• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.03 seconds

The Design and Implementation of Heating Control System Based on Sensor Networks (센서 네트워크 기반의 난방제어시스템 설계 및 구현)

  • Lee, Jin-Kwan;Lee, Dae-Hyung;Lee, Chang-Bok;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.27-33
    • /
    • 2008
  • The object of this paper is to design a heating control system based on sensor networks for the house, integrated with computing technology. The proposed system can manage the heating by sensing and analyzing the temperature and humidity in apartment house and others. This system also is capable of giving a comfortable circumstances because the interior of a house is in heated by the sensory temperature based control system.

  • PDF

A Design of SEED Cipher Algorithm (SEED 암호화 알고리즘의 설계)

  • 권명진;김도완;이종화;조상복
    • Proceedings of the IEEK Conference
    • /
    • 2002.06b
    • /
    • pp.313-316
    • /
    • 2002
  • (Korea Information Security Agency) is designed by using VHDL to Implement hardware architecture It has been adopted by most of the security systems in Korea SEED Is designed to utilize the S-boxes and permutations that balance with the current computing technology It has the Feistel structure with 16 rounds The same procedure for data encryption and decryption makes possible an easy and practical hardware implementation. The primary functions used In SEED are F function and G function. This paper proposes an Iterative architecture of F function, a modified architecture of G function and an Iterative architecture of key scheduling algorithm. The designed SEED encrypts and decrypts exactly the test vectors It is expected to extend to various application fields If the design of control blocks Is added.

  • PDF

Internet-Based Remote Control System Using Virtual Reality (VR을 이용한 인터넷 기반 원격 제어 시스템)

  • 차주헌;이순걸;전희연
    • Korean Journal of Computational Design and Engineering
    • /
    • v.5 no.1
    • /
    • pp.88-94
    • /
    • 2000
  • This paper presents new type remote home automation that can control and manage hi-directionally and efficiently home appliances and home security systems in home through Internet. The system is used virtual reality technology to construct very easy user interface and used Internet as network for remote control. Here, the user interface is 3D GUI which gives user feeling to be at his home on web-browser, and also shows him present state of control objects at home. This system has been implemented on the basis of Java and VRML. In this paper we propose the internet-based remote control system, and show usefulness of the suggested system by applying to home automation system.

  • PDF

Determinants of Consumer Trust in e-Business (e비즈니스에서 신뢰의 결정요인에 관한 연구)

  • Kwak, Won-Seob
    • Journal of Digital Convergence
    • /
    • v.2 no.2
    • /
    • pp.29-44
    • /
    • 2004
  • The main objective of this study is to investigate the determinants of consumer trust in e-business. It examines consumer perceptions trust in a Web site and address following research questions: What factors influence consumer trust in a Web site and what specific Web site cues are associated with trust and satisfaction? We test our hypothesis in a empirical data from 568 consumers across 4 Web sites. By factor analysis, the results show that Web site characteristics are such as product information and purchase process , system stability, navigation, privacy(security), design, information of seller, pay methods, and customer service. We also find that brand and Web site characteristics such as Web site design, navigation, privacy(security), and customer service can explain over 59% of the variance in Web site trust and 60% in satisfaction. The results offer important implication for Web site strategies that include the manipulation of factors influencing Web site trust. And the future directions of the present research are discussed.

  • PDF

Design of StraaS(streaming as a service) based on Cloud Computing (클라우드 컴퓨팅 기반 스트리밍 서비스(StraaS)의 설계)

  • Cha, Byung-Rae;Sim, Su-Jeong;Kim, Yong-Il
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.330-339
    • /
    • 2012
  • In this paper, we define and design the Streaming as a Service (StraaS) to support streaming service based on cloud computing. And we describe the various function and security to StraaS service. Specially, we introduce KS-MMA(Key-generation System for Multilateral Matching Authentication) and SIES(Searchable Image Encryption System) as security function for streaming service and cloud computing.

The Implementation of A XML/PKI based Digital Tax Invoice System (XML/PKI기반의 전자세금계산서 시스템 구현)

  • Kim, Jin-Cheol;Oh, Young-Whan
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.85-98
    • /
    • 2004
  • As the e-Commerce based on the XML technology is getting bigger, user authentication, integrity, non-repudiation and confidentiality has become important for security. Since the XML technology is widely used for exchanging information among the Internet e-business systems, the security of XML documents is essentially required and XML digital signature should be supported. To support the digital signature of XML documents, W3C proposed the XML-Signature specification as an international standard that describes five transform algorithms. In this paper, we design and implement a XML/PKI based digital tax invoice system. Our system supports the five transforming algorithms defined in the XML-Signature specification and exchanges digital tax invoices among enterprises securely. We design and implement the flexible and efficient system consists of reusable components using CBD(Component Based Development).

A Study on the Implementation of a D-Class Computation Package based on Java (Java 기반의 D-클래스 계산 패키지 구현에 대한 연구)

  • Lim, Bum-Jun;Han, Jae-Il
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.99-104
    • /
    • 2004
  • Conventional and public-key cryptography has been widely accepted as a base technology for the design of computer security systems. D-classes have the potential for application to conventional and public-key cryptography. However, there are very few results on D-classes because the computational complexity of D-class computation is NP-complete. This paper discusses the design of algorithms for the efficient computation of D-classes and the Java implementation of them. In addition, the paper implements the same D-class computation algorithms in C and shows the performance of C and Java programming languages for the computation-intensive applications by comparing their execution results.

Design and Implementation of an Efficient Fair Off-line E-Cash System based on Elliptic Curve Discrete Logarithm Problem

  • Lee, Manho;Gookwhan Ahn;Kim, Jinho;Park, Jaegwan;Lee, Byoungcheon;Kim, Kwangjo;Lee, Hyuckjae
    • Journal of Communications and Networks
    • /
    • v.4 no.2
    • /
    • pp.81-89
    • /
    • 2002
  • In this paper, we design and implement an efficient fair off-line electronic cash system based on Elliptic Curve Discrete Logarithm Problem (ECDLP), in which the anonymity of coins is revocable by a trustee in case of dispute. To achieve this, we employ the Petersen and Poupard s electronic cash system [1] and extend it by using an elliptic curve over the finite field GF($2^n$). This naturally reduces message size by 85% compared with the original scheme and makes a smart card to store coins easily. Furthermore, we use the Baek et al. s provably secure public key encryption scheme [2] to improve the security of electronic cash system. As an extension, we propose a method to add atomicity into new electronic cash system. To the best of our knowledge, this is the first result to implement a fair off-line electronic cash system based on ECDLP with provable security.

PUM: Processing Unit Module Design of Intrusion Detector for Large Scale Network (대규모 네트워크를 위한 침입 탐지결정모듈 설계)

  • 최인수;차홍준
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.53-58
    • /
    • 2002
  • the popularity of uses for internet has been needed to information security. thereforce, intrusion, information leakage and modification, change or intentional efflux to computer system aspects of information security have been resulted in requirement of intrusion detection from outer at user authentication. this problem Presents design of PUM(Processing Unit Module) which analyze both the host log generated by sever host systems that various case for intellectualized intrusion method and network_packet on networks in large scale network.

  • PDF

A Design of Electronic Evidence-seizure Mechanism for the Response of Information-warfare (정보전 대응을 위한 전자적 증거포착 메커니즘 설계1))

  • Park, Myeong-Chan;Lee, Jong-Seop;Choe, Yong-Rak
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.285-314
    • /
    • 2004
  • The forms of current war are diversified over the pan-national industry. Among these, one kind of threats which has permeated the cyber space based on the advanced information technology causes a new type of war. C4ISR, the military IT revolution, as a integrated technology innovation of Command, Control, Communications, Computer, Intelligence, Surveillance and Reconnaissance suggests that the aspect of the future war hereafter is changing much. In this paper, we design the virtual decoy system and intrusion trace marking mechanism which can capture various attempts and evidence of intrusion by hackers in cyber space, trace the penetration path and protect a system. By the suggested technique, we can identify and traceback the traces of intrusion in cyber space, or take a legal action with the seized evidence.

  • PDF