• 제목/요약/키워드: 인지된 보안

Search Result 353, Processing Time 0.027 seconds

A Study of Network 2-Factor Access Control Model for Prevention the Medical-Data Leakage (의료 정보유출 방지를 위한 네트워크 이중 접근통제 모델 연구)

  • Choi, Kyong-Ho;Kang, Sung-Kwan;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.341-347
    • /
    • 2012
  • Network Access Control system of medical asset protection solutions that installation and operation on system and network to provide a process that to access internal network after verifying the safety of information communication devices. However, there are still the internal medical-data leakage threats due to spoof of authorized devices and unauthorized using of users are away hours. In this paper, Network 2-Factor Access Control Model proposed for prevention the medical-data leakage by improving the current Network Access Control system. The proposed Network 2-Factor Access Control Model allowed to access the internal network only actual users located in specific place within the organization and used authorized devices. Therefore, the proposed model to provide a safety medical asset environment that protecting medical-data by blocking unauthorized access to the internal network and unnecessary internet access of authorized users and devices.

A Study on the Perceived characteristics of the mobile payment service using the technology acceptance model (기술수용모델을 활용한 모바일 소액결제 시스템의 인지적 특성 분석)

  • 이석기;김성희
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.103-109
    • /
    • 2004
  • Mobile payment service is a new innovating technology in the micro payment industry. Although it emerged only one or two years a9o in Korea, it is now highly used and prospered by many online companies. Traditional studies concerning the electronic payment system are usually about the payment process itself, so they stressed the security or the robustness of the process. The study from the angle of behavioral science seldom exists. This article describes the phenomenon of technology adoption with a particular focus on telephone Payment service. The article identifies which characteristic of the telephone payment service affects to the user status (user, non-users). To do this, this article mainly used Roger's Technology Acceptance Model and some characteristics are added to the model. The most important perceptual characteristic that affects to the user status was not security, but ease of use-the telephone payment service had to enhance continuously for the competitive advantage over the other payment service. Observability and convenience are also noted as important.

  • PDF

A New Dynamic-ID based RFID Mutual Authentication Protocol Eliminated Synchronization Problem (동기화 문제를 해결한 새로운 동적 아이디기반 RFID 상호 인증 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.469-480
    • /
    • 2008
  • The recently proposed RFID(Radio Frequency Identification) authentication protocol based on a hash function can be divided into two types according to the type of information used for authentication between a reader and a tag: either a value fixed or one updated dynamically in a tag memory. In this paper, we classify the protocols into a static ID-based and a dynamic-ID based protocol and then analyze their respective strengths and weaknesses. Also, we define a new security model including forward/backward traceability, synchronization, forgery attacks. Based on the model, we analyze the previous protocols and propose a new dynamic-ID based RFID mutual authentication protocol. Our protocol provide enhanced RFID user privacy compared to previous protocols and identify a tag efficiently in terms of the operation quantity of a tag and database.

Implementation of StegoWaveK using an Improved Lowbit Encoding Method (개선된 Lowbit Encoding 방법을 이용한 StegoWavek의 구현)

  • 김영실;김영미;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.470-485
    • /
    • 2003
  • The steganography is one of methods that users can hide data. Some steganography softwares use audio data among multimedia data. However, these commercialized audio steganography softwares have disadvantages that the existence of hidden messages can or easily recognized visually and only certain-sized data can be hidden. To solve these problems, this study suggested, designed and implemented Dynamic Message Embedding (DME) algorithm. Also, to improve the security level of the secret message, the file encryption algorithm has been applied. Through these, StegoWaveK system that performs audio steganography was designed and implemented. Then, the suggested system and the commercialized audio steganography system were compared and analyzed on criteria of the Human Visilable System (HVS), Human Auditory System (HAS), Statistical Analysis (SA), and Audio Measurement (AM).

Two-Dimensional Face Recognition Algorithm using Outlet Information based on the FDP (FDP 정보를 이용한 2차원 얼굴영상정보 복원기법)

  • Jo, Nam-Chul;Lee, Ki-Dong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.333-338
    • /
    • 2004
  • Today CCTV can be come across easily in public institutions, banks and etc. These CCTV plays very important roles for preventing many kinds of crimes and resolving those crime affairs. But in the case of recording a image of a specific person far from the CCTV, the original image needs to be enlarged and recovered in order to identify the person more obviously. The interpolation is usually used for the enlargement and recovery of the image. This interpolation has a certain limitation. As the magnification of enlargement is getting bigger, the quality of the original image can be worse than before. This paper uses FDP(Face Definition Parameter) of MPEG-4 SNHC FBA group and introduces a new algorithm that the face outline of a face image using Vector Descriptor based on the FDP makes possible better image recovery than the known methods until now.

  • PDF

Study on the Current Status of Data Science Curriculum in Library and Information Science and its Direction (문헌정보학과의 데이터 사이언스 커리큘럼 개발 실태와 방향성 고찰)

  • Kang, Ji Hei
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.3
    • /
    • pp.343-363
    • /
    • 2016
  • This study determines 69 iSchools provided which data science curriculum, and presents the direction for Korean LIS schools. It is certain that iSchools extend their subject territory including areas related to health, technology and biotechnology. However, this phenomenon is not actively observed in Korea. iSchools also focus on the area about how to process and manage data. iSchools, in deed, offer courses regarding data science, data management and data security. The 'database' was a higher proportion of 'data warehouse' curriculum, and, 'data statistic and analysis' curriculum are forming similar portion. As a result of analysis of the iSchool's curriculum and comparison with Korean curriculum, this study suggests: the expansion of LIS curriculum related to data science; the enhanced role of the data translational data science; development of curriculum to raise the mathematical analysis capabilities, development of specialized curriculum and experimental classes; and support new knowledge skills to interact with technology.

Train detection in railway platform area using image processing technology (영상처리를 이용한 철도 승강장 영역에서의 열차상태 검지방법)

  • Oh, Sehchan;Yoon, Yongki;Baek, Jonghyun;Jo, Hyunjeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6098-6104
    • /
    • 2012
  • Currently, dozens of CCTVs are widely used in railway station for monitoring passengers in danger and security areas. The most frequent accidents occur at the platform area where passengers boarding the train. However, It is almost impossible that station operator monitors dozens of CCTV screens and recognizes immediately accidents and handle them. Therefore, railway platform monitoring system using image processing technology which automatically detects platform accidents is needed, and in order to that, preferentially, accurate determination of train state in the platform is required. In the paper, we propose train state detection algorithm for vision based railway platform monitoring system. the proposed algorithm determines four different states i.e. trains approach(IN), departure(OUT), stop(ON), and empty(OFF) of the train, in the platform. To evaluate the proposed algorithm, we present the train detection results for the Seoul Metro Line 4 Dongjak and Namtaeryeong Station.

Design and Implementation of Network Self-Configuration Based on Bluetooth (Bluetooth 기반 네트워크 자동형성 설계 및 구현)

  • Kang, Seong-Ho;Choo, Young-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1376-1384
    • /
    • 2008
  • Numerous researches on network self-configuration have been conducted on Wireless Sensor Network (WSN) and Ad Hoc network but the results have not been applied yet for factory automation. This paper presents development of intelligent process management systems conducting process monitoring and control irrelevant to physical position of a plant operator. The systems are indispensable for diagnosis of rotating machines which cannot exploit wired network. The system was implemented in a Personal Digital Assistant (PDA) using Bluetooth communication protocol. When a mobile terminal reaches to communication range of the process management server, the server detects the mobile terminal to reconfigure plant network automatically. The server authenticates a user of the terminal to download and installs monitoring and control program considering authorized level of the user. If the terminal leaves communication range of the server, it deletes the node from the network and removes the program automatically to save resources and prevent security problems such as missing terminal. Operation of developed functions was verified in a testbed emulating steel-making plant.

  • PDF

A Moving Target Tracking Algorithmfor a Mobile Robot Based on a 2D Image of a Line Light (직선광선의 2D 영상을 이용한 이동로봇의 이동물체 추적 알고리즘)

  • Rim, Ho;Hahn, Hernsoo;Hong, Min-Cheol
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.37 no.4
    • /
    • pp.11-21
    • /
    • 2000
  • This paper proposes a new algorithm for a mobile robot that detects and tracks a moving target, keeping it in the view range of the robot. The sensor system consists of a camera and a line light source. The camera system is placed so that the line light projected into the ground from the light source forms its image along the horizontal center line of the CCD array of the camera. The deformation of the line image from the horizontal center line contains the information on existence of a moving object, its velocity, and position. Since the proposed algorithm reduces the region of the image to be searched, it reduces the computational complexity significantly comparing to the conventional image processing algorithms. The performance of the proposed algorithm has been tested by implementing on a mobile robot.

  • PDF

Measuring Quality of Experience of Internet Protocol Television (IPTV 체감 품질의 측정)

  • Byun, Dae-Ho;Jeon, Hong-Dae
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.3
    • /
    • pp.63-83
    • /
    • 2010
  • IPTV(Internet Protocol Television) is an innovation technology to lead the new media age. Internet protocol television (IPTV) is a next generation television converged with the Internet which are delivered portal services such as information search, games, movies, home shopping and banking. Generally, service quality affects to adopt or use these technologies. Quality of experience (QoE) is more issue to be considered than service quality because of the technological restriction and limitation that IPTV is accessed by the Internet. The QoE is defined as the cognitive and experienced quality measured with users through an experiment and is conceptually related to service quality. The objective of this paper is to suggest a methodology to measure the QoE of IPTV using a user testing. We find significant factors affecting QoE of IPTV through an exploratory study and measure QoE scores. We found the nine factors of graphics, picture, accuracy, access method, quality of contents, usability, security, and performance important for QoE. The QoE scores of picture, graphics, and quality of contents gained over the average score, but the overall score for IPTV service providers was not high and the QoE needs to be improved.