• Title/Summary/Keyword: Certificate authority

Search Result 146, Processing Time 0.025 seconds

Research on The System Software Quality Certification Implementation Plan of DQ Mark Certification (DQ마크 인증제도의 시스템 소프트웨어 품질인증 수행 방안 연구)

  • Yun, Jae-Hyeong;Song, Chi-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.85-91
    • /
    • 2021
  • The DAPA (Defense Acquisition Program Administration) has been operating the DQ mark certification since 2012 to certify the superior technology and quality of munitions. On the other hand, the current DQ mark certification can not directly provide DQ mark certification to software because it is impossible to verify the quality of software alone. Therefore, this study analyzed domestic/overseas software quality evaluation/certification standards to find a way to verify the quality of software in the DQ mark certification. Among them, the method of applying the GS certification according to the international standard ISO/IEC 25000 series to the DQ mark certification was suggested as an improvement plan, and DQ mark certification verified the quality of software and provided certification. An attempt was made to expand the certification scope of DQ mark certification. This paper proposes that the DQ mark can be given to the system software by introducing GS certification to the DQ mark certification. To this end, an improved procedure for omitting the factory audit and verification by submitting a GS certificate for product evaluation is proposed. This is expected to increase defense exports using the granted DQ mark and improve the quality of defense software products through GS certification.

Numerical Analysis of Authentication Algorithm using Randomized CA Groups in Mobile Ad Hoc Networks (모바일 애드혹 네트워크에서 랜덤 CA 그룹을 이용한 인증 알고리즘에 대한 성능 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.8
    • /
    • pp.22-33
    • /
    • 2009
  • Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In [1], we addressed the problem of efficient authentication of distributed mobile users in geographically large networks and proposed a new authentication scheme for this case of MANETs. The proposed scheme exploits randomized groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority(CA). In this paper, we analyze numerically the performance of authentication method using randomized groups and compare with the simulation result.

A Study on the Expected Effects and Vulnerabilities of Safety&Health Sheet on the Construction Industry (공공기관 건설공사의 안전강화를 위한 안전보건대장이 건설산업에 미치는 기대효과와 취약점에 관한 연구)

  • Semi, Oh
    • Journal of the Korea Institute of Construction Safety
    • /
    • v.2 no.2
    • /
    • pp.45-49
    • /
    • 2019
  • The purpose of this study is to study how to draw up a safety guarantee certificate and its future expected effects in connection with the Industrial Safety and Health Act as it becomes mandatory to draw up a safety guarantee led by the owner who exercises practical decision-making authority and pays for the construction work. Therefore, Therefore, this study predicts the expected effects of the health and safety guarantee on the construction industry and the weaknesses that future health and assurance have in settling in the construction industry in relation to the revised Act on Industrial Safety and Health. And It will be used as basic data on the changes that will be brought by the shipper-led preemptive safety and health management system, as well as strengthening responsibilities and safety for the role of the shipper in the construction industry.

Design and Implementation of the Hybrid Messaging System Based on PKI (PKI을 기반으로한 하이브리드 메시징 시스템 설계 및 구현)

  • Lee, Jun-Seok;Yoon, Ki-Song;Jeong, Yeon-Jeong;Ock, Jae-Ho;Kim, Myung-Joon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.9
    • /
    • pp.2903-2912
    • /
    • 2000
  • The paper is a design and implementation of the Hybrid Messaging System as integrating electronic mail system and common mail system based on PKI(Public Key Infrastructure), A user writes mail through Web Browser and sends the mail to Web Server. CGHCommon Gateway Interface) program sends the mail that was received through the Web Sever to Post Office Electronic Mail Server using SMTP(SimpleMail Transfer Protocol), The End Process program of the Hybrid Messaging System in a Post Office fetches the mail from the Post Office Electronic Mail Server using POP3 (Post Office Protocol 3), prints it and deliver it to recipients, Also, the Hybrid Messaging System is able to sign the mail with a sign private key that the Certificate Authority publics for users and encrypts the mail with a public key of the Post Office Web Server.

  • PDF

An Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (신뢰기관을 이용한 익명적 비대칭 핑거프린팅 기법)

  • Yong, Seung-Lim;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.7
    • /
    • pp.288-295
    • /
    • 2007
  • The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. fingerprinting scheme is a technique which supports copyright protection to track redistributors of electronic information using cryptographic techniques. Anonymous asymmetric fingerprinting scheme prevents the merchant from framing a buyer by making the fingerprinted version known to the buyer only. And this scheme allows the buyer to purchase goods without revealing her identity to the seller. In this paper, a new anonymous asymmetric fingerprinting scheme with TTP is introduced. The buyer's fingerprint is generated by the Fingerprint Certificate Authority which is a TTP. When the seller embeds the fingerprint in the digital data, the protocol uses the homomorphic encryption scheme. Thus the seller cannot know the buyer's fingerprint and the buyer's anonymity is guaranteed by using anonymous key pair.

System Safety Assessment for KC-100 Civil Aircraft (KC-100 민간항공기 체계안전성 평가)

  • Kang, Min Seong;Koh, Dae Woo;Choi, Nag Sun;Cheon, Young Seong
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.6 no.1
    • /
    • pp.1-13
    • /
    • 2010
  • KC-100 is a 4 seats, single piston engine, civil aircraft whose type certificate is applied for KAS 23 (FAR 23) for the first time in Korea. Its system safety assessment and analysis have been conducted to meet the minimum safety requirement in KAS 23 and to verify the safety of equipment, system, and installation in accordance with the requirement of ${\S}$23.1309 and the guidelines in FAA AC 23.1309-1D and SAE ARP 4761. This safety assessment begins with the FHA (Functional Hazard Assessment) at aircraft and system level in preliminary design phase, and all of the safety assessment and analysis reports including the preliminary version of SSA (System Safety Assessment) have been prepared during detail design phase. The revised version of these safety reports will be approved by Airworthiness Authority through the ground and flight test phases. In this paper, the safety assessment requirement in ${\S}$23.1309, safety assessment guideline in AC 23.1309-1D, and safety assessment and analysis methods in ARP 4761 will be explained based on the application example for KC-100 development. The experience and knowledge of this system safety assessment for civil aircraft can be applied to commuter aircraft of FAR 23 class or large transport airplane of FAR 25 class.

  • PDF

An Effective Authentication in Mobile Ad Hoc Networks (Mobile Ad Hoc Networks에서 효과적인 인증서비스)

  • Kim Yoon-Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.1
    • /
    • pp.121-134
    • /
    • 2005
  • The MANET has many problems in security despite of its many advantages such as supporting the mobility of nodes, independence of the fixed infrastructure, and quick network establishment. In particular, in establishing security, the traditional certification service has many difficult problems in applying to the MANET because of its safety, expandability, and availability. In this paper, a secure and effective distributed certification service method was proposed using the Secret Sharing scheme and the Threshold Digital Signature scheme in providing certification services in the MANET. In the proposed distributed certification service, certain nodes of relatively high safety among the mobile nodes consisting of the MANET, were set as privileged nodes, from which the process of issuing a certification started. The proposed scheme solved problem that the whole network security would be damaged by the intrusion to one node in the Centralized Architecture and the Hierarchical Architecture. And it decreased the risk of the exposure of the personal keys also in the Fully Distributed Architecture as the number of the nodes containing the partial confidential information of personal keys decreased. By the network simulation, the features and availability of the proposed scheme was evaluated and the relation between the system parameters was analyzed.

  • PDF

Distributed Authentication Model using Multi-Level Cluster for Wireless Sensor Networks (무선센서네트워크를 위한 다중계층 클러스터 기반의 분산형 인증모델)

  • Shin, Jong-Whoi;Yoo, Dong-Young;Kim, Seog-Gyu
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.95-105
    • /
    • 2008
  • In this paper, we propose the DAMMC(Distributed Authentication Model using Multi-level Cluster) for wireless sensor networks. The proposed model is that one cluster header in m-layer has a role of CA(Certificate Authority) but it just authenticates sensor nodes in lower layer for providing an efficient authentication without authenticating overhead among clusters. In here, the m-layer for authentication can be properly predefined by user in consideration of various network environments. And also, the DAMMC uses certificates based on the threshold cryptography scheme for more reliable configuration of WSN. Experimental results show that the cost of generation and reconfiguration certification are decreased but the security performance are increased compared to the existing method.

  • PDF

A study on the Improvement of Private Investigators System in Korea (한국 민간조사제도의 발전방향: 시험제도와 교육훈련 중심(中心)으로)

  • Lee, Sang-Won;Park, Yun-Kyu
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.337-365
    • /
    • 2007
  • The society shows rapid change throughout various fields in the 21 century. These changes are in progress in Korea as well and the private security field is not in exception. The private security system has socially effective function by providing services, which the police cannot provide to citizen. However, it cannot be treated rightly the possibility of violation of human right during the actual action. The qualified person at least should take private investigation service considering privatization of criminal justice and considering that the Private Investigation Act submitted to the Congress could not affect its investigation authority to the citizen currently. The purpose of this study is examination of the private investigation system in Korea and other country and is presentation of its improvement. The chapter 1 composed of introduction on chapter 1, concept and service in chapter 2, private security system in other countryin chapter 3, private security system in chapter 4, problems and its improvements in chapter5, and conclusion in chapter 6. It requires not only consideration of government but also consideration of citizen and effort of both sidesto successful settlement of private security system in Korea.

  • PDF

A Study on Attack Detection Technique based on n-hop Node Certification in Wireless Ad Hoc Network (Wireless Ad Hoc Network에서 n-hop 노드 인증 기반 공격 탐지 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.3-8
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.