• Title/Summary/Keyword: Certificate authority

Search Result 146, Processing Time 0.022 seconds

Finite Element Analysis of H-Shaped Compressive Member Exposed High Temperatures (고온에 노출된 H-형강 압축재의 유한요소해석)

  • Lee, Swoo-Heon;Lee, Hee-Du;Choi, Jun-Ho;Shin, Kyung-Jae
    • Fire Science and Engineering
    • /
    • v.30 no.5
    • /
    • pp.54-59
    • /
    • 2016
  • Steel is a structural material that is inherently noncombustible. On the other hand, it has high thermal conductivity and the strength and stiffness of the material are reduced significantly when exposed to fire or high temperatures. Because the yield strength and modulus of elasticity of steel are reduced by 70% at $350^{\circ}C$ and less than 50% at $600^{\circ}C$, the load-carrying capacity of steel structure at high temperature rapidly lose. To be accepted as a fire-resisting construction, the fire test should be performed at the certificate authority. On the other hand, the fire test on a full-scale structure is limited by time, space, and high-cost. The analytical method was verified by a comparison with the fire test of H-section columns under compression and thermal analysis based on a finite element method using the ABAQUS program, and the numerical analysis method reported in this study was suggested as a complement of an actual fire test.

A Study of Authentication Design for Youth (청소년을 위한 인증시스템의 설계에 관한 연구)

  • Hong, Ki-Cheon;Kim, Eun-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.952-960
    • /
    • 2007
  • Most Websites perform login process for authentication. But simple features like ID and Password have no trust because most people worry about appropriation. So the youth can easily access illegal media sites using other's ID and Password. Therefore this paper examine features be adaptable to authentication system, and propose a design of authentication system using multiple features. A proposed authentication system has two categories, such as low-level and high-level method. Low-level method consists of grant of authentication number through mobile phone from server and certificate from authority. High-level method combines ID/Password and features of fingerprint, character, voice, face recognition systems. For this, this paper surveys six recognition systems such as fingerprint, face, iris, character, vein, voice recognition system. Among these, fingerprint, character, voice, face recognition systems can be easily implemented in personal computer with low cost accessories. Usage of multiple features can improve reliability of authentication.

  • PDF

An Improved Protocol for the Secure Mobile IPv6 Binding Updates (안전한 모바일 IPv6 바인딩 갱신을 위한 개선된 프로토콜)

  • You, Il-Sun;Won, You-Seuk;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.605-612
    • /
    • 2004
  • In MIPv6, unauthenticated binding updates expose the involved MN and CN to various security attacks. Thus, protecting the binding update process becomes of paramount importance in the MIPv6, and several secure binding update protocols have been proposed. In this paper, we pro-pose a novel protocol for the secure binding updates in MIPv6, which can resolve the drawbacks of the Deng-Zhou-Bao's protocol [2], by adopt-ing Aura's CGA scheme with two hashes [9]. Aura's scheme enables our protocol to achieve stronger security than other CGA-based protocols without a trusted CA, resulting in less cost of verifying the HA's public key than the Deng-Zhou-Bao's protocol. Through the comparison of our protocol with other protocols such as the Deng-Zhou-Bao's protocol, CAM-DH and SUCV, we show that our protocol can provide better performance and manageability in addition to stronger security than other approaches.

Deriving Essential Security Requirements of IVN through Case Analysis (사례 분석을 통한 IVN의 필수 보안 요구사항 도출)

  • Song, Yun keun;Woo, Samuel;Lee, Jungho;Lee, You sik
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.2
    • /
    • pp.144-155
    • /
    • 2019
  • One of the issues of the automotive industry today is autonomous driving vehicles. In order to achieve level 3 or higher as defined by SAE International, harmonization of autonomous driving technology and connected technology is essential. Current vehicles have new features such as autonomous driving, which not only increases the number of electrical components, but also the amount and complexity of software. As a result, the attack surface, which is the access point of attack, is widening, and software security vulnerabilities are also increasing. However, the reality is that the essential security requirements for vehicles are not defined. In this paper, based on real attacks and vulnerability cases and trends, we identify the assets in the in-vehicle network and derive the threats. We also defined the security requirements and derived essential security requirements that should be applied at least to the safety of the vehicle occupant through risk analysis.

An Implementation of NEIS′DB Security Using RBAC based on PMI (PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.31-45
    • /
    • 2004
  • Public Key Infrastructure(PKI) provides a strong authentication. Privilege Management Infrastructure(PMI) as a new technology can provide user's attribute information. The main function of PMI is to give more specified authority and role to user. To authenticate net and role, we have used digital signature. Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. NEIS(National Education Information System) can not always provide satisfied quality of security management. The main idea of the proposed RNEIS(Roll Based NEIS) is that user's role is stored in AC, access control decisions are driven by authentication policy and role. Security manager enables user to refer to the role stored in user's AC, admits access control and suggests DB encryption by digital signature.

A Study on the qualification system comparison between technology traders and licensed real-estate agents from a viewpoint of transaction (거래라는 관점에서 바라 본 기술거래사와 공인중개사 자격제도 비교에 관한 연구)

  • Kim, Hye Sun;Lee, Jae Il
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.1
    • /
    • pp.61-68
    • /
    • 2013
  • As modern society changes toward knowledge based society, the patent policy and professional manpower need to be changed because interest and importance about patent, trademarks, intellectual property right and copyright of business secret are increasing. In order to facilitate trading of the technology developed in the private sector and to promote the business, the Act of technology transfer and commercialization promotion is prepared. In the law, the article 14 says that who have expertise on commercialization of the technology transfer can be registered as a technology trader to the Minister of Knowledge Economy. For the purpose of finding improvements of the technology trader's registration system, comparison method was studied. Technology trader compare with licensed real estate agent which is similar with it in terms of trade. There are several results from this study by followings. The unique tasks of technology traders should be specified for increasing authority of technology transfer expert. Manual criteria of post management should be prepared through registration certificate management agency which operated by charging. In addition, The announcement document should be prepared carefully for necessity of announcement and registration criteria of technology trading business. These improvements are enable to motivate trading market and impact to expand the base of technology marketing and technology transfer-commercialization.

  • PDF

A study on the Private Investigator usage for Cyber Crime (사이버범죄의 효과적인 대응을 위한 민간조사제도의 도입방안)

  • Shin, Hyun-Joo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.63-86
    • /
    • 2016
  • The object of this study is to propose a study on the Private Investigator usage for Cyber Crime. The latest trend of cyber crime is being evolve in sophisticated and complex way over the global, like internet fraud, cyber gambling, hacking and etc. Hence national investigative authority mobilize high specialized skills and method of criminal investigation by each nation. But it is hard to respond in rapid and effective way because of propoor, distribution of group and insufficient of related legal system. Already in other countries, not considerable amount of services are given to private investigators in detection and tracking part which is inefficient by nation. So it has significantly meaningful to compensate the defect and study about private investigator usage as companion of cooperation policing for effectively respond to cyber-crime. The way to effectively deal with the cyber-crime is reevaluate meaning of partnership policing and need of private investigator usage. Also it is to analyze the main issue about introduction of a system and suggest the effective way of introduction. First, legislation of private investigator usage which is based upon partnership policing should be made up. Moreover, to establish the range of private investigator's business and enhance the reliability, it is to propose introduction of leading professional global certificate and license system with sufficient education and test. We are expecting introduction of private investigator usage can improve efficiency of investigation and promote effective countermeasures of cyber-crime.

  • PDF

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF

Secure and Efficient Protocol for Vehicular Communication with Privacy Preservation (프라이버시를 보호하며 안전하고 효율적인 차량간 통신 프로토콜)

  • Kim, In-Hwan;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.420-430
    • /
    • 2010
  • Due to increasing demand for improving road safety and optimizing road traffic, Vehicular Ad-Hoc Networks (VANET) have been subject to extensive attentions from all aspects of commercial industry and academic community. Security and user privacy are fundamental issues for all possible promising applications in VANET. Most of the existing security proposals for secure VANET concentrate authentication with privacy preservation in vehicle-to-vehicle (V2V) and vehicle-to-roadside infrastructure (V2I) communications and require huge storage and network capacity for management of revocation list. Motivated by the fact, we propose a new scheme with security and privacy preservation which combines V2V and V2I communication. With our proposed scheme, the communication and computational delay for authentication and overhead for management of revocation list can be significantly reduced due to mutual authentication between a vehicle and a Roadside Unit (RSU) requires only two messages, and the RSU issues the anonymous certificate for the vehicle on behalf of the Trust Authority (TA). We demonstrate that the proposed protocol cannot only guarantee the requirements of security and privacy but can also provide efficiency of authentication and management of revocation list.

The Research on Job Analysis of Horse-Riding Instructor (승마지도사에 관한 직무분석 연구)

  • Lee, Byung-Wook;Kang, Kyoung-Kyoon;Yi, Joo-Wook;Lee, In-Kyung
    • Journal of vocational education research
    • /
    • v.33 no.3
    • /
    • pp.145-167
    • /
    • 2014
  • The purpose of this research is to prepare the measures for evaluating the job of horse-riding instructor and improvement related to it and for distributing horse-riding industry effectively. Forsuch, we tried to analyze job of horse-riding instructor. Inparticular, we have developed DACUM chart of horse-riding instructor through DACUM method and experts related to it. As result, we found out eight duties and hundreds of job and arranged seven duty areas in total and eighty-two executed works. In addition, as experts said, the horse-riding instructor is the one who 'instructs people learning horse-riding in horse-riding facility and manages horses, horse-riding equipment and man-power.' Such results provide the procedure of horse-riding instructor cultivation which has been presently underway with many viewpoints. Especially, there are three educational processes and subject materials related to horse-riding instructor's examination(Hipologia, Horse-treatment technique, Horse Health management). However, as result of analysis on duty, we found out that racecourse management and horse-riding education theory has been needed to be added and complemented as well. In addition, the work and duty of analysis can be used to be made use up of as work profile and specification and such data can be also made use of as standard of training and submission. Through this study there should be a necessary work to distinguish between re-drafting and role of duty in its own right related to certification of horse-riding instructor in future and it would be necessary to develop study that is able to connect them all to certificate. What is more, there should be work and measure required for rethinking of utility of certification.