• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.037 seconds

A Book Retrieval System to Secure Authentication and Responsibility on Social Network Service Environments (소셜 네트워크 서비스 환경에서 안전한 사용자 인증과 효과적인 응답성을 제공할 수 있는 도서 검색시스템)

  • Moon, Wonsuk;Kim, Seoksoo;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.33-40
    • /
    • 2014
  • Since 2006, social networking services such as Facebook, Twitter, and Blog user increasing very rapidly. Furthermore demand of Book Retrieval Service using smartphone on social network service environment are increasing too. This service can to easy and share information for search book and data in several university. However, the current edition of the social services in the country to provide security services do not have the right. Therefore, we suggest a social book Retrieval service in social network environment that can support user authentication and partial filter search method on smartphone. our proposed system can to provide more speed responsiveness, effective display result on smartphone and security service.

Impacts of Wind Power Integration on Generation Dispatch in Power Systems

  • Lyu, Jae-Kun;Heo, Jae-Haeng;Kim, Mun-Kyeom;Park, Jong-Keun
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.453-463
    • /
    • 2013
  • The probabilistic nature of renewable energy, especially wind energy, increases the needs for new forms of planning and operating with electrical power. This paper presents a novel approach for determining the short-term generation schedule for optimal operations of wind energy-integrated power systems. The proposed probabilistic security-constrained optimal power flow (P-SCOPF) considers dispatch, network, and security constraints in pre- and post-contingency states. The method considers two sources of uncertainty: power demand and wind speed. The power demand is assumed to follow a normal distribution, while the correlated wind speed is modeled by the Weibull distribution. A Monte Carlo simulation is used to choose input variables of power demand and wind speed from their probability distribution functions. Then, P-SCOPF can be applied to the input variables. This approach was tested on a modified IEEE 30-bus system with two wind farms. The results show that the proposed approach provides information on power system economics, security, and environmental parameters to enable better decision-making by system operators.

A Study on Dynamic Security Assessment by using the Data of Line Power Flows (선로조류를 이용한 전력계통 동태 안전성 평가 연구)

  • Lee, Kwang-Ho
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.2
    • /
    • pp.107-114
    • /
    • 1999
  • This paper presents an application of artificial neural networks(ANN) to assess the dynamic security of power systems. The basic role of ANN is to provide assessment of the system's stability based on training samples from off-line analysi. The critical clearing time(CCT) is an attribute which provides significant information about the quality of the post-fault system behaviour. The function of ANN is a mapping of the pre-fault, fault-on, and post-fault system conditions into the CCT's. In previous work, a feed forward neural network is used to learn this mapping by using the generation outputs during the fault as the input data. However, it takes significant calculation time to make the input data through the network reduction at a fault as the input data. However, it takes significant calculation time to make the input data through the network reduction at a fault considered. In order to enhance the speed of security assessment, the bus data and line powers are used as the input data of the ANN in thil paper. Test results show that the proposed neural networks have the reasonable accuracy and can be used in on-line security assenssment efficiently.

  • PDF

A study on development of CATIA V5 file security system using CAA (CAA를 이용한 CATIA V5 파일보안시스템 개발에 관한 연구)

  • Chae H.C.;Park D.S.;Byun J.H.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.417-418
    • /
    • 2006
  • CATIA V5 is one of the most preferred softwares in product design for domestic and industrial use. But with the development of the IT industry, design data by CATIA V5 can easily be hacked and stolen especially via the internet and through assistance storage medium. The design data could be protected through executive, physical and technical security system. The best way to maintain confidentiality of data from unauthorized access is to have a cryptosystem of the technical security. In this paper, a cryptosystem for the protection of design data was being proposed. The memory contains the file information made by the New and Open function of CATIA V5. No error can be expected even if the file changed before of after the application of Save and Open function, A cryptosystem was constructed in CATIA V5 by inserting crypto algorithm before and after the I/O process. The encryption/decryption algorithm of each function was based on the complex cipher, which applied permutation cipher and transpose cipher. The file security system was programmed in CAA V5 and Visual C++.

  • PDF

A Study on Development of CATIA V5 File Security System Using CAA (CAA를 이용한 CATIA V5 파일보안시스템 개발에 관한 연구)

  • Chae, Hee-Chang;Park, Doo-Seob;Byun, Jae-Hong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.24 no.5
    • /
    • pp.77-81
    • /
    • 2007
  • CATIA V5 is one of the most preferred softwares in product design for domestic and industrial use. But with the development of the IT industry, design data by CATIA V5 can easily be hacked and stolen especially via the internet and through assistance storage medium. The design data could be protected through executive, physical and technical security system. the best way to maintain confidentiality of data from unauthorized access is to have a cryptosystem of the technical security. In this paper, a cryptosystem for the protection of design data was being proposed. The memory contains the file information made by the New and Open function of CATIA V5. No error can be expected even if the file changed before of after the application of Save and Open function. A cryptosystem was constructed in CATIA V5 by inserting crypto algorithm before and after the I/O process. The encryption/decryption algorithm of each function was based on the complex cipher, which applied permutation cipher and transpose cipher. The file security system was programmed in CAA V5 and Visual C++.

CAS-based Security System for IPTV (CAS기반 IPTV 보안 시스템)

  • Kim, Dae-Youb;Ju, Hak-Soo
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.221-226
    • /
    • 2008
  • IPTV is well known services of TPS (Triple play service). Since TPS supplies the bundle service, service providers can supply low-priced services for their subscribers. To supply high quality contents stably, it is an essential requirement to make payment for the services. According to the type of services, either CAS or DRM is used to protect the pay-contents service. Also IPTV uses or will use these security systems to protect the service. In this paper, we will describe security problems when a IPTV service provider chooses either CAS or DRM, and then propose a new security system to solve the problems.

A Study of Authentication Scheme based on Personal Key for Safety Intelligent Vehicle (안전한 지능형 자동차를 위한 개인키 기반의 인증 기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.549-554
    • /
    • 2014
  • Studies on the intelligent vehicles that are converged with IT and vehicular technologies are currently under active discussion. A variety of communication technologies for safety intelligent vehicle services are support. As such intelligent vehicles use communication technologies, they are exposed to the diverse factors of security threats. To conduct intelligent vehicle security authentication solutions, there are some factors that can be adopted ownership, knowledge and biometrics[6,7]. This paper proposes to analyze the factors to threaten intelligent vehicle, which are usually intruded through communication network system and the security solution using biometric authentication scheme. This study proposed above user's biometrics information-based authentication scheme that can solve the anticipated problems with an intelligent vehicle, which requires a higher level of security than existing authentication solution.

How to enhance the security and operation of Self Bag Drop systems (SBD(Self Bag Drop) Systems의 보안 및 운영 개선 방안에 대한 연구)

  • Kim, Ha-na;Kwon, Pilje;Lee, Kang-seok
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.26 no.3
    • /
    • pp.55-65
    • /
    • 2018
  • The SBD systems have made it possible that all boarding procedures are completed by passengers. With the SBD, air tickets can be issued and baggage can be consigned without the help of airline officers. This way, the SBD can improve the passenger circulation speed as well as decrease the time for passengers to wait for check-in, which is connected to the reduction of airlines' operaitonal costs. However, given that the SBD is a new technology, it has potentials to be used as a tool for air terrorism. This study purposes to determine methods to enhance the security and operation of SBD systems. With the aim, this paper investigated the existing literature on SBDs, self-check-in, airport security, air terrorism, risk management, aviation accidents, and information security. In order to compile real-time information about the SBD operations, twelve airports in North America, Europe, and Asia were analyzed based on existing studies on international SBD trends.

A Graphical User Interface Design for Surveillance and Security Robot (감시경계 로봇의 그래픽 사용자 인터페이스 설계)

  • Choi, Duck-Kyu;Lee, Chun-Woo;Lee, Choonjoo
    • The Journal of Korea Robotics Society
    • /
    • v.10 no.1
    • /
    • pp.24-32
    • /
    • 2015
  • This paper introduces a graphical user interface design that is aimed to apply to the surveillance and security robot, which is the pilot program for the army unmanned light combat vehicle. It is essential to consider the activities of robot users under the changing security environment in order to design the efficient graphical user interface between user and robot to accomplish the designated mission. The proposed design approach firstly identifies the user activities to accomplish the mission in the standardized scenarios of military surveillance and security operation and then develops the hierarchy of the interface elements that are required to execute the tasks in the surveillance and security scenarios. The developed graphical user interface includes input control component, navigation component, information display component, and accordion and verified by the potential users from the various skilled levels with the military background. The assessment said that the newly developed user interface includes all the critical elements to execute the mission and is simpler and more intuitive compared to the legacy interface design that was more focused on the technical and functional information and informative to the system developing engineers rather than field users.

A Study on National Economic Loss and Economic Effects of Security Measures against (Voice)Phishing ((보이스)피싱의 국가경제손실과 보안효과 연구)

  • Shin, Jin;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.157-160
    • /
    • 2012
  • (Voice)Phishing against the old or weak person used the method which is social engineering in the object and financial structure and function. Until recently (voice)Phishing from Chaina caused economic devastation and the economic loss by Phishing grows with the South Korean whole. Korean government and organizations involved have been strengthening protection system and a financial security device. But it is not easy to verify how much effects of security measures are. In this paper we will study the economic loss caused by (voice)Phishing and economic efficiency of security measures and security device reinforcement of the Republic of Korea.

  • PDF