• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.025 seconds

Design of Web Service by Using OPC XML-DA and OPC Complex Data for Automation and Control Systems

  • Tan Vu Van;Yoo Dae-Sung;Yi Myeong-Jae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06a
    • /
    • pp.250-252
    • /
    • 2006
  • Web technologies are gaining increased importance in automation and control systems. However, the choice of Web technologies depends on the use cases in the application environment. In industrial systems, the data can be got not only from many different field systems and devices but also from different OPC (OLE for Process Control) Servers. Current OPC Client might be able to read simple data from OPC Server, but there are some problems to get structured data and to exchange structured information between collaborating applications. Therefore, OPC Foundation has defined interfaces to OPC XML-DA (OPC XML Data Access) and OPC Complex Data that aim to solve those problems. The OPC XML-DA can facilitate the exchange of plant data across the internet, and upwards into the enterprise domain. In addition, the OPC Complex Data will extend the OPC DA specification to allow the OPC Client to read and decode any type of data from measurement and control systems on the plant floor. This paper will describe the concept of OPC XML-DA and OPC Complex Data. And then it proposes a mechanism to implement the OPC Complex Data into OPC XML-DA Server. Additionally, the paper also discusses the security aspects.

  • PDF

A Study on Performance Assessment Methods by Using Fuzzy Logic

  • Kim, Kwang-Baek;Kim, Cheol-Ki;Moon, Jung-Wook
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.3 no.2
    • /
    • pp.138-145
    • /
    • 2003
  • Performance assessment was introduced to improvement of self-directed learning and method of assessment for differenced learning as the seventh educational curriculum is enforced. Performance assessment is overcoming limitation about problem solving ability and higher thinking abilities assessment that is problem of a written examination and get into the spotlight by way for quality of class and school normalization. But, performance assessment has problems about possibilities of assessment fault by appraisal, fairness, reliability, and validity of grading, ambiguity of grading standard, difficulty about objectivity security etc. This study proposes fuzzy performance assessment system to solve problem of the conventional performance assessment. This paper presented an objective and reliable performance assessment method through fuzzy reasoning, design fuzzy membership function and define fuzzy rule analyzing factor that influence in each sacred ground of performance assessment to account principle subject. Also, performance assessment item divides by formation estimation and subject estimation and designed membership function in proposed performance assessment method. Performance assessment result that is worked through fuzzy performance assessment system can pare down burden about appraisal's fault and provide fair and reliable assessment result through grading that have correct standard and consistency to students.

A Study on Information Resources and Demands of NanoTechnology in Korea (나노기술 정보지원시스템 구축을 위한 국내 나노기술 정보자원 현황 및 정보수요엔 관한 조사 연구)

  • 소대섭;강상규;이호신
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.3
    • /
    • pp.127-134
    • /
    • 2002
  • The progress of nanotechnology as a new concept technology will affect greatly the security of the future national competitiveness such as IT, BT and ET. Since nanotechnology is a interdisciplinary research area, a combinatorial system and network is needed for Sharing, diffusion and cooperation of knowledge information. Then we study on the present status of national NT information resources, survey on the status of national NT information resources, and survey on users demand for NT information in korea This study is useful for planning and design of NT information service system.

  • PDF

The Comparative Study on Third Party Mobile Payment Between UTAUT2 and TTF

  • Wu, Run-Ze;Lee, Jong-Ho
    • Journal of Distribution Science
    • /
    • v.15 no.11
    • /
    • pp.5-19
    • /
    • 2017
  • Purpose - According to the research findings, it proposes corresponding market promotion schemes, for Alipay, WeChat wallet and even other payment service providers and mobile internet companies to understand the factors which promote or hinder users' acceptance of mobile payment. Research design, data, and methodology - Statistic analysis of data and social science statistical software of IBM Statistics 23.0 and IBM SPSS AMOS 23.0 were adopted for all the data researched. Results - The technical features of the third party mobile payment and the task characteristics of users have positive influence on the matching degree between task and technology, and the matching degree between task and technology of the third party mobile payment has positive influence on the performance expectancy, effort expectancy and usage intention. The social influence, facilitating condition, price value and enjoyment motivation have significant and positive influence on users' intention of mobile payment adoption. The perceive security of the mobile fingerprint payment of users has positive influence on users' intention of usage. Conclusions - This research has the main contribution on the analysis on the key factors with influence on the third party mobile payment usage by utilizing the integrated model of UTAUT2 and TTF.

A Design and Implementation of Image Maintenance Using Base on Grid of the Decentralized Storage System (GRID 기반의 분산형 의료영상 저장시스템 설계 및 구현)

  • Kim, Sun-Chil;Cho, Hune
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.7 no.1
    • /
    • pp.33-38
    • /
    • 2005
  • Modern hospitals have been greatly facilitated with information technology (IT) such as hospital information system (HIS). One of the most prominent achievements is medical imaging and image data management so-called Picture Archiving and Communication Systems (PACS). Due to inevitable use of diagnostic images (such as X-ray, CT, MRI), PACS made tremendous impact not only on radiology department but also nearly all clinical departments for exchange and sharing image related clinical information. There is no doubt that better use of PACS leads to highly efficient clinical administration and hospital management. However, due to rapid and widespread acceptance of PACS storage and management of digitized image data in hospital introduces overhead and bottleneck when transferring images among clinical departments within and/or across hospitals. Despite numerous technical difficulties, financing for installing PACS is a major hindrance to overcome. In addition, a mirroring or a clustering backup can be used to maximize security and efficiency, which may not be considered as cost-effective approach because of extra hardware expenses. In this study therefore we have developed a new based on grid of distributed PACS in order to balance between the cost and network performance among multiple hospitals.

  • PDF

A wireless sensor network approach to enable location awareness in ubiquitous healthcare applications

  • Singh, Vinay Kumar;Lim, Hyo-Taek;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we outline the research issues that we are pursuing towards building of location aware environments for mainly ubiquitous healthcare applications. Such location aware application can provide what is happening in this space. To locate an object, such as patient or elderly person, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. The cost of the system was reduced while the accuracy in our experiments was fairly good and fine grained between 7 and 12 cm for location awareness in indoor environments by using only the sensor nodes and wireless sensor network technology. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object.

Design and Implementation of User Authentication Schemes for Roaming in Public Wireless LAM Systems (공중 무선랜 시스템에서 로밍을 고려한 사용자 인증방식의 설계 및 구현)

  • Lee, Hyun-Woo;Kim, Jeong-Hwan;Ryu, Won;Yoon, Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8B
    • /
    • pp.755-761
    • /
    • 2004
  • Currently, Wireless LAN(WLAN) service is widely deployed to provide high speed wireless Internet access through the mobile stations such as notebook and PDA. To provide enhanced security and user access control in the public WLAN area, WLAM access points should have the capability of IEEE 802.1x-based user authentication and authorization functionality. In this paper, we provide a brief understanding of IEEE 802. 1x standards and related protocols likeEAPoL(Extended Authentication Protocol Over LAN), EAP, RADIUS and describe how the IEEE 802.1x is designed and implemented in our embedded linux-based WLAN AP which is named i-WiNG.(Intelligent Wireless Internet Gateway).

Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols

  • Nam, Junghyun;Choo, Kim-Kwang Raymond;Kim, Moonseong;Paik, Juryon;Won, Dongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3244-3260
    • /
    • 2013
  • A three-party password-based authenticated key exchange (PAKE) protocol allows two clients registered with a trusted server to generate a common cryptographic key from their individual passwords shared only with the server. A key requirement for three-party PAKE protocols is to prevent an adversary from mounting a dictionary attack. This requirement must be met even when the adversary is a malicious (registered) client who can set up normal protocol sessions with other clients. This work revisits three existing three-party PAKE protocols, namely, Guo et al.'s (2008) protocol, Huang's (2009) protocol, and Lee and Hwang's (2010) protocol, and demonstrates that these protocols are not secure against offline and/or (undetectable) online dictionary attacks in the presence of a malicious client. The offline dictionary attack we present against Guo et al.'s protocol also applies to other similar protocols including Lee and Hwang's protocol. We conclude with some suggestions on how to design a three-party PAKE protocol that is resistant against dictionary attacks.

Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein

  • Latif, Kashif;Aziz, Arshad;Mahboob, Athar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2388-2404
    • /
    • 2012
  • Cryptographic hash functions are widely used in many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In response to recent advances in cryptanalysis of commonly used hash algorithms, National Institute of Standards and Technology (NIST) announced a publicly open competition for selection of new standard Secure Hash Algorithm called SHA-3. One important aspect of this competition is evaluation of hardware performances of the candidates. In this work we present efficient hardware implementations of SHA-3 finalists: JH, Keccak and Skein. We propose high speed architectures using Look-Up Table (LUT) resources on FPGAs, to minimize chip area and to reduce critical path lengths. This approach allows us to design data paths of SHA-3 finalists with minimum resources and higher clock frequencies. We implemented and investigated the performance of these candidates on modern and latest FPGA devices from Xilinx. This work serves as performance investigation of leading SHA-3 finalists on most up-to-date FPGAs.

Design and Implementation of Grid-based PACS (Grid 기반 PACS 설계 및 구현)

  • Kim, Jung-Su;Lee, Se-Yul;Park, Jin-Sub;Lee, Bong-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.143-156
    • /
    • 2008
  • Grid-based PACS can provide an advanced medical information services such as remote image file transfer, collaboration, remote diagnosis, and virtual hospital. In this paper, we have implemented Grid-PACS which guarantees both storage safety and extendability for virtual large scale storage system. The experimental results showed that the virtual storage system provided more efficient and faster data transfer than the conventional PACS. The proposed Grid data management system can be utilized to improve the effectiveness of the PACS data management and transmission between medical institutions.

  • PDF