• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.081 seconds

Information Security in Hospital Information Exchange System (의료 정보 교환 시스템의 정보 보안)

  • 홍동완;주한규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.460-462
    • /
    • 2001
  • 국내외적으로 의료 데이터의 전산 자동화 처리에 관심과 노력이 기울여 진 후 대부분의 병원에 의료 정보 시스템이 보급되었다. 의료 데이터가 컴퓨터 시스템에 저장되어 병원 내 각 부서별 자원의 공유가 가능하거나 병원 간 자료 전송이 원활하게 이루어진다면 오프라인으로 처리 및 보관하는데서 발생하는 자료의 관리 노력과 비용을 절감할 수 있다. 또한 인터넷 전용선과 광케이블의 보급으로 인하여 원격 시스템 사용이 원활하게 진행될 전망이며, 치료 정도 시스템의 경우 원격 진료 및 환자 정보 검색이 가능하게 된다. 하지만 의료 데이터가 인터넷을 통해 전송될 경우 환자의 사생활 침해 및 의사와 환자 간의 비밀 보장이 파괴될 우려가 남아있게 된다. 데이터 접근 권한 및 데이터 전송에서 오는 보안 기법이 확립되어야 하나, 국내의 경우 의료 정보 유출에 대한 법령과 체계적인 지침 등이 미흡한 상태이다. 이에 본 논문에서는 전자 문서 교환 표준으로 제안되고 있는 XML을 이용하여 의료 데이터가 전송 공유 가능한 병원 정보 교환 시스템(Hospital Information Exchange System : HIES)을 구축하고 데이터 접근 및 전송에 적용 가능한 보안 기법을 소개하고 있다.

  • PDF

Loyalty of On-line Stock Trading Customers (온라인 증권거래 고객의 충성도)

  • Lee Min-Hwa
    • The Journal of Information Systems
    • /
    • v.14 no.2
    • /
    • pp.155-172
    • /
    • 2005
  • Securities companies which faced with severe competition should not only attract new customers but also retain their on-line customers. This study examines the factors affecting loyalty of on-line stock trading customers. The research model based on the previous studies was established and the research hypotheses were generated. The test results based on the data gathered from 87 users of on-line stock trading services show that user satisfaction, learning cost, transaction fees, and reputation influence customer loyalty. User satisfaction, learning cost and reputation are positively related to customer loyalty, whereas transaction fee is negatively related to customer loyalty. The results also support that information quality and system quality are positively related to user satisfaction. The hypothesis that transaction fee is related to user satisfaction is not supported. There is no significant information to say that security risk is related to user satisfaction. It is considered that the study results may help managers to increase customer retention.

  • PDF

3D Information based Visualization System for Real-Time Teleoperation of Unmanned Ground Vehicles (무인 지상 로봇의 실시간 원격 제어를 위한 3차원 시각화 시스템)

  • Jang, Ga-Ram;Bae, Ji-Hun;Lee, Dong-Hyuk;Park, Jae-Han
    • The Journal of Korea Robotics Society
    • /
    • v.13 no.4
    • /
    • pp.220-229
    • /
    • 2018
  • In the midst of disaster, such as an earthquake or a nuclear radiation exposure area, there are huge risks to send human crews. Many robotic researchers have studied to send UGVs in order to replace human crews at dangerous environments. So far, two-dimensional camera information has been widely used for teleoperation of UGVs. Recently, three-dimensional information based teleoperations are attempted to compensate the limitations of camera information based teleoperation. In this paper, the 3D map information of indoor and outdoor environments reconstructed in real-time is utilized in the UGV teleoperation. Further, we apply the LTE communication technology to endure the stability of the teleoperation even under the deteriorate environment. The proposed teleoperation system is performed at explosive disposal missions and their feasibilities could be verified through completion of that missions using the UGV with the Explosive Ordnance Disposal (EOD) team of Busan Port Security Corporation.

Invariant Biometric Key Extraction based on Iris Code (홍채 코드 기반 생체 고유키 추출에 관한 연구)

  • Lee, Youn-Joo;Lee, Hyung-Gu;Park, Kang-Ryoung;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1011-1014
    • /
    • 2005
  • In this paper, we propose a method that extracts an invariant biometric key in order to apply this biometric key to the crypto-biometric system. This system is a new authentication architecture which can improve the security of current cryptographic system and solve the problem of stored template protection in conventional biometric system, also. To use biometric information as a cryptographic key in crypto-biometric system, same key should be generated from the same person. However, it is difficult to obtain such an invariant biometric key because biometric data is sensitive to surrounding environments. The proposed method solves this problem by clustering Iris Codes obtained by using independent component analysis (ICA).

  • PDF

Dynamic Dependability Level Switching Strategies by Utilizing Threat Predictions

  • Lim, Sung-Hwa
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • A System can be more Dependable from some types of Threats if the Dependability Level Against the Threat on the System is Increased. However, The Dependability-performance Tradeoff should be Considered because the Increased Dependability may Degrade the Performance of the System. Therefore, it is Efficient to Temporally Increase the Dependability Level to High only when an Threat is Predicted on the System in a Short time while Maintaining the Level in Low or mid in Normal Situations. In this Paper, we Present a Threat Prevention Strategy for a Networked Node by Dynamically Changing the Dependability Level According to the Threat Situation on its Logically/physically Neighboring Nodes. As case Studies, we Employ our Strategy to an Internet Server Against TCP SYN Flood Attacks and to a Checkpoint and Rollback System Against Transient Faults. Our Performance Analysis Shows that our Strategy can Effectively Relieve the Damage of the Failure without Serious Performance Degradation.

Wired and Wileless Dualization Algorithm for Tension Sensing Smart Fence System (스마트 철조망 장력센서를 위한 유무선 이중화 알고리즘)

  • Kim, Jang-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1071-1076
    • /
    • 2015
  • This paper proposed an efficient algorithm for tension sensing smart fence system with wireless sensor transmission module installation and alarming services. The wired transmission system demonstrates high accuracy and low latency, but the cost is expensive and transmission error may occur. For these reasons, this paper presented to use wireless transmission communication using Zigbee module technology in order to decrease delay and latency and solve the battery issues.

Map Reduce-based P2P DBaaS Hub system

  • Jung, Yean-Woo;Lee, Jong-Yong;Jung, Kye-Dong
    • International journal of advanced smart convergence
    • /
    • v.5 no.1
    • /
    • pp.16-22
    • /
    • 2016
  • The database integration is being emphasized to one way of the companies collaboration. To database integration, companies are use like one database what their own, it can be provided more efficient service to customer. However, there exist some difficulty to database integration. that is the database security and database heterogeneity problems. In this paper, we proposed the MapReduce based p2p DBaaS hub system to solve database heterogeneity problem. The proposed system provides an environment for companies in the P2P cloud to integrate a database of each other. The proposed system uses DBaaS Hub for a collection of data in the P2P cloud, and use MapReduce for integrating the collected data.

Security Simulation with Collaboration of Intrusion Detection System and Firewall (침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.1
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF

An Implementation of a Security Token System using USB (USB를 이용하는 보안 토큰 시스템의 구현)

  • 김영진;반성범;정용화
    • Proceedings of the IEEK Conference
    • /
    • 2002.06e
    • /
    • pp.285-288
    • /
    • 2002
  • The match-on-token is a system which executes the user-authentication on the system using the user's biometric information. Nowadays, due to increase of request of the secure user-authentication on various parts, it comes to more use. In this paper, the match-on-token system under development by ETRI is described. The system consists of a host and an emulator board. USB is employed as the communication channel between them. First, the hooting code of the emulator board was programmed and tested in order that USB programs and the finger-print matching program can be executed correctly. Then, host programs cooperating with the board was designed, implemented and tested. Finally, future research including optimization of applications on the match-on-token will be mentioned.

  • PDF

A Comparative Study on ACH and Fedwire as a Cross-Border Payment System (국제전자결제시스템으로서 ACH와 Fedwire의 비교연구)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.139-154
    • /
    • 2008
  • This research want to discuss some issues about payment system of America. This research focuses on comparing ACH with Fedwire. Firstly Fedwire is the payment system for only large-dollar transfer(Large-Value Transfer System; LVTS), while ACH(Automated Clearing House)payment mainly applies a consumer account. Secondly ACH transaction is either credit or debit transfer, while Fedwire is only credit transfer. Thirdly the communication system of Fedwire has twoway method, telephonelike communication network, but ACH is oneway store and forward electronic mail. At present LVTS divides into RTGS(Real-Time Gross Settlement) and DNS(Deferred Net Settlement). However Fedwire uses either RTGS(instantaneous for every transaction) or DNS(net net transaction) but ACH uses only DNS(net net transaction). Fourthly ACH is substantially cheaper than the Fedwire payment. lastly security is important in both Fedwire and ACH, it is even more crucial in Fedwire In addition, for each transaction, Fedwire may entail individual instantaneous confirmation to the originator and notification to the receiver, whereas ACH do not.

  • PDF