• Title/Summary/Keyword: security collaboration

Search Result 146, Processing Time 0.024 seconds

An Analysis of the US 3rd Offset Strategy (미국의 제3차 국방과학기술 상쇄전략에 대한 분석)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.27-35
    • /
    • 2016
  • This thesis analyzes the backgrounds of the third offset strategy of the US Department of Defense. The key technology areas to be developed and the implications of the 3rd strategy are also examined. The potential great powers, China and Russia have catched up with US in the certain areas of military technologies. The technological superiority of US military is found to have been eroded. The US DOD needs a new defense policy called the 3rd offset strategy to meet this new challenge. The 5 basic technology areas were identified; learning machines, human-machine collaboration, machine-assisted human operations, human-machine combat teaming, and autonomous weapons. The 3rd offset strategy should be managed not to move to the new arms race with rivalries. The defense acquisition system also needs to be improved for the smooth flow of the advanced commercial technologies to the defense sector. Korea needs to figure out the possible technologies of co-research and development with US.

Preventing ELF(Executable and Linking Format)-File-Infecting Malware using Signature Verification for Embedded Linux (임베디드 리눅스에서 서명 검증 방식을 이용한 악성 프로그램 차단 시스템)

  • Lee, Jong-Seok;Jung, Ki-Young;Jung, Daniel;Kim, Tae-Hyung;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.6
    • /
    • pp.589-593
    • /
    • 2008
  • These days, as a side effect of the growth of the mobile devices, malwares for the mobile devices also tend to increase and become more dangerous. Because embedded Linux is one of the advanced OSes on mobile devices, a solution to preventing malwares from infecting and destroying embedded Linux will be needed. We present a scheme using signature verification for embedded Linux that prevents executallle-Infecting malwares. The proposed scheme works under collaboration between mobile devices and a server. Malware detection is delegated to the server. In a mobile device, only integrity of all executables and dynamic libraries is checked at kernel level every time by kernel modules using LSM hooks just prior to loading of executables and dynamic libraries. All procedures in the mobile devices are performed only at kernel level. In experiments with a mobile embedded device, we confirmed that the scheme is able to prevent all executable-Infecting malwares while minimizing damage caused by execution of malwares or infected files, power consumption and performance overheads caused by malware check routines.

Legal framework and practices of public order management in England and Wales (잉글랜드와 웨일즈의 공공질서 관리 관련 법적 틀 및 법집행 형태)

  • Jung, Jeyong;Ellis, Tom
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.203-222
    • /
    • 2018
  • Public order management is one of the most important areas in policing. Drawing on the legal framework and policy, this study aims to assess practices of criminal justice practitioners, especially, police and prosecutors, in England and Wales. Using qualitative interviewing, four main themes are identified: (1) an emphasis on a right to protest, (2) police practices on public order management, (3) the development of police/prosecutor liaison, and (4) the value of video evidence. Based upon these findings, several legal, policy and practice implications are drawn. These implications involve a wide range of aspects concerning strategic, operational, and tactical interventions by the police, as well as collaboration between police and prosecutors. Although the criminal justice context in England and Wales is very different to South Korea, some practices and distinctions can be useful to consider in the Korean context. This study suggests that more gains can be made if legislation, policy, and practice across criminal justice nodes can be coordinated and approached holistically.

A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone (스마트폰에서 Smishing 해킹 공격과 침해사고 보안 연구)

  • Park, In-Woo;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.141-145
    • /
    • 2013
  • Damage is increasing by (Smishing) hacking attack Smishing you use a smart phone after entering 2013. Takeover of personal information and direct financial damage in collaboration with graphics sewing machine hacking attack has occurred. Monetary damage that leads to Internet payment service (ISP) and secure payment system in conjunction with graphics sewing machine hacking attack on a smartphone has occurred. In this paper, I will study analysis in the laboratory examples of actual infringement vinegar sewing machine hacking attack. It is a major power security measures to prevent damage to the secure payment system that a case analysis and practical principle technical nest sewing machine hacking attack, using Smishing. In this paper, I will be to research to be able to through a smart phone, to the online payment safer and more convenient.

  • PDF

Convergence of IT and Online Security Trading : The Effects of MTS Service Quality on Customer Satisfaction & Customer Loyalty (IT와 온라인 증권거래의 융합 : MTS 서비스 품질이 고객만족도와 고객충성도에 미치는 영향)

  • Kim, Seong-Geun;Seok, Kee-Joon
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.137-148
    • /
    • 2015
  • The objectives of this study identify the factors that affect the quality of MTS services, to determine the effects of these service quality factors on customer's satisfaction and customer's loyalty. The results are as follows: First, The Four factors, i.e., tangibles, reliability, responsiveness, and assurance, represent statistically marginal significance in explaining the relationship between MTS service quality factors and customer's satisfaction. Second, The Five factors, i.e., rapidness, tangibles, responsiveness, empathy, and assurance represent statistically marginal significance in explaining the relationship between MTS service quality factors and customer's loyalty. Third, There are some differences in assurance/period of utilization, empathy/period of utilization in using MTS services according to social statistics. This article provides the paradigm of new convergence on IT and finance.

Analysis of Research Topics and Trends on COVID-19 in Korea Using Latent Dirichlet Allocation (LDA)

  • Heo, Seong-Min;Yang, Ji-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.83-91
    • /
    • 2020
  • This study aims to identify research topics and examine the trend of Covid19-related papers on DBpia. Applying latent Dirichlet allocation (LDA), we have extracted seven research topics, each of which concerns "International Dynamics", "Technology & Security", "Psychological Impact", "Biomedical-Related", "Economic Impact", "Online Education", and "Religion-Related". In addition, we used the multinomial logistic model to examine the trend of research topics. We found that the papers mainly cover topics related to "International Dynamics" and "Biomedical-Related" before June 2020, but the topics have become diverse since then. In particular, topics regarding "Economic Impact", "Online Education" and "Psychological Impact" has drawn increased attention of researchers. The findings would provide a guideline for collaboration in Covid19-related research, and could serve as a reference work for active research.

Systematic Literature Review of Smart Trade Contract Research (스마트 무역계약 연구의 체계적 문헌고찰)

  • Ho-Hyung Lee
    • Korea Trade Review
    • /
    • v.48 no.3
    • /
    • pp.243-262
    • /
    • 2023
  • This study provides a systematic review of smart trade contracts, examining the research trends and theoretical background of utilizing smart contracts and blockchain technology for the digitalization and automation of trade contracts. Smart trade contracts are a concept that applies the automated contract system based on blockchain to trade-related transactions. The study analyzes the technical and legal challenges and proposes solutions. The technical aspect covers the development of smart contract platforms, scalability and performance improvements of blockchain networks, and security and privacy concerns. The legal aspect addresses the legal enforceability of smart contracts, automatic execution of contract conditions, and the responsibilities and obligations of contract parties. Smart trade contracts have been found to have applications in various industries such as international trade, supply chain management, finance, insurance, and energy, contributing to the ease of trade finance, efficiency of supply chains, and business model innovation. However, challenges remain in terms of legal regulations, interaction with existing legal frameworks, and technological aspects. Further research is needed, including empirical studies, business model innovation, resolution of legal issues, security and privacy considerations, standardization and collaboration, and user experience studies to address these challenges and explore additional aspects of smart trade contracts.

Mutual Authentication Mechanism for Secure Group Communications in Sensor Network (센서 네트워크에서의 안전한 그룹통신을 위한 상호 인증 기법)

  • Ko, Hye-Young;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.441-450
    • /
    • 2010
  • Recently, a lot of interest is increased in sensor network which gathers various data through many sensor nodes deployed in wired and wireless network environment. However, because of the limitation in memory, computation, and energy of the sensor nodes, security problem is very important issue. In sensor network, not only the security problem, but also computing power should be seriously considered. In this paper, considering these characteristics, we make the sensor network consist of normal sensor nodes and clusterheaders with enough space and computing power, and propose a group key rekeying scheme adopting PCGR(Predistribution and local Collaborationbased Group Rekeying) for secure group communication. In our proposal, we enhance the security by minimizing the risk to safety of the entire network through verifying the new key value from clusterheader by sensor nodes. That is, to update the group keys, clusterheaders confirm sensor nodes through verifying the information from sensor nodes and send the new group keys back to authentic member nodes. The group keys sent back by the clusterheaders are verified again by sensor nodes. Through this mutual authentication, we can check if clusterheaders are compromised or not. Qualnet simulation result shows that our scheme not only guarantees secure group key rekeying but also decreasesstorage and communication overhead.

Memory-saving Real-time Collaborative Editing System using Valid-Time Operational Transformation (유효시간 운영변환을 이용한 메모리 절약형 실시간 협업 편집 시스템)

  • Kwon, Oh-Seok;Kim, Young-Bong;Kwon, Oh-Jun;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.2
    • /
    • pp.232-241
    • /
    • 2018
  • Operational Transformation (OT) algorithms for real-time collaborative editing systems are becoming increasingly important due to the increased demand for collaborative data processing. The operational transformation algorithm is a technique for real-time concurrency control and consistency maintenance with non-locking technique, and many studies have been conducted to overcome three issues of convergence, causality-prevention, and intention-prevention. However, previous work has the disadvantage of wasting memory by storing all operations that occurred during an edit operation in the history buffer to solve this problem. Therefore, we propose a memory-saving real-time collaborative editing system that maintains a constant memory space and concurrency control through a method of applying the valid-time to each user-generated operation in order to reduce memory waste. This system prevents long-term memory occupation of client-generated operations, thus it reduces the space and time complexity even with low-rate of collaboration work, so that the performance degradation avoids.

Design and Implementation of Grid-based PACS (Grid 기반 PACS 설계 및 구현)

  • Kim, Jung-Su;Lee, Se-Yul;Park, Jin-Sub;Lee, Bong-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.143-156
    • /
    • 2008
  • Grid-based PACS can provide an advanced medical information services such as remote image file transfer, collaboration, remote diagnosis, and virtual hospital. In this paper, we have implemented Grid-PACS which guarantees both storage safety and extendability for virtual large scale storage system. The experimental results showed that the virtual storage system provided more efficient and faster data transfer than the conventional PACS. The proposed Grid data management system can be utilized to improve the effectiveness of the PACS data management and transmission between medical institutions.

  • PDF