• Title/Summary/Keyword: mutual security

Search Result 476, Processing Time 0.03 seconds

Development of Wire-Wireless Integrated Web Messenger for Communication of users in a Multi-Organization (복수조직 구성원들의 상호통신을 위한 유무선 통합 웹 메신저 개발)

  • Cho, Migyung;Kim, Jungin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1181-1186
    • /
    • 2013
  • Mobile network has become an essential tool for mutual communications, so a survey research published that most of the smartphone users use Mobile Instant Messenger every day. In this paper, we developed a wire-wireless integrated web messenger that can be used in various platform of mobile devices and desktop computer for communicating between users of some companies. We defined a multi-organization as several independent companies. Our web messenger was developed for communicating of users of a multi-organization. So one of functions of our web messenger is to restrict access to some particular departments in each company for the security of their company. Developed web messenger worked reliably from variety of web browsers on most of platforms such as android, iOs and desktop computers.

Hybrid Trust Computational Model for M2M Application Services (M2M 애플리케이션 서비스를 위한 하이브리드형 신뢰 평가 모델)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.53-62
    • /
    • 2020
  • In the end-user domain of an IoT environment, there are more and more intelligent M2M devices that provide resources to create and share application services. Therefore, it can be very useful to manage trust by transferring the role of the existing centralized service provider to end users in a P2P environment. However, in a decentralized M2M computing environment where end users independently provide or consume services, mutual trust building is the most important factor. This is because malicious users trying to build malfunctioning services can cause security problems in M2M computing environments such as IoT. In this paper, we provide an integrated analysis and approach for trust evaluation of M2M application services, and an optimized trust evaluation model that can guarantee reliability among users of the M2M community.

Development of Cloud-Based Telemedicine Platform for Acute Intracerebral Hemorrhage in Gangwon-do : Concept and Protocol

  • Hyo Sub Jun;Kuhyun Yang;Jongyeon Kim;Jin Pyeong Jeon;Jun Hyong Ahn;Seung Jin Lee;Hyuk Jai Choi;Jong Wook Choi;Sung Min Cho;Jong-Kook Rhim
    • Journal of Korean Neurosurgical Society
    • /
    • v.66 no.5
    • /
    • pp.488-493
    • /
    • 2023
  • We aimed to develop a cloud-based telemedicine platform for patients with intracerebral hemorrhage (ICH) at local hospitals in rural and underserved areas in Gangwon-do using artificial intelligence and non-face-to-face collaboration treatment technology. This is a prospective and multi-center development project in which neurosurgeons from four university hospitals in Gangwon-do will participate. Information technology experts will verify and improve the performance of the cloud-based telemedicine collaboration platform while treating ICH patients in the actual medical field. Problems identified will be resolved, and the function, performance, security, and safety of the telemedicine platform will be checked through an accredited certification authority. The project will be carried out over 4 years and consists of two phases. The first phase will be from April 2022 to December 2023, and the second phase will be from April 2024 to December 2025. The platform will be developed by dividing the work of the neurosurgeons and information technology experts by setting the order of items through mutual feedback. This article provides information on a project to develop a cloud-based telemedicine platform for acute ICH patients in Gangwon-do.

A Study on the Demand of the Promotion Policy for the Oil and Gas Overseas Transportation Projects by AHP (AHP 분석을 이용한 원유 및 가스 해외 수송사업 진흥 정책 연구)

  • Jae-Woong Yoon
    • Korea Trade Review
    • /
    • v.47 no.5
    • /
    • pp.289-304
    • /
    • 2022
  • Korea's LNG and crude oil are the most important energy and export raw materials, but 100% import resources by overseas. However, tanker shipping companies, which play the most crucial role in energy cargo security, are very small in number and size, which can be a factor in the supply chain crisis. Therefore, this paper studied the policy of expanding tanker transportation necessary for the transport of crude oil and LNG in Korea. In the existing literature, there was no policy study necessary for tanker ships, but referring only to the importance of overseas energy development and transportation, so we tried to derive various demands necessary for expanding the tanker fleet through expert interviews and AHP which was conducted on 89 related energy institutions to derive policies and their priorities. The results of the study are as follows. As for the policy, the financial support policy was the highest priority, followed by the business and the mutual cooperation policy of related agencies. Tax support (22.6%) and ship financing (19.4%) were the highest priorities, followed by the Energy Intermediate Promotion Act (11.9%), Tanker Guarantee Insurance (10.6%), Energy Budget Independence (9.3%), and Korea Trader Development (8.2%). Energy governance (6.3%), information center establishment (6.2%), and energy procurement committee (5.5%) ranked seventh, eighth, and ninth. The research results show that it is necessary to supply sufficient ships to the market through the expansion of ship finance for tankers and to follow business support policies such as guarantee insurance. In addition, it was also possible to derive that the financial resources need to be determined by law and independent budgets for consistency and continuity.

Interrelationship Between Regional Population Migration, Crop Area, and Foreign Workers (지역 간 인구이동, 경지면적, 외국인 근로자의 관계 분석)

  • Seojin Cho;Heeyeun Yoon
    • Journal of the Korean Regional Science Association
    • /
    • v.40 no.2
    • /
    • pp.21-38
    • /
    • 2024
  • Understanding the interrelationship between regional population dynamics and cultivated land is crucial for promoting regional economic vitality and enhancing food security. While prior research often addressed population migration and changes in crop area separately, this study employs a Panel Vector Auto Regression Model to examine the dynamic interaction between regional population shifts, changes in crop area, and the influx of foreign workers in agriculture. The results reveal a reciprocal relationship between population influx and crop area, indicating a negative impact on each other. Moreover, the analysis demonstrates that an expansion in crop area, particularly in field cultivation, significantly correlates with an increase in foreign workers. These findings underscore the mutual influence of labor shortages and diminished land availability in agriculture, with the influx of foreign workers potentially offering a positive impact on addressing structural challenges in rural areas.

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links (지상 CNPC 링크에서 안전한 데이터 전송을 위한 경량화된 인증기법)

  • Kim, Man Sik;Jun, Moon-Seog;Kang, Jung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.9
    • /
    • pp.429-436
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.

Study on Preventing Retaliation against Crime Victims (범죄피해자에 대한 보복범죄 방지 대책에 관한 연구)

  • Choi, KeeNam
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.129-137
    • /
    • 2016
  • The guarantee of citizens' safety from crime is the reason for a nation's existence according to the social contract, and it is also a salient task in securing the citizens' right to the pursuit of happiness, which is a constitutional right expressing the nation's duty to its citizens. First, a procedure must be made mandatory that corresponds to the Miranda rule applied during the arrest of criminal suspect, which verifies whether there exists a risk of retaliatory crime to the victim of crime, crime reporter, or witness following their report of a crime or testimony. A measure to punish those who violate this should be devised. The second is the improvement of related laws and systems, such as expanding the scope of persons subject to protection from retaliatory crimes under the current law and strengthening information protection. Third, a retaliatory crime risk evaluation index must be developed, and the evaluation results must be quantified to clearly state measures and responsibilities, in detail, for personal safety at each level of intensity. The fourth is the expanded implementation of proactive personal safety measures for victims of crime and witnesses, as well as the development and application of advanced techniques. The last is a change in the perception s of those working for the judicial body. From the initial investigation stage of the crime to the diagnosis regarding the possibility of retaliation perpetrated on an ex-convict through psychological tests, systems of general cooperation, and mutual assistance must be established.

The Authentication and Key Management Method based on PUF for Secure USB (PUF 기반의 보안 USB 인증 및 키 관리 기법)

  • Lee, Jonghoon;Park, Jungsoo;Jung, Seung Wook;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.944-953
    • /
    • 2013
  • Recently, a storage media is becoming smaller and storage capacity is also becoming larger than before. However, important data was leaked through a small storage media. To solve these serious problem, many security companies manufacture secure USBs with secure function, such as data encryption, user authentication, not copying data, and management system for secure USB, etc. But various attacks, such as extracting flash memory from USBs, password hacking or memory dump, and bypassing fingerprint authentication, have appeared. Therefore, security techniques related to secure USBs have to concern many threats for them. The basic components for a secure USB are secure authentication and data encryption techniques. Though existing secure USBs applied password based user authentication, it is necessary to develop more secure authentication because many threats have appeared. And encryption chipsets are used for data encryption however we also concern key managements. Therefore, this paper suggests mutual device authentication based on PUF (Physical Unclonable Function) between USBs and the authentication server and key management without storing the secret key. Moreover, secure USB is systematically managed with metadata and authentication information stored in authentication server.

Hybrid Authentication Scheme for Mobile Multi-hop Relay in IEEE 802.16j (IEEE 802.16j기반의 모바일 멀티 홉 릴레이에서의 혼합형 인증 기법에 대한 연구)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.127-136
    • /
    • 2007
  • It is easy to install and maintain a mobile multi-hop wireless network due to its self-organizing characteristics. However it has security weakness of the authentication of mobile multi-hop relay stations. Specially, the mobile multi-hop relay network in the IEEE 802.16j has the additional security weakness caused by the requirement of backward compatibility for mobile stations of the conventional IEEE 802.16 system. In this paper, we propose a novel mutual authentication scheme applicable to IEEE 802.16j-based mobile multi-hop relay network architecture. The scheme is able to resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which have been considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively. Also, we analyze the effectiveness of the proposed hybrid authentication method.

Workfare in the United Kingdom : A Study on New Deal under the New Labour Government (영국의 근로연계복지에 관한 평가 : 신노동당 정부의 New Deal을 중심으로)

  • Shin, Dong-Myeon
    • Korean Journal of Social Welfare
    • /
    • v.56 no.1
    • /
    • pp.23-43
    • /
    • 2004
  • The purpose of this paper is to evaluate the performance of New Deal under the New Labour government in Britain and examines the nature of New Deal with respect to workfare. The time difference of five years after the New Deal was put into effect shows that New Deal has contributed not only to include the socially excluded groups such as the young unemployed, the long-term unemployed, single parents, and the disabled into the labour market, but also to decrease the amount of income-based benefits providing for working generation. It can be said that the nature of New Deal under the New Labour is near to human capital development model rather than labour force attachment model. New Deal provides the opportunity of policy learning for the countries which pursue the reform of social security system to moving welfare beneficiaries being able to work into jobs. Policy learning can be summed up as follows. First, imposing mutual responsibility and obligations on unemployed person should be accompanied by implementing active labour market programmes of education and job training. Second, the delivery system which administrates workfare programmes should be decentralized in a local society. The cooperation between local government and enterprisers will be critical in implementing various employment programmes and moving unemployed person into jobs. Third, the case management for individual participating in workfare programme is necessary. The personal adviser should continue to provide employment services for the unemployed until he or she get a job and enter the state of self-reliance. Finally, the workfare programme should be firmly backed by the political leadership in order to overcome the oppositions of beneficiary groups under the existing social security system.

  • PDF