• Title/Summary/Keyword: Security problem

Search Result 2,533, Processing Time 0.032 seconds

Privacy leakage security system research for small physical companies (중소 경호.경비업체의 개인정보 유출 방지를 위한 보안 체계 연구)

  • Kang, Poo-Reum;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.87-97
    • /
    • 2012
  • Privacy of personal information disclosure incident occurs frequently as a problem to our society's most important and sensitive social agenda is emerging. Personal information is actually more accurate, depending on the type or types of economic value and sensitivity, the quality of the information, because it can cause a spill a serious social threat and systematic personal information protection and management are not carried out and the information society in a big mess can result. Customers my affairs when small guard security companies, especially the sensitive personal information of customers who need to work, the collected information be leaked or the company's trade secrets, are exposed on the outside, it could be a serious threat to a greater problem cause. Small escort guard companies, however, compared with large companies to build its own security system, due to issues such as the extent of funding, staffing shortages, there are many difficulties. Status of Information Security, scale and analyze the characteristics of small escort guard companies occupied by guard security companies in the present study, sleep, look at him in the solution of the practical issues of information protection system laid small guard. Expenses supplier of propose a security system for preventing the leakage of personal information.

Building an Electronic Approval Module Using Multi-Level Security (다중등급 보안 정책을 적용한 전자결재 모듈의 개발)

  • 김진성;안병혁
    • The Journal of Information Systems
    • /
    • v.11 no.1
    • /
    • pp.175-198
    • /
    • 2002
  • This paper is to develop a security module for electronic approval systems. Electronic documents are created, transmitted and saved in the company's intranet computer network. Transmitting electronic documents, however, brings us a security problem. Communications among various computer systems are exposed to many security threats. Those threats are eavesdropping, repudiation, replay back etc. The main purpose of this paper is to develop a module which provides the security of electronic documents while they are passed from one place to another This paper applies Multi-Level security to the electronic approval system that guarantees security of electronic documents from many threats. Multi-Level security controls the access to the documents by granting security level to subject users and object electronic documents. To prevent possible replay back attacks, this paper also uses one time password to the system. The security module is composed of client program and server one. The module was developed using Microsoft Visual Basic 6.0 and Microsoft SQL Server 7.0. The code uses Richard Bondi's WCCO(Wiley CryptoAPI COM Objects) library functions which enables Visual Basic to access Microsoft CryptoAPI.

  • PDF

Multilevel Security Management for Global Transactions

  • Jeong, Hyun-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.735-738
    • /
    • 2000
  • The most important issue in database security is correct concurrency control under the restrictive security policy. The goal of secure transaction management is to keep security and provide many concurrent users with the high availability of database. In this paper, we consider the security environment of multidatabase system with replicated data. The read-from relationship in the existed serializability is improper in security environment. So, we define new read-from relationship and propose new secure 1-copy quasi-seriailzability by utilizing this relationship and display some examples. This security environment requires both the existed local autonomy and the security autonomy as newly defined restriction. To solve covert channel problem is the most difficult issue in developing secure scheduling scheme. The proposed secure 1-copy quasi-serializability is very proper for global transactions in that this serializability not violates security autonomy and prevents covert channel between global transactions.

  • PDF

Solving the Travelling Salesman Problem Using an Ant Colony System Algorithm

  • Zakir Hussain Ahmed;Majid Yousefikhoshbakht;Abdul Khader Jilani Saudagar;Shakir Khan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.55-64
    • /
    • 2023
  • The travelling salesman problem (TSP) is an important combinatorial optimization problem that is used in several engineering science branches and has drawn interest to several researchers and scientists. In this problem, a salesman from an arbitrary node, called the warehouse, starts moving and returns to the warehouse after visiting n clients, given that each client is visited only once. The objective in this problem is to find the route with the least cost to the salesman. In this study, a meta-based ant colony system algorithm (ACSA) is suggested to find solution to the TSP that does not use local pheromone update. This algorithm uses the global pheromone update and new heuristic information. Further, pheromone evaporation coefficients are used in search space of the problem as diversification. This modification allows the algorithm to escape local optimization points as much as possible. In addition, 3-opt local search is used as an intensification mechanism for more quality. The effectiveness of the suggested algorithm is assessed on a several standard problem instances. The results show the power of the suggested algorithm which could find quality solutions with a small gap, between obtained solution and optimal solution, of 1%. Additionally, the results in contrast with other algorithms show the appropriate quality of competitiveness of our proposed ACSA.

A Study on Performance Analysis of Digital Signature Based on the Security (안전성에 근거를 둔 디지털서명 성능분석에 관한 연구)

  • 이지영
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.2
    • /
    • pp.39-45
    • /
    • 1999
  • In this paper we will look at its cryptographic analysis for digital signature and compare it with other complexity measures such as discrete logarithm problem and factorization problem which are based on the security. The paper especially tries to computational complexity so that it can compare and checks the performance analysis, comparison of data size and processing speed through the simulation me

  • PDF

A "Paradoxical" identity-based scheme based on $\gamma^{th}$-residuosity problem and discrete logarithm problem (고차잉여류 문제와 이산대수 문제에 기반을 둔 역석적인 id-based암호 시스템)

  • 박성준
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.4 no.2
    • /
    • pp.90-118
    • /
    • 1994
  • 본 논문에서는 certificatoin-based 방식이 아닌 id-based방식이면서도 사용자가 자신의 비밀키를 선택할 수 있는 역설적인 id-based 방식을 제안한다. 제안한 방식은 Girault가 제안한 self-certified공개키 개념을 id-based방식에 적용한 것이다. 제안한 방식의 안전성은 고차잉여류 문제와 이산대수 문네에 기반을 두고 있다.

Optimal Solution of Classification (Prediction) Problem

  • Mohammad S. Khrisat
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.129-133
    • /
    • 2023
  • Classification or prediction problem is how to solve it using a specific feature to obtain the predicted class. A wheat seeds specifications 4 3 classes of seeds will be used in a prediction process. A multi linear regression will be built, and a prediction error ratio will be calculated. To enhance the prediction ratio an ANN model will be built and trained. The obtained results will be examined to show how to make a prediction tool capable to compute a predicted class number very close to the target class number.

Mobile IPv6 Problem with Firewalls (Mobile IPv6 환경에서 방화벽 사용에 관한 문제점)

  • Ha Dong-Joo;Youm Heung-Youl
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.741-744
    • /
    • 2006
  • Mobile IPv6은 방화벽의 사용을 전혀 고려하지 않은 채 설계되었다. 그렇기 때문에 방화벽을 사용하는 네트워크에서는 정상적으로 동작하지 않는 문제가 생긴다. 본 논문에서는 일반적인 방화벽의 패킷 판단에 사용되는 상태테이블에 관하여 설명하고, Mobile IPv6 환경에서 방화벽을 사용함으로써 생기는 문제점을 알아본 뒤 향후 Mobile IPv6 환경에서의 방화벽 사용에 관한 연구의 방향을 제안한다.

  • PDF

A New Identification Scheme Based on Conjugacy Problem (땋임군에서의 개인식별기법의 제안)

  • Kim, Jin;Kim, Kwang-Jo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.417-421
    • /
    • 2003
  • 2000년 고기형 등이 발표한 땋임군상에서의 공개키 암호시스템은 후속적으로 다양한 이론적 분석 및 응용기법이 연구되고 있다 땋임군에서의 공개키 암호화기법과 서명기법은 기존에 제안되었으나 개인식별기법은 제안된 바가 없다. 본 논문에서 우리는 땋임군에서의 서명기법에 바탕을 둔 개인식별기법을 제안하고 그 안전성을 증명한다.

  • PDF

Voltage Control and Security Assessment of Power System Using Mixed Integer Linear Programming (혼합정수 선형계획법을 이용한 계통의 전압제어 및 안전도 평가)

  • 김두현;김상철
    • Journal of the Korean Society of Safety
    • /
    • v.14 no.2
    • /
    • pp.70-76
    • /
    • 1999
  • In this paper, a mixed-integer programming approach is presented for adjusting the voltage profiles in a power system. The advent of large-scaled system makes the reactive power and voltage problem-an attempt to achieve an overall improvement of system security, service quality and economy-more complex and seriously, Although the problem is originally a nonlinear optimization problem, it can be formulated as a mixed integer linear programming(MILP) problem without deteriorating of solution accuracy to a certain extent. The MILP code is developed by the branch and bound process search for the optimal solution. The variable for modeling transformer tap positions is handled as discrete one, and other variables continuous ones. Numerical data resulting from case study using a modified IEEE 30 bus system with outaged line show that the MILP can produce more reductions of magnitude in the operating cost. The convergence characteristics of the results are also presented and discussed.

  • PDF