• Title/Summary/Keyword: database security

Search Result 649, Processing Time 0.028 seconds

A NFC-based Business Card Management System for Secure Many-to-many Communication (안전한 다대다 통신을 위한 NFC 기반의 명함 관리 시스템)

  • Ko, Kyoung-ah;Seo, Hee-eun;Nam, Yunyoung
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.13-20
    • /
    • 2015
  • This paper proposes a Near Field Communication (NFC) communication system that exchanges information of digital business cards efficiently for many to many communication to solve inconvenience of one-to-one communication when people exchanges business cards each other in meetings such as conference, forum, seminar. The proposed system can provide people to exchange contact information one-to-one as well as multiple members at once using a digital business card system that consists a server and a database based on NFC communication. The system has been developed to collect business card information from a NFC reader and to transfer it directly to a smartphone application effectively. The system can manage business card information with the application effectively and provide security in order to prevent from leakage of private information when transferring contact data.

Robustness of Face Recognition to Variations of Illumination on Mobile Devices Based on SVM

  • Nam, Gi-Pyo;Kang, Byung-Jun;Park, Kang-Ryoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.1
    • /
    • pp.25-44
    • /
    • 2010
  • With the increasing popularity of mobile devices, it has become necessary to protect private information and content in these devices. Face recognition has been favored over conventional passwords or security keys, because it can be easily implemented using a built-in camera, while providing user convenience. However, because mobile devices can be used both indoors and outdoors, there can be many illumination changes, which can reduce the accuracy of face recognition. Therefore, we propose a new face recognition method on a mobile device robust to illumination variations. This research makes the following four original contributions. First, we compared the performance of face recognition with illumination variations on mobile devices for several illumination normalization procedures suitable for mobile devices with low processing power. These include the Retinex filter, histogram equalization and histogram stretching. Second, we compared the performance for global and local methods of face recognition such as PCA (Principal Component Analysis), LNMF (Local Non-negative Matrix Factorization) and LBP (Local Binary Pattern) using an integer-based kernel suitable for mobile devices having low processing power. Third, the characteristics of each method according to the illumination va iations are analyzed. Fourth, we use two matching scores for several methods of illumination normalization, Retinex and histogram stretching, which show the best and $2^{nd}$ best performances, respectively. These are used as the inputs of an SVM (Support Vector Machine) classifier, which can increase the accuracy of face recognition. Experimental results with two databases (data collected by a mobile device and the AR database) showed that the accuracy of face recognition achieved by the proposed method was superior to that of other methods.

A New Dynamic-ID based RFID Mutual Authentication Protocol Eliminated Synchronization Problem (동기화 문제를 해결한 새로운 동적 아이디기반 RFID 상호 인증 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.469-480
    • /
    • 2008
  • The recently proposed RFID(Radio Frequency Identification) authentication protocol based on a hash function can be divided into two types according to the type of information used for authentication between a reader and a tag: either a value fixed or one updated dynamically in a tag memory. In this paper, we classify the protocols into a static ID-based and a dynamic-ID based protocol and then analyze their respective strengths and weaknesses. Also, we define a new security model including forward/backward traceability, synchronization, forgery attacks. Based on the model, we analyze the previous protocols and propose a new dynamic-ID based RFID mutual authentication protocol. Our protocol provide enhanced RFID user privacy compared to previous protocols and identify a tag efficiently in terms of the operation quantity of a tag and database.

Implementation of AMGA GUI Client Toolkit : AMGA Manager (AMGA GUI Client 툴킷 구현 : AMGA Manager)

  • Huh, Tae-Sang;Hwang, Soon-Wook;Park, Guen-Chul
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.3
    • /
    • pp.421-433
    • /
    • 2012
  • AMGA service, which is one of the EMI gLite middleware components, is widely used for analysis of distributed large scale experiments data as metadata repository by scientific and technological researchers and the use of AMGA is extended farther to include general industries needing metadata Catalogue as well. However AMGA, based unix and Grid UI, has the weakness of being absence of general-purpose user interfaces in comparison to other commercial database systems and that's why it's difficult to use and diffuse it although it has the superiority of the functionality. In this paper, we developed AMGA GUI toolkit to provide work convenience using object-oriented modeling language(UML). Currently, AMGA has been used as the main component among many user communities such as Belle II, WISDOM, MDM, and so on, but we expect that this development can not only lower the barrier to entry for AMGA beginners to use it, but lead to expand the use of AMGA service over more communities.

Study on the Current Status of Data Science Curriculum in Library and Information Science and its Direction (문헌정보학과의 데이터 사이언스 커리큘럼 개발 실태와 방향성 고찰)

  • Kang, Ji Hei
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.3
    • /
    • pp.343-363
    • /
    • 2016
  • This study determines 69 iSchools provided which data science curriculum, and presents the direction for Korean LIS schools. It is certain that iSchools extend their subject territory including areas related to health, technology and biotechnology. However, this phenomenon is not actively observed in Korea. iSchools also focus on the area about how to process and manage data. iSchools, in deed, offer courses regarding data science, data management and data security. The 'database' was a higher proportion of 'data warehouse' curriculum, and, 'data statistic and analysis' curriculum are forming similar portion. As a result of analysis of the iSchool's curriculum and comparison with Korean curriculum, this study suggests: the expansion of LIS curriculum related to data science; the enhanced role of the data translational data science; development of curriculum to raise the mathematical analysis capabilities, development of specialized curriculum and experimental classes; and support new knowledge skills to interact with technology.

Countermeasure against Fire Disaster in Regional Heritage Villages on the Concept of ICT-Based Disaster Prevention Design

  • Park, Sun-Gyu;Mishima, Nobuo;Noh, Hwang-Woo;Yoo, Jae-Soo;Oh, Sang-Hoon;Min, Byung-Won;Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.11 no.1
    • /
    • pp.62-68
    • /
    • 2015
  • Many severe earthquakes have occurred along the main fault lines in the world. In recent years, there has been a high incidence of small- and large-scale earthquakes in our country. These occurrences of earthquakes have become increasingly serious, owing to a degrading earth environment. An earthquake, in general, causes far more serious damages like disruptions in electricity or gas facilities, and fire disasters from its annexed effects than by its vibrations or the shock itself. In this paper, we present a countermeasure and its necessity in safeguarding against fire disasters in regional heritage villages such as "Asan Oeam," "Jeonju Hanok," and "Andong Hahoe." A more systematic and effective strategy for prevention systems against severe fire disasters is proposed after performing various related investigations and analyses of existing domestic and international systems. We investigated the existing fire security systems and their historical records with the tendency of earthquake occurrences in these three folk villages. In this proposal, we present a strategic approach for safeguarding against fire damages in our regional heritage villages derived from ICT (information communication technology)-based DPD (disaster prevention design), after examining the laws and regulations of fire-prevention strategies in Japan, America, and Europe.

The Development of Aerial Navigation Map and Aerial Photographic Guidance System (항공항법지도와 항공사진 촬영안내 시스템의 개발)

  • Hwang, Jin-Sang;Lee, Jae-One;Yoon, Jong-Seong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.7 no.3
    • /
    • pp.70-78
    • /
    • 2004
  • The aerial photographic mission is a difficult work because aircraft must be flown along the specified flight lines, not marked on the ground. This study has been carried out for the development of aerial photographic guidance system, which enables us to make aerial photographic task easier. Such a flight guidance system is able to display a variety of map informations in a quick and efficient way in order to guide pilot. For this purpose, we first developed the nationwide aerial navigation map database that provides the topographic map information used for topographic interpretation and aeronautical chart information used for the flight security. Next, we developed the aerial photographic guidance system which uses the aerial navigation map as base map. It is concluded that the developed system can display the various map informations quickly and do any other photographing guidance tasks well in fast moving airplane.

  • PDF

Certificate Revocation Scheme based on the Blockchain for Vehicular Communications

  • Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.93-101
    • /
    • 2020
  • Regional CRL(certificate revocation list) in vehicular communications is to partition Full CRL into several small CRLs according to geographic location to keep the size of individual CRLs with smaller. However, since a Regional CRL includes vehicle's revoked certificates within its administrative region, it has to know vehicle' location. For this, how to know vehicle' location effectively corresponding to every region represents a major challenge. This paper proposes a Regional CRL scheme which is envisioned to achieve vehicle's location and to make regional CRLs according to vehicles current location efficiently. The scheme is based on the short-lived pseudonyms defined by WAVE standard. It also acquires issued pseudonyms, vehicle's id and region information whenever a vehicle initiates pseudonyms refill after that, utilizes them to create and distribute the Regional CRL. To keep location privacy-preserving for vehicles, the scheme uses the blockchain technology in the network. The analysis results show that it reduces CRL size and database query time for finding revoked certificates sharply in the vehicle's on-board unit.

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data (포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구)

  • Lee, Gyu-an;Shin, young-Tae;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.175-184
    • /
    • 2006
  • Computer Forensics functions by defending the effects and extracting the evidence of the side effects for production at the court. Has the faultlessness of the digital evidence been compromised during the investigation, a critical evidence may be denied or not even be presented at the trial. The presented monograph will deliberate the faultlessness-establishing chain procedures in disk forensics, system forensics, network forensics, mobile forensics and database forensics. Once the faultlessness is established by the methods proposed, the products of investigation will be adopted as a leading evidence. Moreover, the issues and alternatives in the reality of digital investigation are presented along with the actual computer forensics cases, hopefully contributing to the advances in computer digital forensics and the field research of information security.

  • PDF

Research on Effective Scientific Investigation Methods with Regards to Explosion Accidents (폭발사고시 효과적인 과학수사 방법에 관한 연구)

  • Jun, Sang-Gun;Chae, Jong-Min
    • Journal of forensic and investigative science
    • /
    • v.1 no.1
    • /
    • pp.72-87
    • /
    • 2006
  • Accidents and terrorist acts that utilize explosives have a great influence on society and thus require a prompt investigation for the arrest of the culprit. However, such investigations are often met with difficulties due to the vastness of the crime scene, restrictions on approaching the scene, fragility of the evidence, complexity of investigation, and the lack of expertise. In spite of such facts, scientific investigation regarding explosives have not been widely studied in Korea. Therefore, the focus of this research primarily concerns the effective scientific investigation methods in cases of accidents that involve chemical explosives. Although the a systematic investigation method is at the heart of scientific investigation in cases of explosive accidents, it is only at its rudimentary stage. Therefore, in this research, a systematic investigation method is put forth for the 'scene investigation, the documentation of the scene, and the collection and processing of evidence. Further, I have set forth a 'scene investigation check list' the ensure a thorough scene investigation and to promote an exhaustive evidence collection that would guarantee the admissibility of such evidence in court. The above efforts were aimed at simplifying the currently complicated investigation system. 1) In the future, a guidebook that can be generally applied to accidents involving explosives in Korea ught to be produced, a continual systematic education and integrated training excises for investigators ought to be established, laws that require additives in explosives ought to be instituted so that the type, components, and source of explosives can be identified, and lastly, a database that contain information on former explosion accidents, trends, and techniques of criminal activities that involve explosion accidents should be compiled.

  • PDF