• Title/Summary/Keyword: security requirement

Search Result 396, Processing Time 0.034 seconds

PSMVL : A Concurrency Control Protocol for Real-Time Secure Database Systems

  • Park, Chan-jung;Park, Seog
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.5
    • /
    • pp.89-99
    • /
    • 1997
  • The application for real-time database systems must satisfy timing constraints. Typically the timing constraints are expressed in the form of deadlines which are represented by priorities to e used by schedulers. In any real-time applications, since the system maintains sensitive information to be shared by multiple users with different levels of security clearance, security is another important requirement. As more advanced database systems are being used in applications that need to support timeliness while managing sensitive information, protocols that satisfy both requirements need to be developed. In this appear, we proposed a new priority-driven secure multiversion locking (PSMVL) protocol for real-time secure database systems. The schedules produced by PSMVL are proven to e one-copy serializable. We have also shown tat the protocol eliminates covert channels and priority inversions. The details of the protocol, including the compatibility matrix and the version selection algorithms are presented. the results of the performance comparisons of our protocol with other protocols are described.

  • PDF

Analyses of Middleware Requirement for Home Network Security (홈 네트워크 보안을 위한 미들웨어 요구 분석)

  • 김정태
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.861-865
    • /
    • 2004
  • Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home network.

Analyses and considerations for security requirement of PKI for user experience data (사용자 경험 데이터를 위한 PKI의 보안 요구 사항 분석 및 고찰)

  • Im, Hyungjin;Lee, Deok Gyu;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.409-411
    • /
    • 2015
  • 최근 사물인터넷에 대한 발전이 빠르게 이루어짐에 따라서 인터넷 상의 보안 이슈 또한 증가하고 있다. 이에 따라 데이터를 안전하고 은밀하게 통신하기 위한 공개키 기반 구조 (public-Key Infrastructure: PKI) 기술이 발전하고 있다. PKI는 신뢰할 수 있는 기관에서 개인이나 기관을 식별할 수 있는 인증서를 저장하고 있으며 이를 활용할 수 있도록 돕는 디렉토리 서비스를 제공한다. 특히 기존의 PKI 구조에는 사용자의 경험이 담겨있는 패스워드 기반으로 개인키를 암호화 하고 있다. 이는 사용자 인증과 데이터 암호화와 같은 강력한 보안 서비스를 제공하고 있지만 이 또한 취약점을 내포하고 있다. 본 논문에서는 공개키 기반 구조의 핵심 요소에 대해 논의하며 보안 취약점을 분석한다. 이를 통해 안전한 사물인터넷 환경을 위한 연구 방향을 제시한다.

On Securing Web-based Educational Online Gaming: Preliminary Study

  • Yani, Kadek Restu;Prihatmanto, Ary Setijadi;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.767-770
    • /
    • 2015
  • With the deployment of web-based educational game over the internet, the user's registration becomes a critical element. The user is authenticated by the system using username, password, and unique code. However, it cannot be handled properly because the data is transmitted through insecure channel on the network. Hence, security requirement is needed to avoid identity leakage from malicious user. In this paper, we propose a secure communication approach using SSL protocol for an online game. We also describe the security requirements for our approach. In future work, we intend to configure and implement the SSL protocol by enabling HTTPS in web-based online game.

A Simulation Study for Resolving Communication Failure in IPSec Tunnel Mode with Adaptive PMTU Discovery Mechanism (적응적 PMTU 발견 메커니즘을 통한 IPSec 터널 모드에서의 통신 불능 현상 해소에 관한 시뮬레이션 연구)

  • 김은성;안성진;정진욱;이도훈;윤재우
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.1
    • /
    • pp.31-44
    • /
    • 2002
  • VPN which cuts down on expense and assures security and reliance, has increased its market shares quickly because the requirement of enterprise on security has increased. But Fragmentation may raise communication failure when VPN has been implemented using IPSec. In our paper, we have given careful consideration to various reasons Preventing us from communicating stable and have presented the existing solutions about them. Also we hate provided adaptive PMTU discovery mechanism to improve: the solutions. We have proven a prowess of this mechanism through simulation

  • PDF

Analysis of the Requirement on the Intelligent CCTV Camera in Subway Environment (도시철도 지능형 카메라에 요구되는 성능 및 관련기술 연구)

  • Chang, Il-Sik;Park, Jong-Hwa;Kim, Joo-Sun;Kim, Hyung-Min;Park, Goo-Man
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.1151-1156
    • /
    • 2008
  • In this paper we have analysed various requirements on the intelligent camera which is one of the essential component in Integrated Intelligent Security System in Subway Service Environment. The purpose of Integrated Intelligent Security System is to protect possible accidents and respond to the events in the most effective and quickest way to reduce the loss in minimum.

  • PDF

Digital Competence As A Component Of Professional And Information Culture Of A Teacher

  • Kharlamov, Mykhailo;Sinelnikov, Ivan;Lysenko, Vladyslav;Yakobenchuk, Nazar;Tkach, Anna;Honcharuk, Оlena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.169-172
    • /
    • 2021
  • Based on the scientific and pedagogical analysis of the theory and experience of teaching computer science disciplines, the didactic mechanism for ensuring the continuity of the average (full) general and higher professional education of economists for practical implementation innovative technology of personal experience foundation. The pedagogical conditions for the formation of information competence, including laboratory, design, research work, the use of active teaching methods for acquiring management skills in production and activities of the enterprise. An indispensable requirement for the conditions for the implementation of basic of educational programs is the assessment of competencies. With this the goal was to develop criteria and levels of formation information competence of future economists and carried out complex diagnostics.

Adaptive data hiding scheme based on magic matrix of flexible dimension

  • Wu, Hua;Horng, Ji-Hwei;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3348-3364
    • /
    • 2021
  • Magic matrix-based data hiding schemes are applied to transmit secret information through open communication channels safely. With the development of various magic matrices, some higher dimensional magic matrices are proposed for improving the security level. However, with the limitation of computing resource and the requirement of real time processing, these higher dimensional magic matrix-based methods are not advantageous. Hence, a kind of data hiding scheme based on a single or a group of multi-dimensional flexible magic matrices is proposed in this paper, whose magic matrix can be expanded to higher dimensional ones with less computing resource. Furthermore, an adaptive mechanism is proposed to reduce the embedding distortion. Adapting to the secret data, the magic matrix with least distortion is chosen to embed the data and a marker bit is exploited to record the choice. Experimental results confirm that the proposed scheme hides data with high security and a better visual quality.

Presentation Attack Detection (PAD) for Iris Recognition System on Mobile Devices-A Survey

  • Motwakel, Abdelwahed;Hilal, Anwer Mustafa;Hamza, Manar Ahmed;Ghoneim, Hesham E.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.415-426
    • /
    • 2021
  • The implementation of iris biometrics on smartphone devices has recently become an emerging research topic. As the use of iris biometrics on smartphone devices becomes more widely adopted, it is to be expected that there will be similar efforts in the research community to beat the biometric by exploring new spoofing methods and this will drive a corresponding requirement for new liveness detection methods. In this paper we addresses the problem of presentation attacks (Spoofing) against the Iris Recognition System on mobile devices and propose novel Presentation Attack Detection (PAD) method which suitable for mobile environment.

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.