• Title/Summary/Keyword: Document Security System

Search Result 150, Processing Time 0.025 seconds

A Study on the Adoption of Electronic Contract Service (전자계약서비스의 문제점과 해결방안)

  • Choi, Seok-Beom;Kim, Tae-Hwan;Kim, In-Kyung;Kim, Jae-Hak;Park, Sun-Young;Yoon, Young-Rim
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.34
    • /
    • pp.157-185
    • /
    • 2007
  • The purpose of this thesis is to contribute to the activation of e-contract service for one stop e-trade by analyzing the problems and its solutions in e-contract service at home and abroad. In order to achieve the purpose of this thesis, case studies are done on e-contract service providers such as CECTRUST service of NTT DATA in Japan and HanCM.com of Haansoft in Korea and user companies such as Taisei Corporation using CECTRUST service and Hyundai Card using HanCM.com. The problems in the e-contract service are the lack of e-contract service providers, rare publicity of e-contract service, limited use of e-contract service at only home, higher pricing for e-contract service, short time management of e-contract documents by service providers, no application of newly developed security technology to e-contract service, unsatisfaction of requirements of e-contract service provider as trusted third party, absence of lower pricing e-contract service by service provider, authorizing key error in electronic signature under recognized authentication system in case of fail in renewal of digital certificate and reproduction of digital certificate. The solutions of these problems are the upbringing of e-contract service providers, broad publicity of e-contract service, development of e-contract service on a global basis, establishment of lower pricing for e-contract service, long time management of e-contract documents by service providers, application of newly developed security technology such as bio technology to e-contract service, satisfaction of requirements of e-contract service provider as trusted third party by designation of recognized e-document repository, development of lower e-contract service by way of application service provider(ASP), introduction of time stamping of e-contract document and signature key value. The limitation of this thesis is that the problems and its solutions could not meet with the broad recognition as they are conferred by intuition because of few e-contract service provider.

  • PDF

Design of Automatic Database Schema Generator Based on XML Schema (XML 스키마 기반의 데이터베이스 스키마 생성기 설계)

  • Lim, Jong-Seon;Kim, Kyung-Soo
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.79-86
    • /
    • 2007
  • B2B e-business is an economic transaction formed between companies through various networks including internet. At present, e-business between companies partly applies information distribution between companies, but many enterprises expect that a corporate basic system will be gradually changed into XML basis if web service is earnestly materialized, so they are competing with each other in developing XML DBMS. Existing XML DBMS studies used XML DTD in order to represent the structure of XML document. Such XML DTD defines the expression of a simple type, so there are many difficulties in defining the structure of XML document. To cope with this, in this paper, the author will develop database schema generator utilizing relational database generally used in storing contents of data, on the basis of XML schema selected as a standard of W3C. Also, to store XML data, the author proposed the automatic conversion method of relational database schema that used XML schema.

  • PDF

Problems of Applying Information Technologies in Public Governance

  • Goshovska, Valentyna;Danylenko, Lydiia;Hachkov, Andrii;Paladiiichuk, Sergii;Dzeha, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.71-78
    • /
    • 2021
  • The relevance of research provides the necessity to identify the basic problems in the public governance sphere and information technology relations, forasmuch as understanding such interconnections can indicate the consequences of the development and spreading information technologies. The purpose of the research is to outline the issues of applying information technologies in public governance sphere. 500 civil servants took part in the survey (Ukraine). A two-stage study was conducted in order to obtain practical results of the research. The first stage involved collecting and analyzing the responses of civil servants on the Mentimeter online platform. In the second stage, the administrator used the SWOT-analysis system. The tendencies in using information technologies have been determined as follows: the institutional support development; creation of analytical portals for ensuring public control; level of accountability, transparency, activity of civil servants; implementation of e-government projects; changing the philosophy of electronic services development. Considering the threats and risks to the public governance system in the context of applying information technologies, the following aspects generated by societal requirements have been identified, namely: creation of the digital bureaucracy system; preservation of information and digital inequality; insufficient level of knowledge and skills in the field of digital technologies, reducing the publicity of the state and municipal governance system. Weaknesses of modern public governance in the context of IT implementation have been highlighted, namely: "digitization for digitalization"; lack of necessary legal regulation; inefficiency of electronic document management (issues caused by the imperfection of the interface of reporting interactive forms, frequent changes in the composition of indicators in reporting forms, the desire of higher authorities to solve the problem of their introduction); lack of data analysis infrastructure (due to imperfections in the organization of interaction between departments and poor capacity of information resources; lack of analytical databases), lack of necessary digital competencies for civil servants. Based on the results of SWOT-analysis, the strengths have been identified as follows: (possibility of continuous communication; constant self-learning); weaknesses (age restrictions for civil servants; insufficient acquisition of knowledge); threats (system errors in the provision of services through automation); opportunities for the introduction of IT in the public governance system (broad global trends; facilitation of the document management system). The practical significance of the research lies in providing recommendations for eliminating the problems of IT implementation in the public governance sphere outlined by civil servants..

Digital Holographic Security Identification System (디지털 홀로그래픽 보안 인증 시스템)

  • Kim, Jung-Hoi;Kim, Nam;Jeon, Seok-Hee
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.2
    • /
    • pp.89-98
    • /
    • 2004
  • In this paper, we implement a digital holographic security card system that combines digital holographic memory using random phase encoded reference beams with electrical biometrics. Digitally encoded data including a document, a picture of face, and a fingerprint are recorded by multiplexing of holographic memory. A random phase mask encoding reference beams are used as a decoded key to protect illegal counterfeit. As a result, we can achieve a raw BER of 3.6${\times}$10-4 and shift selectivity of 4${\mu}{\textrm}{m}$ using the 2D random phase mask. Also, we develop a recording pattern and image processing which are suitable for a low cost reader without a position sensing photo-detector for real time data extraction and remove danger of fraud from unauthorized person by comparing the reconstructed holographic data with the live fingerprint data.

A Design of the Cloud Aggregator on the MapReduce in the Multi Cloud

  • Hwang, Chigon;Shin, Hyoyoung;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.83-90
    • /
    • 2016
  • The emergence of cloud has been able to provide a variety of IT service to the user. As organizations and companies are increased that provide these cloud service, many problems arises on integration. However, with the advent of latest technologies such as big data, document-oriented database, and MapReduce, this problem can be easily solved. This paper is intended to design the Cloud Aggregator to provide them as a service to collect information of the cloud system providing each service. To do this, we use the DBaaS(DataBase as a Service) and MapReduce techniques. This makes it possible to maintain the functionality of existing system and correct the problem that may occur depending on the combination.

A Study of checking a drain of Document and Security System on RFID tag System (RFID 태그 시스템을 활용한 문서 유출 방지 및 보안 시스템 연구)

  • Yun Seung-Bae;Ko Hyuk-Jin;Kim Ung-Mo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.145-148
    • /
    • 2004
  • 데이터베이스접근기술은 시스템의 보안 모델로서 뿐만 아니라 DRM 기술 및 전자 도서관 서비스등과 함께 활용되어 많은 서비스를 제공하고 있다. 하지만, 시스템 내부의 데이터 보안뿐만 아니라 우리 실생활에서 축적되거나 활용되는 데이터의 보안 또한 매우 중요하다. RFID 태그를 부착한 문서의 정보를 통해 문서 유출을 탐지하고 해당 문서의 정보를 저장하고 있는 시스템의 사용자 접근권한의 변경 및 시스템 내의 보안 정책의 변경을 통해 재차 발생할 수 있는 데이터의 유출을 막도록 하여 시스템 내부의 데이터베이스의 비밀성 및 무결성을 강화할 수 있다.

  • PDF

Web-based Personal Dose Management System for Data Recording on Dosimeter Usage: A Case of Tanzania Atomic Energy Commission

  • Mseke, Angela;Ngatunga, John Ben;Sam, Anael;Nyambo, Devotha G.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.15-22
    • /
    • 2022
  • Modern technology drives the world, increasing performance while reducing labor and time expenses. Tanzania Atomic Energy Commission (TAEC) tracks employee's levels of exposure to radiation sources using dosimeters. According to legal compliance, workers wear dosimeters for three months and one month at the workplace. However, TAEC has problems in tracking, issuing and returning dosimeters because the existing tracking is done manually. The study intended to develop a Personal Dose Management System (PDMS) that processes and manages the data collected by dosimeters for easy and accurate records. During the requirements elicitation process, the study looked at the existing system. PDMS' requirement gathering included document reviews, user interviews, and focused group discussions. Development and testing of the system were implemented by applying the evolutionary prototyping technique. The system provides a login interface for system administrators, radiation officers, and Occupational Exposed Workers. The PDMS grants TAEC Staff access to monitor individual exposed workers, prints individual and institutional reports and manages workers' information. The system reminds the users when to return dosimeters to TAEC, generate reports, and facilitates dispatching and receiving dosimeters effectively. PDMS increases efficiency and effectiveness while minimizing workload, paperwork, and inaccurate records. Therefore, based on the results obtained from the system, it is recommended to use the system to improve dosimeter data management at the institution.

Cloud storage-based intelligent archiving system applying automatic document summarization (문서 자동요약 기술을 적용한 클라우드 스토리지 기반 지능적 아카이빙 시스템)

  • Yoo, Kee-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.3
    • /
    • pp.59-68
    • /
    • 2012
  • Zero client-based cloud storage technology is gaining much interest as a tool to centralized management of organizational documents nowadays. Besides the well-known cloud storage's defects such as security and privacy protection, users of the zero client-based cloud storage point out the difficulty in browsing and selecting the storage category because of its diversity and complexity. To resolve this problem, this study proposes a method of intelligent document archiving by applying an algorithm-based automatic topic identification technology. Without user's direct definition of category to store the working document, the proposed methodology and prototype enable the working documents to be automatically archived into the predefined categories according to the extracted topic. Based on the proposed ideas, more effective and efficient centralized management of electronic documents can be achieved.

Research on Security System for Safe Communication in Maritime Environment (해상환경에서 안전한 통신을 위한 보안체계 연구)

  • Seoung-Pyo Hong;Hoon-Jae Lee;Young-Sil Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • As a means of helping ships navigate safely, navigational aids in operation in the maritime envirionment require periodic management, and due to the nature of the environment, it is difficult to visually check the exact state. As a result, the smart navigation aid system, which improves route safety and operational efficiency, utillizes expertise including sensors, communications, and information technology, unlike general route markings. The communication environment of the smart navigation aid system, which aims to ensure the safety of the navigators operating the ship and the safety of the ship, uses a wireless communication network in accordance with the marine environment. The ship collects the information necessary for the maritime environment on the land and operates. In this process, there is a need to consider the wireless communication security guideline. Basically, based on IHO S-100 a standard for facilitating data exchange and SECOM, which provides an interface for safe communication. This paper research a security system for safe communication in a maritime environment. The security system for the basic interface based on the document was presented, and there were some vulnerabillties to data exchange due to the wireless communication characteristics of the maritime environment, and the user authetication part was added considering the vulnerability that unauthorized users can access the service.

Trend of standardization in the field of Industrial Security through ISO/TC 292 (ISO/TC 292에 의한 산업보안 분야 국제표준화의 동향)

  • Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.79-111
    • /
    • 2016
  • This study aims at analyzing the global trend of standardization in the field of Industrial Security through ISO/TC 292. It covers broad areas from risk management for industrial property protection and loss prevention through supply chain security, product and document fraud and counterfeiting countermeasures and control and community resilience. It also explores the historical background of the standardization in the security field, how ISO TC 292 came out as a leading group in order to standardize relevant security management systems. TC 292 deals with terminology, general security-related standards and supply chain security management. One of the major findings from this analysis is that security targets and threats are diversified and so organizations like enterprises should have proper flexibility to adapt themselves to new security environment and take appropriate resilience system to cope with the threats and incidents. Also the ISO standardization requires public or private entities to take holistic approaches in security management. Finally, it was found that South Korea has to prepare for this global trend of standardization in this field so that ISO certification market demand and the requirements for transnational trades can be well met.

  • PDF