• Title/Summary/Keyword: 안전속성

Search Result 363, Processing Time 0.024 seconds

An Efficient Attribute Certificate Management Technique for Highly Distributed Environment (고도로 분산된 컴퓨팅 환경을 위한 효율적 속성 인증서 관리 기법)

  • Yang, Soo-Mi
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.85-92
    • /
    • 2005
  • For an efficient role based access control in highly distributed computing environment to reduce management cost, we utilize attribute certificates. Especially highly distributed computing environments such as ubiquitous computing environments which cannot have global or broad control, need another attribute certificate management technique. The techniques for transmission of the attribute certificates and management of the group keys should be considered to reduce management cost. For better performance we structure attribute certificates. We group roles and make the role group relation tree. It results secure and efficient role renewing and distribution. For scalable attribute certificate distribution, multicasting packets are used. We take into account the packet loss and quantifying performance enhancements of structuring attribute certificates.

  • PDF

Efficient Counterexample Generation for Safety Violation in Model Checking (모델 체킹에서 안전성 위반에 대한 효율적인 반례 생성)

  • Lee Tae-hoon;Kwon Gi-hwon
    • The KIPS Transactions:PartD
    • /
    • v.12D no.1 s.97
    • /
    • pp.81-90
    • /
    • 2005
  • Given a model and a property, model checking determines whether the model satisfies the property. In case the model does not satisfy the property model checking gives a counterexample which explains where the violation occurs. Since counterexamples are useful for model debugging as well as model understanding, counterexample generation is one of the indispensable components in the model checking tool. This paper presents efficient counterexample generation techniques when a safety property is falsified. These techniques are used to solve Push Push games which consist of 50 games. As a result, all the games are solved with the proposed techniques. However, with the original NuSMV, 42 games are solved but 8 failed. In addition, we obtain $86{\%}$ time improvement and $62{\%}$ space improvement compared to the original NuSMV in solving the game.

Interoperability Compliance Test for PMI (PMI 인증서 등에 대한 적합성 평가)

  • 이승훈;정구완;송주용;송주석;박정환;이재일
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.3-6
    • /
    • 2002
  • 권한 관리 기반 구조(PMI: Privilege Management Infrastructure)란 공개키 기반 구조(PKI: Public key Infrastructure) 와 연동되어 온라인 상에서 사용자의 신원정보와 권한 또는 속성 정보를 연결하여 자원에 대한 접근 관리를 효율적이고 안전하게 할 수 있도록 해주는 정보 보호 인프라이다. 이러한 권한 관리 기반 구조에서 사용되는 인증서를 속성 인증서(Attribute Certificate) 또는 PMI 인증서라고 부른다. 속성 인증서가 기반 구조 내에서 통용되어 사용되기 위해서는 표준화 기관에서 정의한 표준 규격을 따라야 하며 유효성을 해치지 않는 올바른 값들로 인증서 내용이 채워져 있어야 한다. 이와 같이 특정 단체나 어플리케이션에 의해 생성·사용되는 속성 인증서 등이 기반 구조내의 개체들 간에 서고 호환되어 사용될 수 있는지 검사하는 것을 적합성 평가라고 한다. 본 연구에서는 속성 인증서 및 인증서 요청 메시지의 적합성 평가를 위한 평가 시스템을 구성하고 평가 시 요구되는 평가 항목 및 평가 기준을 정의한다.

  • PDF

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.

Attribute-based Broadcast Encryption Algorithm applicable to Satellite Broadcasting (위성방송에 적용 가능한 속성기반 암호전송 알고리즘)

  • Lee, Moon-Shik;Kim, Deuk-Su;Kang, Sun-Bu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.9-17
    • /
    • 2019
  • In this paper, we propose an attribute-based broadcast encryption algorithm that can be applied to satellite broadcasting network. The encryption algorithm is a cryptographic method by which a carrier(sender) can transmit contents efficiently and securely to a plurality of legitimate users through satellites. An attribute-based encryption algorithm encrypts contents according to property of contents or a user, In this paper, we combine effectively two algorithms to improve the safety and operability of satellite broadcasting network. That is, it can efficiently transmit ciphertexts to a large number of users, and has an advantage in that decoding can be controlled by combining various attributes. The proposed algorithm reduces the network load by greatly reducing the size of the public key, the private key and the cipher text in terms of efficiency, and the decryption operation amount is reduced by half to enable fast decryption, thereby enhancing the operability of the user.

The State Attribute and Grade Influence Structure for the RC Bridge Deck Slabs by Information Entropy (정보 엔트로피에 의한 RC 교량 상판의 상태속성 및 등급 영향 구조 분석)

  • Hwang, Jin-Ha;Park, Jong-Hoi;An, Seoung-Su
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.23 no.1
    • /
    • pp.61-71
    • /
    • 2010
  • The attributes related to the health condition of RC deck slabs are analyzed to help us identify and rate the safety level of the bridges in this study. According to the related reports the state assessment for the outward aspects of bridges is the important and critical part for rating the overall structural safety. In this respect, the careful identification for the various state attributes make the field inspection and structural diagnosis very effective. This study analyzes the influence of the state attributes on evaluation classes and the relationship of them by the inductive reasoning, which raise the understanding and performance for evaluation work, and support the logical approach for the state assessment. ID3 algorithm applied to the case set which is constructed from the field reports indicates the main attributes and the precedence governing the assessment, and derives the decision hierarchy for the state assessment.

Attribute-base Authenticated Key Agreement Protocol over Home Network (홈네트워크 상에서 속성기반의 인증된 키교환 프로토콜)

  • Lee, Won-Jin;Jeon, Il-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.49-57
    • /
    • 2008
  • User authentication and key agreement are very important components to provide secure home network service. Although the TTA adopted the EEAP-PW protocol as a user authentication and key transmission standard, it has some problems including not to provide forward secrecy. This paper first provides an analysis of the problems in EEAP-PW and then proposes a new attribute-based authenticated key agreement protocol, denoted by EEAP-AK. to solve the problems. The proposed protocol supports the different level of security by diversifying network accessibility for the user attribute after the user attribute-based authentication and key agreement protocol steps. It efficiently solves the security problems in the EEAP-PW and we could support more secure home network service than the EEAP-AK.

An Attribute-Based Authentication Scheme Using Smart Cards (스마트카드를 이용한 속성기반 사용자 인증 스킴)

  • Yoo, Hye-Joung;Rhee, Hyun-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.41-47
    • /
    • 2008
  • In a network environment, when a user requests a server's service, he/she must pass an examination of user authentication. Through this process, the server can determine if the user can use the provided services and the exact access rights of this user in these services. In these authentication schemes, the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users and smart cards have been widely used for authentication systems providing anonymity of users recently. An remote user authentication system using smart cards is a very practical solution to validate the eligibility of a user and provide secure communication. However, there are no studies in attribute-based authentication schemes using smart cards so far. In this paper, we propose a novel user authentication scheme using smart cards based on attributes. The major merits include : (1) the proposed scheme achieves the low-computation requirement for smart cards; (2) user only needs to register once and can use permitted various services according to attributes; (3) the proposed scheme guarantees perfect anonymity to remote server.

ECC-based IPTV Service Key Establishment Protocol With User Attribute (사용자 속성을 이용한 ECC 기반의 IPTV 서비스 키 설립 프로토콜)

  • Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.105-111
    • /
    • 2012
  • Internet Protocol Television (IPTV) through broadband cable network is a subscriber-based system which consists of software and set-top box. However, a weakness for the current IPTV system is the lack of security between users and CAS. This paper proposes a user authentication protocol at STB, which limits the service by the user-valued attribute to prevent illegal IPTV users. User attribute values change the order with bit form according to the certain rule, and apply to one-way hash function and Diffie-Hellman's elliptic curve key-exchange algorithm. The proposed protocol is able to improve on user authentication and computation. Also, each user generates an authentication message by smart card and receives various services based on the user-valued attribute.

A comparison of social sustainability by domestic power generation types (국내 발전기술별 사회적 지속가능성 비교)

  • Moon, Kee-hwan;Kim, Seung-su;Lee, Young-joon
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2017.11a
    • /
    • pp.1417-1433
    • /
    • 2017
  • 지속가능발전은 인류가 추구해야할 공통의 목적이며 가치로서 사회적 지속가능성, 경제적 지속 가능성, 환경적 지속가능성의 개념이 내포되어 있다. 본 연구에서는 우리나라의 전력공급 부문에서 특히 사회적 지속가능성의 가치를 구현하기 위해서는 에너지 사용에 대한 형평성과 에너지를 생산하는 발전기술에 대한 사회적 수용성, 그리고 지속적으로 고용을 창출할 수 있는 발전기술들로 발전원을 구성되는 것이 필요하다고 보았다. 이를 위해 본 연구는 사회적 지속가능성을 '에너지복지', '기술의 수용성', '고용 창출'등 3가지 핵심 속성으로 나누고 속성 당 2개의 세부 속성 지표를 구성하여 총 6개의 속성지표 측면에서 발전기술별로 비교 분석하였다. 분석 결과, 사회적 지속가능성 종합점수는 원자력 > 풍력 > LNG > 석탄 > 태양광 순으로 나타나 원자력이 사회지속성 측면에서 가장 우수한 발전기술인 반면에 태양광은 가장 열위에 있는 것으로 평가되었다. 또한 속성별로 살펴보면, '에너지사용의 복지성'은 원자력과 석탄화력이, '에너지사용의 접근성'은 LNG와 석탄이, '기술의 안전성'은 원자력과 풍력이, '기술의 신뢰성'은 발전기술간 큰 차이가 없으며, '고용 규모'는 태양광과 원자력이, '고용의 질'은 풍력과 원자력이 우수한 것으로 나타나 원자력이 대부분의 속성에서 우위에 있거나 경쟁력이 있는 것으로 나타났다.

  • PDF