• Title/Summary/Keyword: security requirement

Search Result 393, Processing Time 0.034 seconds

A Study on Resolution Methods of Overseas Direct Purchase Dispute by ODR (ODR을 통한 해외직구 분쟁해결방안)

  • Shin, Koon-Jae
    • Journal of Arbitration Studies
    • /
    • v.25 no.1
    • /
    • pp.3-23
    • /
    • 2015
  • As the Internet rapidly emerges as a speedy and cost-effective way of purchasing goods from overseas websites, the number of disputes arising out of overseas direct purchases also increases. In such situations, a disgruntled consumer might be left without an effective remedy. Providing an alternative approach to redress such grievances might assist in resolving such disputes and in increasing consumer confidence in e-commerce. Online Dispute Resolution (ODR) will allow consumers to solve their disputes without going to court, in a quick, low-cost, and simple way. It also helps to eliminate complex jurisdictional and choice-of-law problems. On the other hand, it has many problems such as having inadequate confidentiality and security, not being able to meet the "writing" requirement for arbitration of disputes, having difficulty in enforcing online arbitration agreements, having difficulties in enforcing online decisions and so on. This article investigates relationship online disputes and ODR and suggests ways that ODR can work best in resolving disputes arising out of overseas direct purchases. To expand the ODR system in online disputes, it is very important for domestic consumers to recognize the concept and usefulness of the Alternative Dispute Resolution (ADR) and ODR systems. The Korean government must also help consumers recognize the ADR mechanisms of dispute resolution by public campaign advertisement of ADR systems. Further education of dispute resolution in higher educational institutions is also required as well as assisting the KCAB with funds and the establishment of ADR Law.

A Study on the Residential Behavior of Cheju Province (제주도 지역 거주자의 주거 행태에 관한 연구)

  • 이정림;김봉애
    • Journal of the Korean housing association
    • /
    • v.8 no.3
    • /
    • pp.81-90
    • /
    • 1997
  • Cheju province exposes a separated residential culture compared to the mainland area. since it has its own unique climate, natural features. Therefore, this study tried to grasp the residential behavior. was based on the questionnaire to Cheju province people, using the approach by statistic verification. This study also focused and aimed on suggesting the basic data about housing plan which is appropriate to the climate. natural features requirement from inhabitants through the comparison and analysis between the mainland area and Cheju province. The results of the study are as follows; Firstly. the diversified applicative study on ‘Ol-rae’. ‘Ma-dang’, ‘Yoo-young’ and so forth that is traditional outside garden of Cheju is imperative, because in urban area people think traffics, vicinity, etc. are more significant, and in rural area people think occupying large outside space is more significant. Secondly. in the study of the degree of satisfaction on the housing, most of the people's was ‘neutral’ and in rural area quite a lot of negative reaction exposed. This is owing to the uniform introduction on residential style of the mainland area. Thirdly, housing plan should be considered family members' housing needs and provincial characteristics, meanwhile most of the people answered positively about the residential value which is considered very significant lately, for instance, security of privacy. appropriate plan for child's room.

  • PDF

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity

  • Lee, Jung-San;Wei, Kuo-Jui;Chen, Ying-Chin;Sun, Yun-Hsiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5616-5642
    • /
    • 2016
  • Different from traditional auctions, electronic auctions provide a platform to allow bidders and auctioneers merchandise to each other over network anytime and anywhere. Auctioneers can publish information of goods, and bidders can choose the interested targets through this bidding platform. To ensure the fairness and security of electronic auctions, Li et al. have proposed a practical electronic auction scheme which can confirm the requirement of strong anonymity, bidding privacy, and secret bidding price. However, we have found out that Li et al.'s scheme may lurk the risk of the denial-of-service attack during the bidding phase in a sealed-bid auction. Thus, we propose a brand-new sealed-bid auction mechanism, in which the essentials of e-auction can be firmly preserved. In particular, each bidder only needs to register at the center once and then can join to multiple plays launched by different auctioneers. Moreover, the correctness of mutual authentication is confirmed according to the BAN logic model.

Implementation of Secure VoIP System based on H.235 (H.235 기반 VoIP 보안 시스템 구현)

  • 임범진;홍기훈;정수환;유현경;김도영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1238-1244
    • /
    • 2002
  • In this paper, H.235-based security mechanism for H.323 multimedia applications was implemented. H.235 covers authentication using HMAC, Diffie-Hellman key exchange, session key management for voice channel, and encryption functions such as DES, 3DES, RC2. Extra encryption algorithms such as SEED, and AES were also included for possible use in the future. And, we also analyzed the quality of service (QoS), the requirement of implementation, and interoperability to the result in this study. The results could be applied to secure simple IP phone terminals, gateways, or gatekeepers.

Spectrum Requirement Estimation for Korean Wireless Communication Network of Public Protection and Disaster Relief Based on ITU-R M.2033 in TETRA-TRS (TETRA-TRS의 ITU-R M.2033 기반 국내 재난안전 무선통신망 주파수 소요량 산출)

  • Lee, Soon-Hwa;Kim, Chang-Bock
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.10
    • /
    • pp.858-864
    • /
    • 2012
  • In South Korea, to effective and systematic response to disasters, the government will build wireless communication network for PPDR(Public Protection and Disaster Relief) on a national level by 2015. To do it, as MOPAS(Ministry of Public Administration and Security) requested the new frequency assignment for PPDR, KCC(Korea Communications Commission) has been examined new frequency allocations about TETRA and WiBro technologies. In this paper, we were defined the technical parameters, were estimated the spectrum of TETRA-TRS requirements for Korean wireless communication of PPDR based on M.2033 methodology recommended by ITU-R.

Proposal and Implementation on Non-Repudiation of Origin for DNP3 (DNP3에 적합한 발신 부인 방지 기법 제안과 그 구현)

  • Yu, Ki-Soon;Song, Kyoung-Young;Jang, Min-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.815-825
    • /
    • 2015
  • DNP3(Distributed Network Protocol) is one of the most representative protocols which is used in SCADA(Supervisory Control and Data Acquisition) system. IEC 62351 is listing the integrity, confidentiality, availability and non-repudiation or accountability as the security requirement. However, IEEE Std. 1815 that is DNP3 standards does not define a mechanism for non-repudiation or accountability. In this paper, we propose a non-repudiation of origin technique about the sender of critical ASDU and implement the proposed scheme using software such as OpenSSL and SCADA source code library.

Towards Designing Efficient Lightweight Ciphers for Internet of Things

  • Tausif, Muhammad;Ferzund, Javed;Jabbar, Sohail;Shahzadi, Raheela
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4006-4024
    • /
    • 2017
  • Internet of Things (IoT) will transform our daily life by making different aspects of life smart like smart home, smart workplace, smart health and smart city etc. IoT is based on network of physical objects equipped with sensors and actuators that can gather and share data with other objects or humans. Secure communication is required for successful working of IoT. In this paper, a total of 13 lightweight cryptographic algorithms are evaluated based on their implementation results on 8-bit, 16-bit, and 32-bit microcontrollers and their appropriateness is examined for resource-constrained scenarios like IoT. These algorithms are analysed by dissecting them into their logical and structural elements. This paper tries to investigate the relationships between the structural elements of an algorithm and its performance. Association rule mining is used to find association patterns among the constituent elements of the selected ciphers and their performance. Interesting results are found on the type of element used to improve the cipher in terms of code size, RAM requirement and execution time. This paper will serve as a guideline for cryptographic designers to design improved ciphers for resource constrained environments like IoT.

Analysis of Importance of Intellectual Properties on Semiconductor Design and Its Reuse (반도체설계의 지식재산권과 그 재사용의 중요성에 대한 분석)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.924-927
    • /
    • 2009
  • IP reuse technology, for the sake of out-performance and the reduction of development period of IT-SoC is the most essential factor for the sound growth of SoC industry. As for this IP reuse technology, it is very important to decide the proper specification and the standardization of the requirement from the companies, as well as to develop our own domestic technological know-how which does not depend on import. In this study, we propose to analyze a security core IP with pure domestic technological know-how, mentioning an example from $CAST_{TM}$, which presently is an American company costing royalty.

  • PDF

RUP Model Based SBA Effectiveness Analysis by Considering the V Process and Defense Simulation Hierarchy (V 프로세스와 국방시뮬레이션 모델유형을 고려한 RUP 모델 기반의 SBA 효과도 분석)

  • Cha, HyunJu;Kim, Hyung Jong;Lee, Hae Young
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.55-60
    • /
    • 2015
  • This paper presents an SBA (simulation-based acquisition) effectiveness analysis environment using the RUP (Relational Unified Process) model. The RUP model has 4 phases which cover the whole development steps such as requirement analysis, design, development and test. By applying the RUP model, SW development can be represented with the iterations of developments for each phase. Such a characteristics of the model would make the model suitable for defense acquisition. In this paper, we show the relation between the RUP model and V process model, which is the foundation for defense acquisition. In order to show how the model could be applied to SBA effectiveness analysis, graphical user interfaces for the analysis are presented at the end of the paper.