• Title/Summary/Keyword: 보안성 검토

Search Result 236, Processing Time 0.024 seconds

A Study of Definition of Security Requirements on Encryption and Audit Logging (암호화와 감사 로깅에서 보안 요건 정의 연구)

  • Shin, Seong-Yoon;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.85-91
    • /
    • 2014
  • Encryption is a method to convert information to no-sense code in order to prevent data from being lost or altered by use of illegal means. Audit logging creates audit log of users' activities, exceptions, and information security events, and then conserves it for a certain period for investigation and access-control auditing. Our paper suggests that confidentiality and integrity of information should be guaranteed when transmitting and storing important information in encryption. Encryption should consider both one-way encryption and two-way one and that encryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application access log and major information. In this paper, we take a real example of encryption and log audit for safe data transmission and periodic check.

Stability Analysis of Vertical Pipeline Subjected to Underground Excavation (지하공간 굴착에 따른 수직파이프 구조물의 안정성해석)

  • 김종우
    • Tunnel and Underground Space
    • /
    • v.10 no.4
    • /
    • pp.533-543
    • /
    • 2000
  • Deformation behavior and stability of vertical pipeline subjected to underground excavation have been studied by means of numerical analysis. Vortical ground displacements cause the pipe to be compressed, while horizontal ones cause it to be bent. In that region the vertical pipeline meets with the induced compressive stress and bending stress. In addition horizontal rock stress subjected to underground excavation may press the tube in its radial direction and it finally produces the tangential stress of pipe. In this study active gas well system is considered as an example of vertical pipelines. Factor analysis has been conducted which has great influence on the pipeline behavior. Three case studies are investigated which have the different pillar widths and gas well locations in pillar. For example, where overburden depth is 237.5 m and thickness of coal seam is 2.5 m, chain pillar of 45.8 m width in the 3-entry longwall system is proved to maintain safely the outer casing of gas welt which is made of API-55 steel, 10$\frac{3}{4}$ in. diameter and 0.4 in. thickness. Finally an active gas well which was broken by longwall mining is analyzed, where the induced shear stress turn out to exceed the allowable stress of steel.

  • PDF

Research Trends in Information Security Economics: Focused on the Articles Presented at WEIS (보안경제성 연구동향 분석: WEIS 발표 논문을 중심으로)

  • Kang, Mi-Hwa;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1561-1570
    • /
    • 2015
  • Even though much investment to prevent or mitigate damage from information security breaches have been considered, researches on economically rational information security decision-making such as investment, management, etc. are not introduced in Korea. This study analyzes research themes and methodologies of articles presented at the Workshop on the Economics of Information Security (WEIS) for 2002 - 2014. Results of the study can suggest future research topics for researchers, and help make rational information security decision-making for practitioners.

A Study on Searching for Valuation Model of Internet Security (인터넷 보안성의 가치 모형 탐색에 관한 연구)

  • Kim, Min-Choel
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.2
    • /
    • pp.337-344
    • /
    • 2005
  • This research is a study on the model of the economic value measurement of Internet Business properties(especially security property) that will take considerable parts in ail transactions. The study can contribute to decide the priority of investment among several Internet Business properties and justify the cost for improving Internet Business elements. However the study have some research limits not to be analyzed by the empirical verification. Future research agenda includes the practical survey of WTP of Internet Business properties, and the practical availability of the proposed model. Especially, many problems will occur in the process of the empirical analysis, so additional works should be done in the future.

  • PDF

Comparison of Failure Rates in Measuring Software Reliability (소프트웨어 신뢰도 측정에서 고장률 비교)

  • Jung, Hye Jung
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.15-20
    • /
    • 2022
  • This research studied the evaluation of reliability among the software quality characteristics: suitability, reliability, usability, portability, maintainability, performance efficiency, security, and compatibility. It proposes a quantitative evaluation of reliability in the measurement of software quality. This study introduces a method for measuring the failure rate included in maturity during reliability evaluation, which is one of the characteristics of software quality, and is a study with experimental data on how the failure rate changes depending on the form of failure data. Focusing on software testing, the failure rate was measured and compared according to the type of failure data by applying it to the software reliability growth model, focusing on the number of failures per day. The failure rate was measured around the failure time found through the 6-day test, and the failure rate was compared with the failure rate proposed by the international standard ISO/IEC 25023 using the measurement results, and the application was reviewed according to the data type.

A Study on The Acceptance of Communication for People through Smart Phone (스마트폰을 통한 대국민커뮤니케이션 수용성에 관한 연구)

  • Park, Jin-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.465-471
    • /
    • 2011
  • This study was to examined the acceptance of communication for people through smart phone focused users of smart phone. The results were as follows. First, smart phone's mobility influenced positively on attitude toward the transmission of government policy. smart phone's personal appropriateness influenced positively on awareness toward the transmission of government policy and usefulness toward the transmission of government policy. And smart phone's usefulness influenced positively on usefulness toward the transmission of government policy. Second, smart phone's ease of use influenced positively on awareness toward the transmission of government policy. smart phone's security influenced negatively on awareness, usefulness, attitude toward the transmission of government policy. smart phone's connectivity influenced positively on awareness toward the transmission of government policy. Third, usefulness and attitude toward the transmission of government policy through smart phone influenced positively on acceptance intention.

A Study on the Development of Consortium Blockchain Governance Framework (컨소시엄 블록체인 거버넌스 프레임워크 개발에 관한 연구)

  • Park, Jin-Sang;Kim, Jung-Duk
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.89-94
    • /
    • 2019
  • Due to the limitations of public and private blockchain, several organizations are implementing consortium blockchain systems. In order for an organization to conduct business using blockchain, it must consider 'blockchain governance' factors, such as decision rights, accountability and incentives over on-chain and off-chain, depending on the organization's strategy and objectives. If an organization conducts business without blockchain governance, it cannot achieve its strategy and objectives systematically, effectively and efficiently, and cannot comply with internal external requirements such as the expectations of stakeholders and laws. However, as businesses using consortium blockchain expand, there is no research on consortium blockchain governance. Thus, in this study, the consortium blockchain governance framework, including functions, roles and responsibilities, was developed to help organizations effectively and efficiently conduct business using consortium blockchain. In addition, to review the feasibility of the developed consortium blockchain governance framework, the framework was reviewed through an advisory committee consisting of experts on blockchain and governance over two occasions. As a result of the review, components of the consortium blockchain governance framework, including functions, roles and responsibilities, were considered complete and relevant.

PUF-based Secure FANET Routing Protocol for Multi-Drone

  • Park, Yoon-Gil;Lee, Soo-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.81-90
    • /
    • 2020
  • In order to operate multi drone efficiently, existing control methods must be improved, and drones must be able to construct communication networks autonomously. FANET(Flying Ad-Hoc Network), which is being considered as an alternative to solving these problems, is based on ad hoc network technology and can be exposed to a variety of security vulnerabilities. However, due to the limited computational power and memory of FANET nodes, and rapid and frequent changes in network topology, it is not easy to apply the existing security measures to FANET without modification. Thus, this paper proposes lightweight security measures applicable to FANET, which have distinct characteristics from existing ad hoc networks by utilizing PUF technology. The proposed security measures utilize unique values generated by non-replicable PUFs to increase the safety of AODV, FANET's reactive routing protocol, and are resistant to various attacks.

Research Trends of Adversarial Attacks in Image Segmentation (Segmentation 기반 적대적 공격 동향 조사)

  • Hong, Yoon-Young;Shin, Yeong-Jae;Choi, Chang-Woo;Kim, Ho-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.631-634
    • /
    • 2022
  • 컴퓨터 비전에서 딥러닝을 활용한 이미지 분할 기법은 핵심 분야 중 하나이다. 이미지 분할 기법이 다양한 도메인에 사용되면서 딥러닝 네트워크의 오작동을 일으키는 적대적 공격에 대한 방어와 강건함이 요구되고 있으며 자율주행 자동차, 질병 분석과 같이 모델의 보안 취약성이 심각한 사고를 불러 올 수 있는 영역에서 적대적 공격은 많은 관심을 받고 있다. 본 논문에서는 이미지 분할 기법에 따른 구별방법과 최근 연구되고 있는 적대적 공격의 방향성을 설명하며 향후 컴퓨터 비전 분야 연구의 효율성을 위해 중점적으로 검토되고 있는 연구주제를 설명한다

A Study on Efficiency of Privacy-preserving Search in Cloud Storage using SGX (SGX를 활용한 클라우드 환경에서의 프라이버시 보존 데이터 검색 효율성에 대한 고찰)

  • Koo, Dongyoung;Hur, Junbeom
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.380-382
    • /
    • 2020
  • 네트워크에 존재하는 저장 공간을 필요에 따라 유연하게 대여하여 사용할 수 있는 클라우드 스토리지 서비스는 데이터의 일관성 유지, 저렴한 유지관리 비용 등 여러 장점에 힘입어 널리 활용되고 있다. 하지만 클라우드 시스템은 데이터 소유자에 의한 관리가 이루어지지 않으므로 민감한 데이터의 노출에 의한 피해 또한 다수 발생하고 있는데, 이를 해결하기 위하여 암호화 등을 통한 프라이버시 보존을 위한 연구가 꾸준히 진행되고 있다. 본 연구에서는 프라이버시가 보존된 상태에서 클라우드에 저장된 데이터를 검색함에 있어, 대수적 난제에 근거를 둔 접근 제어 기능을 내포한 소프트웨어 기반의 검색 가능한 암호화 (searchable encryption) 기법과 최근 많은 관심을 받고 있는 하드웨어 기반 클라우드 데이터 검색의 효율성 및 기능에 대한 비교 분석을 수행한다. 이를 통하여 하드웨어 기반 기법의 활용을 통한 성능 향상 가능성을 확인하고 잠재적 보안 위협을 검토한다.