• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.043 seconds

A Design of Multimedia Content Management through Cloud Computing Paradigm (클라우드 컴퓨팅 파라다임을 통한 멀티미디어 컨텐츠 관리 설계)

  • Tolentino, Randy;Kim, Yong-Tae;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.343-349
    • /
    • 2012
  • Usage control models are the new breed of access control models that allow description of comprehensive policies for usage of protected content. In this paradigm, decisions regarding access to objects are not limited to request time only. It is coupled with the usage of the protected objects and becomes a continuous process carried out in parallel to the usage. The realization of usage control has been a long standing research problem to overcome the issue of loss of control in secure document dissemination. With the emergence of cloud computing, documents are stored in the cloud, the document viewers and editors themselves reside in the cloud and are accessed from thin clients such as browsers. We note that such scenarios provide an ideal opportunity for the realization of usage control for securing the usage of documents based on the stakeholders' policies. In this paper, we proposed Multimedia Content Management (MCM) for a better realization multimedia content in the cloud based applications. We designed a robust architecture to provide fine-grained control over usage of protected objects through the use of emerging cloud computing paradigm. We present the design principles for this realization and discuss our proposed architecture.

A Korean CAPTCHA Study: Defeating OCRs In a New CAPTCHA Context By Using Korean Syllables

  • Yang, Tae-Cheon;Ince, Ibrahim Furkan;Salman, Yucel Datu
    • International Journal of Contents
    • /
    • v.5 no.3
    • /
    • pp.50-56
    • /
    • 2009
  • Internet is being used for several activities by a great range of users. These activities include communication, e-commerce, education, and entertainment. Users are required to register regarding website in order to enroll web activities. However, registration can be done by automated hacking software. That software make false enrollments which occupy the resources of the website by reducing the performance and efficiency of servers, even stop the entire web service. It is crucial for the websites to have a system which has the capability of differing human users and computer programs in reading images of text. Completely Automated Public Turing Test to Tell Computers and Human Apart (CAPTCHA) is such a defense system against Optical Character Recognition (OCR) software. OCR can be defined as software which work for defeating CAPTCHA images and make countless number of registrations on the websites. This study proposes a new CAPTCHA context that is Korean CAPTCHA by means of the method which is splitting CAPTCHA images into several parts with random rotation values, and drawing random lines on a grid background by using Korean characters only. Lines are in the same color with the CAPTCHA text and they provide a distortion of image with grid background. Experimental results show that Korean CAPTCHA is a more secure and effective CAPTCHA type for Korean users rather than current CAPTCHA types due to the structure of Korean letters and the algorithm we are using: rotation and splitting. In this paper, the algorithm of our method is introduced in detail.

An Approach to Software Analysis and Design based on Distributed Components (분산 컴포넌트 기반의 소프트웨어 분석 및 설계 방법)

  • Choi, You-Hee;Yeom, Keun-Hyuk
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.12
    • /
    • pp.896-909
    • /
    • 2001
  • Recently, above 50 percentages of software are being developed based on distributed application platforms. And recent technologies such as EJB(Enterprise Java Beans)[1]COM(Component Object Model)[2] CORBA(Common Object Request Broker Architecture)[3] have been advanced for distributed component-based software development . Therefore a systematic development process is necessary to develop component based applications using distributed application platforms. However, most of component-base software development processes do not define concrete flows between tasks and relationships among artifacts of each task Also, distribution issues are not considered explicitly in most of component-based software development In this paper, we present an approach to analyze and design software based on distributed components. In this approach, we propose systematic guidelines for developing a software based on Unified process and the relationships among artifacts which are produced, Also we explicitly consider the distribution issues such as performance, fault tolerance, security, distributed transaction of CORBA environments.

  • PDF

A Study on the Architectural Planning of the Magnet Resonance Imaging Unit in General Hospital (종합병원 자기공명단층촬영유니트에 관한 건축계획적 연구)

  • Yun Woo-Yong;Chai Choul-Gyun
    • Korean Institute of Interior Design Journal
    • /
    • v.15 no.4 s.57
    • /
    • pp.89-96
    • /
    • 2006
  • Magnetic Resonance Imaging (MRI) scanner is the device to draw an image of conditions and the spread of various tissue in the body. It is used by making the patient into rounded superconductor and using high frequency which cause resonances. It uses superconduction magnet and high frequency that is non-ionizing radiation so can acquire biochemical, physical, and functional information of tissue. It is also very useful because it can scan tomography from many different angles to diagnose disease of a nervous system, the heart, and a skeletal structure. It also has advantages of that there is no risk of radiation exposure and the ability of observation on organizations such as brains, livers and the spinal cord of people. Since these features, the rate of use has been increased accordingly more considerations of the security are required when it plans. The weight of devices and the cover problem of the strong magnetic field which is occurred by magnetic resonance at the time of diagnosis can cause very important structure problems and architectural condition. That also the recent tendency which needs stronger equipment means that planning of the MRI unit should generally aim at purposing of the proximity for the device maintenance and up-grade and of further expansion. However there are not enough studies and data on the magnet resonance imaging in domestic hospitals. According to these reasons, this study has an object of indicating basic data on MRI unit plan standard and alternative proposals.

Structural Safety Assessment of Independent Spherical LNG Tank(1st Report) - Fatigue Strength Analysis Based on the S-N Approach - (독립구형 LNG 탱크의 구조안전성 평가(제1보) - 피로균열 발생수명 예측 -)

  • In-Sik Nho;Yong-Yun Nam;Ho-Sup Lee
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.30 no.2
    • /
    • pp.132-140
    • /
    • 1993
  • The design of LNG ship needs very high level structural design/analysis technology compared with conventional ship types because it requires perfect security against the extremly dangerous and cryogenic cargo. Hence, present paper describes the general procedure of the structural safety assessment for independent tank type LNG ship, which contains following items. 1) Long term prediction of the wave induced stresses including ship motion analysis, structural analysis of hull and tank and stochastic analysis process of ocean waves. 2) Fatigue strength analysis of a tank structure based on the S-N approach. 3) Structural safety assessment against the fatigue crack propagation based on the LBF(Leak Before Failure) concept. The first report focuced on the item (1) (2) and example calculation was performed on a prototype LNG ship. The remained part will be covered by the second report.

  • PDF

Design and Implementation of IEEE 802.11 Wireless LAN-based Identification and Location Tracking Techniques for Vehicle Information Terminals (IEEE 802.11 무선랜 기술 기반 차량용 정보 단말을 위한 식별과 위치 추적 기능의 설계와 구현)

  • Oh, Doo-Hwan;Yoon, Mi-Kyung;Han, Seung-Ho;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.107-118
    • /
    • 2009
  • In this paper, we present design and implementation for identification and location tracking techniques for vehicle information terminals in high-speed mobile environment using IEEE 802.11 wireless LAN technology. RSU be installed at a specific point. RSU recognizes it and then aware identification and location tracking for target vehicle when target vehicle that is equipped with information terminals pass near point. Issue of quick recognition using IEEE 802.11 access management frame, issue of weak wireless LAN security and tracking a range of restrictions be raised and we present solutions. Vehicle information terminal, RSU and a server-side GUI-based management program be implemented based on proposed solution. Implementation system be performed experiment at actual road environment and effectiveness be verified.

Design & Construction of Korean Type Smart Work Center on the basis of User-Oriented Smart Work System (사용자를 지향한 스마트워크 시스템 기반의 한국형 스마트워크 센터 설계 및 구축)

  • Koo, Gun-Seo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.1
    • /
    • pp.73-81
    • /
    • 2013
  • This research proposes design and construction of Korean type SWC based on user oriented smart work system. To achieve this proposal, the research suggested improvements of related law, changes to working environment, and strengthening information security for users, stronger Korean ICT based; the study investigated for an efficient and suitable Korean type SWC by analyzing Korean government plans and foreign developed countries' cases. The user-oriented smart work service platform suggested in this study aims to offer a solution to national crisis and establish infrastructure to knowledge-industry and creative-industry by collaborative smart work environment of 'Context Awareness' and 'Tangible User Interface'. As a result, smart work suggests methods to produce creative work by IT workers and efficient work environment for better standing in world competition. In conclusion, Korean SWC system is proved to be superior in satisfaction rate at 75.41%, 20.18% higher than average score shown in 5 categories in 5 countries from USA, Japan, and EU's which was 55.23%.

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

Implementation of an Expert System for COTS Fault Diagnosis (COTS 고장진단을 위한 전문가 시스템 구현)

  • Kim, A-Ram;Roh, Jin-Song;Rhee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.275-281
    • /
    • 2013
  • This space is for the of your study in English. If simple menu item changes or the addition of check items are necessary on GUI menu of existing test equipments for military facilities that are programmed by using RAD tools such as Visual C++, they should go through complex steps, such as numerous conducting steps, coding, flash design modification, recompiling and distribution. It is cumbersome process and waste much time. Also, on implementing them, it was worried about leaking secrets because a number of military security considerations were included. To solve such as the above problem, we proposed commercial RIA technologies and a COTS fault diagnostic knowledge-based system that implemented by the XML data design technique in this research. The proposed approach solves the problem of existing methods, reduced inspection time, and improved performance, usability, and maintainability.

Analyses on Spatial Compositions and Furniture Characteristics of Children's Reading Rooms in Public Libraries (공공도서관 아동열람실의 공간구성 및 가구특성 분석)

  • Jeon, Se-Ran;Lee, Ji-Hyun;Kim, Soo-Young
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.24 no.7
    • /
    • pp.567-577
    • /
    • 2012
  • This study examines the spatial compositions of children's reading rooms, furniture characteristics, and users' satisfaction levels for the furniture in public libraries. Field measurements and surveys were performed in 5 public libraries. Results imply that the spatial compositions of reading rooms in libraries were classified into three categories according to the locations of bookshelves and reading space. Management areas should not be located at the edge of reading rooms but be located at the center of reading rooms to avoid clerks' narrow viewing angle toward young kids and to ensure security for the kids. The evaluation for bookshelves according to evaluation checklists was acceptable, but users were not always satisfied with the bookshelves due to the inappropriate positions of books in shelves. The evaluation for desks was generally acceptable according to the checklists and users were satisfied with them. In general, the desk with higher scores by the checklist provided better satisfaction to users. However, the score by checklist for chair and user satisfaction were not always similar each other. Convenience areas in reading rooms were not enough compared to bookshelf, reading and management area. Computer tables that were designed in a way that users sit down and use the computers were highly preferred.