• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.036 seconds

Design and Implementation of Secure Web System with Cookies Protection Function (쿠키보호기능을 제공하는 안전한 웹 시스템의 설계 및 구현)

  • Choi, Eun-Bok;Choi, Hyang-Chang;Lee, Hyeong-Ok
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.934-943
    • /
    • 2004
  • In this paper, we propose cookie protection-key management system for cookie protection and maintain separate cookie protection-key of each user. We provide integrity, confidentiality, and user authentication of cookie by using registered cookie protection-key and applying encryption techniques. And, we use the technique for hiding the URL of an internal document to a user to minimize the problem of its exposure. When this system is applied to the intranet of an enterprise, it will be able to provide a security to cookie and minimize the problem of internal document exposure by an internal user.

  • PDF

Implementation of Offline Payment Solution using USIM in IMT-2000 (IMT-2000 단말기용 USIM상에서의 오프라인 지불 솔루션 탑재에 관한 연구)

  • 백장미;하남수;홍인식
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.849-860
    • /
    • 2003
  • As mobile device is becoming more popular, E-Commerce changes into M-Commerce. Especially, IMT-2000 (International Mobile Telecommunication 2000) service is prepared for M-Commerce and this has USIM (Universal Subscriber Identity Module) as a core of certification of individuality and transactions. As a result, the area of mobile service going to expand by USIM. But, mobile services using USIM leave much to be desired, and developed application don't variety. In this paper, for the efficient design of USIM, the structure of USIM and protocol is analyzed, and secure payment solution in USIM is proposed. Specially, offline payment system is proposed for the verification of proposed protocols including security, saving, and calculation of balance. finally, the simulation of proposed payment system on USIM is performed using Java Card.

  • PDF

Design variation serial test using binary algorithm (이진 알고리즘을 이용한 변형 시리얼테스트 설계에 관한 연구)

  • Choi, Jin-Suk;Lee, Sung-Joo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.1
    • /
    • pp.76-80
    • /
    • 2010
  • It is floating to security of information and the early assignment that it is important it processes and to transmit in inundations of information that I changed suddenly. I used the encryption/decryption process that applied simple substitution and mathematical calculation algorithm at theory and encryption transmission steps protective early information. Hardware and financial loss are using spurious random number to be satisfied with the random number anger that isn't real random number to size so much perfect information protection using One-time pad for applying this. I was transformed into serial test under a test to prove spurious random number anger, and it is into random number anger stronger, and the transformation serial test that proposes is proving it in algorithm speed and efficiency planes.

The Effects of Service Factors of Electronic Catalogue Systems on User Satisfaction (전자카탈로그 시스템의 서비스 요인이 사용자만족에 미치는 영향)

  • Ko, Il-Sang;Choi, Su-Jeong;Kim, Jeong-Hee
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.3
    • /
    • pp.107-131
    • /
    • 2007
  • Due to an increase of the importance of E-catalogue on electronic commerce, E-catalogue systems have been prevailing for their production and efficient management around Web environment. In this study, we categorize service factors off-catalogue systems into three aspects contents-providing, user participation, and system management, and we measure their impacts on user satisfaction. The results of the study show that richness, design, trust, interaction, function of transaction management, system extensibility, system stability, and security have been found out to be significant factors to affect user satisfaction.

  • PDF

Purchase Satisfaction of Apparel for Internet Fashion Shopping Mall Users - focused on 20's~30's Men and Women (인터넷 패션 쇼핑몰 이용자의 의류구매 만족도 -20~30대 남녀를 중심으로-)

  • 신수연;김민정
    • The Research Journal of the Costume Culture
    • /
    • v.11 no.4
    • /
    • pp.487-499
    • /
    • 2003
  • The purpose of this study was to suggest marketing strategies to internet fashion shopping malls identifying factors that customers consider important. Data were collected by survey questionnaire and the subjects were 322 men and women in their twenties and thirties living in Seoul and Kyung-gi. SPSS 10.0 package were used and reliability, frequency, cross tabulation, chi-square, paired t-test, ANOV A and Duncan test were conducted for data analysis. The results were as follows. I) Subjects placed the most importance on providing the precise and detail information of products but its satisfaction level was low. 2) Subjects considered the ‘low price’ very importantly but its satisfaction level of it was not high. 3) Subject's importance and satisfaction level of ‘point system’ were about an average. 'Point system' has to be activated by using systems such as 'point network system' by pointbanking co. as one of price-cutting strategies. 4) Internet fashion shopping mall users treated 'the security system of personal data' importantly while they were not sufficiently satisfied with the system. 5) Female placed more importance on design and color of products and suppliance of the trendy items.

  • PDF

The Determinants of the Usage of Government Institutions' SNS (행정기관 SNS 이용의 결정요인)

  • Son, Dal-Ho;Yoo, Seong-Pil
    • The Journal of Information Systems
    • /
    • v.24 no.3
    • /
    • pp.95-114
    • /
    • 2015
  • Purpose: This study was tried to investigate a structural relationship among key impacting factors and usage in SNS of government institutions. It was designed to research the processing property of SNS, the emotional property of SNS, and the service property of SNS for the SNS usage. Based on the research framework from the relationships among intrinsic SNS characteristics, social psychological characteristics, and the attitude of government institutions' SNS, the empirical research model and the hypotheses were established. Design/methodology/approach: Data for empirical study were collected from 453 of total distributed 500 by the structured questionnaire survey with SNS users of government institutions. The analysis was performed from effective 432 data, and the sample was mainly consisted of men, the thirty-old, and salesmen. Findings: The results showed that the emotional and service properties in intrinsic characteristics of SNS have a significantly positive effect to the value perception and the security variable in social psychological characteristics has a significant positive effects to the trust. Finally, the value perception has positive effects on both trust and use intention of government institutions' SNS. Meaning of these results is that intrinsic SNS characteristics, social psychological characteristics, and the attitude of government institutions' SNS have a significant effect on SNS usage.

The Study of User Resistance to Fintech Payment Service: In the Perspective of Innovation Diffusion And Status Quo Bias Theory (핀테크 지급결제 서비스 수용 저항요인 연구 : 혁신저항이론과 현상유지편향이론을 중심으로)

  • Hwang, Sin-Hae;Kim, Jeoung-Kun
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.133-151
    • /
    • 2018
  • Purpose Global fintech industry is proliferating. Although domestic investment in fintech service is also increasing fast, user acceptance of fintech payment service seems slower than expected. Previous fintech literature mainly focuses on overall characteristics and technical aspects of fintech including security issues and explores factors affecting the service adoption. This study aims to examine crucial factors affecting user's resistance intention to fintech payment service adoption. The research model was formulated based on innovation diffusion theory and status quo bias theory and validated empirically. Design/methodology/approach The proposed research model was empirically validated with 149 responses from college students who have used fintech payment service. The component-based SEM was employed for data analysis. Findings The significant findings are as follow. First, compatibility has significant negative effect and complexity, and perceived risk has a positive effect on user resistance. Second, institutional trust does not show a significant effect on user resistance but has an indirect effect through the mediation of trust in service provider. Finally, trust in service provider shows the significant negative effect on user resistance.

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

A Design and Implementation of N-IDS Model based on Multi-Thread (멀티 쓰레드 기반 N-IDS 모델의 설계 및 구현)

  • 주수홍;엄윤섭;김상철;홍승표;이재호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.542-547
    • /
    • 2003
  • A network based intrusion detection system(N-IDS), can detect intruders coming in through packets in real time environment. The ability of capture of packet is the most important factor when we evaluate the performance of the system. The time delay between the time handling one packet capture and next one is variant become of packet handling mechanism. So for N-IDS can not settle this problem because most systems use a single processor. In this thesis, we solve the problem of irregular tine delay with a file socket and multi-thread processing. We designed and implement, the Crasto system. By an accurate observation, the performance testing shows that the Crasto reduces the capture delay time to 1/5 comparing to the existing single process N-IDS, and maintain delay time regularly.

  • PDF

Design and Implementation of PKI based Cryptography Communication Component (PKI 기반의 암호화 통신 컴포넌트 설계 및 구현)

  • Mo Soo-jong;Cho Won-hi;Yu Sun-young;Yim Jae-hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1316-1322
    • /
    • 2005
  • Specially, though electronic commerce and electron signature technology through internet rose, PKI (Public Key Ifrastructure) is one of technologies. PKI brought several kind of new standards in encryption base technology. In spite of several kind of standardizations consist lively, shortcoming of solutions that apply PKI is expensive and slow. If main interest of encryption technology including PKI is the fast speed and security that improve, this is very serious problem. The various kinds alternatives about these problem are presented. But, we must consider about replace expense and stability etc. still. So, I propose that use suitable encryption policy by method to solve such problem. I improved some problems of existent PKI structure. Subject of this treatise designs and embody communication component could use easily and simply short message communication or simplicity way encryption communication.