• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.032 seconds

The Design and Implementation of Intruder Access Control System by based of Ubiquitous Sensor Network (USN기반의 외부인 출입감시시스템 설계 및 구현)

  • Lee, Kyu-Su;Sim, Hyeon;Oh, Jai-Cheol
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1165-1171
    • /
    • 2012
  • Latest, it is dealt with seriously problems that an intruder kidnapping students in elementary school. Especially young students is more vulnerable in these risks. Elementary School has many limitations in controlling the intrusion of trespassers. A problem occurs that requires a lot of manpower through the deployment and management of security systems such as CCTV and control systems. In this paper, we is designed and implemented the outsider access management system using a sensor network and PZT camera called the USN's core technology to monitoring the access control for controlling the mobility of the trespassers.

The Design of the Security Protocol for Electronic Commerce Payment System (전자상거래 지불시스템을 위한 보안 프로토콜 설계)

  • Lee, Sang-Duck;Han, Seung-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.112-117
    • /
    • 2007
  • The Internet leads the transformation of the all-over social life with its radical diffusion and development. Moreover, it can be more focussed on the electronic commerce using the Internet - a new type of commerce, which is diffusion and developing. In the paper, we propose an electronic payment protocol with a network-type electronic-cash based on Public Key Infrastructure(PKI). The proposed protocol overcomes the problem of NetBill which deals with only contents and can't ensure anonymity. It also prevents illegal copy and distribution and insures the greatest safety by means of giving a certification number to the digital contents offered on the on-line.

  • PDF

The Design of Electronic Payment Protocol Using Dual Signature based on Cardholder's Secret Number (카드사용자의 비밀번호 기반 이중서명을 이용한 전자 지불 프로토콜의 설계)

  • 김성열;이옥빈;배용근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.411-420
    • /
    • 1999
  • The topic of electronic commerce is a hot issue in computer technology. There are many kinds of risks associated with electronic commerce which performs financial transactions by exchanging electronic information over public networks. Therefore, security factors such as confidentiality, integrity, authentication and non-repudiation should be required to construct secure electronic commerce systems. In this paper, the credit card-based payment protocol applying dual signature is presented. It provides payment information to the bank a cardholder pays to, but conceals ordering information. It also offers ordering information to a merchant, but hides payment information including the card number. Thus, cardholder's private information can be protected. In order to accomplish this, dual signature is performed employing both symmetric method utilizing cardholder's secret number as an encryption key and asymmetric method.

  • PDF

Design and Implementation of The Spam I-Mail filtering System (컨텐츠 필터를 이용한 스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.465-468
    • /
    • 2003
  • E-mail, one of the oldest services in internet becomes very important and essential way to communicate with development of internet. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or bad things, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF

Design of Non-repudiation Module for Secure FTP Service (안전한 FTP 서비스를 위한 부인방지 모듈 설계)

  • 이원호;오명관;한군희
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.4 no.3
    • /
    • pp.150-154
    • /
    • 2003
  • This paper designs the secure FTP model which provides origin non-repudiation and receipt non-repudiation service that sender and recipient profit of each other to prevent the repudiated of transmission of message and which provides the delivery non-repudiation service to prevent the repudiated of file reception and fact of the transmission failure of an error from the network. The FTP model which is designed to use the GSS-API and in order to have compatibility from source level, with security service it provided the interface which is consistent, establishes the secure context which application client and application server for is safe the session key which overhead from opening to the public key system with efficient key use and it used it minimized.

  • PDF

An UHISRL design to protect patient's privacy and to block its illegal access based on RFID (환자의 프라이버시 보호와 불법 접근 차단을 위한 RFID 기반 UHISRL 설계)

  • Lee, Byung Kwan;Jeong, Eun Hee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.3
    • /
    • pp.57-66
    • /
    • 2014
  • This paper proposes the UHISRL(Ubiquitous Healthcare Information System based on Real Time Location) which manages patient, doctor, medicine by using RFID. The proposed UHISRL monitors the patient's health state, and enables us to confirm the result with Smart Phone and Tablet PC. Also, it can block Replay and Spoofing attack by using the ERHL(Extended Randomized Hash Lock) authentication scheme designed in this paper. A patient privacy is enhanced by limiting UHISRL DB access according to attributes with CP-ABE (Cipher Text - Attributed based Encryption) technique. Specially, UHISRL can prevent an unexpected accident by monitoring a chronic patient's emergency situation in real time.

Assessment Criteria of Information Security Training Centers for Personnels of Educational Institutions (교육기관 종사자 대상의 정보보호교육센터 평가를 위한 지표 개발)

  • Jun, Hyo-Jung;Kim, Tae-Sung;Kim, Yeon-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.455-462
    • /
    • 2013
  • As the protection of personal information has been appeared as a main issue in educational institutions, the Ministry of Education, Science and Technology (currently the Ministry of Education) opened InfoSec Training Center to train personnels of educational institutions in 2012. To achieve the purpose of the establishment of the centers, each center needs to identify training target, make training roadmap and design specialized training curriculum. The paper aims to develop criteria to evaluate training and operating levels of InfoSec Training Centers using AHP.

Design of High Frequency Casting Machine for Dental using Induction Heating System (유도가열 시스템을 적용한 치과용 고주파 주조기 설계)

  • Song, Seung-Gun;Lim, Sang-Kil;Lee, Sang-Hun
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.26 no.8
    • /
    • pp.79-87
    • /
    • 2012
  • Currently, The method to produce a brewing body for dentistry supplementation water produces a brewing body by fabrication, burying and it is heat wish in city gas and oxygen. It uses an original judgment found airplane the brewing body uses a spring of the back wait that melting temperature dissolved various alloys in by a blow pipe, and to generate centrifugal force and produces it. In addition, because it uses preheating to dissolve an alloy in general, it is hard to regulate the appropriate melting temperature of the alloy and brewing time and generates a brewing defect hereby same as gas industry and pinhole and shows the defect of the supplementation thing due to the super-heating. In this paper, We developed the high induction heating system which it could set brewing time,temperature and had durability and security,by the kind of the alloy to produce a high quality prosthetic thing brewing body.

An EJB-Based Database Agent for Workflow Definition (EJB 기반의 워크플로우 정의 데이터베이스 에이전트 설계 및 구현)

  • 오동근;김광훈
    • Journal of Internet Computing and Services
    • /
    • v.2 no.5
    • /
    • pp.41-47
    • /
    • 2001
  • This paper deals with an EJB-based database agent(component) used to define workflow processes, which is a core function of the e-Chautauqua workflow management system that is an on-going research product. We describe about how to design and implement the EJB-based DB agent that is deployed on EJB server as a component. The agent is located between the build-time clients and the database system, and manages database accesses, such as retrieves and stores, from the workflow definition components. Through the EJB technology, we are able to accomplish a stable database agent that can be characterized by the distributed object management, reliable recovery mechanism from system failovers, reliable large-scale transaction management, and the security functions.

  • PDF

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid

  • Li, Hongwei;Liu, Dongxiao;Alharbi, Khalid;Zhang, Shenmin;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1404-1423
    • /
    • 2015
  • In smart grid, electricity consumption data may be handed over to a third party for various purposes. While government regulations and industry compliance prevent utility companies from improper or illegal sharing of their customers' electricity consumption data, there are some scenarios where it can be very useful. For example, it allows the consumers' data to be shared among various energy resources so the energy resources are able to analyze the data and adjust their operation to the actual power demand. However, it is crucial to protect sensitive electricity consumption data during the sharing process. In this paper, we propose a fine-grained access control scheme (FAC) with efficient attribute revocation and policy updating in smart grid. Specifically, by introducing the concept of Third-party Auditor (TPA), the proposed FAC achieves efficient attribute revocation. Also, we design an efficient policy updating algorithm by outsourcing the computational task to a cloud server. Moreover, we give security analysis and conduct experiments to demonstrate that the FAC is both secure and efficient compared with existing ABE-based approaches.