• Title/Summary/Keyword: Updated key

Search Result 137, Processing Time 0.023 seconds

Design of KT′s Single Sign-On on Public Key Infrastructure (공개키 기반 구조에서 KT Single Sign-On 설계)

  • Yeon, Seung-Ho;Park, Hyun-Gyu;Oh, Hee-Soo;Kim, Yeong-Heon;Jun, Byoung-Min
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.231-239
    • /
    • 2002
  • This paper gives a comprehensive overview of the SSO solution design on the intranet. SSO described in this paper is based on LDAP, PKI and CA. We designed the data structure to hold many various application services by changing the attribute and DN of LDAP DB. We built LDAP DB using the employee records stored in our organization database. LDAP DB is routinely updated from the database. CA Server that depends on PKI is used to issue the certificates. SHTTP based on SSL is used to protect the data between certificate server and the intranet users.

A secure token-updated authentication scheme using security key (비밀키를 이용한 토큰 업데이트 보안 인증 기법)

  • Liang, Jun;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.89-97
    • /
    • 2007
  • Recently, a large number of authentication schemes based on smart cards have been proposed, using the thinking of OTP (one-time password) to withstand replay attack. Unfortunately, if these schemes implement on PCs instead of smart cards, most of themcannot withstand impersonation attack and Stolen-Verifier attack since the data on PCs is easy to read and steal. In this paper, a secure authentication scheme based on a security key and a renewable token is proposed to implement on PCs. A comparison with other schemes demonstrates the proposed scheme has following merits: (1) Withstanding Stolen-Verifier attack (2) Withstanding Impersonation attack (3) Providing mutual authentication; (4) Easy to construct secure session keys.

  • PDF

Hybrid Approach-Based Sparse Gaussian Kernel Model for Vehicle State Determination during Outage-Free and Complete-Outage GPS Periods

  • Havyarimana, Vincent;Xiao, Zhu;Wang, Dong
    • ETRI Journal
    • /
    • v.38 no.3
    • /
    • pp.579-588
    • /
    • 2016
  • To improve the ability to determine a vehicle's movement information even in a challenging environment, a hybrid approach called non-Gaussian square rootunscented particle filtering (nGSR-UPF) is presented. This approach combines a square root-unscented Kalman filter (SR-UKF) and a particle filter (PF) to determinate the vehicle state where measurement noises are taken as a finite Gaussian kernel mixture and are approximated using a sparse Gaussian kernel density estimation method. During an outage-free GPS period, the updated mean and covariance, computed using SR-UKF, are estimated based on a GPS observation update. During a complete GPS outage, nGSR-UPF operates in prediction mode. Indeed, because the inertial sensors used suffer from a large drift in this case, SR-UKF-based importance density is then responsible for shifting the weighted particles toward the high-likelihood regions to improve the accuracy of the vehicle state. The proposed method is compared with some existing estimation methods and the experiment results prove that nGSR-UPF is the most accurate during both outage-free and complete-outage GPS periods.

License Management Method supporting secure contents distribution in Family Domain (패밀리 도메인에서 안전한 콘텐츠 배포를 지원하는 라이센스 관리 기법)

  • Wang, Bo-Hyun;Lee, Byung-Wook
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.9-19
    • /
    • 2007
  • Superdistribution service of DRM system is an essential part for revitalization of digital contents distribution. However, it limits superdistribution range to superdistribution between consumers. Recently, as the demands of the consumer increase, the consumers want to use the contents in their multiple devices, In this paper, we propose a license management method supporting superdistribution between devices owned by a consumer, The proposed method creates domain key for device authentication by using identification informations of devices owned by a consumer and stores it in license, If devices are changed, domain key and license are updated, Through this method, contents distribution between devices can be achieved securely and efficiently, Also, this license management method can apply to superdistribution between consumers.

  • PDF

Permanent Support for Tunnels using NMT

  • Barton, Nick
    • Proceedings of the Korean Society for Rock Mechanics Conference
    • /
    • 1995.03a
    • /
    • pp.1-26
    • /
    • 1995
  • Key aspects of the Norwegian Method of Tunnelling (NMT) are reviewed. These include a predictive method of support design using the six-parameter Q-system of rock mass characterisation. The rock mass rating or Q-value is updated during tunnel driving. The designed tunnel support generally consists of wet process, steel fibre reinforced shotcrete combined with fully grouted, untensioned rock bolts, Even in poor rock conditions S(fr) + B usually acts as the final rock reinforcement and tunnel lining. Since it is a drained lining, it is very economic compared to cast concrete with membranes. Light, free-standing steel liners are used to prevent water affecting the runnel environment. Rock mass conditions, and hence lining design and cost estimation can be assessed by careful use of seismic surveys. Relationships between the P-wave velocity, the rock mass deformation modulus and the Q-value have recently been established, where tunnel depth, rock porosity and the uniaxial compression strength of the rock are important variables. The rock mass modulus estimate, and simple index testing of the joints, provide the key input which joints are discretely represented (either in two dimensions with the UDEC code or in three dimensions with the 3DEC code) is generally favoured compared to continuum analysis. The latter may give a misleading impression of uniformity and deformations tend to be understimated. Q-system NMT designs of S(fr) + B (fibre reinforced shotcrete and bolting) are numerically checked and adjustments made to bolt capacities and shotcrete thickness if overloading is evident around the modelled profile.

  • PDF

Exploring cancer genomic data from the cancer genome atlas project

  • Lee, Ju-Seog
    • BMB Reports
    • /
    • v.49 no.11
    • /
    • pp.607-611
    • /
    • 2016
  • The Cancer Genome Atlas (TCGA) has compiled genomic, epigenomic, and proteomic data from more than 10,000 samples derived from 33 types of cancer, aiming to improve our understanding of the molecular basis of cancer development. Availability of these genome-wide information provides an unprecedented opportunity for uncovering new key regulators of signaling pathways or new roles of pre-existing members in pathways. To take advantage of the advancement, it will be necessary to learn systematic approaches that can help to uncover novel genes reflecting genetic alterations, prognosis, or response to treatments. This minireview describes the updated status of TCGA project and explains how to use TCGA data.

Self Maintainable Data Warehouse Views for Multiple Data Sources (다중 데이터 원천을 가지는 데이터웨어하우스 뷰의 자율갱신)

  • Lee, Woo-Key
    • Asia pacific journal of information systems
    • /
    • v.14 no.3
    • /
    • pp.169-187
    • /
    • 2004
  • Self-maintainability of data warehouse(DW) views is an ability to maintain the DW views without requiring an access to (i) any underlying databases or (ii) any information beyond the DW views and the delta of the databases. With our proposed method, DW views can be updated by using only the old views and the differential files such as different files, referential integrity differential files, linked differential files, and backward-linked differential files that keep the truly relevant tuples in the delta. This method avoids accessing the underlying databases in that the method achieves self-maintainability even in preparing auxiliary information. We showed that out method can be applicable to the DW views that contain joins over relations in a star schema, a snowflake schema, or a galaxy schema.

Reliability analysis for fatigue damage of railway welded bogies using Bayesian update based inspection

  • Zuo, Fang-Jun;Li, Yan-Feng;Huang, Hong-Zhong
    • Smart Structures and Systems
    • /
    • v.22 no.2
    • /
    • pp.193-200
    • /
    • 2018
  • From the viewpoint of engineering applications, the prediction of the failure of bogies plays an important role in preventing the occurrence of fatigue. Fatigue is a complex phenomenon affected by many uncertainties (such as load, environment, geometrical and material properties, and so on). The key to predict fatigue damage accurately is how to quantify these uncertainties. A Bayesian model is used to account for the uncertainty of various sources when predicting fatigue damage of structural components. In spite of improvements in the design of fatigue-sensitive structures, periodic non-destructive inspections are required for components. With the help of modern nondestructive inspection techniques, the fatigue flaws can be detected for bogie structures, and fatigue reliability can be updated by using Bayesian theorem with inspection data. A practical fatigue analysis of welded bogies is utilized to testify the effectiveness of the proposed methods.

Localization of AUV Using Visual Shape Information of Underwater Structures (수중 구조물 형상의 영상 정보를 이용한 수중로봇 위치인식 기법)

  • Jung, Jongdae;Choi, Suyoung;Choi, Hyun-Taek;Myung, Hyun
    • Journal of Ocean Engineering and Technology
    • /
    • v.29 no.5
    • /
    • pp.392-397
    • /
    • 2015
  • An autonomous underwater vehicle (AUV) can perform flexible operations even in complex underwater environments because of its autonomy. Localization is one of the key components of this autonomous navigation. Because the inertial navigation system of an AUV suffers from drift, observing fixed objects in an inertial reference system can enhance the localization performance. In this paper, we propose a method of AUV localization using visual measurements of underwater structures. A camera measurement model that emulates the camera’s observations of underwater structures is designed in a particle filtering framework. Then, the particle weight is updated based on the extracted visual information of the underwater structures. The proposed method is validated based on the results of experiments performed in a structured basin environment.

Application of Norwegian Method of Tunnelling (NMT) Principles to bypass landslides in mountainous terrain

  • Bhasin, Rajinder;Aarset, Arnstein
    • Magazine of korean Tunnelling and Underground Space Association
    • /
    • v.22 no.1
    • /
    • pp.26-35
    • /
    • 2020
  • Tunnelling to bypass major landslide areas is considered as a good and long-term environmentally friendly solution to reduce an existing hazard. In Norway, hundreds of kilometres of tunnels have been constructed in areas prone to landslides and snow avalanches. Although tunnelling is considered as an expensive mitigation strategy for bypassing landslides, analysis indicate that in some cases the cost of building a tunnel can be repaid by savings in driving costs (fuel) alone over a period of 5-10 years due to reduced driving distances. The other benefits of constructing tunnels in landslide areas include savings in time and increased safety. The Norwegian Method of Tunnelling (NMT) is considered safe, efficient and cost effective compared to other tunnelling techniques. Some aspects of NMT, which are considered safe and cost efficient, are presented. The application of updated rock support techniques, including reinforced ribs of shotctrete (RRS), which is a key component of the Norwegian Method of Tunnelling (NMT), is highlighted.