• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.034 seconds

Protecting Copyright Owners in Nigeria: A Panacea for Intellectual Development

  • Owushi, Emmanuel
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.1
    • /
    • pp.21-34
    • /
    • 2020
  • The paper looks at protecting copyright owners in Nigeria: a panacea for intellectual development. A descriptive survey design was adopted in carrying out the study. The sample size for the study was 112. Three research objectives guided the study. The study utilized a self-developed questionnaire for data collection. A total of 112 copies of the questionnaire were distributed to librarian and lecturers, out of which 108 copies were duly filled and returned, representing 96.4%. The collected data was arranged in frequency and analyzed using percentage and mean score. The findings revealed that protection of copyright will encourage creators of intellectual works, and that if authors are well remunerated there is likelihood of adequate availability of various publications to meet information needs of Nigerians. The result showed that the right to intellectual properties is one of the ways to encourage intellectual development. The finding revealed that copyright protection provides security for intellectual product and does not negatively affect the availability of intellectual materials. Based on the research findings, it was recommended that owners of intellectual property deserve good earnings for their intellectual works in order to promote Knowledge proliferation and availability so as to meet the reading needs of the citizens at the various levels. The study also recommended that all cases relating to copyright violation in our courts should be summarily dealt with. The study advocated that the provision on the punishment should be reviewed such that it could deter people from infringing on authors rights.

A STUDY OF AN NAT USING THE TCP SEGMENT INFORMATION (TCP 세그멘트 정보를 이용한 NAT에 대한 연구)

  • JaeYongHwang;GiHoJoo
    • Journal of the Korean Geophysical Society
    • /
    • v.4 no.4
    • /
    • pp.239-249
    • /
    • 2001
  • NAT (Network Address Translation) is an IP address modification protocol that translates private IP addresses into authentic Internet addresses. The main features of NAT are to improve network security and to save IP addresses. Generally speaking, in order to perform its functionality. NAT uses the address informaiton in the packet header. Certain application protocols, however, use the information in the packet data as well as the imformation in the packet header to perform end-to-end communication. Therefor, to support these types of application protocols, NAT should be able to perform appropriate translation of protocol information in the packet data. In this thesis, we design and implement a method which translates virtual IP information in the packet data into real IP information by using port proxy server.

  • PDF

Fault tolerant control scheme for a converter in a photovoltaic system (태양광 발전시스템의 컨버터 고장에 따른 보상운전기법)

  • Park, Tae-Sik;Hur, Yong-Ho;Lee, Kwang-Woon;Moon, Chae-Joo;Kwak, No-Hong
    • Journal of the Korean Solar Energy Society
    • /
    • v.36 no.4
    • /
    • pp.31-40
    • /
    • 2016
  • The demands for photovoltaic systems on a large scale have grown dramatically and require new technologies to get the high efficiency and reliable operations of power conversion systems. These needs can be realized by the cost-effective and high performance digital revolutions and faster semiconductor switching devices. However, the new power systems have been more sophisticated and their reliability becomes critical issues. In this paper, a new fault-tolerance power conversion scheme for the photovoltaic systems is proposed. The proposed fault-tolerant scheme is able to supply energy from solar panels to loads intermittently in spite of a front boost converter open failure, and its voltage and current controllers are designed to improve the transient performance by using an average model design scheme. The proposed approach is verified both by simulations. The results will enable more timely and wide usage of alternative/renewable energy systems resulting in increased energy security.

Real-time Network Middleware Supporting Fault-Tolerant Operations for Personal Robot System

  • Choo, Seong-Ho;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.756-760
    • /
    • 2005
  • By development of a robot technology, personal robot is being developed very actively. Various infra-technologies are accumulated in hardware and software how by internal a lot of research and development efforts, and it is circumstance that actual commodity is announced. But, personal robot is applied to be acting near human, and takes charge of safety and connected directly a lot of works of home security, gas-leakage, fire-warning facilities, or/and etc. So personal robot must do safe and stable action even if any unexpected accidents are happened, important functions are always operated. In this paper, we are wished to show design structures for supporting fault-tolerant operation from our real-time robot middleware viewpoint. Personal robot, in being developed, was designed by module structure to do to interconnect and to interoperate among each module that is mutually implemented by each research facilities or company. Also, each modules can use appreciate network system that is fit for handling and communicating its data. To guarantee this, we have being developed a real-time network middleware, for especially personal robot. Recent our working is to add and to adjust some functions like connection management, distributed routing mechanism, remote object management, and making platform independent robot application execution environment with self-moving of robot application, for fault-tolerant personal robot.

  • PDF

Design and Implementation of OTP Based Authentication Mechanism for Web Service (OTP 기반의 웹서비스 인증 메커니즘 설계 및 구현)

  • Song, You-Jin;Lee, Dong-Hyeok
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.2
    • /
    • pp.89-108
    • /
    • 2005
  • The SOAP specifications are not provided a functions of information security, especially authentication function. In case of user authentication, delivery of the username and password elements can be exposed to sniffing/replay attack by malicious attacker. In this paper, we propose a new mechanism to protect authentication attacks for the SOAP messages. The proposed mechanism is compensated for weakness of S/KEY system. Our mechanism has no limitation for time and overhead and also provide a more effective and secure delivery.

  • PDF

An Optimal Algorithm for the Design of a Proxy Blind Signature Agent (대리 은닉서명 에이전트의 설계를 위한 최적화 알고리즘)

  • Rhee, Hyunsook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.7
    • /
    • pp.85-92
    • /
    • 2013
  • In this paper, on the basis of Guilin Wang's proxy signature scheme and the Schnorr blind signature, we propose a secure proxy blind signature scheme. A proxy blind signature scheme is a digital signature scheme which combines the properties of a proxy signature and a blind signature scheme. Guilin Wang proposed a provably secure proxy signature scheme, which is based on a two-party Schnorr signature scheme. Also, using the proposed proxy blind signature scheme, we propose the proxy agent system for the electronic voting. We show the proposed scheme satisfies the security properties of both the blind signature and the proxy signature scheme and is efficient and optimal proxy blind signature scheme.

Design and Analysis of Efficient Parallel Hardware Prime Generators

  • Kim, Dong Kyue;Choi, Piljoo;Lee, Mun-Kyu;Park, Heejin
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.16 no.5
    • /
    • pp.564-581
    • /
    • 2016
  • We present an efficient hardware prime generator that generates a prime p by combining trial division and Fermat test in parallel. Since the execution time of this parallel combination is greatly influenced by the number k of the smallest odd primes used in the trial division, it is important to determine the optimal k to create the fastest parallel combination. We present probabilistic analysis to determine the optimal k and to estimate the expected running time for the parallel combination. Our analysis is conducted in two stages. First, we roughly narrow the range of optimal k by using the expected values for the random variables used in the analysis. Second, we precisely determine the optimal k by using the exact probability distribution of the random variables. Our experiments show that the optimal k and the expected running time determined by our analysis are precise and accurate. Furthermore, we generalize our analysis and propose a guideline for a designer of a hardware prime generator to determine the optimal k by simply calculating the ratio of M to D, where M and D are the measured running times of a modular multiplication and an integer division, respectively.

Design of the Adaptive SIP Application Server System Architecture supporting SIP-based Session Mobility over the Home Network configured with Private IP (사설IP 기반 홈네트워크에서 세션이동성 지원의 적응적인 SIP 응용서버 시스템 구조 설계)

  • Oh, Yeon-Joo;Beom, Min-Jun;Kim, Dong-Hee;Paik, Eui-Hyun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.1 no.2
    • /
    • pp.73-81
    • /
    • 2006
  • The home network is generally separated from the Internet, as it is made up of a private network due to security issues and the lack of IPv4 addresses space. Also, a user may want to move from a terminal to another terminal connected in the home network during communicating with people outside the home. In this case, people connected in the Internet, or another home network could not communicate the user at the home. These limitations prevent a SIP-capable device connected in the home network from communicating with another SIP-capable device connected in the Internet or the outside of the home network. To overcome the limitations, This paper proposes the Adaptive SIP Application Server System as a software architecture that a user inside of the home can communicate with people outside of the home when the home is composed of a private IP-based network. Moreover, the proposed architecture provides the session mobility that allows the user to maintain a media session even if changing the terminal inside of the home during the session established. The proposed system was implemented over a home server device which acts functionality as a connection point for transmitting IP packets between a home network and the Internet.

  • PDF

Design improved security protocol on mobile device for sensor node access using RFID local key (센서노드 접근을 위해 RFID를 지역 키로 사용하는 이동형 단말장치상의 개선된 보안 프로토콜 설계)

  • John, Young-Jun;Choi, Yong-Sik;Park, Sang-Hyun;Han, Soo;Shin, Seung-Ho
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.328-333
    • /
    • 2007
  • RFID와 sensor network의 두 기반 기술은 독특한 물리적 특정을 가지며 상호 보완적인 관계를 가지고 있다. 이러한 관계는 창고 안 물품의 상태파악과 입출 재고를 관리하는 형태로 응용된다. 창고 내 물품 보관 단위인 파렛트(Pallet) 에 RFID 태그를 부착하여 입/출고시의 물품을 식별한다. 그리고 Zigbee 무선 통신기능을 가진 센서 모듈에 의해 물품의 환경 상태 정보를 파악한다. 이후 현장 관리자나 소비자들은 이동형 단말장치를 통해 현장에서 다양한 USN 상의 정보들과 상호작용 한다. 이 과정에서 이동형 단말장치를 통한 RFID tag 정보와 센서 노드의 접근이 공중파 상에 노출 된다. 이러한 센서 노드 접근을 보호하기 위해 추가적인 칩 설계 등의 비용 지불로 기밀 노출에 대처할 수 있다. 이에 대한 대안으로 인프라형태로 놓여진 RFID tag와 단말장치에 탑재될 RFID 리더를 활용해 더 적은 비용으로 보안 서비스를 받고자 한다. 그래서 유비쿼터스 환경에서 센서 노드에 대한 접근을 제어하기 위해 RFID tag를 지역키(local key) 처럼 사용한다. 또한 이 과정에 보안이 적용된 프로토콜을 설계 하는 것이 본 논문의 주된 목표이다.

  • PDF

A Study on the Characteristic Analysis of Housing Complex planning by Regional Characteristic (지역성을 고려한 주거단지계획의 특성분석을 위한 사래연구 -대구광역시 'U 대회 선수촌 단지'를 중심으로 -)

  • Seo Ji-Eun;Park Eui-Jeong
    • Journal of the Korean housing association
    • /
    • v.17 no.3
    • /
    • pp.31-40
    • /
    • 2006
  • The purpose of this study is to grasp the present state of a outdoor space planning and to analysis plan characteristics in based on regional characteristics in Housing complex plan. The analysis result of this study is as follows : first, we know that the right of regional characteristics is appearing variously every research workers. also an analysis about regional characteristics that should be considered in housing complex plan was insufficient. Second, regional characteristics can be classified into 5 factors. These are classified as a context of location, city link, life atmosphere, needs of locals and creation of image. Third, it has originality against other housing complex to graft items connected with 'U contest' on outdoor space planning. Also, it has affirmatively effected on image of Buk-gu and recognition of Dong beyn-dong and Seo beyn-dong. It is get out of the uniform design by a planning based on land and surrounding environment in arrangement and forms. Also residents have the satisfaction and pride in arrangement considering the climate of a region and security of the green space.