• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.034 seconds

Design and Implementation of The Spam I-Mail filtering System (컨텐츠 필터를 이용한 스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.465-468
    • /
    • 2003
  • E-mail, one of the oldest services in internet becomes very important and essential way to communicate with development of internet. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or bad things, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF

Advances in Cyber-Physical Systems Research

  • Wan, Jiafu;Yan, Hehua;Suo, Hui;Li, Fang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1891-1908
    • /
    • 2011
  • Cyber-physical systems (CPSs) are an emerging discipline that involves engineered computing and communicating systems interfacing the physical world. The widespread applications of CPSs still face enormous challenges because of the lack of theoretical foundations. In this technical survey, we review state-of-the-art design techniques from various angles. The aim of this work is to provide a better understanding of this emerging multidisciplinary methodology. The features of CPSs are described, and the research progress is analyzed using the following aspects: energy management, network security, data transmission and management, model-based design, control technique, and system resource allocation. We focus on CPS resource optimization, and propose a system performance optimization model with resource constraints. In addition, some classic applications (e.g., integrating intelligent road with unmanned vehicle) are provided to show that the prospects of CPSs are promising. Furthermore, research challenges and suggestions for future work are outlined in brief.

A Design for Single Web Authentication at Network Service Foundation (네트워크 서비스 기반의 단일 웹 인증 설계)

  • Lee, Jae-Wan;Ban, Kyung-Sig;Kim, Hyoung-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.457-460
    • /
    • 2007
  • Recently, Network companies have introduced security solutions to protect the network from intrusions, attacks and viruses but the network has still weakness and vulnerability. It is time to bring more stable and reliable authentication system that would meet the Internet user's need. In this study, Current broadband networks don't have hierarchic and stable authentication solutions. And so, an integrated and hierarchic system is needed to provide a various kinds of application services.

  • PDF

A Comparative Study on the Electronic Payment System between United States and Korea (한국과 미국의 전자결제제도 비교연구 -고객보호관련 주요쟁점을 중심으로-)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.11 no.1
    • /
    • pp.27-43
    • /
    • 2009
  • This article explored the customers protection regulations in electronic payment system by Article 4A of the UCC and EFTA of 1978 and by Electronic Financial Transaction Act of Korea. Both Korea and America have various regulations to protect concerned parties(customers). For examples, the errors of payment order, money-back guarantee, and unauthorized payment order etc. First, this Article focuses on the allocation of risk of loss caused by ambiguous term in payment orders that do not express the subjective intention of the senders. Second, most rights and obligations created by Article 4A of America can be varied with the agreement of affected parties. But there are some exceptions. The exceptions include the money-back guarantee. So Receiving bank have to pay to originator the ordered money included interest. However, Korea also has money-back guarantee but bank do not pay interest to sender. Lastly, Electronic Funds Transfer Act of 1978 and Regulation E has US$ 50 regulation in order to protect customers on the unauthorized payment order. Article 4A imposes duty to detect unauthorized payment orders to originator in relation to the establishment of commercially reasonable security procedure, while Korean law imposes the duty to notify the bank in order to decrease the loss resulted from unauthorized payment order.

  • PDF

A Comparison Study for Optimal Implementation of the EDI Systems of Port Logistics (항만물류 EDI 시스템의 최적 구현을 위한 비교 분석)

  • 김현수;박남규;한계섭;최형림;조재형
    • The Journal of Information Systems
    • /
    • v.10 no.2
    • /
    • pp.103-128
    • /
    • 2001
  • At present, the EDI systems are indispensable software in port logistics industry. Currently, a monopolistic VAN/EDI service provider operates the EDI services. The current EDI client software has the 2-tier fat client/server architecture. However, the current EDI software is lack of Web interface and causes lots of cost for maintenance. Therefore, a variety of implementation architecture has been being tried by using script, XML and distributed object-oriented technology. Web/EDI and XML/EDI are the new EDI systems, However, the EDI systems have some limitations such as speed. This study intends to compare the variety implementation architecture for the EDI systems in the users' perspective and explore the strong and weak points of each architecture. We compared the EDI systems based on our experience of more than 2-years of implementation project for the EDI systems of port logistics. We categorized the EDI systems as client application EDI, Web EDI using script, XML/EDI, and 3-tier distributed object-oriented EDI system. We compared them with criteria such as speed, program maintenance, easiness of implementation and usage, security, and load balancing and fail-over. Finally we discuss the direction of optimal EDI system architecture for the future.

  • PDF

A Design and Implementation of Camera Information File Creation Tool for Efficient Recording Data Search in Surveillance System (보안 관제 시스템에서 효율적인 영상 검색을 위한 카메라 연동 정보 파일 자동 생성 도구의 설계 및 구현)

  • Hwang, Gi-Jin;Park, Jae-Pyo;Yang, Seung-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.55-61
    • /
    • 2016
  • For the purpose of video security equipment is to protect personal property and life against from terrorism or recent threats. In this study, if you proceed with the recorded data search, we propose a method for increasing the user's search convenience. It has predefined data structure which is between camera's movement path and relationship. Also, design and implement a tool that automatically generates a files which has inter camera related information on the control center in a multi-camera is installed environment. Using generated file, minimize searching time and increase searching efficiency.

Data Mining for Personalization Model Using Customer Belief under the Internet Banking Environment (인터넷 뱅킹에서 고객의 신념을 이용한 개인화 모형을 위한 데이터마이닝)

  • 홍태호;서보밀;한인구
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.11a
    • /
    • pp.215-219
    • /
    • 2002
  • 인터넷의 급속한 성장으로 e비즈니스의 인터넷 사용이 증대되었다. 인터넷 환경에서는 새로운 인터넷 사용자라는 소비자를 대상으로 인터넷 소비자 행동에 관한 연구가 중요한 분야로 자리잡게 되었다. 인터넷상에서의 소비자 행동을 설명하기 위해 온라인 인지절차 (Cognitive process)에 관한 연구로, 웹 사이트에 대한 소비자의 태도에 미치는 영향을 밝히는 연구들이 수행되었다. 웹 사이트에 대한 소비자의 태도에 따른 개인화된 마케팅을 위해서는 웹사이트를 소비자의 특성을 고려해서 개인화된 웹사이트를 운영해야 한다. 개인의 정보 시스템 사용에 대한 설명을 위하여 많은 모형들이 개발되어 왔다. 기술 수용 모형(Technology Acceptance Model: TAM)은 개인의 정보 시스템 수용에 영향을 미치는 요소를 설명하기 위하여 가장 폭 넓게 사용되고 있는 모형이다. TRA 모형에 따르면, 개인의 사회적 행위는 그 행위의 결과에 대한 신념에 의해 영향을 받는다고 할 수 있다. 본 연구에서는 고객의 신념을 신뢰 (Trust), 유용성 (Usefulness), 사용의 편의성 (Ease of Use), 위험 (Risk), 보안통제 (Security control)로 분류하고, 고객의 실제 사용 (Usage)을 인터넷 뱅킹 환경에서 측정하여 고객세분화에 적용하였다. 세분화된 고객집단을 분류하기 위해서 인공신경망, 판별 분석 기법을 적용하여 웹 사이트에서 사용할 수 있는 개인화 모형을 개발하였다.

  • PDF

A Study on Remote Evaluation System for the Efficiency Improvement of R&D Project Evaluation (연구개발사업 평가 효율향상을 위한 원격지 전자평가시스템)

  • Ryu, Jee-woong;Song, Jong-chul;Moon, Byung-joo;Jung, Hoi-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.518-520
    • /
    • 2013
  • In these days, national R&D projects are taking major roles to strengthen national competitiveness. In order to produce successful R&D project, the most important point is objective and specialized evaluation. That means an appraisal board composed of experts in each field is necessary. But, it is very difficult to entrust experts, because of the constraints of time, space. In this paper, I describe the remote evaluation system for experts appointment, cost reduction and security enhancement.

  • PDF

Face Recognition using 2D-PCA and Image Partition (2D - PCA와 영상분할을 이용한 얼굴인식)

  • Lee, Hyeon Gu;Kim, Dong Ju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.31-40
    • /
    • 2012
  • Face recognition refers to the process of identifying individuals based on their facial features. It has recently become one of the most popular research areas in the fields of computer vision, machine learning, and pattern recognition because it spans numerous consumer applications, such as access control, surveillance, security, credit-card verification, and criminal identification. However, illumination variation on face generally cause performance degradation of face recognition systems under practical environments. Thus, this paper proposes an novel face recognition system using a fusion approach based on local binary pattern and two-dimensional principal component analysis. To minimize illumination effects, the face image undergoes the local binary pattern operation, and the resultant image are divided into two sub-images. Then, two-dimensional principal component analysis algorithm is separately applied to each sub-images. The individual scores obtained from two sub-images are integrated using a weighted-summation rule, and the fused-score is utilized to classify the unknown user. The performance evaluation of the proposed system was performed using the Yale B database and CMU-PIE database, and the proposed method shows the better recognition results in comparison with existing face recognition techniques.

A Design of RFID Mutual Authentication System based on Open Channel (공개 채널 기반의 RFID 상호인증 시스템 설계)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10C
    • /
    • pp.946-954
    • /
    • 2009
  • General RFID system has assumed that the communication channel between reader and back-end database is secure channel. However, the reader can be communicated with the database through insecure channel like the communication channel between the reader and the tag according to application environment. In this paper, we propose a new secure RFID mutual authentication protocol based on open network channel which assumed that all communication channels between the database, the reader and the tag are insecure communication channels. The proposed protocol uses a secure one-way hash function to provide authentication and integrity against all communication messages which exchanged on the open channels. In addition, we designed that the proposed protocol can provide forward secrecy by performing the database and the tag update their old secret key with a new secret key after finished mutual authentication.