• Title/Summary/Keyword: E-mail protocol

Search Result 50, Processing Time 0.029 seconds

A Study on DRM System for Multimedia Contents Protection base on Advanced Authentication Protocol (멀티미디어 콘텐츠 보호를 위한 향상된 인증 프로토콜 보안 시스템에 관한 연구)

  • Lee Kwang-Hyung;Jung Young-Hoon;Lee Young-Gu;Kim Hyun-Chul;Jun Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.933-936
    • /
    • 2006
  • 본 논문에서는 디지털 콘텐츠의 암호화를 Puzzle기법을 사용하여 Puzzle을 재배치하고 재배치한 조합도를 공개키로 암호화 하여 유선을 통하여 전송하고, 조합도 암호화키 OTP를 생성하여 무선으로 사용자에게 전송하는 알고리즘을 제안하고, 재배치된 Puzzle기법과 Puzzle조합도 및 OTP를 E-mail과 Mobile phone을 이용하여 높은 수준의 사용자 Deviec와 사용자 인증을 제안하였다. 제안 시스템을 설계하고 구현한 후 성능 평가를 위해 다양한 콘텐츠 파일을 이용하여 실험을 수행하여 제안한 시스템이 기존 시스템에 비해 높은 보안성을 검증하였다.

  • PDF

A Study on XML/EDI System Security using XML Signature (XML 전자서명을 이용한 XML/EDI 시스템 보안에 관한 연구)

  • 이경록;서장훈;박명규
    • Journal of the Korea Safety Management & Science
    • /
    • v.4 no.1
    • /
    • pp.57-68
    • /
    • 2002
  • As Internet spreads rapidly, the industrial structure is changing to a new paradigm. The previous EDI system was asked to change and WEB EDI, E-Mail EDI, FTP EDI etc. which are based on the internet appeared. These days the XML/EDI which has XML document appeared. The XML/EDI consider advantages and disadvantages of VAN/EDI and EDI which based on the internet. Also, EDI system has to assure a safe exchange between sender and receiver. But, the internet has security problems because it uses a open TCP/IP protocol. Although there are many methods for security, it is being studied with XML concept. On this paper, we will suppose the XML/EDI system model with XML Signature, and build a procedure of electronic signature and delivery of document between sender and receiver.

Distributed Control Algorithms for QoS in Wireless Networks Using Wireless Token Ring Protocol (무선토큰링 프로토콜을 사용한 무선 네트워크에서 QoS를 지원하는 분산 제어 알고리즘)

  • 김성철
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.187-193
    • /
    • 2004
  • Wireless networks play a very important role in communications today. For example, wireless networks today provide from the basic services like e-mail and FTP to the multimedia applications like Web service. It is obvious that QoS requirements to these diverse applications over wireless networks will continue as in wired networks. Much research has been done to develop QoS supporting algorithms on Internet. But due to the limited bandwidth and varying channel states of the wireless networks, it is difficult to support differentiated service over wireless networks. In this paper we propose the modified wireless token ring protocol supporting QoS to the real-time traffic service node over Internet environments in which non-real-time and real-time traffic service nodes coexist. In the proposed algorithm, the real-time traffic service node gets the priority to take token over the non-real-time traffic service node. So the proposed algorithm support quick transmission of the real-time traffic service node. And this advantage can be obtained with minor modification of the legacy wireless token ing protocol to support QoS. We also consider the lost token recovery mechanism.

  • PDF

A Design of the Certification System in a Instantant Messenger Using PKI (PKI를 이용한 인스턴트 메신저에서의 인증 시스템 설계)

  • Park Su-Young;Choi Gwang-Mi;Jung Chai-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.142-147
    • /
    • 2006
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information, but instant messengers are gaining popularity abroad and domestically because of their nature of getting immediate reponses. However a instant messenger services have the exposure of data on internet but clients use them without recognizing their exposure. It's like phone tapping. The coding technology using Public Key Cryptosystem has developed the public key infrastructure to be able to do the services of Access-control, Authentication, Confidentiality, Integrity. and Non-repudiation with internet. It is a thesis that suggests the certification protocol in a instant messenger using PKI(Public Key Infrastructure) for secure communication.

Effects of Walking Program based on Social Cognitive Theory for Office Workers (사무직 근로자를 위한 사회인지이론 기반 걷기 프로그램의 효과)

  • Choi, Hye-Young;Yang, Sook-Ja
    • Korean Journal of Adult Nursing
    • /
    • v.25 no.6
    • /
    • pp.712-724
    • /
    • 2013
  • Purpose: The purpose of this study was to examine the effects of a walking program for office workers in terms of social cognitive theory, walking activities and physiological indexes. Methods: A nonequivalent control group pretest-posttest design was used. The sample consisted of 50 office workers who were identified as having low levels of physical activity according to the International Physical Activity Questionnaire (IPAQ Research Committee, 2005). The participants were recruited from two companies in Seoul. Of the 50 participants, 26 were assigned to the non-equivalent experimental group and 24 to the control group. The walking program consisted of six didactic sessions via e-mail, two individual telecoaching sessions and three support group meetings over ten weeks. Data were analyzed using SPSS 17.0 program. Results: The non-equivalent experimental group reported significantly higher posttest scores in walking activities and adhering to the walking protocol than the control group. There were no differences in reported self-efficacy, outcome expectations, body mass index and blood pressure between the two groups. Conclusion: These findings indicate that a walking program based on social cognitive theory is effective in increasing physical activities for office workers.

Development of Embedded Security Fax Server Supporting Dual Mode (이중 방법을 지원하는 임베디드 보안 팩스 서버 개발)

  • Lee, Sang-Hak;Chung, Tae-Choong
    • The KIPS Transactions:PartA
    • /
    • v.11A no.3
    • /
    • pp.129-138
    • /
    • 2004
  • Even though the Internet applications such as e-mail and FTP are widely used, fax is still an important media for data communications till today. Many researches on security over the Internet data communication have been done over the years, on the other hand not many researches have been dedicated to the fax security issue which is as important as the Internet. In this paper, we describe the development of hardware and software of the embedded security fax server which increases the security in supporting existing fax. The developed system is designed and implemented to maintain security while minimizing the delay due to encryptionㆍdecryption. Since there's international or domestic tryptographic standard and each nation have their policy to restrict the use of cryptographic system, we adopt domestic standard cryptographic protocol admitted in Korea. And the system supports two modes: Security mode and Non-Security mode that user can choose from. The system can be applied directly which is the requirements of users at company ,End the government. We verify the performance and functioning of the system in various real environment.

The E-mail Survey on the Neck Pain for Acupuncture and Moxibustion Clinical Guideline (경항통에 관한 침구임상 진료지침 개발을 위한 전자우편 설문조사)

  • Kim, Hyun-Wook;Kim, Sung-Soo;Nam, Dong-Woo;Kim, Eun-Jung;Hong, Kwon-Eui;Kim, Sung-Chul;Kim, Sun-Woong;Lee, Jae-Dong;Kim, Kap-Sung;Lee, Geon-Mok
    • Journal of Acupuncture Research
    • /
    • v.26 no.3
    • /
    • pp.67-80
    • /
    • 2009
  • Objectives : The purpose of this survey is the development on the neck pain for acupuncture and moxibustion clinical guideline. Methods : The survey questionnaire was developed by the committee of experts who major in acupuncture & moxibustion or statistics for acupuncture clinical trial protocol development. The questionnaires were distributed via e-mail to 75 members of Korean Acupuncture & moxibustion society. 57 members completed answers, and the computerized data were analyzed by SPSS 17.0 statistical program. Results and Conclusions : 1. The first selected pattern identification on the neck pain This study shows that the meridian pattern identification was selected 35 times(61.4%), the pattern identification based on cause of disease was selected 8 times(14.0%), the visceral pattern identification was selected 7 times(12.3%), the other pattern identification was selected 4 times(7.0%), Qi blood yin yang pattern identification was selected 2 times(3.5%), according to symptoms was selected 1 time(2.4%). 2. Meridian pattern identification Small intestine meridian of hand Taeyang was used 39 times(18.1%), Large intestine meridian of hand Yangmyeong and Bladder meridian of foot Taeyang was used 34 times(15.7%), Gall-bladder meridian of foot Soyang was 32 times(14.8%), Tripple energizer meridian of hand Soyang was used 31 times(14.4%), Governor meridian was used 30 times(13.9%), Lung meridian of hand Taeeum was used 8 times(3.7%), Heart meridian of hand Soeum and Pericarduim meridian of hand Gworeum was used 4 times(1.9%). 3. Pattern identification based on cause of disease Wind-Cold-Dampness was used 31 times(17.5%), Accumulation of the collateral by Phelgm-Dampness was used 16 times(14.0%), affection by exopathogen Wind-Cold(stiff neck, sprain of cervical) was used 13 times (11.4%), Defecient-Cold was used 10 times(8.8%), affection by exopathogen Wind-Dampness was used 9 times(7.9%), Deep Invasion by Wind-Cold was used 8 times(7.0%), Wind-Cold was used 7 times (6.1%), Wind-Cold was used 6 times(5.3%), Accumulation in the Center by Phelgm-Dampness, Imparement of bou fluid by Pathogenic Heat, Wind-Heat with Dampness was used 5 times(4.4%), affection by exopathogen Wind-Dampness and Accumulation of the collateral by Wind-Cold was used 4 times(3.5%), Invasion of Dampness-Heat was used 2 times(1.8%). 4. Visceral pattern identification Rising of the Liver yang was used 16 times(41%), Yin deficiency of Liver and Kidney+pathogens was used 15 times(38.5%), Yin deficiency of Liver and Kidney was used 8 times(20.5%) on this survey.

  • PDF

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Son, Hong;Jo, In-June;Ju, Young-Ji;Lee, Dal-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.667-671
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can been through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working Group is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, I design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

A Study on Activation of Oriental Medicine in Public Health Sector : The role of Oriental Public Health Physicians (한방 공공의료의 활성화에 관한 연구 - 공중보건 한의사의 활동을 중심으로 -)

  • Yi Sang-Gu;Moon Ok-Ryun;Piao Song-Lin;Lee Shin-Jae;Yoon Tae-Ho;Jeong Baek-Geun;Wen Yong
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.4 no.1
    • /
    • pp.1-16
    • /
    • 2000
  • From 1998, Oriental Medical Physicians(OMP) is distributed in Public Health Sector. but long term plan for Oriental Medicine in Public Health is not existed. So, this study is designed for the activation of OMP Subjects in this study were comprised 3 groups of oriental medicine related persons, the group of which are Students of 11 Oriental Medical Schools, Oriental Medical Physicians in Public Health Sector, Specialist Croup of Oriental medicine Policy(total 1,458 persons). Data were collected from July 1st to November 30, 1999. Direct interview with key persons, systematic interview by using of interview protocol, e-mail and facsimile have been conducted. The results of survey were coded by Excel 5.0, and analysed with SAS 6.12 statistical package. Inter-group difference determined by T-test, and descriptive statistics have been examined. Major findings can be epitomized as follows. 1) OMP disposition to multifarious organizations and institutes such as Public Health Centers, Public Health Sub-centers, Public Hospitals, Private Hospitals in Remote-Vulnerable Area, Community Social Welfare Centers, Institutes for Heath Policy Research, etc, will promise an effective use of Oriental Medical Physician. 2) Average number of patients treated by OMP was 22.8, average budget for oriental medical department, in which OMP were affiliated, was 39.6 million Won per year. Direct cost per every patient visit was 7,210.9 Won, which is considered expensive for public health service. Therefore, development and transformation for Oriental Medical Service in Public Health Sector is desirable in economic and political aspects. 3) It is recommended that ${\ulcorner}Advisory\;Committee{\lrcorner},{\ulcorner}Planning\;Commission\;for\; Public\;Health\;in\;Oriental\;Medicine{\lrcorner}$ should be established for the activation and for the support of Oriental Medical Physician in Public Health Sector, 4) Most effective programmes for oriental public health doctor are health service programmes for the elderly, Home health visit, chronic degenerative disease control services(p<0.001). 5) Standard guideline for facilities and equipments of Oriental Medicine Department in Public Health Center is needed for optimal supply of resources and activation of public health activity.

  • PDF

Survey of Sedation Practices by Pediatric Dentists (소아치과의사의 진정법 사용에 대한 실태조사)

  • Yang, Yeonmi;Shin, Teojeon;Yoo, Seunghoon;Choi, Seongchul;Kim, Jiyeon;Jeong, Taesung
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.41 no.3
    • /
    • pp.257-265
    • /
    • 2014
  • The aim of this study was to establish the appropriate guidelines in the sedation techniques and to organize the continuing education programs for the sedation in future under the direction of Committee on Sedation, Education and Research under the Korean Academy of Pediatric Dentistry(KAPD). The surveys on the sedation technique were performed on 111 organizations which practices the sedation and responded to the survey via online and e-mail by February 2014. The collected survey were analyzed. The purpose of sedation was mainly to manage the children's behavior and its uses were primarily on 3~4 years old children. The most frequent duration of treatment was 1~2 hours to treat both maxillary and mandible. The preferred dosages of sedative drugs were chloral hydrate(CH) 50~70 mg/kg, hydorxyzine(Hx) 1~2 mg/kg, and intramuscular midazolam(Mida IM) 0.1~0.2 mg/kg. The preferred combination of the sedative drugs were CH + Hx + $N_2O/O_2$(67.6%), CH + Hx + Mida submucosal administration (SM) + $N_2O/O_2$(29.7%), and Mida IM + $N_2O/O_2$(23.4%). The administration of additional sedatives was carried out at 48%, mainly using Midazolam. 87.5% of the respondents experienced the adverse effects of the sedation such as vomiting/retching, agitation during recovery, subclinical respiratory depression, staggering, and etc. Among them, only 20% periodically retrain the emergency management protocol. About the discharge criteria for patients after the sedation, the respondents either showed a lack of clear criteria or did not follow the recommended discharge criteria. 86% of the respondents expressed the interests in taking a course on the sedation and they wanted to learn mostly about the sedation-related emergency management, the safe dosage of the sedative drugs, and etc. The use of sedation in pediatric dentistry must be consider a patient's safety as top priority and each dentist must show the evidence of sound practices for the prevention of any possible medical errors. Therefore, KAPD must establish the proper sedation guidelines and it needs to provide the systematic technical training program of sedation-related emergency management for pediatric dentists.