• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.053 seconds

A Study on the Web Service Quality and User Satisfaction at Open Market (오픈마켓의 웹서비스 품질과 사용자 만족)

  • Son, Yong-Shim;Seo, Chang-Gab
    • Journal of Digital Convergence
    • /
    • v.11 no.6
    • /
    • pp.113-127
    • /
    • 2013
  • The open market are expanding service quality which was used as rating scale in the field of marketing. In accordance with open market, they convert it to e-service quality and use it. Udo et al.[6] suggested web service quality combining e-SEVQUAL[2] and extended Information Success Model[7]. This study suggests four influence factors of e-service quality in the open market; website privacy and security, web site contents, web site convenience, and images of the open market companies. The study conducted survey on 301 college students and life long education center students in Busan. The study found that all four influence factors have positive effects on the web service quality and ultimately web service quality has beneficial effects on the satisfaction in open market users' information system.

Pseudonym Management in Autonomous Driving Environment (자율주행환경에서 가명성 관리)

  • Hong, Jin Keun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.29-35
    • /
    • 2017
  • In this paper, we describe certificate policy and characteristics in cooperation condition with Cooperative intelligent transport system and autonomous driving vehicle. Among the authentication functions of the vehicle, there is a pseudonym authentication function. This pseudonymity is provided for the purpose of protecting the privacy of information that identifies the vehicle driver, passenger or vehicle. Therefore, the purpose of the pseudonym certificate is to be used for reporting on BSM authentication or misbehavior. However, this pseudonym certificate is used in the OBE of the vehicle and does not have a cryptographic key. In this paper, we consider a method for managing a pseudonym authentication function, which is a key feature of the pseudonym certificate, such as location privacy protection, pseudonym function, disposition of linkage value or CRL, request shuffling processing by registry, butterfly key processing, The authentication policy and its characteristics are examined in detail. In connection with the management of pseudonymes of the vehicle, the attacker must record the BSM transmission and trace the driver or vehicle. In this respect, the results of this study are contributing.

Factors Influencing Mobile Commerce Adoption and the Moderating Effect of Gender: Focused on Shanghai and Guangzhou (중국 소비자의 성별 모바일커머스 수용의도에 미치는 요인에 관한 연구: 광저우.상하이지역 소비자를 중심으로)

  • Lee, Jungsae
    • International Commerce and Information Review
    • /
    • v.16 no.3
    • /
    • pp.25-50
    • /
    • 2014
  • This study is to identify the factors and explore the moderating effects of gender in influencing customer behavioral intention to adopt mobile commerce in Shanghai and Guangzhou in China. An extended study based on TRA, TPB and TAM, UTAUT, technology adoption model is applied for designing on this study model of behavioral intention to adopt mobile commerce focused on emotional variables and cross-gender differences. The results of analysis reveal that the effects of perceived risk, personal innovativeness, individual familarity and social influence on behavioral intentions to adopt mobile commerce as well as to differ across gender. Differences cross gender is specially the perceived risk and social influence. Findings imply that mobile commerce operators need to be communicated to female consumers, the risk-free quality including security, payment and certification system along with the social influence of using mobile commerce. When targeting female consumers in China, the word of mouth marketing strategic approach and improvement of communications of mobile commerce should be focused.

  • PDF

Security Scheme for Prevent malicious Nodes in WiMAX Environment (노드간 에너지 소비를 효율적으로 분산시킨 PRML 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Nam-Kyu;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.774-784
    • /
    • 2009
  • A wireless sensor network consisting of a large number of nodes with limited battery power should minimize energy consumption at each node to prolong the network lifetime. To improve the sensitivity of wireless sensor networks, an efficient scheduling algorithm and energy management technology for minimizing the energy consumption at each node is desired. ill this paper, we propose energy-aware routing mechanism for maximum lifetime and to optimize the solution quality for sensor network maintenance and to relay node from its adjacent cluster heads according to the node"s residual energy and its distance to the base station. Proposed protocol may minimize the energy consumption at each node, thus prolong the lifetime of the system regardless of where the sink is located outside or inside the cluster. Simulation results of proposed scheme show that our mechanism balances the energy consumption well among all sensor nodes and achieves an obvious improvement on the network lifetime. To verify propriety using NS-2, proposed scheme constructs sensor networks adapt to current model and evaluate consumption of total energy, energy consumption of cluster head, average energy dissipation over varying network areas with HEED and LEACH-C.

Design and Implementation of XML Encryption and Digital signature API for Mobile Environment (모바일 환경에서 XML 암호화 및 전자서명 API 설계 및 구현)

  • Cho, Tae-Beom;Ryu, Hwang;Park, Jeong-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1416-1422
    • /
    • 2010
  • Various other platforms have appeared due to the abolishment of WIPI requirement and increased problems related with hacking and security. Since levels consisting of these platforms are composed of various APIs (Application Programming Interfaces) which are not standardized, other ways must be considered to protect data which are transferred using XML formats. Therefore, XML encryption API and XML digital signature API for data protection and certification, which are both responsible to define mark-up languages for XML encryption and digital signature respectively, were designed in this paper. The simulation system which played the role of the server and client between two terminal units was realized to validate the APIs.

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.

Cloud storage-based intelligent archiving system applying automatic document summarization (문서 자동요약 기술을 적용한 클라우드 스토리지 기반 지능적 아카이빙 시스템)

  • Yoo, Kee-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.3
    • /
    • pp.59-68
    • /
    • 2012
  • Zero client-based cloud storage technology is gaining much interest as a tool to centralized management of organizational documents nowadays. Besides the well-known cloud storage's defects such as security and privacy protection, users of the zero client-based cloud storage point out the difficulty in browsing and selecting the storage category because of its diversity and complexity. To resolve this problem, this study proposes a method of intelligent document archiving by applying an algorithm-based automatic topic identification technology. Without user's direct definition of category to store the working document, the proposed methodology and prototype enable the working documents to be automatically archived into the predefined categories according to the extracted topic. Based on the proposed ideas, more effective and efficient centralized management of electronic documents can be achieved.

A Study on the Selection Process of RFID Middleware and Quality Factor Evaluation in Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서 RFID 미들웨어 선정 프로세스 및 품질 요소 평가에 대한 연구)

  • Oh, Gi-Oug;Park, Jung-Oh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.257-263
    • /
    • 2011
  • Conventional middleware is software providing services between clients and servers efficiently, but it is not applicable to RFID systems because of low consistency due to the absence of context awareness function, and problems in the management of meaning, security system, etc. Accordingly, we need a quality selection process and a quality evaluation method for selecting RFID middleware based on new criteria. This Paper proposed a new selection process based on international standard ISO/IEC 14598, and extracted and selected optimal quality factors through the proposed process. The selected quality factors were mapped to the quality characteristics of standard quality model ISO/IEC 9126, and to quality factors of RFID middleware of SUN, Microsoft, EPCglobal, IBM, etc. The results of these works showed that the quality factors extracted and selected through the proposed process were fair and adequate for evaluating the quality of RFID middleware.

CUDA Acceleration of Super-Resolution Algorithm Using ELBP Classifier for Fisheye Images (광각 영상을 위한 ELBP 분류기를 이용한 초해상도 기법과 CUDA 기반 가속화)

  • Choi, Ji Hoon;Song, Byung Cheol
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.10
    • /
    • pp.84-91
    • /
    • 2016
  • Most recently, the technology of around view monitoring(AVM) system or the security systems could provide users with images by using a fisheye lens. The filmed images through fisheye lens have an advantage of providing a wider range of scenes. On the other hand, filming through fisheye lens also has disadvantages of distorting images. Especially, it causes the sharpness of images to degrade because the edge of images is out of focus. The influence of a blur still remains at the end of the range when the super-resolution techniques is applied in order to enhance the sharpness. It degrades the clarity of high resolution images and occurs artifacts, which leads to deterioration in the performance of super-resolution algorithm. Therefore, in this paper we propose self-similarity-based pre-processing method to improve the sharpness at the edge. Additionally, we implement the acceleration in the GPU environment of entire algorithm and verify the acceleration.

Technical analysis of Cloud storage for Cloud Computing (클라우드 컴퓨팅을 위한 클라우드 스토리지 기술 분석)

  • Park, Jeong-Su;Jung, Sung-Jae;Bae, Yu-Mi;Kyung, Ji-Hun;Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.757-760
    • /
    • 2012
  • Cloud storage system that cloud computing providers provides large amounts of data storage and processing of cloud computing is a key component. Large vendors (such as Facebook, YouTube, Google) in the mass sending of data through the network quickly and easily share photos, videos, documents, etc. from heterogeneous devices, such as tablets, smartphones, and the data that is stored in the cloud storage using was approached. At time, growth and development of the globally data, the cloud storage business model emerging is getting. Analysis new network storage cloud storage services concepts and technologies, including data manipulation, storage virtualization, data replication and duplication, security, cloud computing core.

  • PDF