• 제목/요약/키워드: Security tools

검색결과 562건 처리시간 0.026초

u-헬스케어 지원 분산 프레임워크에서 접근 제어 모델을 이용한 동적 보안 서비스 (A Dynamic Security Service using Access Control Model in Distributed Framework Support for u-Healthcare)

  • 정창원;김동호;김명희;주수종
    • 인터넷정보학회논문지
    • /
    • 제8권6호
    • /
    • pp.29-42
    • /
    • 2007
  • 본 논문은 분산 보안 정책을 지정하기 위해 객체그룹을 사용하는 u-헬스케어 컴퓨팅 환경에서 응용 서비스를 위해 동적 보안 서비스를 지원하는데 설계된 보안 객체에 대해 기술한다. 특히 u-헬스케어를 위한 분산 프레임워크의 보안 정책과 규칙 그리고 접근 제어에 사용되는 오퍼레이션을 포함한 보안 객체에 중점을 두었다. 그리고 DPD-Tool을 이용하여 서버 프로그램으로 구현된 객체들의 접근권한 부여 절차 및 클라이언트 프로그램 개발 과정을 보였다. 또한 DPD-Tool을 이용하여 모바일 모니터링 응용 개발 절차를 통해 u-헬스케어 지원 분산 프레임워크에서 지원하는 동적 보안 서비스의 수행성을 검증하였다.

  • PDF

Modernization determinants by ensuring economic security of enterprises in the competitive conditions

  • Tkachenko, Tetiana;Tulchynska, Svitlana;Kostiunik, Olena;Vovk, Olha;Kovalenko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.119-126
    • /
    • 2021
  • The study develops methodological aspects for modeling the determining impact of modernization on the enterprise's economic security in development competitive conditions using the model of speed, stability and spaciousness of modernization. Modeling the determining impact of modernization on the enterprise's economic security in a competitive conditions involves: firstly, the formation of estimated modeling indicators in accordance with the speed, stability and spaciousness of the enterprise's modernization; secondly, establishing the weight of indicators in the assessment system using the tools of cognitive judgment; thirdly, the establishment of reference values of sound evaluation indicators; fourthly, the calculations of the integrated impact assessment of the modernization's determining impact modeling on the enterprise's ensuring economic security in a competitive conditions; fifthly, conducting calculations and analytical summarization of the results. To determine a comprehensive integrated indicator of the modernization changes impact on the competitiveness and economic security of enterprises, we use the correlation method of the calculated value with the reference value, as well as use weights for groups of calculations. Approbation of modeling of determining influence of modernization on maintenance of economic safety of the enterprise in competitive conditions of development by authors was carried out concerning such enterprises, as: JSC "Ukrzaliznytsia", SE "Ukraerorukh", SE IA "Boryspil", SE "Ukrposhta", KP "Kyivpastrans".

A Novel Transfer Learning-Based Algorithm for Detecting Violence Images

  • Meng, Yuyan;Yuan, Deyu;Su, Shaofan;Ming, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.1818-1832
    • /
    • 2022
  • Violence in the Internet era poses a new challenge to the current counter-riot work, and according to research and analysis, most of the violent incidents occurring are related to the dissemination of violence images. The use of the popular deep learning neural network to automatically analyze the massive amount of images on the Internet has become one of the important tools in the current counter-violence work. This paper focuses on the use of transfer learning techniques and the introduction of an attention mechanism to the residual network (ResNet) model for the classification and identification of violence images. Firstly, the feature elements of the violence images are identified and a targeted dataset is constructed; secondly, due to the small number of positive samples of violence images, pre-training and attention mechanisms are introduced to suggest improvements to the traditional residual network; finally, the improved model is trained and tested on the constructed dedicated dataset. The research results show that the improved network model can quickly and accurately identify violence images with an average accuracy rate of 92.20%, thus effectively reducing the cost of manual identification and providing decision support for combating rebel organization activities.

서버 측 브라우저를 활용한 서비스들의 보안 위협 진단 및 안전성 검증 (Threat Diagnosis and Security Verification of Services Using Server-Side Browsers)

  • 이민상;최형기
    • 정보보호학회논문지
    • /
    • 제34권4호
    • /
    • pp.693-706
    • /
    • 2024
  • 브라우저는 웹페이지를 렌더링하여 데이터 추출, 형식 변환 그리고 개발 테스트 등의 기능을 수행하는 프로그램에서 활용된다. 브라우저를 활용하는 온라인 서비스는 브라우저 정보가 노출되거나 안전하지 않은 상태로 사용될 때 보안 문제를 야기한다. 본 논문에서는 안전한 브라우저 사용을 위해 취할 수 있는 보안 요구사항을 제시하고, 이를 만족하지 않을 시 발생하는 보안 위협을 설명한다. 실험을 통해 상용 웹 애플리케이션의 안정성을 검증하고, 브라우저가 공격 도구로 악용되는 취약 사례를 분석한다.

The Effectiveness of the Use of Distance-Evaluation Tools and Methods among Students with Learning-Difficulties from the Teachers' Point of View

  • Almaleki, Deyab A.;Khayat, Wejdan W.;Yally, Taghreed F.;Al-hajjaji, Aysha A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.243-255
    • /
    • 2021
  • This study aimed to identify the effectiveness of the use of distance-evaluation tools and methods among students with learning difficulties from the teachers' point of view, to achieve this goal. A scale was built, and the psychometric characteristics were validated. It consisted, in its final form, of 17 items distributed on four axes, in addition to three open questions. It was applied to a random sample of (149) teachers of students with learning difficulties in Makkah Region. The results showed that teachers' keenness to encourage students with learning difficulties, so that they would not feel frustrated with the distance learning process. It was also evident that teachers did not use achievement portfolios in the evaluation process. In connection with the appropriate evaluation methods, the majority indicated the use of work sheets and visual evaluation methods that rely on audio and visual skills, such as presenting videos, pictures, audio and games, and applying short objective tests. Among the proposals to improve evaluation methods and tools: Individual evaluation, attention to individual treatment, obligating personal attendance of students to school, splitting the required tasks, and not increasing the skills required to be mastered. As for the obstacles that teachers face: Lack of time, difficulty in communicating with students with distance learning difficulties and problems related to the Internet such as interruption, weakness, or lack of availability.

Digital Marketing Tools for Managing the Development of Park and Recreation Complexes

  • Chaikovska, Maryna;Mashika, Hanna;Mankovska, Ruslana;Liulchak, Zoreslava;Haida, Pavlo;Diakova, Yana
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.154-162
    • /
    • 2022
  • Digital marketing tools are actively used in managing the development of park and recreation complexes to familiarize the population with the objects of natural heritage. This article aims to empirically evaluate digital marketing tools for popularizing the park and recreational complexes. The methodology was based on the concept of ecosystem value of park and recreation complexes as a natural heritage site. These methods included: identifying and selecting websites with information about park and recreation complexes in Slovakia and Ukraine. structural analysis of the main channels of online details about natural parks. Assessing the current state of online identity of the studied sites from the perspective of Internet users. The results indicate that to manage the development of park and recreational complexes developed their driven official websites in the Internet space, on which sections structure the information with the allocation of data on tourism and recreational potential. The article identifies additional digital marketing tools for managing the development of park and recreation complexes, particularly social networks and tourist websites. There is a sufficient amount of information about tourist recreation sites within these natural parks and tourist routes. Among the main problems of the websites: the information on the websites is entirely textual, there is a lack of sufficient data on social networks, despite the created official pages, there is no video content, which was more attracted tourists and visitors, allowing a visual assessment of the tourist potential; there is a problem of many communication channels to present the natural heritage of the countries. The research proves that the website is the primary and most common digital marketing tool for natural heritage, structuring information about tourism potential and recreation.

Secure sharing method for a secret binary image and its reconstruction system

  • Lee, Sang-Su;Han, Jong-Wook
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.1240-1243
    • /
    • 2003
  • In this paper, an encryption method to share a secret binary image is proposed. It divides the image to be encrypted into an arbitrary number of images and encrypts them using XOR process with different binary random images which was prepared by the means of the XOR process, too. Each encrypted slice image can be distributed to the authenticated ones. However, we transfer the encrypted images to the binary phase masks to strengthen the security power, that means phase masks can not be copied with general light-intensity sensitive tools such as CCDs or cameras. For decryption, we used the Mach-Zehnder interferometer in which linearly polarized two light beams in orthogonal direction, respectively. The experimental result proved the efficiency of the proposed method.

  • PDF

군작전 효율화를 위한 셀룰라망 연동구조 설계 (An Architecture Design of Military Operation System Utilizing Cellular Networks)

  • 김재철;김인택
    • 안보군사학연구
    • /
    • 통권9호
    • /
    • pp.257-282
    • /
    • 2011
  • In this paper, we propose an architecture design of military operation system utilizing cellular networks. The main contribution of this paper is to provide a cost-effective military operation solution for ground forces, which is based on IT(information technology). By employing the cellular phones of officers' and non-commissioned officers' as the tools of operational communication, the proposed system can be constructed in the minimum duration and be built on the four components: command and control system, gateway, security system, and terminal(cell phone). This system is most effective for the warfare of limited area, but the effectiveness does not decrease under the total war covering the whole land of Korea. For the environmental change of near future, expanded architecture is also provided to utilize the functionalities of smart phones.

  • PDF

ISM Application Tool, A Contribution to Address the Barrier of Information Security Management System Implementation

  • Chandra, Nungky Awang;Sadikin, Mujiono
    • Journal of information and communication convergence engineering
    • /
    • 제18권1호
    • /
    • pp.39-48
    • /
    • 2020
  • Information-security management systems (ISMSs) are becoming very important, even for micro, small, and medium enterprises (MSMEs). However, implementing an ISMS is not an easy task. Many obstacles must be overcome, e.g., complexity, document tracking, competency management, and even changing cultures. The objective of our study is to provide ISMS application tools, based on ISO 27001:2013 ISM frameworks. The application was developed on the Odoo Open Enterprise Resource Planning platform. To validate its feasibility for future improvement, the application was implemented by an MSME company. For this implementation, information-security-related users gave their feedback through a questionnaire. The distributed feedback questionnaire consists of nine assessment parameters, covering topics from the application's technical aspects to users' experiences. Based on the questionnaire feedback, all users of the application were satisfied with its performance.

Design On Secure Messenger Mechanism Using Elliptic Curve Cryptography and IPSec

  • Choi Gwang-Mi;Park Su-Young;Kim Hyeong-Gyun
    • Journal of information and communication convergence engineering
    • /
    • 제2권3호
    • /
    • pp.182-186
    • /
    • 2004
  • When most of existing instant messengers log on server, they transmit to sever in encoding password to RC5. but RC5 don't be secured because it has been known many of password cracking tools. Also, messengers don't have any protection on the transmitted information with communicating two hosts since loging on, endangering the privacy of the user. As a counter measure, messengers need to provide security service including message encryption. In this paper, we designed a key exchange method of password representing fast, effective and high security degree, using ECC(Elliptic Curve Cryptography) that being known the very stronger than another public key cryptography with same key size. To effectively improve data transmission and its security using IPSec protocol between users, tunnel mode is introduced. Tunnel mode transmits Host-to-Host data through virtual pipelines on the Internet.