• Title/Summary/Keyword: web security

Search Result 1,092, Processing Time 0.032 seconds

Low-Power Encryption Algorithm Block Cipher in JavaScript

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.252-256
    • /
    • 2014
  • Traditional block cipher Advanced Encryption Standard (AES) is widely used in the field of network security, but it has high overhead on each operation. In the 15th international workshop on information security applications, a novel lightweight and low-power encryption algorithm named low-power encryption algorithm (LEA) was released. This algorithm has certain useful features for hardware and software implementations, that is, simple addition, rotation, exclusive-or (ARX) operations, non-Substitute-BOX architecture, and 32-bit word size. In this study, we further improve the LEA encryptions for cloud computing. The Web-based implementations include JavaScript and assembly codes. Unlike normal implementation, JavaScript does not support unsigned integer and rotation operations; therefore, we present several techniques for resolving this issue. Furthermore, the proposed method yields a speed-optimized result and shows high performance enhancements. Each implementation is tested using various Web browsers, such as Google Chrome, Internet Explorer, and Mozilla Firefox, and on various devices including personal computers and mobile devices. These results extend the use of LEA encryption to any circumstance.

A Study on Location-Based Services Based on Semantic Web

  • Kim, Jong-Woo;Kim, Ju-Yeon;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1752-1761
    • /
    • 2007
  • Location-based services are a recent concept that integrates a mobile device's location with other information in order to provide added value to a user. Although Location-based Services provide users with comfortable information, it is a complex task to manage and share heterogeneous and numerous data in decentralized environments. In this paper, we propose the Semantic LBS Model as one of the solution to resolve the problem. The Semantic LBS Model is a LBS middleware model that includes an ontology-based data model for LBS POI information and its processing mechanism based on Semantic Web technologies. Our model enables POI information to be described and retrieved over various domain-specific ontologies based on our proposed POIDL ontology. This mechanism provide rich expressiveness, interoperability, flexibility in describing and using information about POls, and it can enhance POI retrieval services.

  • PDF

A Discussion of Current Issues Integrating Mobile Agent in Web

  • Park, Jung-Hee;Lee, Ki-Dong
    • Journal of Digital Convergence
    • /
    • v.7 no.1
    • /
    • pp.175-183
    • /
    • 2009
  • With the development of enabling technologies such as wireless networking and various types of hand held-mobile devices, Mobile intelligent agent has been widely applied to various fields. Different views on capabilities, advantages, and disadvantages of mobile intelligent agent providing an ubiquitous access are brought by field researchers and practitioners recently. The purpose of this paper is thus to provide the discussion of the comtemporary development of mobile intelligent agent in the contexts of the Infosphere, focusing especially on developing and nurturing the future research grounds such as information scalability, and information security. The results of this study would improve the applications of mobile intelligent agents in web transaction, especially mobile business surroundings where many interest groups have to adjust their point of issues rapidly due to the changing business environment, i.e., customer's change the order item in web.

  • PDF

Implementation of the web based environment monitoring system supporting the NMS protocol (NMS를 지원하는 웹기반 환경 감시 시스템의 구현)

  • Bae, Kwang-Jin;Yim, Kang-Bin
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.831-832
    • /
    • 2006
  • In this paper, we introduce a canonical framework of the large-scaled web-based sensor gateway and practically implement it as the environment monitoring system. The system consists of a central management server, up to 250 local embedded subsystems and up to 250 sensor or actuator nodes for each subsystem. The node information is gathered periodically through a well-defined protocol on the sensor network and converted to the web contents and the SNMP MIB objects according to its data type. The MIB objects are well-defined and include system, network, sensor, actuator and alarm specific data classes. Because there is an increasing trend that a large number of sites are willing to adapt unmanned sensing and control, the developed system will play a key role to efficiently manage a large scale sensor networked system such as environment monitoring systems or countermeasure systems against disaster and calamities.

  • PDF

Web application security management integrated platform development study (웹(WEB)애플리케이션 보안관리 통합플랫폼 개발 연구)

  • Kim, Kihwan;Lee, Dongil;Lee, Hyunbin;Shin, Yongtae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.85-86
    • /
    • 2018
  • 본 논문에서는 사이버공격의 주요 대상인 웹 애플리케이션의 보안을 위하여 취약점진단 및 제거, 이행점검의 웹 통합보안관리 플랫폼을 제안한다. 이 플랫폼은 동적진단엔진, 취약점제거보안모듈, UI를 제공하는 통합관리시스템, 진단 결과를 저장하는 결과 및 통계 DB, 와 진단을 위한 관련 정보를 저장하는 진단 및 보안정보 DB로 구성되며, 동적진단결과에 대한 상관관계분석 기능과 취약점 개선 활동 시 스마트 보안모듈을 통해 빠르고 손쉬운 취약점 제거수정, 완화할 수 있는 통합플랫폼 연구를 통하여 웹 애플리케이션보안을 효율적으로 할 수 있다.

  • PDF

On Securing Web-based Educational Online Gaming: Preliminary Study

  • Yani, Kadek Restu;Prihatmanto, Ary Setijadi;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.767-770
    • /
    • 2015
  • With the deployment of web-based educational game over the internet, the user's registration becomes a critical element. The user is authenticated by the system using username, password, and unique code. However, it cannot be handled properly because the data is transmitted through insecure channel on the network. Hence, security requirement is needed to avoid identity leakage from malicious user. In this paper, we propose a secure communication approach using SSL protocol for an online game. We also describe the security requirements for our approach. In future work, we intend to configure and implement the SSL protocol by enabling HTTPS in web-based online game.

Publication Indicators under Web of Science, SCOPUS Databases at Northern Border University: 2008-2020

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.90-97
    • /
    • 2021
  • The study aimed to analyze the reality of the scientific publishing of the faculty members of the Northern Border University, in both the Web of Science database and the SCOPUS database, with the analysis of publishing indicators and trends for the period between 2008-2020, and the researcher's keenness to apply the bibliometric study research methodology to obtain an account Full and detailed publications indicators under the two databases, including a full analysis of scientific publishing through objective, temporal, quantitative, authors, languages, open access journals, information forms, the most productive authors, the most published scientific journals, the most scientific bodies involved with the university. The study found results, the most important of which is the existence of a high increase in scientific publishing, starting from 2015, with an increase in publishing in the scientific field compared to other disciplines, and that the vast majority of publishing is in the form of articles, as well as publishing in English for the rest of the languages.

Use Of Interactive Internet Services In Education

  • Moskalenko-Vysotska, Olena;Melnyk, Emiliia;Tovstenko-Zabelin, Serhii;Lehka, Svitlana;Didenko, Maryna;Hrubych, Kostiantyn
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.218-224
    • /
    • 2022
  • The article describes the concept of a Web-portal of an educational institution; the technical conditions for the creation of the Web-portal of the educational institution were determined; the features of the use of the Web-portal in the educational process and its organization are revealed. The scientific and practical value of the article lies in the fact that the use of portals in education will improve the management of an educational institution, activate and bring the educational process to the level of modern technologies at all its stages, as well as enhance the interaction of parents and students with employees of the educational institution.

A Development of Web-based Integrated Security Management System for Firewalls (웹 기반의 방화벽 통합 보안 관리 시스템 개발)

  • Lee, Dong-Young;Kim, Dong-Soo;Hong, Seung-Sun;Chung, Tai-Myoung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3171-3181
    • /
    • 2000
  • With a remarkable growth and expansionof Internet, the security issues emerged from intrusions and attacks such as computer viruses, dental of servives and backings to destroy intormation have been considered as serious threats for Internet and the provate networks. To protect networks from those attacks, many nendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However managing those systems individually requres too much work and high cost. Thus, integrated security managemanet and eatabliashment of consistent security policy for various security products has become more important. In this paper, we propose integrated security manabement system called WISMSF(Web based Integrated Security Management System for Fireswalls) to monitor and contro various kinds of firewalls WISMSF consists of three components-clients, integrated engine, and agents. It supports the transparent management functions of security products, easy ways of defining security policies, and simple expansion of managed ranges.

  • PDF

Systematic and Comprehensive Comparisons of the MOIS Security Vulnerability Inspection Criteria and Open-Source Security Bug Detectors for Java Web Applications (행정안전부 소프트웨어 보안 취약점 진단기준과 Java 웹 어플리케이션 대상 오픈소스 보안 결함 검출기 검출대상의 총체적 비교)

  • Lee, Jaehun;Choe, Hansol;Hong, Shin
    • Journal of Software Engineering Society
    • /
    • v.28 no.1
    • /
    • pp.13-22
    • /
    • 2019
  • To enhance effective and efficient applications of automated security vulnerability checkers in highly competitive and fast-evolving IT industry, this paper studies a comprehensive set of security bug checkers in open-source static analysis frameworks and how they can be utilized for source code inspections according to the security vulnerability inspection guidelines by MOIS. This paper clarifies the relationship be tween all 42 inspection criteria in the MOIS guideline and total 323 security bug checkers in 4 popular open-source static analysis frameworks for Java web applications. Based on the result, this paper also discuss the current challenges and issues in the MOIS guideline, the comparison among the four security bug checker frameworks, and also the ideas to improve the security inspection methodologies using the MOIS guideline and open-source static security bug checkers.