• Title/Summary/Keyword: 인증 경로

Search Result 661, Processing Time 0.028 seconds

Design of International Cross Certification Model using Cross Certificate (상호인증서를 이용한 국제상호인증 모델 설계)

  • 김재중;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.99-107
    • /
    • 2003
  • In this paper we propose an international cross certification model using cross certificate. We propose a new model by analyzing and solving current problems of the National PKI. We recommend a certificate profile, design a directory schema, and propose a method to access PSE(personal security environment) using PKCS#11, which gives the expansibility and convenience. Finally, we propose a certificate path verification method using RFC 3280 and show how to get the certificate chain by using the trust anchor. This model is recommended to the detailed level of specification for the interoperability of each country's PKI.

친환경농업 이모저모

  • 한국유기농업협회
    • THE HEALTH and ORGANIC FARMING
    • /
    • no.219
    • /
    • pp.11.1-11.1
    • /
    • 2005
  • 고교생 친환경농업 글짓기 작품 공모전 - 친환경인증신청, 전남도 9월 현재 11.908ha로 급증 - 화천군, 친환경농업대학 1기생 모집 - 전남도, 친환경농업육성 조례 제정

  • PDF

The Shortest Authentication Path for Performance Improvement of MHT Contents Authentication Method in Distributed Network Environment (분산 네트워크 환경에서의 MHT 콘텐츠 인증 기술 성능 개선을 위한 최소 인증 경로에 관한 연구)

  • Kim, DaeYoub
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.9
    • /
    • pp.235-242
    • /
    • 2018
  • Various technologies have been developed to more efficiently share content such as P2P, CDN, and CCN. These technologies take a common approach that content request packets is responded by distributed network nodes or hosts, not by a single content distributor. Such approaches not only resolve network congestion around content distributors, but also make it possible to distribute content regardless of the system and network status of content distributors. However, when receiving content from distributed nodes/hosts, not from authenticated distributors, users cannot practically identify which node/host sent content to them. Due to this characteristic, various hacking caused by the malicious modification of content is possible. Therefore, to make such approaches more secure, a content authentication technique is required. In this paper, we propose a improved operation of MHT used in CCN for authenticating distributed content. Then we evaluate the proposed method by comparing its performance with the existing technology.

A Study on Management Condition and Improvement of Artificial Greens in GBCS-Certified Apartments through the Post Occupancy Evaluation (POE를 통한 친환경건축물 인증 공동주택 인공환경 녹화 관리 실태 및 개선방안 연구)

  • Kim, Bo-Ram;Ahn, Tong-Mahn
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.40 no.6
    • /
    • pp.1-12
    • /
    • 2012
  • This study aims to suggest ways to improve sustainability on housing complexes. This study sampled eight housing projects in Seoul and GyeongGi-Do in Korea, which were completed in June 2007 and June 2008. Then, are retention and maintenance on "constructed greens for ecological environment" including "green structures substitutes retaining walls", "green roofs", and "green walls." Study methods are field investigations of the sampled sites, and Post Occupancy Analysis. Major findings were; 1) "constructed greens" are not well retained in more sites and and this implies the GBCS(Green Building Certification System) does not meet its objectives well, 2) User showed lower user satisfaction to "constructed greens". User satisfaction concerning "green structures substitute retaining walls" was higher than the satisfaction on the other constructed green type. Satisfaction Assessment Criteria lower 1han average were "level of quality", "meet the design objectives", "vegetation management status", "vegetation maintenance". 3) User satisfaction was strongly correlated on the level of quality factor of "constructed green". In addition, tue other factors are the significant correlations between the satisfactions. The present GBCS has inadequate assessment standards for maintenance, which lead to lower the entire satisfaction. Therefore, periodic recertification system, education and information providing for the managing personals, and incentives for good maintenance or disincentive for poor maintenance of the "constructed greens" are suggested to improve the GBCS.

친환경농업 농정

  • 한국유기농업협회
    • THE HEALTH and ORGANIC FARMING
    • /
    • no.216
    • /
    • pp.9.1-9.1
    • /
    • 2005
  • 친환경 직불 지급면적 상한제 폐지 - 전남도, '친환경농산물 음식점' 인증제 실시 - 조선재, 유기농기사 준비반 개설

  • PDF

A New Certificate Validation Method Allowing CAs to Participate the Certificate Path Validation Processing (CA를 인증 경로 처리 작업에 참여시키는 새로운 인증서 검증 방안)

  • Choi, Yeon-Hee;Park, Mi-Og;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.21-30
    • /
    • 2004
  • Most applications using the PKI allows a user to execute the certificate validation processing. The efficiency of user system can be declined by the user-side processing resulting the overhead and low speed of the validation processing. Therefore, in this paper, we propose a new certificate validation processing method can decrease the overhead on user by allowing CAs of the hierarchical PKI to participate in the validation processing. Therefore, our proposed scheme can not only reduce the considerable overhead caused by the user-side whole processing without a new implementation of the delegated server but also improve the time spent for the processing by the reduction of the validation processing job on user.

전자서명 인증기술 동향

  • 이석래;이재일;고승철
    • Information and Communications Magazine
    • /
    • v.17 no.10
    • /
    • pp.105-117
    • /
    • 2000
  • 글로벌 정보통신망을 통하여 전자문서 교환 및 전자상거래의 안전·신뢰성을 보장하기 위해서 공개키 기반의 인증서비스가 필요하다. 세계 각국은 자국의 통신 인프라에 대한 안전·신뢰성 보장을 위하여 공개키 기반구조를 구축하고 있다. 글로벌 정보통신망에서 인증기관간의 호환성 유지를 위하여 가장 중요한 기술요소는 인증서 혹은 거래문서에 대한 전자서명을 위한 암호알고리즘, 인증서 및 인증서 폐지목록의 프로파일 규격, 인증서 발급 및 관리를 위한 프로토콜, 인증서의 유효성을 확인할 수 있는 인증서 경로 검증 방법 등이다. 본 논문에서는 IETF PKIX 작업반의 내용을 중심으로 PKI 구현을 위하여 필수적 기술 요소인 인증서 및 CRL 프로파일 규격, 인증서 신청·발급 및 관리에 필요한 프로토콜, 인증서 유효성 검증을 위하여 필요한 기술 등을 우선적으로 다루고 국내외 인증 제품 개발 및 인증서비스 업체의 현황에 대하여 설명하고자 한다.

  • PDF

Efficient Anonymous On-Demand Routing Protocol in MANET (익명성을 지원하는 효율적인 MANET On-Demand 라우팅 프로토콜)

  • Sung-Yun Lee;Hee-Kuck Oh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1465-1468
    • /
    • 2008
  • 모바일 에드혹 네트워크(MANET)에서 익명 라우팅을 위해 각 노드가 익명ID를 이용하여 MAC 단에서 익명으로 서로를 인증하고 네트워크 단에서 익명 라우팅 수행하는 AODV 기반의 라우팅 기법이 제안된바 있다[4]. 하지만 기존의 제안된 방법은 익명ID가 변경될 때마다 페어링 연산을 통해 재인증을 해야 하며, 라우팅 경로 중간의 노드들은 메시지의 연결성을 없에게 위해 매홉마다 암·복호화를 반복하여 상당히 비효율적이다. 본 논문은 기존논문의 노드 인증 기법을 확장하여 실제 메시지의 교환과정에서 일어나는 홉 간 암호화 횟수를 줄이고, 임시 인증값을 이용한 노드 상호간의 빠른 인증 기법을 사용하여 노드간의 인증과 익명성을 보장하는 보다 효율적인 프로토콜을 제안한다.

건강과 자연농업-제240호

  • Korea Organic Farming Association
    • THE HEALTH and ORGANIC FARMING
    • /
    • no.240
    • /
    • pp.1-12
    • /
    • 2007
  • 제6회 '친환경유기농박람회2007' 개최/우리의 산야초-쥐방울덩굴/과일의 생장발육과 무기영양 공급/한.미 FTA 비준에 대비한 명예농림부 장관 초청 Workshop 개최/농림부 발표 "한.미 FTA 보완대책(안)" 골자/산나물도 '친환경인증' 추진/한미 FTA 이후의 우리농업의 살 길/친환경농산물 인증제도의 발전방향/포도 갈색 무늬병의 발병 생태/작물의 고온장해 극복/친환경자재 목록공시제 관리 필요/<암을 이기는 음식>(5) 율무/걷기는 남성에게 최고의 명약/EU, 유기식품 라벨 규정 마련/유기농, 몰락위기 유럽농업 구했다/유용미생물의 개발

  • PDF

A Study of node Authentication in Ad-hoc Network using Java Card (자바 카드를 이용한 Ad-hoc망의 노드 인증에 관한 연구)

  • Lee, Cheol-Seung;Shin, Myeong-Sook;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.902-905
    • /
    • 2005
  • In this paper we challenge the mobile node Authentication using Java Card authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc rooting protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Java Card Authentication of mobile node can possibly be applied to the area of M-Commerce, Wireless Security, and Ubiquitous Computing and so on.

  • PDF