comes to be low because of increased network traffic and system overload. There must be a system. That should be improved in secure service quality to process data. This paper describes a new approach for design and implementation of distributed encryption key processing for web application system. In this paper, it is based on distributed encipherment key, for the purpose of confidentially, integrity and authentication. It can prevent system degradation from server's data bottleneck and can improve service quality. For distributed encipherment system, we use java object activation technology. It can service while some distributed server are fail.

A risk management methodology for maritime logistics and supply chain applications

  • Mokhtari, Kambiz;Ren, Jun
    • Ocean Systems Engineering
    • /
    • v.4 no.2
    • /
    • pp.137-150
    • /
    • 2014
  • In the marine industry although there has been significant growth towards safety, security and risk assessments or risk-based strategies such as marine insurance and regulations to avoid the risks of damage to properties and the environment or the prospect of premature death caused by accidents etc, the moves toward managing the risks which are linked directly to the business functions and decision making processes have been very slow. Furthermore in the marine industry most perceptions, methodologies and frameworks of dealing with hazards, risks, safety and security issues are for their assessment rather than their management. This trend reveals the fact that in different marine industry sectors such as logistics and shipping there is a lack of coherent risk management framework or methodology from which to understand the risk-based decisions especially for the purpose of design, construction, operation, management and even decommissioning of the marine related applications. On the other hand risk management is not yet viewed holistically in the marine industry in order to, for example, assign a right person, i.e. risk manager, who can act as a coordinator and advisor with responsibilities that are only specific to risk management. As a result this paper, by examining the present physical borders and risk-based activities in the marine industry, aims to propose an appropriate risk management methodology in addition to the emergent role of risk managers which will enable the industry users initially to become familiar with the concept of risk management at its holistic level. In the later stages this eventually can lead to development of risk management capabilities at an exclusive level and its integration into the marine industry functions in future.

Seismic performance of precast joint in assembled monolithic station: effect of assembled seam shape and position

  • Liu, Hongtao;Du, Xiuli
    • Earthquakes and Structures
    • /
    • v.17 no.6
    • /
    • pp.611-621
    • /
    • 2019
  • Precast concrete structure has many advantages, but the assembled seam will affect potentially the overall seismic performance of structure. Based on the sidewall joint located in the bottom of assembled monolithic subway station, the main objectives of this study are, on one hand to present an experimental campaign on the seismic behavior of precast sidewall joint (PWJ) and cast-in-place sidewall joint (CWJ) subjected to low-cycle repeated loading, and on the other hand to explore the effect of shape and position of assembled seam on load carrying capacity and crack width of precast sidewall joint. Two full-scale specimens were designed and tested. The important index of failure pattern, loading carrying capacity, deformation performance and crack width were evaluated and compared. Based on the test results, a series of different height and variably-shape of assembled seam of precast sidewall joint were considered. The test and numerical investigations indicate that, (1) the carrying capacity and deformation capacity of precast sidewall and cast-in-place sidewall were very similar, but the crack failure pattern, bending deformation and shearing deformation in the plastic hinge zone were different obviously; (2) the influence of the assembled seam should be considered when precast underground structures located in the aquifer water-bearing stratum; (3) the optimal assembled seam shape and position can be suggested for the design of precast underground concrete structures according to the analysis results.

A Design of Lightweight RFID Authentication Protocol Errors Correction Using Re-Counter (재카운터를 이용해 오류를 수정하는 경량화 RFID 인증 프로토콜 설계)

  • OH, Gi-Oug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.149-157
    • /
    • 2011
  • Passive tags are inferior to active tags in processing efficiency, so they have difficulty in largevolume processing. The proposed protocol reduces the volume of computation in passive tags and, at the same time, improves authentication for enhanced safety and security. That is, different from existing RFID protocols that return the same value even if an error happens when the reader reads a tag, the improved RFID security protocol returns a new value using a re-counter and processes the computation part of a tag in the reader or in a back.end system. Even if the information of a tag is acquired by an malicious way, it is not actual information but encrypted information that is not usable. In addition, even if tag information is read in sequence, it is changed in each read, so the protocol is safe from Location Tracking.

Mutual Authentication Protocol based on the Random Divided Session for the Security of Medical Information in Home-Health (홈헬스 환경에서 생체정보전송의 안전성을 고려한 랜덤유효세션기반의 상호인증 프로토콜)

  • Lim, Heon-Cheol;Park, Tae-Hyun;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.10
    • /
    • pp.79-88
    • /
    • 2012
  • In this paper, we design a mutual authentication protocol which divided sessions from an authenticated session are updated periodically. And in order to minimize the traffic overhead for session authentication, we also introduce dynamic session management according to sampling rate of medical sensor type. And randomize the divided session time. This model has the effect of blocking the integrity and confidentiality intrusion of rogue gateway. Moreover, efficiency is provided through medical data to be transmitted have different sampling rate. In order to evaluate this model, it was embodied and experimented in TinyOS 2.1 environment. The result, we got an overall validity from three types of experiment.

A Study on Filter Performance of Materials in Embankment Slope during Heavy Rain (강우시 성토사면 재료의 필터조건검토에 대한 연구)

  • Kim, Sang-Hwan;Mha, Ho-Seong
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.4
    • /
    • pp.65-71
    • /
    • 2008
  • This paper presents the characteristics of internal erosion of embankment slopes due to the localized heavy rain. In this study, the existing analysis methods of filter performance in embankment materials were reviewed. Based on the theoretical concept of filter conditions to prevent particles from being carried in from the adjacent embankment materials, new analysis method was suggested. According to the new analysis method for filter performance, experimental programs were carried out to investigate the filter performance for controlling and sealing any leak which develops through the embankment materials as a result of internal erosion. Three sets of small scale laboratory tests were carried out with changing the main influence factors such as rainfall intensity, gradient of slope, embankment material condition. It was found that the new analysis method for filter performance to prevent particles from being carried in from the adjacent embankment materials was more capable approach to design the filter materials in embankment slopes. The new criterion or method for satisfactory filter performance, therefore, was recommended.

  • PDF

Estimate of the Fluctuating Pressure Distribution of Tall Building under Hazard Fluctuating Wind Load (재난변동풍하중을 받는 고층건물의 변동풍압분포의 평가)

  • Hwang, Jin Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.2
    • /
    • pp.49-56
    • /
    • 2013
  • In this paper, used by the boundary layer wind tunnel test, have conducted a series of wind tunnel experiments, i.e. test the mean velocity profile regarding the surface roughness, turbulence intensity and power spectrum measured by augmentation device. After that, to provide data relevant for the preliminary design step of tall building hazard fluctuating wind loads may be obtained fluctuating pressure coefficients, fluctuating pressure spectrum, autocorrelation coefficients by the boundary layer wind tunnel test. From the results of experiments, this study can be obtained conclusions as follows. 1. We know the fact that the mean velocity profile and the turbulence intensity are well fitted natural wind flow in the boundary layer wind tunnel. 2. The satisfactory agreement of velocity spectrum can be obtained from the compare of fluctuating power spectrum and Von Karman spectrum. 3. We know the fact that the fluctuating pressure spectrums distributed peak at 0.01 Hz-0.1 Hz in the windward surfaces and at 0.1 Hz in the leeward surfaces. 4. We know the fact that the autocorrelation coefficients distributed stationary random processes with application time of hazard fluctuating wind loads.

Design and Implementation of the Performance Driven UI-Mashup Architecture (성능 주도의 UI-Mashup 아키텍처의 설계 및 구현)

  • Cho, Dong-Il
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.45-53
    • /
    • 2014
  • UI-Mashup is widely used as a service method to add value, which is composed of distributed various contents on the internet and has turned out to be one of the latest trends in web application program development. Previous UI-Mashup-related studies have focused primarily on the dynamic service composition and have not been able to adapt to a rapidly changing Web Standard, thusthe end users conclude that UI-Mashups are slow, incompatible and poor security services. In this study, We propose an architecture for the performance improvements of UI-Mashup.In order to provide fast services and security enhancements, the proposed architecture collects UI fragments on the server in parallel, and sends layouts and contents of Mashups UI to the client through a special delivery channel supporting fast reaction and response time. In this study, the implementation and performance tests were proceeded to verify the proposed architecture experimentally. As a result of the performance testing, the proposed architecture has two to three times faster response time and more than four times throughput compared to the previous UI-Mashup technology.

Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks (DDoS 공격 대응을 위한 Sinkhole 역추적 프로토콜 설계 및 구현)

  • Lee, Hyung-Woo;Kim, Tae-Su
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.85-98
    • /
    • 2010
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhancing its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. Therefore, advanced traceback and network management mechanism also should be necessary on All-IP network environments against DDoS attacks. In this study, we studied and proposed a new IP traceback mechanism on All-IP network environments based on existing SPIE and Sinkhole routing model when diverse DDoS attacks would be happen. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Proposed mechanism uses simplified and optimized memory for storing and memorizing the packet's hash value on bloom filter, with which we can find and determine the attacker's real location on open network. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the traceback performance also can be enhanced compared with previously suggested mechanism.

Design and Performance Analysis of u-TSMVPN for Intelligent Transportation Systems (지능형 교통시스템을 위한 u-TSMVPN의 설계와 성능분석)

  • Jeon, Hae-Nam;Jeong, Jongpil
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.32-45
    • /
    • 2013
  • Globally, intelligent vehicles and telematics research and development through the integration of IT technology in the vehicle are significant increasing. Real-time data communication for intelligent transportation system (ITS) is very important. It collects real-time data from the vehicle and provides the information collected from ITS center. We propose an effective and secure communication scheme for these communication procedures. In particular, our proposed SIP-based MVPN reduces signaling cost and has many advantages in security aspects. In addition, our proposed scheme performs the mobility management applying NEMO (Network Mobility) for the communication between the vehicles. In other words, we propose an ITS communication mechanism of SIP-based mobile VPN and V2V NEMO. Finally, our performance analysis show that the ITS of SIP-based MVPN is significantly reducing the handoff signaling cost.