• Title/Summary/Keyword: 안전 삭제

Search Result 103, Processing Time 0.025 seconds

Design and Implementation of Multistage Database for Shipboard by using Data Sampling (데이터 샘플링을 이용한 선박용 다단 데이터베이스 설계 및 구현)

  • Seo, Jeong-Min;Hwang, Hun-Gyu;Lee, Seong-Dae;Lee, Jang-Se;Jang, Kil-Woong;Park, Hyu-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1111-1118
    • /
    • 2011
  • Several data from equipments on shipboard have been used for the safe navigation of ships. Due to the varieties of data, however, there may be difficulties to manage those data separately. Therefore, it can be effective to develop database for the integrated management of ship data. However, the database may become full soon because huge amount of data are saved continuously. To cope with this problem, this paper proposes multistage database which can always keep the database under full by means of sampling mechanism. To verify the functionality of the methodology, a prototype system has been implemented and tested.

Secure logging system with self-protecting function (자체 보호 기능을 갖는 안전한 로깅 시스템)

  • Kim, Min-Su;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2442-2450
    • /
    • 1999
  • The audit logging system is to write the details of systems use and access on networks. These details are used for trailing the route, when illegal access or using system resource is occurred on networks. The logging system therefore, might be the first target of intruder. We developed the logging system which writes the information of logging and command execution on UNIX system. And we prepared the self-protecting functions of blocking intruder's attack on the logging system. They are protecting the logging process and the log file. To protect the logging process, we made it keep changing the process ID to avoid the intruder's attack. To protect the log file, we use hard link and mandatory file locking, so it can make it impossible to delete or change log file.

  • PDF

A system for automatically generating activity photos of infants based on facial recognition in a multi-camera environment (다중 카메라 환경에서의 안면인식 기반의 영유아 활동 사진 자동 생성 시스템)

  • Jung-seok Lee;Kyu-ho Lee;Kun-hee Kim;Chang-hun Choi;Kyoung-ro Park;Ho-joun Son;Hongseok Yoo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.481-483
    • /
    • 2023
  • 본 논문에서는 다중 카메라환경에서의 안면인식 기반 영유아 활동 사진 자동 생성 시스템을 개발했다. 개발한 시스템은 어린이집에서 알림장 작성을 위한 촬영하는 동안 보육에 부주의하여 안전사고가 발생하는 것을 방지 할 수 있다. 시스템은 이동식 수집기와 분류 서버로 나뉘어 작동하게 된다. 이동식 수집기는 Raspberry Pi를 이용하였고 초당 1장 내외의 사진을 촬영하여 SAMBA를 사용 공유폴더에 저장한다. 분류 서버에서는 YOLOv5를 사용해 안면을 인식해 분류한다. OpenCV와 TensorFlow-Keras를 통해 분류된 사진에서의 표정을 파악하여 부모에게 전송할 웃는사진만을 분류하여 남겨둔다. 이외의 사진은 /dev/null로 이동하여 삭제된다.

  • PDF

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

A Scheme for Secure Storage and Retrieval of (ID, Password) Pairs Using Smart Cards as Secure and Portable Storages (안전한 휴대 저장장치로서의 스마트카드를 활용한 (ID, 패스워드) 쌍들의 안전한 저장 및 검색 기법)

  • Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.333-340
    • /
    • 2014
  • Despite the security weakness of reusing passwords, many Internet users are likely to use a single ID and password on various sites to avoid the inconvenience of remembering multiple credentials. This paper proposes a scheme for securely storing, retrieving, and updating randomly chosen (ID, password) pairs by using smart cards as secure and portable storages. The scheme makes a user free from remembering her (ID, password) pairs for Internet accesses. By splitting and scattering the (ID, password) pairs of a user across the user's smart card memory and a remote server's storage, it can protect the logon credentials even from the theft or loss of the smart card. Also, a user, if deemed necessary, can issue and let the server to delete all information belonging to the user. Hence even an attacker who cracked the smart card memory would not be able to obtain any (ID, password) pair of the victim thereafter. The scheme requires a user to input a site information and pass-phrase to her smart card to obtain the logon credentials, but it should be an acceptable overhead considering the benefits of not remembering the freely chosen (ID, password) pairs at all.

Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment (M2M 통신 환경에서 트랩도어 충돌 해쉬를 이용한 그룹키 생성 및 교환 기법)

  • Kim, Sung-Soo;Jun, Moon-Seog;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.9-17
    • /
    • 2015
  • The development of wireless communication technology and change in the ICT market has led to the development of the M2M service and technology. Under these circumstances, the M2M environment has been the focus of communication environment construction between machines without control or direct intervention of human being. With characteristics of wireless communication environment, the possibility of being exposed to numerous security threats and safe communication security technology have becoming an issue an important requirements for problems such as data exposure, forgery, modulation, deletion, and privacy. This research analyzes requirements of trapdoor collision hash, generates keys between groups under the M2M environment by using the specificity of trapdoor, and suggests technology to exchange keys with session keys. Further, it also suggests techniques to confirm authentication of device and gateway in accordance with group key generation. The techniques herein suggested are confirmed as safe methods in that they have attack resistance such as Masquerade Attack, Man-in-the-Middle Attack, and Replay Attack in the group communication block by using the speciality of collision message and collision hash.

Chameleon Hash-Based Mutual Authentication Protocol for Secure Communications in OneM2M Environments (OneM2M 환경에서 안전한 통신을 위한 카멜레온 해쉬 기반의 상호인증 프로토콜)

  • Kim, Sung-soo;Jun, Moon-seog;Choi, Do-hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1958-1968
    • /
    • 2015
  • Things intelligence communication (M2M or IoT) service activation and global company of OneM2M-related business on aggressive investing and has led to the acceleration of change in the ICT market. But a variety of hacking security technology because of the possibility of secure communication (data exposure, theft, modification, deletion, etc.) has been issued as an important requirement. In this paper, we propose a mutual authentication protocol for secure communications chameleon hash based on the M2M environment. The results of performance analysis efficiency is encryption and decryption an average of 0.7%, calculated rate showed good results as compared to the target algorithm, equivalent to a 3%(Average 0.003 seconds) difference, mutual authentication and encryption region by using the key update advantage of ECC(Elliptic Curve Cryptography)based Chameleon hash function is signed of the operational efficiency, using a collision message verifiable properties demonstrated strong security of the communication section.

Construction Safety Evaluation of Local Bearing Strength of Hollow Core Slab (중공 슬래브의 국부지압강도에 대한 시공안전성 평가)

  • Hur, Moo-Won;Yoon, Jeong-Hwan;Hwang, Kyu-Seok;Yoon, Sung-Ho;Park, Tae-Won
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.22 no.2
    • /
    • pp.8-15
    • /
    • 2018
  • Hollow Core Slab is a very efficient system that can reduce weight and its use has increased. Void slab is a concrete slab that has voids substituted with void material. Because of its saved volume of concrete, void slab can reduce weight of slabs. Also, it can't only save concrete but also can reduce carbon-emission. However, because of the unclear bearing strength at the part of void substituted with voiding material, several problems occur in constructing field. In this study, void slab including void material was built and local bearing strength test was carried out for 3 types of load(truck load, support load and Jack support load). As a result, bearing strength of void neck and upper void material is more than allowable load. And also, bearing strength of specimens with using deck and not using deck are also over allowable loads.

Efficient Re-Establishment Mechanism of Diameter Security Association lost in MIP Application (MIP 환경에서의 Diameter Security Association 정보 분실시의 재설정 기법)

  • 유희종;김말희;김현곤
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.39-48
    • /
    • 2003
  • AAA(Authentication, Authorization, Accounting) protocol is a framework that propose functions of AAA on multiple networks and platforms. AAA protocol is extending from previous RADIUS protocol to Diameter protocol. There are some Diameter applications for variety purpose. Diameter CMS Application makes Diameter messages more secure by using PKI. Diameter CMS Application establish DSA(Diameter Security Association) for end to end security. However the Application has some problems to establish DSA(Diameter Security Association), which can make Diameter system unstable. If one system lose DSA information for some system error - for example, reboot -, the secure communication between two nodes may not be possible. At the application such as MIP, even user registration can't be done. In this paper, we propose a mechannism for DSA re-establishment, and also show the result of the implementation.

Development of Guidelines for Setting Up Sensory Integration Rooms in Korea Using the Delphi Method (국내 감각통합치료실 구성을 위한 가이드라인 개발: 델파이 연구)

  • Lee, Chan-Hwa;Hwang, Sun-Mi;Park, Seo-Yul;Chae, Song-Eun;Kim, Jung-Ran
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.18 no.2
    • /
    • pp.1-14
    • /
    • 2020
  • Objective : This study presents guidelines for setting up a sensory integration room by applying the Delphi method. Methods : The Delphi method was applied in a survey of 22 expert panels asked to review sensory integration therapy from May to June 2020 to collect expert opinions. The survey was conducted in two rounds. The first round involved the collection of opinions based on prior research that used a total of 40 assessment tools, 23 closed questions about treatment tools, and 10 questions about the physical environment. Based on the results of the first round, the second was conducted using a process of item deletion and modification. Results : A total of 59 items were selected in the first round of the survey. In the second the contents of these 59 items were analyzed: each item scored .42 or higher, so no items were deleted. The stability of the survey was also calculated and found to be less than 0.5, so no further testing was required. The average content feasibility ratio of the final Delphi survey was .92, stability .15, convergence .36, and consensus .80, showing high agreement. Conclusion : This study is expected to help institutions and clinical therapists who want to create a sensory integration therapy room in their facilities by examining the physical environment, treatment tools, and evaluation tools used in sensory integration therapy rooms and understanding the views on such environments obtained from the clinical site to sensory integration therapists.