• 제목/요약/키워드: Cross Authentication

검색결과 40건 처리시간 0.022초

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

한·중 FTA 전자상거래 협정의 주요쟁점과 활용과제 (Legal Issues and Policy Implications of Electronic Commerce Chapters of the Korea·China FTA)

  • 권순국
    • 디지털융복합연구
    • /
    • 제13권10호
    • /
    • pp.9-17
    • /
    • 2015
  • 중국은 세계에서 가장 큰 전자상거래 시장으로서 중국 온라인 소매시장은 미국보다 약 40% 크며, 양국은 전세계 전자상거래 시장의 55% 이상을 차지하고 있다. 한 중 FTA는 한중 양국의 상품, 서비스의 전자상거래 확대와 국가간 전자상거래 활동을 촉진시킬 것이다. 한국산 소비재는 기술과 품질 측면에서 중국시장에서 경쟁우위를 가지고 있기 때문에 FTA 혜택을 향유할 수 있다. 본 연구는 한 중 FTA 전자상거래 협정문의 주요쟁점을 검토하고 이를 바탕으로 한국 상품의 전자상거래 수출확대를 위한 활용과제에 대해 문헌연구를 중심으로 살펴보았다. 이러한 연구결과를 바탕으로 다음과 같은 시사점을 제시하고자 한다. 한국 상품의 전자상거래 수출확대를 위해서는 한 중 FTA 전자상거래 협정의 후속협상에 대한 준비와 전자적 전송물의 분류에 대한 대비를 하여야 한다. 그리고 전자인증과 전자서명에 있어 양국의 상호인정이 필요하며, 전자상거래 분쟁해결을 위한 제도의 마련과 한국 상품의 전자상거래 수출확대를 위한 전략의 수립 등이 필요하다.

농촌교육농장 방문자의 행동의도 및 방문태도에 미치는 영향요인 연구 (A Study on the Factors Affecting Visitor's Attitude and Behavioral Intention to Visit Educational Farms)

  • 곽병진;노경수;신호균
    • 농촌계획
    • /
    • 제22권1호
    • /
    • pp.37-48
    • /
    • 2016
  • The purpose of this study is to provide an objective insight for factors that affect people's visiting behavior to educational farms. Second, this study aims to identify the underlying dimensions representing motivations and constraints for visiting educational farms. Third, this study explores differences among the classified groups with respect to structural relationships of each construct. Finally, identifying strategies of educational farm-related organizations could develop to reinforce visit motivations, offset visit constraints and ultimately increase behavioral intention for potential possible visitors to revisit and recommend educational farms. Empirical results of the study suggest implications for promoting the current farm villages and markets with many stakeholders in agricultural industries. Nevertheless, there are some limitations as followed: first, despite the possibility of their effects, the study did not consider other factors, which could affect revisiting behavior such as destination image, experiencing attributes etc. Second, the study needs improvements through longitudinal research because the cross-sectional research could not rule out the alternative explanations. The directions for the future study are as follows: first, future study requires time series approach instead of cross sectional approach. Secondly, future study might utilize comparative study regarding regional characteristics of educational farms or a nation-wide approach. Thirdly, future study can suggest a combined educational farms considering practical educational farm cases. Lastly, it is considered that developing evaluation measures such as quality authentication system will contribute to educational farms' stabilization.

서로 다른 패스워드를 가진 사용자간의 패스워드 인증 키 교환 프로토콜 (Password-Authenticated Key Exchange between Clients with Different Passwords)

  • 변지욱;정익래;이동훈
    • 정보보호학회논문지
    • /
    • 제13권1호
    • /
    • pp.27-38
    • /
    • 2003
  • 논문에서 언급되어지는 대부분의 패스워드 인증 키 교환 프로토콜은 사전 분배된 패스워드를 기반으로 해서 서버와 사용자간의 인증된 키 교환을 제공한다. 현대 통신 환경의 빠른 변화에 의해, 기존의 서버와 사용자간의 패스워드인증 키 교환 프레임워크(framework)와는 틀린, 사용자와 사용자간의 안전한 종단간 인증(end-to-end authentication) 구축이 요구되어진다. 본 논문에서는 어떤 사전 비밀 값 분배 없이, 오직 사용자들간의 서로 다른 패스워드를 기반으로한 사용자간의 패스워드 인증 키 교환 프레임워크인, C2C-PAKE(client-to-client password-authenticated ky exchange)를 제안한다. 새로운 프레임워크에 적합한 안전성 개념들과 공격형태들이 정의된다. 또한 제안된 스킴이 정의되어진 총격들에 대해 안전함을 보인다. 본 논문은 두 개의 안전한 C2C-PAKE 스킴을 다중 영역(cross-realm) 환경과 단일서버(single-server) 환경에서 각각 제안한다.

Development of Reproducible EST-derived SSR Markers and Assessment of Genetic Diversity in Panax ginseng Cultivars and Related Species

  • Choi, Hong-Il;Kim, Nam-Hoon;Kim, Jun-Ha;Choi, Beom-Soon;Ahn, In-Ok;Lee, Joon-Soo;Yang, Tae-Jin
    • Journal of Ginseng Research
    • /
    • 제35권4호
    • /
    • pp.399-412
    • /
    • 2011
  • Little is known about the genetics or genomics of Panax ginseng. In this study, we developed 70 expressed sequence tagderived polymorphic simple sequence repeat markers by trials of 140 primer pairs. All of the 70 markers showed reproducible polymorphism among four Panax species and 19 of them were polymorphic in six P. ginseng cultivars. These markers segregated 1:2:1 manner of Mendelian inheritance in an $F_2$ population of a cross between two P. ginseng cultivars, 'Yunpoong' and 'Chunpoong', indicating that these are reproducible and inheritable mappable markers. A phylogenetic analysis using the genotype data showed three distinctive groups: a P. ginseng-P. japonicus clade, P. notoginseng and P. quinquefolius, with similarity coefficients of 0.70. P. japonicus was intermingled with P. ginseng cultivars, indicating that both species have similar genetic backgrounds. P. ginseng cultivars were subdivided into three minor groups: an independent cultivar 'Chunpoong', a subgroup with three accessions including two cultivars, 'Gumpoong' and 'Yunpoong' and one landrace 'Hwangsook' and another subgroup with two accessions including one cultivar, 'Gopoong' and one landrace 'Jakyung'. Each primer pair produced 1 to 4 bands, indicating that the ginseng genome has a highly replicated paleopolyploid genome structure.

Rheological Properties of Dandelion Root Concentrates by Extraction Solvents

  • Lee, Ok-Hwan;Kang, Suk-Nam;Lee, Boo-Yong
    • Food Science and Biotechnology
    • /
    • 제15권1호
    • /
    • pp.33-38
    • /
    • 2006
  • This study was performed to provide basic rheological data of dandelion root concentrates in order to predict their processing aptitude and usefulness as functional foods material. The hot water and 70% ethanol extracts of dandelion root were concentrated at 5, 20, and 50 Brix, and their static viscosity, dynamic viscosity, and Arrhenius plots were investigated. Almost all hot water concentrates showed the typical flow properties of a pseudoplastic fluid, but evaluation using the power law model indicated that the 70% ethanol concentrates showed a flow behavior close to a Newtonian fluid. The apparent viscosity of hot water and 70% ethanol concentrates decreased with increasing temperature. Yield stresses of hot water and 70% ethanol concentrates by Herschel-Bulkley model application were in the range of 0.026 - 1.368 Pa and 0.022 - 0.238 Pa, respectively. The effect of temperature and concentration on the apparent viscosity was examined by Arrhenius equation. The activation energies of hot water and 70% ethanol concentrates were in the range of $8.762-23.778{\times}10^3\;J/mol{\cdot}kg$ and $3.217-20.384{\times}10^3\;J/mol{\cdot}kg$ with increasing concentration, respectively. Storage (G') and loss (G") moduli were generally increased with increasing frequency. For the 70% ethanol concentrates, G" predominated over G' at all applied frequencies and so they showed the typical flow behavior of a low molecular solution. However, for the hot water concentrates, G' predominated over G" at more than 1.9 rad/sec (cross-over point) and so they showed the typical flow behavior of a macromolecular solution.

동북아 e-Trade 활성화를 위한 e-ADR에 의한 분쟁해결에 관한 연구 (Dispute Resolution by e-ADR for e- Trade in the Northeast Asia)

  • 최석범;박종석;정재우
    • 한국중재학회지:중재연구
    • /
    • 제12권2호
    • /
    • pp.185-220
    • /
    • 2003
  • Korean Government is increasingly focusing on the Northeast Asia Business and Logistics Hub strategy to create a competitive advantage. A key element of this strategy is creating or leveraging distribution and logistics hubs that act as centres for distribution in Northeast Asia. A Northeast Asian e-Hub Policy is required for business hub and logistics hub in the Northeastern Asia. An e-Hub is an integrated, sophisticated set of e-Biz, information and e-trade facilities and services that provides access to a marketplace and exchangee the e-trade data. To study the e-Hub policy, Pan Asian e-Commerce Alliance, Korea-Japan e-Trade Hub project, and ASEM e-Trade project are considered. E-trade via cyberspace may need new methods of dispute resolution to reduce transaction costs for small value-related disputes and to erect structures that work well across national boundaries. Voluntary Mediation Councils and cyber tribunals should be encouraged by governmental sectors to continue developing private sector mechanisms to resolve e-trade disputes. Government-sponsored online cross-border dispute resolution systems may be also be useful to complement these private sector approaches. E-trade in Northeast Asia results in disputes owing to the incompleteness of e-trade law in the countries. These disputes contain disputes regarding e-trade model, central title registry, authentication body. To resolve these disputes in the Northeast Asia, a variety of electronic alternative dispute resolution bodies must be organized under cooperation of Korea, Japan, China. This study deals with the e-ADR construction in the Northeast Asia to resolve the disputes in the e-trade and to activate the e-trade in the Northeast Asia.

  • PDF

감초의 기원 및 교잡종 외내부형태 성상 비교연구 (Comparative study of external-intenal morphological shape in origins and hybrids for Glycyrrhizae Radix et Rhizoma)

  • 김영식;박춘근;최고야;장재기;이정훈;주영승
    • 대한본초학회지
    • /
    • 제34권5호
    • /
    • pp.1-12
    • /
    • 2019
  • Objectives : The consumption of licorice is large in Korea, but domestic production is insufficient due to the lack of adaptability. This study aimed to provide a morphological basis for adding interspecific hybrid licorice with improved adaptability to pharmacopoeia. Methods : This study was to establish identification criteria for the original plants, external and internal morphology of the authentic herbal medicines (Glycyrrhiza uralensis, G. glabra and G. inflata), market products and artificially interspecific hybrid forms of licorice. For this purpose, previous studies were investigated and visual and histological observations were carried out. We focused on the internal morphology by microscopic observation for securing objectivity. Finally, we proposed the identification keys for precise classification of each part. Results : 1) Original plant : Licorice species in the compendium were distinguished by the number of leaflets, presence of hair on the fruit, curvature and swelling of the fruit. 2) External morphology : Licorice species were distinguished by degree of powderiness, tearing gap, radial structure in the cross section and existence of protrusion of outer epidermis. 3) Internal morphology : Licorice species were distinguished by the degree of development of phloem fiber bundle, development of obliterated sieve, whether the secondary medullary ray are branched. In the case of interspecific hybrids, the characteristics of both species used for hybridization were mixed in all observation methods. Conclusions : These results suggest that the interspecific crossbred licorice is suitable for the pharmacopoeial standard. Therefore, it can be applied as a herbal medicine through additional supplementary study.

테라헤르츠 이미징을 이용한 금속 성분 회화 재료 진단 연구 (Material Diagnosis of Metalbased Pigments in Paintings Using Terahertz Imaging)

  • 백나연;이한형;송유나
    • 박물관보존과학
    • /
    • 제29권
    • /
    • pp.111-132
    • /
    • 2023
  • 테라헤르츠파는 금속에 대부분의 신호가 반사되어 되돌아온다는 특성을 가지고 있다. 이를 활용하여 본 연구에서는 회화 문화재에서 금속 재료의 사용 여부와 그 분포범위를 확인하여 정보를 해석하는 연구를 진행하였다. 먼저 금속 분말 안료와 금속성의 색상과 질감을 표현하는 합성 펄 안료를 사용한 시편 테스트를 통해서는 금속 성분으로 인한 신호 단절과 단면 이미지에 반영되는 양상, 그리고 평면 이미지에서 높은 반사도를 보이는 기본적인 테라헤르츠 이미지 특성을 비교하였다. 이와 더불어 여러 형태의 한국화와 유화에 대한 이미지 분석을 진행하여 금속 채색 재료의 내부 채색 여부와 그 분포 범위를 파악하였으며 이를 바탕으로 그림의 상태 확인과 더불어 추가적인 미술사적 정보를 획득하였다. 테라헤르츠 이미징 기술은 금속 성분의 재료가 사용된 여러 유형의 회화에 대하여 채색 기법과 내부 정보에 대한 진단 분석으로 보존처리를 위한 자료 및 미술사적인 내용 규명에 활용할 수 있을 것으로 기대된다.

개인정보 유출의 정보전이 효과 (The Effects of Information Transfer of Personal Information Security Breaches)

  • 박상수;이현철
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제27권1호
    • /
    • pp.193-224
    • /
    • 2018
  • Purpose Targeting Korean companies listed on Korean securities markets (i.e., KOSPI and KOSDAQ markets), this study aims to shed lights the effects of personal information security breaches on stock prices of information security companies. Interestingly, this study is, to the best of our knowledge, the first to examine the information transfer effect on personal information security breaches of companies. Design / Methodology /Approach To examine the information transfer effect of personal information security breaches, our study employs the event study commonly used in financial studies. To this end, we investigate a variety of events of personal information security breaches of companies listed on the KOPSI stock market and the KOSDAQ market. We collect the total samples of one hundred and twelve with forty seven of events of personal information security breaches by thirty companies and sixty five of information security companies. Findings The principal findings from the empirical study are as follows. First, for companies of personal information security breaches, our event study presents the significantly negative AAR (averaged abnormal return) value on the event day at the 5 % level and the highly significant negative CAAR(cumulative averaged abnormal return) value on the event day and the day after the event day at the 1 % level. The results suggest that personal information breaches significantly contribute to an decrease in value of the information breached companies. The cross sectional regressions in this study estimate the significantly negative coefficient for the ME/BE variable, the proxy for a growth opportunity at the 5 % level. This suggests a reverse relation between the growth opportunity of companies and their value. As for the various samples of the information security companies categorized by physical security, network and system security, security application software, code authentication, system integration, we find the significantly positive AAR on the day after the event day at the 5% level, only for the network and system security-companies. This addresses that the information transfer effect followed by personal information breaches is uniquely observable for companies categorized into network and system companies. The regressions for the network and system companies estimate the significantly positive coefficient for the NS dummy variable (i.e., the dummy of the network and system security companies) at the standard level. This allows us to identify appropriate times needed to make the information transfer effect realized from personal information breached companies to information security companies.