• 제목/요약/키워드: Data Message

검색결과 1,503건 처리시간 0.026초

태국의 전자거래법에 대한 비교법적 고찰 - 전문 및 일반규정을 중심으로 - (A Comparative Legal Study on the Electronic Transactions Act in Thailand)

  • 심종석;오현석
    • 통상정보연구
    • /
    • 제12권4호
    • /
    • pp.405-427
    • /
    • 2010
  • This legal study is to compare the Electronic Transactions Act in Thailand(hereinafter 'ETA') with mainly other countries electronic transactions acts, such as UNCITRAL MLEC, UECIC, VETA, UCITA and Korea' Electronic Transactions Act The ETA is consisted of 6 chapters which included preamble and definitions. Each chapter's main point as follows. Preamble is related to the name, time of legal effect, scope and definitions. Chapter 1 is not only general principles of electronic transactions, required restriction in addition to specify the limit of application, documentation, evidential weight in reference to the data message, but also the conditions of offer and acceptance through data message, time and place of dispatch and receipt of data message, certification between origination and addressee. According to media-neutrality and the effectiveness security requirement of data message under the information system, legal certification is related to the exchange's declaration of intention, define about origination-addressee of data message. Chapter 2 is composed to provide expressly about the effectiveness security in electronic signature. Those contents are to compare the MLEC, UECIC and Electronic Transactions Act in Korea. Chapter 3 is related to legal definitions that present legal requirement about service relating electronic transaction which contents accept domestic law, the adequate requirement as eligibility, satisfied matter, self-reliance ratio of finance and other detail standard Chapter 4 is deal with the transaction which are public sector and those application requirements. And also this chapter are composed regulations about direct-indirect purpose of Thailand domestic electronic government.

  • PDF

차량 내부 네트워크에서 메세지 인증을 이용한 사이버 공격 탐지 (Cyber Attack Detection Using Message Authentication for Controller Area Networks)

  • 이수윤;박서희;송호진;백영미
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2022년도 추계학술대회
    • /
    • pp.107-109
    • /
    • 2022
  • 본 논문은 차량 내부 네트워크에서 메시지 인증을 사용하여 사이버 공격을 탐지할 수 있는 보안 시스템을 제안한다. 자동차 내부 네트워크는 브로드캐스트 방식으로 메시지를 전송하고 노드의 식별자를 사용하지 않으므로 송신자를 식별할 수 없다. 송신 노드는 제어 데이터를 암호화 해시함수를 사용하여 메시지인증코드를 생성하여 제어 데이터와 같이 전송한다. 메시지인증코드 생성 시, 결과의 임의성을 증가시키기 위해서 다차원 카오틱 맵을 적용하였다. 수신 노드는 수신한 메시지의 제어 데이터에 대해 생성된 메시지인증코드를 수신 메시지에 존재하는 메시지인증코드 값과 비교하여 전송된 메시지의 위조 여부를 탐지한다. CANoe와 CAPL(Communication Access Programming Language)을 사용하여 차량 내부 네트워크 환경을 구성하고 사이버 공격을 수행하여 성능을 평가하였으며 탐지율 100%의 성능을 보였다.

  • PDF

고속병렬컴퓨터(SPAX)에서의 효율적인 메시지 전달을 위한 메시지 전송 기법 (A Message Transfer Scheme for Efficient Message Passing in the Highly Parallel Computer SPAX)

  • 모상만;신상석;윤석한;임기욱
    • 전자공학회논문지B
    • /
    • 제32B권9호
    • /
    • pp.1162-1170
    • /
    • 1995
  • In this paper, we present a message transfer scheme for efficient message passing in the hierarchically structured multiprocessor computer SPAX(Scalable Parallel Architecture computer based on X-bar network). The message transfer scheme provides interface not only with operating system but also with end users. In order to transfer two types of control message and data message efficiently, it supports both of memory-mapped transfer and DMA-based transfer. Dual-port RAMs are used as message buffers, and control and status registers provide efficient programming interface. Interlaced parity scheme is adopted for error control. If any error is detected at receiving node, errored packet is resent by sender according to retry mechanism. In conjunction with retry mechanism, watchdog timers are used to protect infinite waiting and repeated retry. The proposed message transfer scheme can be applied to input/output nodes and communication connection nodes as well as processing nodes in the SPAX.

  • PDF

이기종 지휘통제체계 연동을 위한 무장정보 처리 표준화 설계 방안 (A Standardized Design Method of Weapon Information Exchange for Interoperability with Several Kinds of Command and Control System)

  • 신진범;배정일;이동관;고혜승
    • 한국군사과학기술학회지
    • /
    • 제18권6호
    • /
    • pp.771-778
    • /
    • 2015
  • In this paper, we have proposed a design method for standardization of weapon information exchange between a weapon control computer of guided missile system and a high echelon command and control system. Because the weapon control computer based on diverse combat platforms is operated with several kinds of a high echelon system, it is necessary to provide a standardized design method for weapon information exchange between mutual system. In fact, it is possible to standardize a interface design specification of weapon information message because weapon information message is closely related to standard tactical data link message. It is essential that the interface design specification of weapon information is submitted to that of tactical data link information. It seems that this interface design specification is very useful in development process of the future weapon system.

LEA 알고리즘을 이용한 MQTT 프로토콜 보안 (Securing the MQTT Protocol using the LEA Algorithm)

  • 락스모노 아구스 마하르디카 아리;이크발 무함마드;프라타마 데리;김호원
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2024년도 춘계학술발표대회
    • /
    • pp.175-178
    • /
    • 2024
  • IoT is becoming more and more popular, along with the massive availability of cheap and easy-to-use IoT devices. One protocol that is often used in IoT devices is the Message Queuing Telemetry Transport (MQTT) protocol. By default, the MQTT protocol does not activate encrypted data security features. This MQTT default feature makes the transmitted and received message data vulnerable to attacks, such as eavesdropping. Therefore, this paper will design and implement encrypted data security using the lightweight cryptography algorithm. The focus of this paper will be on securing MQTT message data at the application layer. We propose a method for encrypting specific MQTT message fields while maintaining compatibility with the protocol's functionalities. The paper then analyzes the timing performance of the MQTT-LEA implementation on the Raspberry Pi 3+. Our findings demonstrate the feasibility of using LEA at the application layer to secure MQTT message communication on resource-constrained devices.

물류EDI 표준메세지 이용 방안 (The Practical Use of Un Standard Message for cargo flow EDI)

  • 박남규;이태우
    • 한국항해학회지
    • /
    • 제17권2호
    • /
    • pp.57-73
    • /
    • 1993
  • Subject : The Practical Use of UN Standard Message for cargo flow EDI Writer : Park, Nam Kyu and Lee, Tae Woo It's necessary to prepare standard message which is agreed on among trading partners for EDI in container transport industry. Now KMPA is carrying out the EDI Project for establishing Korea Logistics Network. It is important to make standard message of documents using in transport industry to succesfully accomodate EDI. The objective of this study is to find out the method of UN standard message utility in Korea. For this study, the UN message guideline is primarily reviewed, and the process that Shipping Request being used in Hanjin Shipping Co. Ltd. is applied to UNSMs as case study. Generally the data format of EDIFACT is so complex and broad for inter-industry standard that the abstract of data format is usually used. Therefore, it is necessary to make the subset of standard message for Shipping Request in ocean industry. In the result of this study, that the ocean industry can use the subset of IFTMBF for Shipping Request is proved, and the subset is suggested. This thesis will contribute toward showing the practical way of standardrization of 350 documents using in trade, customs and transport sectors.

  • PDF

공동구매형 소셜커머스에서 희소성메시지가 고객의 지각된 가치, 만족, 재구매의도에 미치는 영향 (The Influence of Scarcity Message on Customers' Perceived Value, Satisfaction, and Repurchase Intention in the Context of Group-Buying Social Commerce)

  • 최수정
    • Journal of Information Technology Applications and Management
    • /
    • 제23권1호
    • /
    • pp.97-117
    • /
    • 2016
  • Drawing on the theoretical framework of customer value-satisfaction-loyalty, this study examines how scarcity message influences customers' value, satisfaction, and loyalty in the context of group-buying social commerce. Previous studies have argued that scarcity message limiting the avilability of products and service is a source of enhancing customer value. In this regard, this study posits scarcity message as a predictor of customer value. Furthermore, this study classifies customer value into two forms (i.e., utilitarian value and hedonic value) and verfies how scarcity message is associated with them. To test the proposed research model and hypotheses, this study performed structural equation modeling (SEM) analyses, using a total of 292 data collected on users who have experience in purchasing products and service through group-buying social commerce sites such as Coupang, Timon, and WeMakePrice. The key results are as follows : First, scarcity message increases utilitarian and hedonic values and further customer satisfaction. Second, utilitarian value increases customer satisfaction and repurchase intention while hedonic value has nothing to do with them. The findings imply that customers seek to maximize utilitarian value through group-buying social commerce. Finally, this study indicates that repuchase intention depends greatly on customer satisfaction.

분산 구조에 의한 세션 기반 인스턴트 메시지 시스템 (A Session-based Instant Message System by Distributed Architecture)

  • 장춘서;이기수
    • 한국정보통신학회논문지
    • /
    • 제18권9호
    • /
    • pp.2169-2175
    • /
    • 2014
  • 본 논문에서는 SIP 세션 기반의 인스턴트 메시지(Instant Message) 시스템에서 확장성을 높이기 위하여 복수개의 서버를 사용하여 시스템의 부하를 효율적으로 분산 처리하는 새로운 구조를 제안하였다. 세션 기반 인스턴트 메시지 서버는 SIP 세션을 관리하여 멀티미디어 데이터를 포함한 인스턴트 메시지를 각 사용자들에게 전달해야 하고 각 사용자들에서 발생하는 다량의 프레즌스 정보 처리도 해야 함으로 사용자 수의 증가에 따라 부하를 적절히 분산하여야 한다. 이를 위하여 본 논문에서는 사용자 수의 증가에 따라 특정 서버의 부하가 커지면 전체 인스턴트 메시지 서버 중 가장 부하가 적은 서버로 사용자 요청을 분산하거나 새로운 인스턴트 메시지 서버를 생성하여 메시지 처리를 할당함으로써 동적으로 부하를 분산하도록 한다. 이와 같은 동작을 위하여 인스턴트 메시지 서버의 부하를 제어하는데 필요한 요소들이 추가된 새로운 프레즌스 정보 데이터 형식이 설계되었고 인스턴트 메시지 서버들 사이 및 서버와 사용자 사이의 SIP 메시지 교환 절차가 제시되었다. 제안된 시스템의 성능은 시뮬레이션 실험을 통하여 분석하고 성능이 향상됨을 보였다.

Secure-ReXpis System with Internet Environment

  • Ahn, Kyeong-Rim
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2001년도 International Conference CALS/EC KOREA
    • /
    • pp.165-176
    • /
    • 2001
  • * Extension of EC(Electronic Commerce) * Standard of Message -EDI : UN/EDIFACT, ANSI X12, etc -XML : ebXML, CML, MathML, WIDL, etc * Various of Information -Business Transaction Data -Private Data : ID, Password, Personal Information -Charge Data : Accounts, Card, etc * Message Level Security(omitted)

  • PDF

비트 재배열을 이용한 가변길이 CAN 메시지 압축 (Variable Length CAN Message Compression Using Bit Rearrangement)

  • 조경주
    • 대한전자공학회논문지SD
    • /
    • 제48권4호
    • /
    • pp.51-56
    • /
    • 2011
  • 본 논문에서는 CAN 버스로드를 줄여 CAN 네트워크 비용을 줄이고 오류 확률을 낮추기 위해서 메시지를 압축하는 방법을 제안한다. 제안하는 비트 재배열 방법은 기존의 메시지 변화량만 전송하는 압축방식과 달리 각 변화량의 하위 비트들로부터 시작하여 전송데이터를 재구성하도록 하여 결과적으로 데이터가 압축되는 방법이다. 차량 CAN 로깅 파일을 이용하여 제안한 방법으로 압축한 결과 전송 데이터량이 기존 압축알고리즘에 비해 26% 더 감소함을 보였다.