• Title/Summary/Keyword: web security

Search Result 1,097, Processing Time 0.028 seconds

A Study on the Open Platform Architecture for the Integrated Utilization of Spatial Information and Statistics (공간정보와 통계정보의 융합 활용을 위한 오픈플랫폼 아키텍처에 관한 연구)

  • Kim, Min-Soo;Yoo, Jeong-Ki
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.2
    • /
    • pp.211-224
    • /
    • 2016
  • Based on the 'Government 3.0', the government opens the public data and encourages the active use in the private sector. Recently, the spatial and statistical information that is one of the public data is being widely used in the various web business as a high value-added information. In this study, we propose an architecture of high-availability, high-reliability and high-performance open platform which can provide a variety of services such as searching, analysis, data mining, and thematic mapping. In particular, we present two different system architectures for the government and the public services, by reflecting the importance of the information security and the respective utilization in the private and public sectors. We also compared a variety of server architecture configurations such as a clustered server configuration, a cloud-based virtual server configuration, and a CDN server configuration, in order to design a cost- and performance-effective spatial-statistical information open platform.

Access Control for XML Documents Using Extended RBAC (확장된 RBAC를 이용한 XML문서에 대한 접근제어)

  • Kim, Jong-Hun;Ban, Yong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.869-881
    • /
    • 2005
  • XML(eXtensible Markup Language) has emerged as a prevalent standard for document representation and exchange on the Internet. XML documents contain information of different sensitivity degrees, so that XML Document must selectively shared by user communities. There is thus the need for models and mechanisms enabling the specification and enforcement of access control policies for XML documents. Mechanisms are also required enabling a secure and selective dissemination of documents to users, according to the authorizations which the users have. In this paper, we give an account of access control model and mechanisms, which XML documents can be securely protected in web environments. We make RBAC Based access Control polices to the problem of secure and selective access of XML documents. The proposed model and mechanism guarantee that the secure use for XML documents through definition of authority for element, attribute, link within XML document as well as XML document.

  • PDF

Still Image Identifier based over Low-frequency Area (저역주파수 영역 기반 정지영상 식별자)

  • Park, Je-Ho
    • Journal of Digital Contents Society
    • /
    • v.11 no.3
    • /
    • pp.393-398
    • /
    • 2010
  • Composite and compact devices equipped with the functionality of digital still image acquisition, such as cellular phones and MP3 players are widely available to common users. In addition, the application of digital still images is becoming common among security and digital recording devices. The amount of still images, that are maintained or shared in personal storage or massive storage provided by various web services, are rapidly increasing. These still images are bound with file names or identifiers that are provided arbitrarily by users or that are generated from device specific naming method. However, those identifiers are vulnerable for unexpected changing or eliminating so that it becomes a problem in still image search or management. In this paper, we propose a method for still image identifier generation that is created from the still image internal information.

A Study of Deformation Depicted on Moschino's Collection -Focusing on 2006~2010 Year Collection- (모스키노 컬렉션에 표현된 데포르마시옹에 관한 연구 -2006~2010년의 Collection을 중심으로-)

  • Lee, Jee-Yeon;Cho, Jean-Suk
    • The Research Journal of the Costume Culture
    • /
    • v.19 no.3
    • /
    • pp.488-500
    • /
    • 2011
  • [ $D{\'{e}}formation$ ]is one of the most important cultural factor which puts people at ease and gives a sense of security. This study, in the process, analyzes the works of Moschino. Moschino's designs are rated to have approached the sublime when it comes to transforming the psychological anxiety of everyday living into a laughter. After selecting one hundred-two of Moschino's designs from the Internet Web site(www.cft.or.kr, www.samsungdesign.net), this study examines and analyzes the characteristics and types of deformation found in them. The result as follows. The examination of deformation found in Moschino designs can be classified into a transformation, distortion, exaggeration, and illusion. Transformation, a conscious change of the existing form or function, was shown as the change of an existing position, form, function and designation of a new function. Distortion, an interpretation away from the reality or a "wrong interpretation," was shown by placing opposing factors in left-right position as an extreme asymmetry. Exaggeration, always beyond the realm of reality, was shown thorough an enlargement or a magnification of a specific part and a repetition of a detail factors. Illusion, through a distortion of reality results in something that looks new, was expressed through the effects of wearing a two-pieces, an expression of details, effects of wearing accessories, and an expression of a dynamism. Therefore, Moschino has reflected the desire of homo modern to transform the existing situation through many techniques of deformation.

A Probabilistic Load Balancing Scheme for Improving Service Quality of a Wireless Mesh Network (무선 메쉬 망의 서비스 품질 향상을 위한 확률적 부하 분담 기법)

  • Park, Jae-Sung;Lim, Yu-Jin;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.375-382
    • /
    • 2008
  • As the use of Internet and information communication technology is being generalized, the SSL protocol is essential in Internet because the important data should be transferred securely. While the SSL protocol is designed to defend from active attack such as message forgery and message alteration, the cipher suite setting can be easily modified. If the attacker draw on a malfunction of the client system and modify the cipher suite setting to the symmetric key algorithm which has short key length, he should eavesdrop and cryptanalysis the encrypt data. In this paper, we examine the domestic web site whether they generate the security session in the symmetric key algorithm which has short key length and propose the solution of the cipher suite setting problem.

An Image-based CAPTCHA System with Correction of Sub-images (서브 이미지의 교정을 통한 이미지 기반의 CAPTCHA 시스템)

  • Chung, Woo-Keun;Ji, Seung-Hyun;Cho, Hwan-Gue
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.873-877
    • /
    • 2010
  • CAPTCHA is a security tool that prevents the automatic sign-up by a spam or a robot. This CAPTCHA usually depends on the smart readability of humans. However, the common and plain CAPTCHA with text-based system is not difficult to be solved by intelligent web-bot and machine learning tools. In this paper, we propose a new sub-image based CAPTCHA system totally different from the text based system. Our system offers a set of cropped sub-image from a whole digital picture and asks user to identify the correct orientation. Though there are some nice machine learning tools for this job, but they are useless for a cropped sub-images, which was clearly revealed by our experiment. Experiment showed that our sub-image based CAPTCHA is easy to human solver, but very hard to all kinds of machine learning or AI tools. Also our CAPTCHA is easy to be generated automatical without any human intervention.

Privacy Data Protection Methods on Smartphone Using A Virtual Disk Platform (스마트폰에서 가상 디스크 플랫폼을 사용한 프라이버시 데이터 보호 방안)

  • Shin, Suk-Jo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.560-567
    • /
    • 2013
  • The release of iPhone by Apple in 2009 has changed the life pattern of an individual tremendously. That is, with the emergence of a smart phone, various services including voice/video call, camera, receiving and sending of e-mail, and web browsing have been realized. However, the broader the scope of the use of a smart phone has become, the greater the need for companies to introduce an MDM solution for protecting important documents has become. However the MDM solution may have a problem in that all data such as contacts, pictures, and memos saved in the smart phone can be accessed unlimitedly. For this reason, there is a risk that unwanted violation of privacy may happen to smart phone users. This paper proposed a plan to protect a personal privacy file of smart phone users, which disables access by others except for related smart phone users by enabling a person in charge of security or an MDM manager in a company to have access only to the file which was allowed by smart phone users to be disclosed and by saving non-disclosed files in a virtual disk.

Efficient Authorization Conflict Detection Using Prime Number Graph Labeling in RDF Access Control (RDF 접근 제어에서 소수 그래프 레이블링을 사용한 효율적 권한 충돌 발견)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.35 no.2
    • /
    • pp.112-124
    • /
    • 2008
  • RDF and OWL are the primary base technologies for implementing Semantic Web. Recently, many researches related with them, or applying them into the other application domains, have been introduced. However, relatively little work has been done for securing the RDF and OWL data. In this article, we briefly introduce an RDF triple based model for specifying RDF access authorization related with RDF security. Next, to efficiently find the authorization conflict by RDF inference, we introduce a method using prime number graph labeling in detail. The problem of authorization conflict by RDF inference is that although the lower concept is permitted to be accessed, it can be inaccessible due to the disapproval for the upper concept. Because by the RDF inference, the lower concept can be interpreted into the upper concept. Some experimental results show that the proposed method using the prime number graph labeling has better performance than the existing simple method for the detection of the authorization conflict.

Surveillance System Using Person Tracking in Mobile Platform (모바일 플랫폼 기반의 사람 추적 감시시스템)

  • Lee, Kyoung-Mi;Lee, Youn-Mi
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.8
    • /
    • pp.94-101
    • /
    • 2007
  • In this paper, we propose a surveillance system using multi-person tracking in a WIPI based mobile system, which is the standard wireless internet platform. The proposed system consists of two subsystems: the person tracking system and the mobile information transmission system. The person tracking system tracks persons who invade security and the mobile information transmission system sends the tracking results from the person tracking system to the user's mobile phone. In this paper, the person tracking system tracks persons who appear on many cameras with non-overlapping views in order to achieve a wider view. The mobile information transmission system saves automatically tracked data to the owner's web server and transmits the saved data to the user's WIPI mobile phone. Therefore, whenever the user wishes to view tracked data later, the mobile system can provide the user with the tracking results by either the user selecting particular cameras or the time on the owner's mobile phone. The proposed system is a new surveillance system that transfers tracked data among cameras to the user's mobile phone in order to overcome space limitations in tracking areas and monitoring areas and spatial limitations in monitoring hours.

Analysis on the Correlation Between Mobile Contents Use and Active Attitude toward Mobile Internet (모바일 콘텐츠 활용과 모바일 인터넷에 대한 적극적 태도와의 연관성 분석)

  • Jang, Sejung;Jin, Seohoon
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.15-28
    • /
    • 2016
  • As the industry of Mobile Internet has been gradually developed, the major device for accessing the web is predicted to shift from PC to Mobile devices in the near future. This drastic increase of demand in Mobile devices has drawn a more convenient standard of living by transcending time and space in our lives, however, it triggered various side effects such as a digital divide. This study was conducted to analyze how people utilize the contents via Mobile devices and their active attitude toward Mobile Internet by dividing individual characteristics into generations, education level and income level, and also identify whether Mobile contents utilization has an effect on the active attitude. The research results could be used for establishing a policy to narrow the gap in Mobile contents use and active attitude by individual characteristics.