• Title/Summary/Keyword: Cross Authentication

Search Result 40, Processing Time 0.024 seconds

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

Legal Issues and Policy Implications of Electronic Commerce Chapters of the Korea·China FTA (한·중 FTA 전자상거래 협정의 주요쟁점과 활용과제)

  • Kwon, Soon-Koog
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.9-17
    • /
    • 2015
  • China is the largest e-commerce market in the world. The Chinese online retail market is almost 40% larger than the US, and together these markets account for more than 55% of worldwide e-commerce. The Korea China FTA is likely to facilitate e-commerce activity between the two countries, as well as trade in the goods and services that enable e-commerce. Korean consumer goods can enjoy the benefits of the FTA because it has a competitive advantage in the Chinese market in terms of technology and quality. The purpose of this study is to examine legal issues of e-commerce chapters of the Korea China FTA and policy implications. Results of the study show that several implications based on the export vitalization of cross-border e-commerce of Korean products are offered. The Korean government needs to do the following: prepare for the subsequent negotiation of the e-commerce agreement, prepare for the classification issue of electronic transmissions, require mutual recognition of electronic authentication and electronic signatures, prepare for e-commerce dispute settlement mechanism and establish of strategies for the export vitalization of e-commerce.

A Study on the Factors Affecting Visitor's Attitude and Behavioral Intention to Visit Educational Farms (농촌교육농장 방문자의 행동의도 및 방문태도에 미치는 영향요인 연구)

  • Kwak, Byung-Jin;Noh, Gyoung-Soo;Shin, Ho-Kyun
    • Journal of Korean Society of Rural Planning
    • /
    • v.22 no.1
    • /
    • pp.37-48
    • /
    • 2016
  • The purpose of this study is to provide an objective insight for factors that affect people's visiting behavior to educational farms. Second, this study aims to identify the underlying dimensions representing motivations and constraints for visiting educational farms. Third, this study explores differences among the classified groups with respect to structural relationships of each construct. Finally, identifying strategies of educational farm-related organizations could develop to reinforce visit motivations, offset visit constraints and ultimately increase behavioral intention for potential possible visitors to revisit and recommend educational farms. Empirical results of the study suggest implications for promoting the current farm villages and markets with many stakeholders in agricultural industries. Nevertheless, there are some limitations as followed: first, despite the possibility of their effects, the study did not consider other factors, which could affect revisiting behavior such as destination image, experiencing attributes etc. Second, the study needs improvements through longitudinal research because the cross-sectional research could not rule out the alternative explanations. The directions for the future study are as follows: first, future study requires time series approach instead of cross sectional approach. Secondly, future study might utilize comparative study regarding regional characteristics of educational farms or a nation-wide approach. Thirdly, future study can suggest a combined educational farms considering practical educational farm cases. Lastly, it is considered that developing evaluation measures such as quality authentication system will contribute to educational farms' stabilization.

Password-Authenticated Key Exchange between Clients with Different Passwords (서로 다른 패스워드를 가진 사용자간의 패스워드 인증 키 교환 프로토콜)

  • 변지욱;정익래;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.27-38
    • /
    • 2003
  • Most password-authenticated key exchange schemes in the literature provide an authenticated key exchange between a client and a server based on a pre-shared password. With a rapid change in modem communication environments, it is necessary to construct a secure end-to-end channel between clients, which is a quite different paradigm from the existing ones. In this paper we propose a new framework which provides a password-authenticated ky exchange between clients based only on their two different Passwords without my Pre-shared secret, so called Client-to-Client Password-Authenticated Key Exchange(C2C-PAKE). Security notions and types of possible attacks are newly defined according to the new framework We prove our scheme is secure against all types of attacks considered in the paper. Two secure C2C-PAKE schemes are suggested, one in a cross-realm setting and the other in a single-sorrel setting.

Development of Reproducible EST-derived SSR Markers and Assessment of Genetic Diversity in Panax ginseng Cultivars and Related Species

  • Choi, Hong-Il;Kim, Nam-Hoon;Kim, Jun-Ha;Choi, Beom-Soon;Ahn, In-Ok;Lee, Joon-Soo;Yang, Tae-Jin
    • Journal of Ginseng Research
    • /
    • v.35 no.4
    • /
    • pp.399-412
    • /
    • 2011
  • Little is known about the genetics or genomics of Panax ginseng. In this study, we developed 70 expressed sequence tagderived polymorphic simple sequence repeat markers by trials of 140 primer pairs. All of the 70 markers showed reproducible polymorphism among four Panax species and 19 of them were polymorphic in six P. ginseng cultivars. These markers segregated 1:2:1 manner of Mendelian inheritance in an $F_2$ population of a cross between two P. ginseng cultivars, 'Yunpoong' and 'Chunpoong', indicating that these are reproducible and inheritable mappable markers. A phylogenetic analysis using the genotype data showed three distinctive groups: a P. ginseng-P. japonicus clade, P. notoginseng and P. quinquefolius, with similarity coefficients of 0.70. P. japonicus was intermingled with P. ginseng cultivars, indicating that both species have similar genetic backgrounds. P. ginseng cultivars were subdivided into three minor groups: an independent cultivar 'Chunpoong', a subgroup with three accessions including two cultivars, 'Gumpoong' and 'Yunpoong' and one landrace 'Hwangsook' and another subgroup with two accessions including one cultivar, 'Gopoong' and one landrace 'Jakyung'. Each primer pair produced 1 to 4 bands, indicating that the ginseng genome has a highly replicated paleopolyploid genome structure.

Rheological Properties of Dandelion Root Concentrates by Extraction Solvents

  • Lee, Ok-Hwan;Kang, Suk-Nam;Lee, Boo-Yong
    • Food Science and Biotechnology
    • /
    • v.15 no.1
    • /
    • pp.33-38
    • /
    • 2006
  • This study was performed to provide basic rheological data of dandelion root concentrates in order to predict their processing aptitude and usefulness as functional foods material. The hot water and 70% ethanol extracts of dandelion root were concentrated at 5, 20, and 50 Brix, and their static viscosity, dynamic viscosity, and Arrhenius plots were investigated. Almost all hot water concentrates showed the typical flow properties of a pseudoplastic fluid, but evaluation using the power law model indicated that the 70% ethanol concentrates showed a flow behavior close to a Newtonian fluid. The apparent viscosity of hot water and 70% ethanol concentrates decreased with increasing temperature. Yield stresses of hot water and 70% ethanol concentrates by Herschel-Bulkley model application were in the range of 0.026 - 1.368 Pa and 0.022 - 0.238 Pa, respectively. The effect of temperature and concentration on the apparent viscosity was examined by Arrhenius equation. The activation energies of hot water and 70% ethanol concentrates were in the range of $8.762-23.778{\times}10^3\;J/mol{\cdot}kg$ and $3.217-20.384{\times}10^3\;J/mol{\cdot}kg$ with increasing concentration, respectively. Storage (G') and loss (G") moduli were generally increased with increasing frequency. For the 70% ethanol concentrates, G" predominated over G' at all applied frequencies and so they showed the typical flow behavior of a low molecular solution. However, for the hot water concentrates, G' predominated over G" at more than 1.9 rad/sec (cross-over point) and so they showed the typical flow behavior of a macromolecular solution.

Dispute Resolution by e-ADR for e- Trade in the Northeast Asia (동북아 e-Trade 활성화를 위한 e-ADR에 의한 분쟁해결에 관한 연구)

  • 최석범;박종석;정재우
    • Journal of Arbitration Studies
    • /
    • v.12 no.2
    • /
    • pp.185-220
    • /
    • 2003
  • Korean Government is increasingly focusing on the Northeast Asia Business and Logistics Hub strategy to create a competitive advantage. A key element of this strategy is creating or leveraging distribution and logistics hubs that act as centres for distribution in Northeast Asia. A Northeast Asian e-Hub Policy is required for business hub and logistics hub in the Northeastern Asia. An e-Hub is an integrated, sophisticated set of e-Biz, information and e-trade facilities and services that provides access to a marketplace and exchangee the e-trade data. To study the e-Hub policy, Pan Asian e-Commerce Alliance, Korea-Japan e-Trade Hub project, and ASEM e-Trade project are considered. E-trade via cyberspace may need new methods of dispute resolution to reduce transaction costs for small value-related disputes and to erect structures that work well across national boundaries. Voluntary Mediation Councils and cyber tribunals should be encouraged by governmental sectors to continue developing private sector mechanisms to resolve e-trade disputes. Government-sponsored online cross-border dispute resolution systems may be also be useful to complement these private sector approaches. E-trade in Northeast Asia results in disputes owing to the incompleteness of e-trade law in the countries. These disputes contain disputes regarding e-trade model, central title registry, authentication body. To resolve these disputes in the Northeast Asia, a variety of electronic alternative dispute resolution bodies must be organized under cooperation of Korea, Japan, China. This study deals with the e-ADR construction in the Northeast Asia to resolve the disputes in the e-trade and to activate the e-trade in the Northeast Asia.

  • PDF

Comparative study of external-intenal morphological shape in origins and hybrids for Glycyrrhizae Radix et Rhizoma (감초의 기원 및 교잡종 외내부형태 성상 비교연구)

  • Kim, Young-Sik;Park, Chun-Geon;Choi, Goya;Chang, Jae-Ki;Lee, Jeong-Hoon;Ju, Young-Sung
    • The Korea Journal of Herbology
    • /
    • v.34 no.5
    • /
    • pp.1-12
    • /
    • 2019
  • Objectives : The consumption of licorice is large in Korea, but domestic production is insufficient due to the lack of adaptability. This study aimed to provide a morphological basis for adding interspecific hybrid licorice with improved adaptability to pharmacopoeia. Methods : This study was to establish identification criteria for the original plants, external and internal morphology of the authentic herbal medicines (Glycyrrhiza uralensis, G. glabra and G. inflata), market products and artificially interspecific hybrid forms of licorice. For this purpose, previous studies were investigated and visual and histological observations were carried out. We focused on the internal morphology by microscopic observation for securing objectivity. Finally, we proposed the identification keys for precise classification of each part. Results : 1) Original plant : Licorice species in the compendium were distinguished by the number of leaflets, presence of hair on the fruit, curvature and swelling of the fruit. 2) External morphology : Licorice species were distinguished by degree of powderiness, tearing gap, radial structure in the cross section and existence of protrusion of outer epidermis. 3) Internal morphology : Licorice species were distinguished by the degree of development of phloem fiber bundle, development of obliterated sieve, whether the secondary medullary ray are branched. In the case of interspecific hybrids, the characteristics of both species used for hybridization were mixed in all observation methods. Conclusions : These results suggest that the interspecific crossbred licorice is suitable for the pharmacopoeial standard. Therefore, it can be applied as a herbal medicine through additional supplementary study.

Material Diagnosis of Metalbased Pigments in Paintings Using Terahertz Imaging (테라헤르츠 이미징을 이용한 금속 성분 회화 재료 진단 연구)

  • Baek Nayeon;Lee Hanhyoung;Song Youna
    • Conservation Science in Museum
    • /
    • v.29
    • /
    • pp.111-132
    • /
    • 2023
  • Terahertz radiation cannot pass through metal and therefore reflect and return most signals. Utilizing this property, this study analyzed information on paintings to verify the usage of metal materials on paintings and the scope of their application. First, the study tested specimens of metal-based pigments and synthetic pearl pigments with metallic colors and textures in order to compare basic characteristics of terahertz images, such as signal severance caused by metallic substances, traits reflected in cross-section images, and high degree of reflection. Subsequently, based on the collected information, the study diagnosed various types of paintings including Korean traditional paintings and oil paintings using the terahertz imaging technique to confirm the usage of metal-based pigments in the inner layers of paintings and their scope of application. The terahertz imaging technique could has the potential to provide scientific evidence for previously-undiscovered information and art-historical records about various types of paintings that used metalbased pigments, thereby rendering significant utility for the conservation and authentication of paintings.

The Effects of Information Transfer of Personal Information Security Breaches (개인정보 유출의 정보전이 효과)

  • Park, Sang-Soo;Lee, Hyun-Chul
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.193-224
    • /
    • 2018
  • Purpose Targeting Korean companies listed on Korean securities markets (i.e., KOSPI and KOSDAQ markets), this study aims to shed lights the effects of personal information security breaches on stock prices of information security companies. Interestingly, this study is, to the best of our knowledge, the first to examine the information transfer effect on personal information security breaches of companies. Design / Methodology /Approach To examine the information transfer effect of personal information security breaches, our study employs the event study commonly used in financial studies. To this end, we investigate a variety of events of personal information security breaches of companies listed on the KOPSI stock market and the KOSDAQ market. We collect the total samples of one hundred and twelve with forty seven of events of personal information security breaches by thirty companies and sixty five of information security companies. Findings The principal findings from the empirical study are as follows. First, for companies of personal information security breaches, our event study presents the significantly negative AAR (averaged abnormal return) value on the event day at the 5 % level and the highly significant negative CAAR(cumulative averaged abnormal return) value on the event day and the day after the event day at the 1 % level. The results suggest that personal information breaches significantly contribute to an decrease in value of the information breached companies. The cross sectional regressions in this study estimate the significantly negative coefficient for the ME/BE variable, the proxy for a growth opportunity at the 5 % level. This suggests a reverse relation between the growth opportunity of companies and their value. As for the various samples of the information security companies categorized by physical security, network and system security, security application software, code authentication, system integration, we find the significantly positive AAR on the day after the event day at the 5% level, only for the network and system security-companies. This addresses that the information transfer effect followed by personal information breaches is uniquely observable for companies categorized into network and system companies. The regressions for the network and system companies estimate the significantly positive coefficient for the NS dummy variable (i.e., the dummy of the network and system security companies) at the standard level. This allows us to identify appropriate times needed to make the information transfer effect realized from personal information breached companies to information security companies.