• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.042 seconds

A Design and Implementation of Two-Phase Server Login Authentication System based on XML-Signature Extension (XML-Signature 확장을 통한 2단계 서버 로그인 인증 시스템의 설계 및 구현)

  • Kim, Yong-Hwa;Kim, Jin-Sung;Kim, Yong-Sung
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.321-330
    • /
    • 2007
  • This paper proposes a two-phase server login authentication system by XML-Signature schema extension to protect server's information resources opened on network which offer various web contents. A proposed system requests and publishes XML-based certificate through on-line, registers certificate extension information provided by CA(Certification Authority) to XCMS(XML Certificate Management Server), and performs prior authentication using user's certificate password. Then, it requests certificate extension information added by user besides user's certificate password and certificate extension information registered in XCMS by using SOAP message, and performs posterior authentication by comparing these certificate extension information. As a result, a proposed system is a security reinforced system compared with existing systems.

A Study on u-paperless and secure credit card delivery system development

  • Song, Yeongsim;Jang, Jinwook;jeong, Jongsik;Ahn, Taejoon;Joh, Joowan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.4
    • /
    • pp.83-90
    • /
    • 2017
  • In the past, when the credit card was delivered to the customer, the postal agreement and receipt were signed by customer. The repossessed documents were sent back to the card company through the reorganization process. The card company checks the error by scanning and keeps it in the document storage room. This process is inefficient in cost and personnel due to delivery time, document print out, document sorting, image scanning, inspection work, and storage. Also, the risk of personal data spill is very high in the process of providing personal information. The proposed system is a service that receives a postal agreement and a receipt to a recipient when signing a credit card, signing the mobile image instead of paper, and automatically sending it to the card company server. We have designed a system that can protect the cost of paper documents, complicated work procedures, delivery times and personal information. In this study, we developed 'u-paperless' and secure credit card delivery system applying electronic document and security system.

Development of the Recommender System of Arabic Books Based on the Content Similarity

  • Alotaibi, Shaykhah Hajed;Khan, Muhammad Badruddin
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.175-186
    • /
    • 2022
  • This research article develops an Arabic books' recommendation system, which is based on the content similarity that assists users to search for the right book and predict the appropriate and suitable books pertaining to their literary style. In fact, the system directs its users toward books, which can meet their needs from a large dataset of Information. Further, this system makes its predictions based on a set of data that is gathered from different books and converts it to vectors by using the TF-IDF system. After that, the recommendation algorithms such as the cosine similarity, the sequence matcher similarity, and the semantic similarity aggregate data to produce an efficient and effective recommendation. This approach is advantageous in recommending previously unrated books to users with unique interests. It is found to be proven from the obtained results that the results of the cosine similarity of the full content of books, the results of the sequence matcher similarity of Arabic titles of the books, and the results of the semantic similarity of English titles of the books are the best obtained results, and extremely close to the average of the result related to the human assigned/annotated similarity. Flask web application is developed with a simple interface to show the recommended Arabic books by using cosine similarity, sequence matcher similarity, and semantic similarity algorithms with all experiments that are conducted.

A Whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device (모바일 단말을 이용한 Whitelist 기반 비인가 AP 탐지 및 접속 차단 기법)

  • Park, Jungsoo;Park, Minho;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.632-640
    • /
    • 2013
  • In this paper, we proposed a system in a wireless LAN environment in case of security threats, the mobile terminal and the remote server-based WLAN security. The security of the wireless LAN environment in the recent technology in a variety of ways have been proposed and many products are being launched such as WIPS and DLP. However, these products are expensive and difficult to manage so very difficult to use in small businesses. Therefore, in this paper, we propose a security system, wireless LAN-based terminal and a remote server using whitelist according to development BYOD market and smartphone hardware. The proposed system that AP and personal device information to be stored on the server by an administrator and Application installed on a personal device alone, it has the advantage that can be Applicationlied to a variety of wireless network environment.

A Study on Developmental Plan of In-Flight Security Officer in Korea - Focused on U.S. Federal Air Marshal Service - (항공기내보안요원제도의 발전 방안에 관한 연구 - 미국 연방 Air Marshal 제도를 중심으로-)

  • Park, Hee-Kyun;Moon, Jun-Seob
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.83-105
    • /
    • 2017
  • The purpose of this study is to identify the problems of In-Flight Security Officer responsible for the security of the aircraft in the situation where Acts of Unlawful Interference in Aircraft shows an increasing tendency and the aircraft security is threatened by the terror threat of IS(Daesh) and to suggests its policy implications. Based on the problems of In-Flight Security Officer system found in the media reports and laws, the US Air Marshal system and the domestic similar system were presented to the In-Flight Security Officer developmental implications. First, it is necessary to revise the "Operational Guidelines for Airline Operators' In-Flight security officer" and the related qualifications to the "National Technical Qualifications" system. Second, the plan to change the national civil servants of In-Flight Security Officer in the aircraft, Third, it is a plan to use the registered security guard system in the aircraft. Although this study has limitations the accessibility of information related to aviation security. But, contributions of this study is that the government's efforts to create the public sector jobs, the "strengthening of public services in the country", "the establishment of national accountability for safety accident prevention and disaster safety management" in the "A five-year plan for Government Operation" that it has a timeliness in that it is together. In addition, since there are not many researches related to In-Flight Security Officer, this study also has another contribution as a basic study of the researchers in the aviation security aircraft in the future.

  • PDF

A Mobile Printing System based on User Authentication using NFC Tag (NFC 태그를 이용한 사용자 인증 기반의 모바일 프린팅 시스템)

  • Lee, Eun-Mi;Choi, Ok-Kyung;Yeh, Hong-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.41-43
    • /
    • 2012
  • 스마트 폰의 빠른 보급으로 인하여 공간적 제약 없이 문서를 확인 할 수 있는 환경으로 변화하고 있다. 이러한 변화에 맞추어 모바일 상에서 문서를 확인하고 바로 프린터를 할 수 있는 기술이 각광을 받고 있다. 환경적 변화에 따라 프린터를 통한 개인정보 유출 가능성이 증가되고 있으나 이에 대한 보안 기법은 매우 미미한 상태이다. 이에 따라, 본 연구에서는 모바일 프린팅 시스템에서 개인정보 유출을 줄이고자 차세대 근거리 통신 방법으로 자리 잡고 있는 NFC 태그를 이용한 모바일 단말기와 프린터의 인증을 통하여 프린터 출력물을 이용한 개인정보 유출을 방지하고자 한다.

A Rolling Image based Virtual Keyboard Resilient to Spyware on Smartphones (스마트폰 환경에서 스파이웨어에 저항하는 동적 이미지 기반 가상 키보드 기법)

  • Na, Sarang;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1219-1223
    • /
    • 2013
  • Due to the fundamental features of smartphones, such as openness and mobility, a great deal of malicious software including spyware can be installed more easily. Since spyware can steal user's sensitive information and invade privacy, it is necessary to provide proper security mechanisms like secure virtual keyboards. In this paper, we propose a novel password input system to resist spyware and show how effectively it can reduce the threats.

The Design of Security Information Management System of CORBA Security with Using Repository (Repository를 활용한 CORBA Security의 보안정보관리 시스템 설계)

  • Ryu, Ki-Young;Kim, Ki-Bong;Jin, Seong-Il;In, So-Ran
    • Annual Conference of KIPS
    • /
    • 2000.10a
    • /
    • pp.15-18
    • /
    • 2000
  • 분산객체 처리 환경에서 CORBA 를 기반으로 한 응용 객체간에 전달되는 정보에 대하여 보안을 유지하기 위해 요구되는 보안 정보를 관리하는 기법을 제안하고 이들을 관리하기 위한 보안정책 들의 객체들을 효율적으로 관리하기 위하여 Repository 응용 방안을 제시하였다.

  • PDF

The Design and Implementation of Diameter Server Management System (Diameter Server 를 위한 관리시스템의 설계 및 구현)

  • Ham, Young-Hwan;Chung, Byung-Ho;Chung, Kyo-Il
    • Annual Conference of KIPS
    • /
    • 2003.11b
    • /
    • pp.1313-1316
    • /
    • 2003
  • 최근에 공공장소에서의 보다 안정적이고 고속의 무선 인터넷 접속에 대한 욕구가 커지면서 무선랜에 대한 수요가 많아지고 있고, 유무선 사업자들은 무선랜 시장을 선점하기 위해서 서비스를 서두르고 있다. 이와 같은 무선랜환경에서 안전하게 사용자를 인증하고 서비스를 제공하기 위한 AAA 프로토콜로 Diameter Protocol 표준이 정의되었다. 이와 같은 Diameter base Protocol 표준의 관리를 위한 MIB 구조가 Diameter Base MIB에 정의되어 있다. 본 논문에서는 무선단말 사용자를 인증시켜 주고 무선랜서비스를 허가해주는 Diameter Server 를 관리하기 위한 관리 시스템을 위의 MIB 을 기준으로 해서 설계하고 구현하였다.

  • PDF

A Study on the results of Technical Risk Analysis based IDS Assessment Methodology (기술적 위험분석 결과를 활용한 IDS 평가방법에 관한 연구)

  • Shim, Mi-Na;Cho, Sang-Hyun;Lim, Jong-In
    • Annual Conference of KIPS
    • /
    • 2005.11a
    • /
    • pp.945-948
    • /
    • 2005
  • 현재 침입탐지시스템(IDS:Intrusion Detection System)은 다양한 평가요소들 - 탐지율, 오탐율, 새로운 공격탐지능력, 안정성 등을 기준으로 평가되고 있고, 이러한 결과는 제품의 보호수준을 결정하거나 한 조직의 정보보호장치로 적합한지를 평가하는 벤치마킹테스트의 방법으로 활용된다. 그러나, 이러한 평가의 결과는 조직의 침입탐지시스템을 구축하고자 하는 네트워크 환경하에서 각각의 침입탐지시스템이 갖는 특성에 따라 상대적인 평가는 가능하나 해당 조직의 네트워크 인프라와 위협요소, 취약점을 고려했을 때 보다 최적의 것이 무엇인지를 평가하는 방법으로는 한계가 있다. 그러므로, 본 연구논문에서는 이러한 한계를 극복하기 위한 방법으로서 조직의 정보보호 위험분석에서 도출된 해당 네트워크 환경의 자산, 위협, 취약성의 결과인 위험과 위험수준을 IDS 평가에 반영하여 조직의 환경하에 보다 적합한 침입탐지시스템 선정이 가능한 평가방법을 제안한다.

  • PDF