• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.033 seconds

Theoretical Foundations of the Evolution of the Use of Multimedia Technologies in Modern IT Education in Ukraine

  • Zbanatska, Oksana;Zadorozhnya, Olena;Hurbanska, Antonina;Hurbanska, Svitlana;Grinberg, Larysa;Melnyk, Alla
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.473-476
    • /
    • 2021
  • The article used a complex system of research methods: observation of the course of the educational process, analysis of literature on pedagogy, teaching methods, modern pedagogical technologies; analysis of the experience of using multimedia in the study of disciplines. The theoretical significance of the article: the definition of multimedia programs is given, the advantages and disadvantages of using multimedia programs are revealed, the basic principles of teaching using multimedia programs are revealed.

Theoretical And Technological Aspects Of Intelligent Systems: Problems Of Artificial Intelligence

  • Frolov, Denys;Radziewicz, Wojciech;Saienko, Volodymyr;Kuchuk, Nina;Mozhaiev, Mykhailo;Gnusov, Yurii;Onishchenko, Yurii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.35-38
    • /
    • 2021
  • The article discusses approaches to the definition and understanding of artificial intelligence, research directions in the field of artificial intelligence; artificial intelligence in the anthropological dimension; the importance of the systems approach as a methodological basis for the design of intelligent systems; structural and functional components of intelligent systems; intelligent systems in the technological aspect; problems and prospects of relations in the system "man - intellectual system".

Fault Diagnosis with Adaptive Control for Discrete Event Systems

  • El Touati, Yamen;Ayari, Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.165-170
    • /
    • 2021
  • Discrete event systems interact with the external environment to decide which action plan is adequate. Some of these interactions are not predictable in the modelling phase and require consequently an adaptation of the system to the metamorphosed behavior of the environment. One of the challenging issues is to guarantee safety behavior when failures tend to derive the system from normal status. In this paper we propose a framework to combine diagnose technique with adaptive control to avoid unsafe sate an maintain the normal behavior as long as possible.

A Generic Multi-Level Algorithm for Prioritized Multi-Criteria Decision Making

  • G., AlShorbagy;Eslam, Hamouda;A.S., Abohamama
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.25-32
    • /
    • 2023
  • Decision-making refers to identifying the best alternative among a set of alternatives. When a set of criteria are involved, the decision-making is called multi-criteria decision-making (MCDM). In some cases, the involved criteria may be prioritized by the human decision-maker, which determines the importance degree for each criterion; hence, the decision-making becomes prioritized multi-criteria decision-making. The essence of prioritized MCDM is raking the different alternatives concerning the criteria and selecting best one(s) from the ranked list. This paper introduces a generic multi-level algorithm for ranking multiple alternatives in prioritized MCDM problems. The proposed algorithm is implemented by a decision support system for selecting the most critical short-road requests presented to the transportation ministry in the Kingdom of Saudi Arabia. The ranking results show that the proposed ranking algorithm achieves a good balance between the importance degrees determined by the human decision maker and the score value of the alternatives concerning the different criteria.

Electronic Cash Protocol Using the Magic Ink Signature (매직 잉크 서명 기법을 이용한 전자 현금 프로토콜 설계)

  • 백종현;염흥열
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.354-367
    • /
    • 1997
  • Chaum's blind signature scheme is the typical withdrawal procedure of electronic cash. In blind signature scheme, a signer sign a document while he never knows the content of the signed document. Yung and Jakobsson presented new signature scheme with which the content of document can be unblinded if unusual activity is detected. This signature is referred to as the magic ink signature. In this paper, we analyze the magic ink signature, and present two new magic ink signature schemes using KCDSA and Schnorr signature algorithm. We propose two types of the efficient electonic cash system using these magic ink signature schemes. One is the electronic cash system with a single server magic init signature scheme, and the other is the electronic cash system with a distributed magic ink signature scheme.

  • PDF

Certificate Management System, Related Technologies, and its Requirements

  • Kim Chan-Young;Oh Sang-Jo
    • Management & Information Systems Review
    • /
    • v.2
    • /
    • pp.195-208
    • /
    • 1998
  • We have experienced tremendous growth in commercial use of Internet especially in the last couple of years, and the rate of growth does not appear to be slowing down. As the Internet becomes a dominant platform for electronic commerce, all involved parties of electronic commerce are concerned about security of transactions. Various technologies are adopted to enhance the security of business transactions. This paper briefly discusses certificate technology and a way to minimize the business risk of certificate authority in a form of system requirements of CMS(Certificate Management System).

  • PDF

Design of Wireless Threat Management System (무선망 위협 관리 시스템(W-TMS : Wireless Threat Management System) 설계에 관한 연구)

  • Seo Jong-Won;Lee Hyung-Woo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.654-657
    • /
    • 2006
  • 무선 네트워크의 가장 큰 이점은 이동성에 있다. 따라서 사용자들은 네트워크에 접속하면서 자유롭게 로밍(이동)할 수 있다. 그 이동성의 전제는 물리적인 매체 없이 네트워크에 접속이 가능하다는 것이다. 그러나 이러한 이점에도 불구하고 유선 네트워크에서의 기초적인 물리적 보안기반 구조를 무선네트워크에서는 제공하고 있지 않다는 것이다. 하지만 무선 네트워크가 기존 유선 네트워크에 비해 대역폭이 적다는 이유로 성능감소를 우려하는 사용자들은 보안 알고리즘 적용을 꺼려왔고 쉽게 해킹의 대상이 되어 왔다. 이에 본 논문에서는 특정 네트워크에 국한되지 않으면서도 유연성을 제공하는 W-TMS(Wireless Threat Management System) 시스템을 설계하여 기존 무선 네트워크 환경에서 보안 취약성을 보안하면서 안전성을 강화할 수 있는 무선망 보안 시스템을 제안한다.

  • PDF

Biometrics System for User Authentication in e-biz (전자상거래에서 사용자 인증을 위한 생체측정 시스템)

  • 조동욱;이내준;한길성
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1329-1338
    • /
    • 2001
  • This paper describes the biometrics system for user authentication in electronic commerce. At present, social demands are increasing for information security techniques against the information wiretapping in open communications network. For this, these techniques such as anti-virus, firewall, VPN, authentication, cryptography, public key based systems and security management systems have been developed. This Paper discusses the user authentication for the implementation of efficient electronic payment systems. In particular. user authentication system has keen developed using biometrics techniques and the effectiveness of this paper is demonstrated by several experiments.

  • PDF

Quorum based Peer to Peer Key Sharing Protocol over Wireless Sensor Networks

  • Yang, Soong-Yeal;Won, Nam-Sik;Kim, Hyun-Sung;Lee, Sung-Woon
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.445-448
    • /
    • 2008
  • The key establishment between nodes is one of the most important issues to secure the communication in wireless sensor networks. Some researcher used the probabilistic key sharing scheme with a pre-shared key pool to reduce the number of keys and the key disclosure possibility. However, there is a potential possibility that some nodes do not have a common share in the key pool. The purpose of this paper is to devise a peer to peer key sharing protocol (PPKP) based on Quorum system and Diffie-Hellman key exchange scheme (DHS). The PPKP establishes a session key by creating a shared key using the DHS and then scrambles it based on Quorum system to secure that. The protocol reduces the number of necessary keys than the previous schemes and could solve the non-common key sharing possibility problem in the probabilistic schemes.

  • PDF

Design of Collaborative BOM Management System for Small and Medium Enterprises (중소 제조기업을 위한 협업환경지원 BOM 관리 시스템 설계)

  • Kim, Bo-Hyun;Jung, So-Young;Baek, Jae-Yong;Lee, Sung-Jin;Lee, Seok-Woo;Choi, Hun-Zong
    • Korean Journal of Computational Design and Engineering
    • /
    • v.14 no.4
    • /
    • pp.254-260
    • /
    • 2009
  • Most commercial PDM (product data management) systems, which have been released recently by overseas famous software vendors, are still expensive and heavy to apply to small and medium enterprises (SMEs). Proposed in this paper are an architecture and functions of collaborative BOM (bill-of-material) management system (cBOM-MS) which supports the internal BOM management by BOM Navigator, provides SMEs with constructing the collaborative BOM via Collaborative BOM Portal, and proposes an interface to extract BOM automatically from commercial CAD systems. In the design of cBOM-MS, BOM Navigator and cBOM Portal are positioned separately to reinforce the information security about product data during product development process.