• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.029 seconds

Reassessment on the CMI Rules for Electronic Bills of Lading (전자선화증권(電子船貨證券)에 관한 CMI 규칙(規則)의 재조명(再照明))

  • Choi, Myung-Kook
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.54
    • /
    • pp.235-260
    • /
    • 2012
  • The CMI Rules for Electronic Bills of Lading were based on sound principles that are now reflected in the provisions of the Rotterdam Rules, which provide for the use of electronic equivalents to bills of lading. Services involving bills of lading which exist in electronic form for at least part of their lives, and which use encryption to guarantee integrity and security of these electronic records, are already being offered by a number of carriers, among them APL. The relative success of APL's system demonstrates that the use of a system which embodies the basic ideas and processes underlying the CMI Rules could easily become a practical reality in the near future. The basic principles in the CMI Rules and the Rotterdam Rules adopt a minimum requirements approach and does not flesh out the details of procedures for the use of electronic bills. This is an improvement, as it allows adaptability to future technological developments. Successful electronic bill of lading systems can only be developed in response to customer demand, and carriers are in the best position to gauge this and design systems to cater for it. APL has demonstrated this by creating a system which is tailor-made to its customers' requirements. The CMI Rules were correct in their assumption that electronic bill of lading services should be provided by carriers. They also seem to have anticipated that the switch to the electronic medium would not be sudden and complete, but would require a gradual phasing out of paper documents over a long period of time.

  • PDF

Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment (U-Health환경에서 안전한 개인정보 관리를 위한 통합 인증스키마 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3865-3871
    • /
    • 2014
  • The U-health service provides medical services with patients anytime or anywhere and is defined as the service that combines information and communication technology with health and medical service. However, it causes some troubles, such as the disclosure of patients' medical information or data spills (personal information extrusion). Moreover, it has the weak point of the security threats associated with data based on existing wire-wireless systems because it conducts data transmission and reception through the network. Therefore, this paper suggests a safe personal information management system by designing integrated certification schema that will help compensate for the weaknesses of the U-health service. In the proposal, the protocols for user information, certification between medical institution and users, data communication encryption & decryption, and user information disuse were designed by applying the ID-Based Encryption, and analyzed such existing systems and PKI Based-based communication process, securely and safely.

(Design of Group Key Management Protocol for Information Security in Multicast) (멀티캐스트 정보 보호를 위한 그룰 키 관리 프로토콜의 설계)

  • 홍종준
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1235-1244
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication. With prosed architect, subgroups for multicast secure group management will be divided by RP (Rendezvous-Point) unit and each RP has a subgroup manager. Each subgroup manager gives a secure key to it's own transmitter md the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepare to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after choking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. As a result, the transmitting time is shortened because there is no need to data translation by group key on data sending and the data transmition is possible without new key distribution at path change to SPT (Shortest Path Tree) of the router characteristic. Additionally, the whole architecture size is samller than the other multicast secure architecture by using the conventional PIM-SIM routing structure without any additional equipment.

  • PDF

A Design and Implementation of Anomaly Detection Model based the Web Traffic Trend Analysis (웹 트래픽 추이 분석 기반 비정상행위 탐지 모델의 설계 및 구현)

  • Jang, Sung-Min;Park, Soon-Dong
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.5
    • /
    • pp.715-724
    • /
    • 2005
  • Recently many important systems that used to be operated in a closed environment are now providing web services and these kinds of web-based services are often an easy and common target of attacks. In addition, the great variety of web content and applications cause the development of new various intrusion technologies, while the misuse-based intrusion detection technology cannot keep the peace with the attacks and it seems to lack the capability to deal with such various new security threats, As a result it is necessary to research and develop new types of detection technologies that can detect newly developed attacks and intrusions as well as to be able to deal with previous types of exploits. In this paper, a HTTP traffic model is tested for its anomaly by using a HTTP request traffic pattern analysis and the field information analysis of the HTTP packet. Consequently, the HTTP traffic models by applying anomaly tests is designed and established.

  • PDF

Design of Web-Based Simulation Framework for Real-Time Infographics (실시간 인포그래픽을 위한 웹 기반의 시뮬레이션 프레임워크 설계)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.411-416
    • /
    • 2015
  • The service size of an IoT environment is determined by the various types of sensors. A gateway for relaying sensor information from various sensors is a representative middleware system, and an infographics showing the information with a graphical presentation of data and information is a client system for representing real-time information efficiently, it is necessary a similar test bed with IoT environment to develop a real-time infographics displaying a large amount of information effectively. The testing tools used in developing the existing network systems are mostly made to be suitable for functional testing and performance testing of the driven unit. In this paper, we proposed a mean which is web-based simulation framework to create a variety of information required for real-time infographics development, and evaluate the function of the system proposed by the test function of the comparison with the previous network test tool.

e-Service Quality and Behavioral Intention in the App Shopping Mall (앱(app) 쇼핑몰의 서비스품질과 구매의도에 관한 연구)

  • Chun, Joo-Hyung;Lim, Yeon-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.4
    • /
    • pp.1609-1618
    • /
    • 2012
  • We can easily acknowledge the facts that the e-market is increasingly and quickly changed by the smart phone user's. This research focuses the e-service quality and relationship between the e-service quality, customer satisfaction and behavioral intention in the AppShopping Mall. Based on the documentary research, the empirical study was followed by the questionnaire. The 313 usable questionnaires were collected by a self-administered survey. The results reveal that the e-service quality determinants are factors including customer service, app design, security, connectivity and user's convenience, and that the e-service quality is directly or indirectly related to customer satisfaction and behavioral intention. The AppShopping mall managers have to try on their best to find out the customer's needs, manage the lists of the e-service quality and develop the app.

The Relationship between Discretionary Revenues and Book-Tax Difference

  • CHA, Sangkwon;YOO, Jiyeon
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.4
    • /
    • pp.39-46
    • /
    • 2020
  • Purpose: This study looks at the relevance between discretionary revenue and book-tax differences (hereafter BTDs). While the study of earnings management, which focused on discretionary accruals and real earnings management, has largely made, it has not yet been actively researched on discretionary revenues. Therefore, it was believed that discretionary revenue would expand the preceding study by looking at its relevance to BTD, known as financial reporting quality and measures of tax avoidance. In general, prior research suggested that earnings management make BTDs larger. Thus, the relationship between discretionary revenue and the amount of BTD is predicted positive. Research design, data and methodology: To this end, the method of discretionary revenues was used and BTDs measured in four ways. First, Earnings before income tax - estimated taxable income divided by total asset (BTD). Second is fractional rank variable of BTDs (FBTD). Third is Indicator variable equals 1 if the firm-year has a positive BTD, 0 otherwise (PBTD). Fourth is that Indicator variable equals 1 if the firm-year has a BTDs in top(bottom) quartile, 0 otherwise (LPBTD, LNBTD). 4,251 samples were analyzed in the Korean Security market (KOSPI) from 2003 to 2014. Results Empirical analysis shows that BTDs increases as discretionary revenue increases. These results were equally observed when BTDs was measured as a ranking variable or as a indicating variable. These results indicate that earnings management through the revenue of managers exacerbate the quality of financial reporting. Conclusions: In sum, discretionary revenues can be used as an indicator of making BTDs larger and meaningful as the first study of the Korean capital market where discretionary revenues affect accounting information quality. Investors need to increase interest in discretionary revenues because intervention in financial reporting through revenue accounts by managers can increase information asymmetry and agency costs. This means that studies on discretionary revenues that have been relatively small should be expanded. The results also provide important implications for the relevant authorities and investors. Despite these benefits, however, measurement error problems with estimates still appear as limited points, and prudent interpretations are required, and additional follow-up studies are needed in that variables that are not yet considered in this study may affect our findings.

The Global Distribution Direction of Defense Industry in Eastern Europe under the New Cooperation Strengthened (신 협력 강화에 따른 동유럽 방위산업의 국제유통방향)

  • Seo, Dae-Sung;Coo, Byung-Mo
    • Journal of Distribution Science
    • /
    • v.15 no.1
    • /
    • pp.83-93
    • /
    • 2017
  • Purpose - After the transition, the development of defense industry in Eastern Europe has been regressed. Recently, they have internationally recognized that new products have been exported and contributed to the Innovation-Based Manufacturing of national economy such as unmanned reconnaissance aircraft, water purification technology, and mobile chemical laboratory, etc. The military forces in Eastern Europe are re-armed by the localization of self-produced munitions in their own defense industry, and then emphasize fostering their own defense industry. Thus, if they make a collaboration with other nations as a industrial cluster, it will gain a competitive edge on the defense industry. Research design, data, and methodology - The study was designed with the data of each national defense department. The research of the subject was reviewed before and after the transition. Thousands of workers have worked in defense industries before the transition, however, the defense industry and experts left after the transition. The Hungarian defense spending on GDP also dropped sharply from 1.72% in 2000 to 0.85% in 2013. But, due to the crisis in Ukraine and the crisis of Syrian refugees, the Viségrad Group (V4) member countries have also increased their interest in a defense and industries as well as the confidence in the EU and NATO. Results - On the whole, the joint of military training and purchase of defense materials were found in order to form the EU cooperative combat troops in CEE. There are the implementation of a joint manual plan for strengthening V4 security policy and the joint military exercises for V4 every year, and the others are electronic warfare and innovation of V4 national forces. Through such a performance analysis methodology, we found that the defense industry is developed through the national cluster cooperation among CEEs and spreading global distribution. Conclusions - Eastern Europe and Balkan countries have been looking forward to cooperating with the non-EU countries such as Korea and other defense industries. There are a lot of potential development into a new civilian cooperation defense industry for global-distribution. Thus, Korea should develop electronic commercial applications, not just as a weapon exporting region.

The Influential Relations on Sharing Economy and Consumer Traits (공유경제와 소비자의 특성과의 영향 관계)

  • LI, Qing-Zhu;Lee, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.8 no.6
    • /
    • pp.75-86
    • /
    • 2017
  • Purpose - The purpose of this study is to grasp the concept, characteristics and application status of sharing economy, and to derive a research model based on sharing economic service, and to analyze factors and influences of consumers' intention to reuse of sharing economy. Research design, data, and methodology - The questionnaires were created to examine variables for practical and theoretical implications. After pilot survey, conducted for 24 days from March 10th to April 2st in 2017, total numbers were 377. But 330 copies were used for the analysis with IBM SPSS Statistics 23.0 and IBM SPSS AMOS 23.0. The structural equation model was applied for this. Results - First, sharing economic services remain at an early stage, but it is meaningful to identify the revenue mechanism of the business model of the sharing economic platform. Second, in this study, it is meaningful that we systematized the theoretical structure by examining existing studies on the characteristics of the sharing economic service and consumer characteristics, and by examining empirically. Third, Satisfaction and Reliability are related to the characteristics of Sharing Economic Service (Security, Convenience, Discount, Sharing, Social Interaction), Consumer Characteristics (Personal Innovation, Word-of-Mouth) It is meaningful to broaden the understanding of the factors by verifying the mediating effect. Fourth, the sharing economy business is meaningful in that it is a new consumption trend that changes the meaning of consumption to consumers. Gradually, more and more people are recalling that purchasing something is not consumption, but sharing and borrowing is also consumption. In other words, through the sharing economy, consumers can experience more products and services, have more choices, and are expected to have a positive impact on economic growth by increasing the utilization of idle resources. Conclusions - Currently, the sharing economy is growing rapidly all over the world. Therefore, in the subsequent study, it is necessary to compare Korea and China's sharing economy and study the cultural and social characteristics of Korea and China. In particular, I think that steady research is necessary for more precise and specific direction on the influence of the shared economy.

Design of Ubiquitous Payment Process for Enhancing Seamlessness and Privacy (연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계)

  • Lee, Kyoung Jun;Jeong, Mu Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.3
    • /
    • pp.1-13
    • /
    • 2006
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. Payment, however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, strong personal device, and peer-based information transactions. We also propose U-SDT Protocol integrating technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF