• 제목/요약/키워드: web security

Search Result 1,092, Processing Time 0.025 seconds

Security Access Control of Home System Through Authentication Server and Web Server (인증서버와 웹서버를 통한 홈 시스템의 보안 접근 제어)

  • Lee, Gang-Sik;Cho, Sung-Mok
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.12b
    • /
    • pp.558-561
    • /
    • 2011
  • 본 논문은 임베디드 타겟 보드의 시스템을 활용하여 웹서버를 운용하고, 웹페이지를 통해 임베디드타겟 보드 내의 신호를 제어할 수 있도록 제작한 신호 감지 시스템을 통해 제어 신호를 받아 실제 작동여부를 확인할 수 있는 조형물을 구성하였다. 또한, Linux 커널을 컴파일하여 포팅한 임베디스 시스템과 Linux OS기반의 인증 서버를 구축하여 안전한 홈 시스템의 보안접근 제어가 가능하도록 하였다.

  • PDF

A Study on XML/EDI Security using XML Signature (XML 전자서명을 이용한 XML/EDI보안에 관한 연구)

  • 고규준;정경찬;박정선
    • Journal of the Korea Safety Management & Science
    • /
    • v.4 no.2
    • /
    • pp.135-145
    • /
    • 2002
  • As the Internet spreads rapidly, the industrial structure is changing to a new paradigm. The previous EDI system was asked to be changed and WEB EDI, E-Mail EDI, FTP EDI etc. based on the internet have appeared. Recently, the XML/EDI which is based on XML documents has appeared. EDI system has to assure a safe exchange between senders and receivers. But, the internet has security problems because it uses a open TCP/IP protocol. In this paper, we will propose an XML/EDI system with XML Signature.

IPSec VPNs vs. SSL VPNs

  • 윤재호;권태경;천동현;임선간
    • Review of KIISC
    • /
    • v.13 no.5
    • /
    • pp.24-30
    • /
    • 2003
  • 인터넷을 비롯한 대부분의 패킷스위칭 네트워크는 IP(Internet Protocol)을 기반으로 하고 있다. 그러나, IP는 기본적으로 보안에 취약하게 설계되어 보안이 필요한 통신에 사용하는데는 어려움이 있다. IPSec(IP Security)은 IP 트래픽에 대한 이러한 보안문제를 극복하기 위해 생겨났으며, 방화벽과 결합된 형태로 가장 널리 쓰이고 있는 VPN(Virtual Private Network) 제품의 하나이다. 그러나 IPSec의 문제점이 대두되고, Web-based Service가 영역을 넓혀가면서 기존의 웹보안프로토콜인 SSL이 VPN의 새로운 형식으로 나타나고 있다. 본 고에서는 IPSec VPN과 SSL VPN의 차이점의 분석하여 정리하고자 한다.

The Verification Method for PKC and AC Using OCSP (OCSP를 이용한 PKC 및 AC 검증방안)

  • 김영진;지준웅;김지홍
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.45-52
    • /
    • 2003
  • 정보통신기술의 발달로 인터넷상의 PKC를 사용한 전자거래가 활성화되었다. 이에 따라 실질적으로 Web Server나 Database Server에 접속하기 위한 접근통제의 방안으로 속성인증서에 대한 연구도 활발히 진행되고 있다. 그러나 현재 제안되고 있는 CRL(Certificate Revocation List) 및 OCSP를 이용한 공개키인증서 검증방법은 속성인증서의 인증상태확인과 적용시킬 수 없다. 따라서 본 논문에서는 기존의 공개키인증서 검증방법인 OCSP 방법에 속성인증서 검증방법을 포함시킴으로서, 공개키인증서와 속성인증서간의 동기문제를 해결하고자 한다.

  • PDF

클라우드 환경의 서버 워크로드 보안 동향

  • Park, Moonhyung;Kim, DaeHyeob;Han, HyeonSang;Lee, Yongjoon
    • Review of KIISC
    • /
    • v.31 no.3
    • /
    • pp.39-44
    • /
    • 2021
  • 재택근무 확대와 온라인 수업 증가로 클라우드 환경으로의 전환이 확대되고 있다. 하지만 기존 온프레미스 환경과 달리 클라우드의 환경은 자원의 확장 및 재구성이 신속하기 때문에 복잡도가 증가 되었다. 본 논문에서는 급격히 전환되고 있는 클라우드 환경에서의 보안 위협과 이를 대응하기 위한 최근 위협관리 방안에 대해 분석하고, 특히 데브옵스와 같은 컨테이너 환경에서의 서버 워크로드 보안 동향과 수명주기 및 대응 자동화 등에 대한 구축 방향 관련 클라우드 환경 보안 동향을 연구한다.

A Development of the Unified Object-Oriented Analysis and Design Methodology for Security-Critical Web Applications Based on Object-Relational Database - Forcusing on Oracle11g - (웹 응용 시스템 개발을 위한 보안을 고려한 통합 분석·설계 방법론 개발 - Oracle11g를 중심으로 -)

  • Joo, Kyung-Soo;Woo, Jung-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.169-177
    • /
    • 2012
  • In the development process of application systems, the most important works are analysis and design. Most of the application systems are implemented on database system. So, database design is important. Also, IT System are confronted with more and more attacks by an increase interconnections between IT systems. Therefore security-related processes belong to a very important process. Security is a complex non-functional requirement that can interaction of many parts in the system. But Security is considered in the final stages of development. Therefore, Their increases the potential for the final product to contain vulnerabilities. Accordingly, Early in development related to security analysis and design process is very important. J2EE gives a solution based on RBAC((Role Based Access Control) for security and object-relational database also has RBAC for security. But there is not a object-oriented analysis and design methodology using RBAC of J2EE and object-relational database for security. In this paper, the unified object-oriented analysis and design methodology is developed for security-critical web application systems based on J2EE and object-relational database. We used UMLsec and RBAC of object-relational database and J2EE for this methodology.

A Study on Authorization Policy Management for Semantic Web (시맨틱 웹을 위한 권한부여 정책 관리에 관한 연구)

  • Jo, Sun-Moon
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.189-194
    • /
    • 2013
  • Semantic Web is what supports a search, data integration, and automated web service by developing technology of giving help so that a computer can understand information a little more on the web. As amount of information gets growing and diverse, there is a problem of offering by efficiently extracting and processing only information proper for users' demand. Semantic Web isn't what is distinguished completely from the existing web. It gives a meaning, which was well defined, to information of being inserted on web by expanding the current web. Through this, a computer and a person come to perform work cooperatively. To implement Semantic Web, the limit of HTML needs to be overcome. The existing access authorization has not taken information and semantics into account due to the limitations of HTML. It is difficult to expand or integrate many relevant documents by using HTML. Program or software agent, not a person, cannot extract a meaning of document automatically. This study suggests a method of Access Authorization Policy Management that is in the Semantic Web configuration. Accordingly, the policy, which was designed in this study, improved the authorization process more than the existing method.

A Study of Priority for Policy Implement of Personal Information Security in Public Sector: Focused on Personal Information Security Index (공공분야 개인정보보호 정책 집행과제의 우선순위 분석: 개인정보보호 수준진단 지표의 선정 및 중요도를 중심으로)

  • Shin, Young-Jin;Jeong, Hyeong-Chul;Kang, Won-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.379-390
    • /
    • 2012
  • This study is to consider political implication of indicators to measure personal information security in public sector studied by Ministry of Public Adminstration and Security from 2008 to 2011. The study analyzed the priority of personal information security policy dividing into personal information security infrastructure, personal information management with life cycle, correspondence of information infringement by scholars, experts, and chargers. As the results, to progress personal information security policy is important to management of personal identification information on web site; specially institutional infrastructure as responsible organization, exclusive manpower, and security budget; personal information security infrastructure. As like the results, it would be reflected in the progress of personal information security policy and tried to provide systematic management program with improving safe information distribution and usefulness.

Management and Security of User in Linux Server (리눅스 서버의 사용자 관리 및 보안)

  • Jung, Sung-Jae;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.587-594
    • /
    • 2015
  • Open operating system, Linux is the traditional Web, E-mail, DNS, FTP server, as well as being used in Cloud and Big data infrastructure. In addition, Linux is also used like a desktop or mobile devices, smart TV and cars. In particular, stepping up to the IoT era at this time is expected to be greater proportion occupied by Linux. As the use of Linux has increased security has emerged as an important factor. User management is core of Linux system security. In this paper, Classifying Linux user and analyzed the role of the user-specific file. Finally, we analyzed the linux management technologies and useful user security tools.

Access Control of Digital Content Package by Using XML Encryption (XML 암호화를 이용한 디지털 콘텐츠 패키지의 접근 제어)

  • Cho, Kwang-Moon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.291-295
    • /
    • 2004
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Until now research on XML security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex however XML security comes to involve not only network security but also managerial security. But XML encryption support simple network security. So it cannot support multiple users and multiple access control policy. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can support multiple authorization of multiple users with integrating access control. And this can reduce the cost of the existing complicated access evaluation process of access control by using pre-processing.

  • PDF