• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.03 seconds

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.117-126
    • /
    • 2007
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBs. Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch, BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these Paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF

A Study on Functional Design of Electronic Records Management System in Records Centers (전자기록관리시스템의 기능 설계에 관한 연구)

  • Kim, Yong
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.7 no.1
    • /
    • pp.61-82
    • /
    • 2007
  • With changes of information environment on records managements, ERMS can be a suitable solution for managing multi-typed records. In this point, this study performed analysis and design of ERMS based on key functions and requirements to perform creation, preservation, management and use of electronic records. Especially, this study focused on interoperability with the related systems, security issues and back-up methods for secured preservation and management including fundamental requirements. Also, ERMS has a close relation with related systems such as intranet system, electronic document settlement system, and so on. compared to digital library managing information resources. Considering those features mentioned above, this study proposes functional requirements and a system architecture of ERMS which is satisfied with four characteristics of electronic records mentioned on ISO 15489 and environmental requirements.

Relative Position Pattern Unlocking Solution based on Blind Interaction on Touch Screen (터치스크린에서의 블라인드 인터랙션 기반의 상대적 위치 패턴 잠금 해제 솔루션)

  • Jin, Zhou-Xiong;Pan, Young-Hwan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.45-52
    • /
    • 2020
  • In this study, we propose a new Relative position pattern unlocking solution based on blind interaction, which is a new unlocking method, and compared it with existing unlocking methods to verify usability and security improvement. And verified the practical value of the proposed new unlocking solution. The relative position pattern unlock method is easily remembered than the numeric code method and is worth practical enough to show a degree of learning ease similar to the drawing pattern method. The new method is safer to steal than other two methods. It can be manufactured at a low cost and can also be used by special users such as blind people. Therefore, the practical value is relatively high.

Fashion Shopping Orientation, Mobile Shopping Characteristics, Perceived Value, and Mobile Purchase Experience in Male consumer's Mobile Fashion Shopping (남성 소비자의 모바일 패션 쇼핑에서의 구매경험과 패션 쇼핑성향, 모바일 쇼핑특성, 지각된 가치)

  • Chae, Jin Mie
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.19 no.1
    • /
    • pp.107-120
    • /
    • 2017
  • The purpose of this study was to investigate the effects of fashion shopping orientation and mobile shopping characteristics on consumer's perceived value. In addition, mobile purchase experiences of male consumers in their 20s~30s were analyzed. Questionnaires were carried out from November 10, 2015 to November 20, 2015 and 230 useful data were analyzed by descriptive statistics, exploratory factor analysis, reliability analysis, ANOVA, duncan test, multiple regression using Spss 21. The results of this study were as follows: First, fashion shopping orientation of male consumers was composed of five factors, which were 'brand ostentatious orientation', 'pleasure/trend orientation', 'economic orientation', 'impulse orientation' and 'time-saving orientation'. Second, mobile shopping characteristics were divided into three factors including 'ease of use', 'personalization', and 'security'. Third, fashion shopping orientation factors such as 'pleasure/trend orientation', 'economic orientation', and 'time-saving orientation' had a significant influence on the perceived value, while all the factors of mobile shopping characteristics affected the perceived value significantly. Fourth, there were significant differences among the classsified groups based on the level of purchase frequency and the period of using mobile shopping mall in fashion shopping orientation factors. Fourth, there were significant differences among the group classified by the level of purchase frequency in mobile shopping characteristics factors. These results suggested the differenciated strategies for customer management to make male consumers lead to mobile purchase.

  • PDF

A Study on the Development of Building Control and management System -Focusing on the Lighting Control and Monitoring system- (빌딩 제어 및 관리 시스템 개발에 관한 연구 -조명 제어 관리 시스템 구축을 중심으로-)

  • Cho, Sung-O
    • Korean Institute of Interior Design Journal
    • /
    • v.16 no.4
    • /
    • pp.110-118
    • /
    • 2007
  • Technology has been viewed at various stages of civilization as leading to future progress. The building, its services systems and management of the work process all contribute to the well-being of people within an organization. Productivity relies on there being a general sense of high morale and satisfaction with the workplace. Now buildings are considered as providing a milieu for human creativity. Flexibility, adaptability, service integration and high standards of finishes offer an intelligence threshold. Building Automation System(BAS) - controlled lighting systems may offer incremental energy saving. Conventional Lighting control systems often control equipment in a single room or over the limited area, because they are centralized control systems, which means that all the controlled circuits must be wired to a single control panel. The computers used by these systems are typically dedicated microprocess that perform only lighting control functions. By comparison, modern Building automation systems are distributed control system, which means that their computing hardware and software are distributed as a network that microprocessor-based control modules and standard PC. PLC(Programmable Logic controller) is extensible virtually without limits, so that all the lighting in a facility can be controlled by single, unified system - the same system that also can control and monitor the building's HVAC, security, and manufacturing processed, elevators, and more. A Building automation system can control light using schedules, manual controls, occupancy sensors, and photosensors, either singly or in combination. Building Lighting control and monitoring system will be for a energy saving and efficient building management system.

VLIS Design of OCB-AES Cryptographic Processor (OCB-AES 암호 프로세서의 VLSI 설계)

  • Choi Byeong-Yoon;Lee Jong-Hyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1741-1748
    • /
    • 2005
  • In this paper, we describe VLSI design and performance evaluation of OCB-AES crytographic algorithm that simulataneously provides privacy and authenticity. The OCB-AES crytographic algorithm sovles the problems such as long operation time and large hardware of conventional crytographic system, because the conventional system must implement the privancy and authenticity sequentially with seqarated algorithms and hardware. The OCB-AES processor with area-efficient modular offset generator and tag generator is designed using IDEC Samsung 0.35um standard cell library and consists of about 55,700 gates. Its cipher rate is about 930Mbps and the number of clock cycles needed to generate the 128-bit tags for authenticity and integrity is (m+2)${\times}$(Nr+1), where m and Nr represent the number of block for message and number of rounds for AES encryption, respectively. The OCB-AES processor can be applicable to soft cryptographic IP of IEEE 802.11i wireless LAN and Mobile SoC.

Design of The Autopilot System of vessel using Fuzzy Algorithm (퍼지제어 알고리즘을 이용한 선박의 자율운항 시스템 설계)

  • 이민수;추연규;이광석;김현덕;박연식
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1509-1513
    • /
    • 2003
  • The autopilot system of vessel is proposed to take service safety and security, to elevate service efficiency, to decrease labor and to improve working environment. Ultimate purpose of the proposed system is to minimize the number of crew by guaranteeing economical efficiency of shipping service. Recently, the research is being achieved to compensate various nonlinear parameters of vessel and apply it to course keeping control, track keeping control, roll-rudder stabilization, dynamic ship positioning and automatic mooring control etc. using optimizing control technique. Relation between rudder angle controlled by steering machine of vessel and ship-heading angle, and load condition of ship is nonlinear, which affects various parameters of shipping service. The speed and direction of waves, velocity and quantity of wind, which also cause the non-linearity of it. Therefore the autopilot system of ship requires the robust control algorithm can overcome various non-linearity. On this paper, we design the autopilot system of ship, which overcomes nonlinear Parameters and disturbance of it using Fuzzy Algorithm, evaluate the proposed algorithm and its excellence through simulation.

A Study on Area-Efficient Design of Unified MD5 and HAS-160 Hash Algorithms (MD5 및 HAS-160 해쉬 알고리즘을 통합한 면적 효율적인 설계에 관한 연구)

  • Sonh, Seung-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.1015-1022
    • /
    • 2012
  • This paper deals with hardware design which unifies MD5 and HAS-160 hash algorithms. Two algorithms get a message with arbitrary length and process message blocks divided into 512 bits each time and output a hash code with a fixed length. MD5 ouputs a hash code of 128 bits and HAS-160 a hash code of 160 bits. The unified hash core designed has 32% of slices overhead compared to HAS-160 core. However, there is only a fixed message buffer space used. The unified hash core which run a step in one clock cycle operates at 92MHz and has performance which digests a message in the speed of 724Mbps at MD5 and 581Mbps at HAS-160 hash mode. The unified hash core which is designed can be applicable to the areas such as E-commerce, data integrity and digital signature.

A Design of Web Server Architecture Environment for Reliability Enhancement and Secure Web Services (신뢰성 향상과 안전한 웹 서비스를 위한 웹 서버 아키텍처 환경의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.343-350
    • /
    • 2010
  • In the existing design of web server architecture, data encryption technique is used to keep the reliability, stability, and safety of web service. But the use of data encryption technique wastes the work of cpu while decreasing throughput of web server and increasing average response time so that it shows negative effect on the capacity of web application server. Also, the latest web applications require security and safety for the safe internet communication. Therefore, this paper suggests the improved web server which uses thread pool and Non-blocking I/O adding new web service modules to the existing web server for the safe web service, provides reliability and safety to show the safe web service capacity. And we compare and evaluate the safety and capacity through experiment on the existing traditional Tomcat based web server and the proposed system to evaluate the safety and capacity of the proposed web server system.

Efficient certificate management system design and implementation on the use of medical solutions (의료솔루션 사용과 관련된 효율적인 인증서 관리 시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.5 no.1
    • /
    • pp.114-121
    • /
    • 2016
  • Currently, different medical institutions have been carrying out the e-healthcare system project. The system includes electronic medical record and prescription delivery system, and, the Medical Treatment law permits electronic signature for medical record management, which reduced the relevant costs and enabled sharing medical record. And medical solution using online certificates is expanding its application. In that light, the role of certificates became more important than ever. However, in contrast to active effort made to manage personal certificates, certificates related to medical solutions and other types of work are not being managed properly. Most work-related certificates are saved in office computers, which makes them vulnerable to various security threats. Although certificate servers can be used as a solution to this problem, hospitals must build the server separately and, therefore, small and medium-size hospitals can be reluctant to bear the burden. This study proposed a way to design and implement an effective and secure certificate management system by save the certificate file as a BLOB, using existing resources without needing to build a separate certificate server, at minimized costs.