• Title/Summary/Keyword: 첨부 파일

Search Result 48, Processing Time 0.03 seconds

A Study on the Secure Prescription Transmission System based on the XML (XML기반의 안전한 처방전 전송 시스템에 관한 연구)

  • Lee Sang-Beom;Lee Seong-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1777-1782
    • /
    • 2004
  • I propose a prescription transmission system based on XML in this paper, and it is not to attach a former signature to only a XML document for encoding of XML/EDI, and it is construction, one with the prescription transmission system which is safer with what use a way to attach a digital signature to DTD. I defined sub element to manage information prescription DTD defined prescription information, patient information, medical care organ information, prescription details information, compounding of medicines details information element according to for each a component of a prescription I went along, and to have looked up, and to have obeyed information transmission at he low rank. I read a DTD file for safe prescription transmission, and I do element or property, the entity which I do it, and is extracted here, and Pasing is saved in a table while being a field. If Pasing is finished, I read and lift a hash table and carry out message a digest. I compose it with an early private key and create a digital signature.

Security Elevation of XML Document Using DTD Digital Signature (DTD 전자서명을 이용한 XML문서의 보안성 향상)

  • Park, Dou-Joon;Min, Hye-Lan;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.1080-1083
    • /
    • 2005
  • Can speak that DTD is meta data that define meaning of expressed data on XML document. Therefore, in case DTD information is damaged this information to base security of XML document dangerous. Not that attach digital signature on XML document at send-receive process of XML document in this research, proposed method to attach digital signature to DTD. As reading DTD file to end first, do parsing, and store abstracted element or attribute entitys in hash table. Read hash table and achieve message digest if parsing is ended. Compose and create digital signature with individual key after achievement. When sign digital, problem that create entirely other digest cost because do not examine about order that change at message digest process is happened. This solved by method to create DTD's digital signature using DOM that can embody tree structure for standard structure and document.

  • PDF

A Study on the Secure Prescription Transmission System using XML/DTD digital signature (XML/DTD 전자서명을 이용한 안전한 처방전 전송 시스템에 관한 연구)

  • Kim, Hyeong-Gyun;Bae, Yong-Guen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.722-727
    • /
    • 2007
  • We propose a prescription transmission system based on XML in his paper, and it is not to attach a former signature to only a XML document for encoding of XML/EDI, and it is construction, one with the prescription transmission system which is safer with what use a way to attach a digital signature to DTD. I defined sub element to manage information prescription DTD defined prescription information, patient information, medical care organ information, prescription details information, compounding of medicines details information element according to for each a component of a prescription I went along, and to have looked up, and to have obeyed information transmission at he low rank. I read a DTD file for safe prescription transmission, and I do element or property, the entity which I do it, and is extracted here, and Pasing is saved in a table while being a field. If Pasing is finished, I read and lift a hash table and carry out message a digest. I compose it with an early private key and create a digital signature.

A COMPARATIVE STUDY ON THE CANAL CONFIGURATION AFTER SHAPING BY PROFILE, PROTAPERTM AND K-FLEXOFILE IN SIMULATED CANALS WITH DIFFERENT ANGLES OF CURVATURE (ProFile, ProTaperTM K-Flexofile 근관 성형시 근관의 만곡도에 따른 근관 형태 변화 비교연구)

  • Lee, Bo-Kum;Kim, Dong-Jun;Hwang, Yun-Chan;Hwang, In-Nam;Oh, Won-Mann
    • Restorative Dentistry and Endodontics
    • /
    • v.30 no.4
    • /
    • pp.294-302
    • /
    • 2005
  • The purpose of this study was to evaluate the canal configuration after shaping by ProFile. ProTaper and K-Flexofile in simulated resin canals with different angles of curvature. Three types of instruments were used: ProFile. ProTaper. K-Flexofile. Simulated root canals. which were made of epoxy resin. were prepared by ProFile. ProTaper with rotary instrument using a crown-down pressureless technique. and hand instrumentation was performed by K-Flexofile using a step-back technique. All simulated. canals were prepared up to size 25 file at end-point of preparation. Pre and post instrumentation images were recorded with Scanner. Assessment of canal shape was completed with Image Analysis program. Measurements were made at 1. 2. 3. 4. 5. 6. 7. 8. 9 and 10mm from the apex. At each level. outer canal width. inner canal width. total canal width. and amount of transportation from original axis were recorded. Instrument deformation and fracture were recorded. Data were analyzed by means of one-way ANOVA analysis of variance and the Sheffe's test. The result was that ProFile and ProTaper maintain original canal shape regardless of the increase of angle of curvature than K-Flexofile. ProFile show significantly less canal transportation and maintained original canal shape better than ProTaper.

Development of an open source-based APT attack prevention Chrome extension (오픈소스 기반 APT 공격 예방 Chrome extension 개발)

  • Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.3-17
    • /
    • 2021
  • Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.

A Study on the Email Management of Undergraduate Students (대학생의 이메일 관리 행태 연구)

  • Jiyoon Han;Hye-Eun Lee
    • Journal of the Korean Society for information Management
    • /
    • v.40 no.1
    • /
    • pp.149-173
    • /
    • 2023
  • This study examines email records management patterns of undergraduate students and their perceptions of university email policy. The research collected data from 317 undergraduate students using a survey based on the five essential elements of email records management: common elements, email creation, email management, email preservation, and perception. Also, an in-depth interview was conducted with 6 undergraduate students, according to the method of university email service: Google, Microsoft, and in-house webmail. As a result, undergraduate students used email as an address book, cloud storage, file storage, and collaboration tool, and they had difficulties in systematically managing the email records according to the records lifecycle. Also, there was a tendency to prefer using an external email platform that can use additional functions to in-house webmail that has limitations in mobile service and preservation of attachments. Thus, this study suggests ways to help undergraduate students manage their email records, including maintaining graduates' email accounts, providing sufficient email storage, and providing email records management training and guidelines for undergraduate students.

E-mail System Implementation for Standardization of E-mail Address Internationalization (다국어 전자 메일 주소 표준화를 위한 메일 시스템 구현)

  • Yeom, Dae-Young;Han, Dong-Yun;Kim, Kyong-Sok
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.2
    • /
    • pp.265-278
    • /
    • 2010
  • Most recent E-mail systems, that are serviced in Korea, are supporting Hangul in many fields of E-mail(For example, contents, subject, attachment, etc.). However, these systems do not support Hangul in the address field of E-mail. In 2003, IDNA built the international standard in order to support multi-lingual besides the alphabetic character, a number, and '-'. So, Hangul cab be used in the domain part where is the right of '@' mark among the compositional element of the E-mail address. But, the local-part, where is the left of '@' mark, doesn't still support multi-lingual. So Hangul cannot be used in the local-part. In order to support multi-lingual including Hangul in the local-part, this paper designs and implements the E-mail system according to the EAI standardization research that it is progressed in IETF.

A STUDY OF INSERTION DEPTH OF GUTTA PERCHA CONES AFTER SHAPING BY NI-TI ROTARY FILES IN SIMULATED CANALS (레진모형 근관에서 Ni-Ti 파일로 근관성형 후 거타퍼챠콘의 근관내 삽입깊이에 대한 연구)

  • Cho, Hyun-Gu;Hwang, Yun-Chan;Hwang, In-Nam;Oh, Won-Mann
    • Restorative Dentistry and Endodontics
    • /
    • v.32 no.6
    • /
    • pp.550-558
    • /
    • 2007
  • The purpose of this study was to evaluate the insertion depth of several brands of master gutta percha cones after shaping by various Ni-Ti rotary files in simulated canals. Fifty resin simulated J-shape canals were instrumented with ProFile, ProTaper and HEROShaper. Simulated canals were prepared with ProFile .04 taper #25(n=10), .06 taper #25(n=10), ProTaper F2(n=10), HEROShaper .04 taper #25(n=10) and .06 taper #25(n=10). Size #25 gutta percha cones with a .04 & .06 taper from three different brands were used: DiaDent; META; Sure-endo. The gutta percha cones were selected and inserted into the prepared simulated canals. The distance from the apex of the prepared canal to the gutta percha cone tip was measured by image analysis program. Within limited data of this study, the results were as follows 1. When the simulated root canals were prepared with HEROShaper, gutta-percha cones were closely adapted to the root canal. 2. All brands of gutta percha cones fail to go to the prepared length in canal which was instrumented with ProFile, the cones extend beyond the prepared length in canal which was prepared with ProTaper. 3. In canal which was instrumented with HEROShaper .04 taper #25, Sure-endo .04 taper master gutta percha cone was well fitted(p < 0.05). 4. In canal which was instrumented with HEROShaper .06 taper #25, META .06 taper master gutta percha cone was well fitted(p < 0.05). As a result, we concluded that the insertion depth of all brands of master gutta percha cone do not match the rotary instrument, even though it was prepared by crown-down technique, as recommended by the manufacturer. Therefore, the master cone should be carefully selected to match the depth of the prepared canal for adequate obturation.

The medical 3-dimensional image exchange via health level 7 fast healthcare interoperability resource (HL7 FHIR) (Health level 7 fast healthcare interoperability resource (HL7 FHIR)를 통한 3차원 의료 영상의 교환)

  • Lee, Jung Hwan;Choi, Byung Kwan;Han, In Ho
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.373-378
    • /
    • 2020
  • For improving interoperability of medical information, health level 7 has initiated the development of a next-generation framework for the exchange of medical information called the Fast health interoperability resources (FHIR). However, there was no attempt to exchange the medical three-dimensional (3D) image with clinical data via FHIR. Thus, we designed a new method. The 3D image to be made from computed tomography was converted to the javascript object notation (JSON) file format, and clinical data was added. We made a test FHIR server, and the client used the postman. The JSON file was attached to the body, and was then transmitted. The transmitted 3D image could be seen through a web browser, and attached clinical data was identified in the source code. This is the first attempt to exchange the medical 3D image. Additional researches will be needed to develop applications or FHIR resources that apply this method.

Design and Analysis of the Web Stegodata Detection Systems using the Intrusion Detection Systems (침입탐지 시스템을 이용한 웹 스테고데이터 검출 시스템 설계 및 분석)

  • Do, Kyoung-Hwa;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.39-46
    • /
    • 2004
  • It has been happening to transfer not only the general information but also the valuable information through the universal Internet. So security accidents as the expose of secret data and document increase. But we don't have stable structure for transmitting important data. Accordingly, in this paper we intend to use network based Intrusion Detection System modules and detect the extrusion of important data through the network, and propose and design the method for investigating concealment data to protect important data and investigate the secret document against the terrorism. We analyze the method for investigating concealment data, especially we use existing steganalysis techniques, so we propose and design the module emphasizing on the method for investigating stego-data in E-mail of attach files or Web-data of JPG, WAVE etc. Besides, we analyze the outcome through the experiment of the proposed stego-data detection system.