• Title/Summary/Keyword: agreement protocols

Search Result 115, Processing Time 0.029 seconds

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud

  • Xiong, Jinbo;Yao, Zhiqiang;Ma, Jianfeng;Liu, Ximeng;Li, Qi;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.282-304
    • /
    • 2014
  • Each cloud service has numerous owners and tenants, so it is necessary to construct a privacy preserving identity management and access control mechanism for cloud computing. On one hand, cloud service providers (CSP) depend on tenant's identity information to enforce appropriate access control so that cloud resources are only accessed by the authorized tenants who are willing to pay. On the other hand, tenants wish to protect their personalized service access patterns, identity privacy information and accessing newfangled cloud services by on-demand ways within the scope of their permissions. There are many identity authentication and access control schemes to address these challenges to some degree, however, there are still some limitations. In this paper, we propose a new comprehensive approach, called Privacy pReserving Identity and Access Management scheme, referred to as PRIAM, which is able to satisfy all the desirable security requirements in cloud computing. The main contributions of the proposed PRIAM scheme are threefold. First, it leverages blind signature and hash chain to protect tenant's identity privacy and implement secure mutual authentication. Second, it employs the service-level agreements to provide flexible and on-demand access control for both tenants and cloud services. Third, it makes use of the BAN logic to formally verify the correctness of the proposed protocols. As a result, our proposed PRIAM scheme is suitable to cloud computing thanks to its simplicity, correctness, low overhead, and efficiency.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

Anonymous Ad Hoc Routing Protocol based on Group Signature (그룹서명에 기반한 익명성을 제공하는 애드 혹 라우팅 프로토콜)

  • Paik, Jung-Ha;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.15-25
    • /
    • 2007
  • According to augmentation about interesting and demanding of privacy over the rest few years, researches that provide anonymity have been conducted in a number of applications. The ad hoc routing with providing anonymity protects privacy of nodes and also restricts collecting network information to malicious one. Until recently, quite a number of anonymous routing protocols have been proposed, many of them, however, do not make allowance for authentication. Thus, they should be able to have vulnerabilities which are not only modifying packet data illegally but also DoS(denial of service) attack. In this paper, we propose routing protocol with providing both anonymity and authentication in the mobile ad hoc network such as MANET, VANET, and more. This scheme supports all of the anonymity properties which should be provided in Ad Hoc network. In addition, based on the group signature, authentication is also provided for nodes and packets during route discovery phase. Finally, route discovery includes key-agreement between source and destination in order to transfer data securely.

How do imaging protocols affect the assessment of root-end fillings?

  • Fernanda Ferrari Esteves Torres;Reinhilde Jacobs;Mostafa EzEldeen;Karla de Faria-Vasconcelos;Juliane Maria Guerreiro-Tanomaru;Bernardo Camargo dos Santos;Mario Tanomaru-Filho
    • Restorative Dentistry and Endodontics
    • /
    • v.47 no.1
    • /
    • pp.2.1-2.11
    • /
    • 2022
  • Objectives: This study investigated the impact of micro-computed tomography (micro-CT)-based voxel size on the analysis of material/dentin interface voids and thickness of different endodontic cements. Materials and Methods: Following root-end resection and apical preparation, maxillary premolars were filled with mineral trioxide aggregate (MTA), Biodentine, and intermediate restorative material (IRM) (n = 24). The samples were scanned using micro-CT (SkyScan 1272; Bruker) and the cement/dentin interface and thickness of materials were evaluated at voxel sizes of 5, 10, and 20 ㎛. Analysis of variance and the Tukey test were conducted, and the degree of agreement between different voxel sizes was evaluated using the Bland and Altman method (p < 0.05). Results: All materials showed an increase in thickness from 5 to 10 and 20 ㎛ (p < 0.05). When evaluating the interface voids, materials were similar at 5 ㎛ (p > 0.05), while at 10 and 20 ㎛ Biodentine showed the lowest percentage of voids (p < 0.05). A decrease in the interface voids was observed for MTA and IRM at 20 ㎛, while Biodentine showed differences among all voxel sizes (p < 0.05). The Bland-Altman plots for comparisons among voxel sizes showed the largest deviations when comparing images between 5 and 20 ㎛. Conclusions: Voxel size had an impact on the micro-CT evaluation of thickness and interface voids of endodontic materials. All cements exhibited an increase in thickness and a decrease in the void percentage as the voxel size increased, especially when evaluating images at 20 ㎛.

Vulnerability Analysis of Remote Multi-Server User Authentication System Based on Smart Card and Dynamic ID (스마트 카드 및 동적 ID 기반 멀티서버 원격 사용자 인증 프로토콜의 취약점 분석)

  • Kwon Soon Hyung;Byeon Hae won;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.43-52
    • /
    • 2023
  • Many businesses and organizations use smartcard-based user authentication for remote access. In the meantime, through various studies, dynamic ID-based remote user authentication protocols for distributed multi-server environments have been proposed to protect the connection between users and servers. Among them, Qiu et al. proposed an efficient smart card-based remote user authentication system that provides mutual authentication and key agreement, user anonymity, and resistance to various types of attacks. Later, Andola et al. found various vulnerabilities in the authentication scheme proposed by Qiu et al., and overcame the flaws in their authentication scheme, and whenever the user wants to log in to the server, the user ID is dynamically changed before logging in. An improved authentication protocol is proposed. In this paper, by analyzing the operation process and vulnerabilities of the protocol proposed by Andola et al., it was revealed that the protocol proposed by Andola et al. was vulnerable to offline smart card attack, dos attack, lack of perfect forward secrecy, and session key attack.

Survey on Radiotherpv Protocols for the Rectal Cancers Among the Korean Radiation Oncologists in 2002 for the Development of the Patterns of Care Study of Radiation Therapy (방사선치료 Patterns of Care Study 개발을 위한 2002년 한국 방사선종양학과 전문의들의 직장암 방사선치료 원칙 조사연구)

  • Kim, Jong-Hoon;Kim, Dae-Yong;Kim, Young-Ho;Kim, Woo-Chul;Kim, Chul-Yong;Sung, Jin-Shil;Son, Seung-Chang;Shin, Hyun-Su;An, Young-Chan;Oh, Do-Hum;Oh, One-Yong;Yu, Mi-Ryung;Yu, Hung-Jun
    • Radiation Oncology Journal
    • /
    • v.21 no.1
    • /
    • pp.44-65
    • /
    • 2003
  • Purpose : To conduct nationwide surgery on the principles In radiotherapy for rectal center, and develop the framework of a database of Korean Patterns of Care Study. Materials and Methods : A consensus committee was established to develop a tool for measuring the Patterns in radiotherapy Protocols for rectal cancer. The Panel was composed of radiation oncologists from 18 hospitals in Seoul Wetropolltan area. The committee developed a survey format to analyze radiation oncologist's treatment principles for rectal cancer. The survey items developed for measuring the treatment principles were composed of 1) 8 eliglblllty criteria, 2) 20 Items for staging work-ups and prognostic factors, 3) 7 Items for principles of combined surgery and chemotherapy, 4) 9 patient set-ups, 5) 19 determining radiation fields, 6) S radiotherapy treatment pians, 7) 4 physicalilaboratory examination to monitor a patient's condition during treatment, and 8) 10 follow-up evaluations. These items were sent to radiation oncoioglsts In charge of gastrolntestlnal malignancies in all hospitals (48 hospitals) In Korea to which 30 replies were received (63$\%$). Results : Most of the surrey Items were replied to without no major between the repliers, but with the fellowing items only 50$\%$ of repliers were in agreement : 1) Indications of preoperative radiation, 2) use of endorectal ultrasound, CT scan, and bone scan for staging work-ups, 3) principles of combining chemotherapy with radiotherapy, 4) use of contrast material for small bowel delineation during simulation, 5) determination of field margins, and 6) use of CEA and colonoscopy for follow-up evaluations. Conclusions : The Items where considerable disaggrement was shown among the radiation oncologists seemed to make no serious difference In the treatment outcome, but a practical and reasonable consensus should be reached by the committee, with logical processes of agreement. These Items can be used for a basic database for the Patterns of Care Study, which will survey the practical radiotherapy Patterns for rectal cancer in Korea.

A Study on the Financial Service Negotiations in the Korean-Chinese Free-Trade Agreement (FTA) with Respect to RMB Internationalization (위안화 국제화를 고려한 한·중 FTA 금융서비스 협상 전략에 관한 연구)

  • Kim, Sang-Su;Son, Sam-Ho
    • Journal of Distribution Science
    • /
    • v.11 no.4
    • /
    • pp.81-88
    • /
    • 2013
  • Purpose - This paper analyzes the influence of the RMB internationalization on the KRW/dollar exchange rate using an autoregressive distributed lag model. Comparing the parameter estimators from the sample period before and after the global financial crisis, we found that the RMB/dollar exchange rate has increasingly become more influential on the KRW/dollar exchange rate. Moreover, for the past several years, the Chinese government has actively utilized the financial service FTA negotiation as a measure for the RMB internationalization. This paper simultaneously considers RMB internationalization and financial service negotiations in the Korean-Chinese FTA. The purpose of this paper is to explicitly suggest a direction for the financial service negotiations in the Korean-Chinese FTA considering the effects of RMB internationalization. Research design, data, and methodology - The research plan of this paper has two parts. First, for an empirical study, this paper uses the daily exchange rate of the U.S. dollar against the currencies of the ASEAN5, Taiwan,and Korea. By using an autoregressive distributed lag model, this paper studies the influence of the change in the RMB/dollar exchange rate on changes in the local currency/dollar exchange rate in seven economies neighboring China. Our sample periods are 06/2005 - 07/2008 and 06/2010 -02/2013. During these periods, China was under the multi-currency basket system. We exempted the period of 08/2008 - 05/2010 from the analysis because there was nearly no RMB/dollar exchange rate fluctuation during those months. Second, after analyzing the recent financial service liberalizations and deregulations in China, we recommend a direction for the financial service negotiations in the Korean-Chinese FTA. In the past several years,the main Chinese financial policy agenda has surrounded the RMB internationalization. Therefore, it is crucial to understand this in the search for strategies for the financial service negotiations in the Korean-Chinese FTA. This paper employs an existing literature survey and examines the FTA protocols in its research methodology. Results and Conclusions - After the global financial crisis, the Chinese government wanted to break away from the dollar influence and pursued independent RMB internationalization in order to continue the growth and stability of its economy. Hence, every neighboring economy of China has been strategically impacted by RMB internationalization. Nevertheless, there is little empirical study on the influence of RMB internationalization on the KRW/dollar exchange rate. This paper is one of the few studies to analyze this problem comprehensively. By using a relatively simple estimation model, we can confirm that the coefficient of the RMB/dollar exchange rate has become more significant, except in the case of Indonesia. Although Korea is not under the multi-currency basket system but under the weakly controlled floating exchange rate system, its coefficient appears as large as that of the ASEAN5. This is the basis of the currency cooperation that has grown from the expansion of trade between the two countries. These empirical results suggest that the Korean government should specifically consider the RMB internationalization in the Korean-Chinese FTA negotiations.

  • PDF

Abdominal Digital Radiography with a Novel Post-Processing Technique: Phantom and Patient Studies (새로운 후처리 기술을 이용한 복부 디지털 방사선 촬영: 팬텀과 환자 연구)

  • Hyein Kang;Eun Sun Lee;Hyun Jeong Park;Byung Kwan Park;Jae Yong Park;Suk-Won Suh
    • Journal of the Korean Society of Radiology
    • /
    • v.81 no.4
    • /
    • pp.920-932
    • /
    • 2020
  • Purpose The aim of this study was to evaluate the diagnostic image quality of low dose abdominal digital radiography processed with a new post-processing technique. Materials and Methods Abdominal radiographs from phantom pilot studies were post-processed by the novel and conventional post-processing methods of our institution; the proper dose for the subsequent patient study of 49 subjects was determined by comparing image quality of the two preceding studies. Two radiographs of each patient were taken using the conventional and derived dose protocols with the proposed post-processing method. The image details and quality were evaluated by two radiologists. Results The radiation dose for the patient study was derived to be half of the conventional method. Overall half-dose image quality with the proposed method was significantly higher than that of the conventional method (p < 0.05) with moderate inter-rater agreement (κ = 0.60, 0.47). Conclusion By applying the new post-processing technique, half-dose abdominal digital radiography can demonstrate feasible image quality compared to the full-dose images.

Deep Learning-Based Computed Tomography Image Standardization to Improve Generalizability of Deep Learning-Based Hepatic Segmentation

  • Seul Bi Lee;Youngtaek Hong;Yeon Jin Cho;Dawun Jeong;Jina Lee;Soon Ho Yoon;Seunghyun Lee;Young Hun Choi;Jung-Eun Cheon
    • Korean Journal of Radiology
    • /
    • v.24 no.4
    • /
    • pp.294-304
    • /
    • 2023
  • Objective: We aimed to investigate whether image standardization using deep learning-based computed tomography (CT) image conversion would improve the performance of deep learning-based automated hepatic segmentation across various reconstruction methods. Materials and Methods: We collected contrast-enhanced dual-energy CT of the abdomen that was obtained using various reconstruction methods, including filtered back projection, iterative reconstruction, optimum contrast, and monoenergetic images with 40, 60, and 80 keV. A deep learning based image conversion algorithm was developed to standardize the CT images using 142 CT examinations (128 for training and 14 for tuning). A separate set of 43 CT examinations from 42 patients (mean age, 10.1 years) was used as the test data. A commercial software program (MEDIP PRO v2.0.0.0, MEDICALIP Co. Ltd.) based on 2D U-NET was used to create liver segmentation masks with liver volume. The original 80 keV images were used as the ground truth. We used the paired t-test to compare the segmentation performance in the Dice similarity coefficient (DSC) and difference ratio of the liver volume relative to the ground truth volume before and after image standardization. The concordance correlation coefficient (CCC) was used to assess the agreement between the segmented liver volume and ground-truth volume. Results: The original CT images showed variable and poor segmentation performances. The standardized images achieved significantly higher DSCs for liver segmentation than the original images (DSC [original, 5.40%-91.27%] vs. [standardized, 93.16%-96.74%], all P < 0.001). The difference ratio of liver volume also decreased significantly after image conversion (original, 9.84%-91.37% vs. standardized, 1.99%-4.41%). In all protocols, CCCs improved after image conversion (original, -0.006-0.964 vs. standardized, 0.990-0.998). Conclusion: Deep learning-based CT image standardization can improve the performance of automated hepatic segmentation using CT images reconstructed using various methods. Deep learning-based CT image conversion may have the potential to improve the generalizability of the segmentation network.

Reproducibility of Adenosine Tc-99m sestaMIBI SPECT for the Diagnosis of Coronary Artery Disease (관동맥질환의 진단을 위한 아데노신 Tc-99m sestaMIBI SPECT의 재현성)

  • Lee, Duk-Young;Bae, Jin-Ho;Lee, Sang-Woo;Chun, Kyung-Ah;Yoo, Jeong-Soo;Ahn, Byeong-Cheol;Ha, Jeoung-Hee;Chae, Shung-Chull;Lee, Kyu-Bo;Lee, Jae-Tae
    • The Korean Journal of Nuclear Medicine
    • /
    • v.39 no.6
    • /
    • pp.473-480
    • /
    • 2005
  • Purpose: Adenosine myocardial perfusion SPECT has proven to be useful in the detection of coronary artery disease, in the follow up the success of various therapeutic regimens and in assessing the prognosis of coronary artery disease. The purpose of this study is to define the reproducibility of myocardial perfusion SPECT using adenosine stress testing between two consecutive Tc-99m sestaMIBI (MIBI) SPECT studies in the same subjects. Methods: Thirty patients suspected of coronary artery disease in stable condition underwent sequential Tc-99m MIBI SPECT studies using intravenous adenosine. Gamma camera, acquisition and processing protocols used for the two tests were identical and no invasive procedures were performed between two tests. Mean interval between two tests were 4.1 days (range: 2-11 days). The left ventricular wall was divided into na segments and the degree of myocardial tracer uptake was graded with four-point scoring system by visual analysis. Images were interpretated by two independent nuclear medicine physicians and consensus was taken for final decision, if segmental score was not agreeable. Results: Hemodynamic responses to adenosine were not different between two consecutive studies. There were no serious side effects to stop infusion of adenosine and side effects profile was not different. When myocardial uptake was divided into normal and abnormal uptake, 481 of 540 segments were concordant (agreement rate 89%, Kappa index 0.74). With four-grade storing system, exact agreement was 81.3% (439 of 540 segments, tau b=0.73). One and two-grade differences were observed in 97 segments (18%) and 4 segments (0.7%) respectively, but three-grade difference was not observed in any segment. Extent and severity scores were not different between two studios. The extent and severity scores of the perfusion defect revealed excellent positive correlation between two test (r value for percentage extent and severity score is 0.982 and 0.965, p<0.001) Conclusion: Hemodynamic responses and side effects profile were not different between two consecutive adenosine stress tests in the same subjects. Adenosine Tc-99m sestaMIBI SPECT is highly reproducible, and could be used to assess temporal changes in myocardial perfusion in individual patients.