• Title/Summary/Keyword: 보안 검색

Search Result 374, Processing Time 0.024 seconds

A Study on Authorization Policy Management for Semantic Web (시맨틱 웹을 위한 권한부여 정책 관리에 관한 연구)

  • Jo, Sun-Moon
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.189-194
    • /
    • 2013
  • Semantic Web is what supports a search, data integration, and automated web service by developing technology of giving help so that a computer can understand information a little more on the web. As amount of information gets growing and diverse, there is a problem of offering by efficiently extracting and processing only information proper for users' demand. Semantic Web isn't what is distinguished completely from the existing web. It gives a meaning, which was well defined, to information of being inserted on web by expanding the current web. Through this, a computer and a person come to perform work cooperatively. To implement Semantic Web, the limit of HTML needs to be overcome. The existing access authorization has not taken information and semantics into account due to the limitations of HTML. It is difficult to expand or integrate many relevant documents by using HTML. Program or software agent, not a person, cannot extract a meaning of document automatically. This study suggests a method of Access Authorization Policy Management that is in the Semantic Web configuration. Accordingly, the policy, which was designed in this study, improved the authorization process more than the existing method.

TCAM Partitioning for High-Performance Packet Classification (고성능 패킷 분류를 위한 TCAM 분할)

  • Kim Kyu-Ho;Kang Seok-Min;Song Il-Seop;Kwon Teack-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2B
    • /
    • pp.91-97
    • /
    • 2006
  • As increasing the network bandwidth, the threat of a network also increases with emerging various new services. For a high-performance network security, It is generally used that high-speed packet classification methods which employ hardware like TCAM. There needs an method using these devices efficiently because they are expensive and their capacity is not sufficient. In this paper, we propose an efficient packet classification using a Ternary-CAM(TCAM) which is widely used device for high-speed packet classification in which we have applied Snort rule set for the well-known intrusion detection system. In order to save the size of an expensive TCAM, we have eliminated duplicated IP addresses and port numbers in the rule according to the partitioning of a table in the TCAM, and we have represented negation and range rules with reduced TCAM size. We also keep advantages of low TCAM capacity consumption and reduce the number of TCAM lookups by decreasing the TCAM partitioning using combining port numbers. According to simulation results on our TCAM partitioning, the size of a TCAM can be reduced by upto 98$\%$ and the performance does not degrade significantly for high-speed packet classification with a large amount of rules.

3D Medical Image Data Watermarking Applied to Healthcare Information Management System (헬스케어 정보 관리 시스템의 3D 의료영상 데이터 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11A
    • /
    • pp.870-881
    • /
    • 2009
  • The rapid development of healthcare information management for 3D medical digital library, 3D PACS and 3D medical diagnosis has addressed security issues with medical IT technology. This paper presents multiple 3D medical image data for protection, authentication, indexing and diagnosis information hiding applied to healthcare information management. The proposed scheme based on POCS watermarking embeds the robust watermark for doctor's digital signature and information retrieval indexing key to the distribution of vertex curvedness and embeds the fragile watermark for diagnosis information and authentication reference message to the distance difference of vertex. The multiple embedding process designs three convex sets for robustness, fragileness and invisibility and projects 3D medical image data onto three convex sets alternatively and iteratively. Experimental results confirmed that the proposed scheme has the robustness and fragileness to various 3D geometric and mesh modifiers at once.

A Study of Office Open XML Document-Based Malicious Code Analysis and Detection Methods (Office Open XML 문서 기반 악성코드 분석 및 탐지 방법에 대한 연구)

  • Lee, Deokkyu;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.429-442
    • /
    • 2020
  • The proportion of attacks via office documents is increasing in recent incidents. Although the security of office applications has been strengthened gradually, the attacks through the office documents are still effective due to the sophisticated use of social engineering techniques and advanced attack techniques. In this paper, we propose a method for detecting malicious OOXML(Office Open XML) documents and a framework for detection. To do this, malicious files used in the attack and benign files were collected from the malicious code repository and the search engine. By analyzing the malicious code types of collected files, we identified six "suspicious object" elements that are meaningful in determining whether they are malicious in a document. In addition, we implemented an OOXML document-based malware detection framework based on the detection method to classify the collected files and found that 98.45% of malicious filesets were detected.

A Design for Medical Information System of Emergency Situation Prediction using Body Signal (생체신호를 이용한 응급상황 예측 의료정보 시스템의 설계)

  • Park, Sun;Kim, Chul Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.28-34
    • /
    • 2010
  • In this paper, we proposes a emergency medical information system for predicting emergency situation by using the body's vital signs. Main research of existing emergency system has focused on body sensor networks. The problem of these studies have a delay of the emergency first aid since occurring of an emergency situation send a message of emergency situation to user. In the serious situation, patients of these problem can lead to death. To solve this problem, it need to the prediction of emergency situation for doing quickly the First Aid with identify signs of a pre-emergency situations until an emergency occurs. In this paper, the sensor network technology, the security technology, the internet information retrieval techniques, data mining technology, and medical information are studied for the convergence of medical information systems of the prediction of emergency situations.

  • PDF

Implementation of Data Integrity Module in Wireless Internet Terminal for Mobile Customer Relationship Management(m-CRM) (m-CRM을 위한 무선인터넷단말기의 데이터무결성 모듈의 구현)

  • Park, Hyun-Cheol;Kim, Dong-Gyu
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.485-494
    • /
    • 2004
  • Recently, the wireless internet terminals like mobile phones or PDAs prevail in the management of customers. With such terminals, businessmen can get business data and information of customers in real time, in connection with mobile group wares. By the wireless terminals, customers can conveniently get information of goods, search purchase sites, and give orders and do settlement. This paper aims to present the safe data integrity modules of the wireless internet terminal, for service providing correct real-time promotion information, by using users' disposition, situation, Purchase information. This study aims to suggest an implementation methodology of security module for data integrity of mobile internet terminal. This is based on the WTLS of WAP Protocol. This security module is expected to achieve central role in conversion of wireless internet environment and emphasis of encryption technology and safe and calculable wireless communication environment construction

A More Storage-Efficient Order-Revealing Encryption Scheme (우수한 공간 효율성을 제공하는 순서노출암호 기법)

  • Kim, Kee Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.503-509
    • /
    • 2019
  • Order-revealing encryption which enables a range query over encrypted data is attracting attention as one of the important security technologies in industry such as IoT, smart manufacturing, and cloud computing. In 2015, an ideally-secure order-revealing encryption whose ciphertexts reveal no additional information beyond the order of the underlying plaintexts has been proposed. However, their construction is too inefficient for practical use and some security analysis of multilinear maps, which their construction relies on, have been proposed. Recently, more practical schemes have been proposed, focusing on achieving practically usable efficiency rather than the ideal security. In this paper, we propose a more storage-efficient order-revealing encryption scheme than the Lewi et al.'s scheme most recently published by presenting an idea that can generate shorter ciphertexts without any security loss.

A Study on System Tracing User Activities in the Windows Operating System (윈도우 운영체제 상의 사용자 행위 추적에 관한 연구)

  • Jung, Chang-Sung;Kim, Young-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.101-114
    • /
    • 2011
  • As it seems like critical information leakages have been increasing due to industrial espionage and malicious internal users, the importance of introducing audit and log security technology is growing every now and then. In this paper, we suggest the session logging system for the company's internal control to meet the SOX legislation level, by monitoring and analyzing users behaviors connecting to the business-critical Operating System. The system proposed in this paper aims to monitor the user's illegal activities in the Operating System, and to present the clear evidence of purpose of those activities by detailed logs. For this purpose, we modified Operating System by adding multiple services suggested in this paper. These services utilize interfaces provided by the existing Operating System and add functions to control access and get logs. The system saves and manages session logs of users or administrators connected to the server with centralized log storage. And the system supports session log searching and lookup features required by SOX legislation for the company's internal controls with the level of computer forensics and logging technology.

Blockchain (A-PBFT) Based Authentication Method for Secure Lora Network (안전한 Lora 네트워크를 위한 블록체인(A-PBFT) 기반 인증 기법)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • Lora, a non-band network technology of the long-distance wireless standard LPWAN standard, uses ABP and OTTA methods and AES-128-based encryption algorithm (shared key) for internal terminal authentication and integrity verification. Lora's recent firmware tampering vulnerability and shared-key encryption algorithm structure make it difficult to defend against MITM attacks. In this study, the consensus algorithm(PBFT) is applied to the Lora network to enhance safety. It performs authentication and PBFT block chain creation by searching for node groups using the GPS module. As a result of the performance analysis, we established a new Lora trust network and proved that the latency of the consensus algorithm was improved. This study is a 4th industry convergence study and is intended to help improve the security technology of Lora devices in the future.

The Development of a Dormitory Management System Using the Ubiquitous and Automation Technology (유비쿼터스와 자동화 기술을 이용한 기숙사 관리 시스템 개발)

  • Jang, Jae-Hyuk;Sim, Gab-Sig
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • Today the use of RFID is extended in medical. circulation market, manufacture, security field, etc. Besides, the book-lending and the attendance management system are on an increasing trend in the use of RFID The developed dormitory management system is composed of a support program, a room management program, a manager program, and a mobile program etc.. In the support program a student(or a manager) can see his(or all member's) entrance and exit history. The room management program decides whether a student can enter the dormitory or not and manages the use of the power after or inquiring a RFID's input tag information into database server. The manager program is able to input and modify a room state and the fixtures information in the room required to operate the room management program, to set up and retrieve a student's entrance and exit information and a room state information. The mobile program enables a manager to check student's identity whether he is in or out, and the manager can know the personal information of being out in detail.