• Title/Summary/Keyword: EC Security

Search Result 91, Processing Time 0.025 seconds

Security Method for Approval Process of Payment System (지불시스템의 승인단계에서 보안방안)

  • 임인채;위장현
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.4
    • /
    • pp.59-65
    • /
    • 2002
  • Payment systems in EC need confidentiality, integrity, non-repudiation. All transactions between cardholders and merchants must be authorized by a payment gateway in SET protocol. RSA secret key operation which requires heavy computation takes the most part of the time for payment authorization. For the reason, a heavy traffic of payment authorization requests from merchants causes the payment gateway to execute excessive RSA secret key operations, which may cause the bottleneck of the whole system. To resolve this problem, One-Time Password technique is applied to payment authorization step of the SET protocol.

  • PDF

A study for Electronic Billing System on the Cyber Supporting Site (사이버 도우미를 위한 전자후원시스템 구축에 관한 연구)

  • 김석수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.33-39
    • /
    • 2000
  • This paper designed the electronic billing system for implementation web site of the social welfare and help-line. And, it possible to the various supporting method between supporter and receiver on the cyberspace. Also, this system is modified to electronic supporting system from the electronic billing system of EC(Electronic Commercial). The electronic billing system is more security and efficiencial billing system than the conventional off-line system.

  • PDF

Identifying Factors for Corn Yield Prediction Models and Evaluating Model Selection Methods

  • Chang Jiyul;Clay David E.
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.50 no.4
    • /
    • pp.268-275
    • /
    • 2005
  • Early predictions of crop yields call provide information to producers to take advantages of opportunities into market places, to assess national food security, and to provide early food shortage warning. The objectives of this study were to identify the most useful parameters for estimating yields and to compare two model selection methods for finding the 'best' model developed by multiple linear regression. This research was conducted in two 65ha corn/soybean rotation fields located in east central South Dakota. Data used to develop models were small temporal variability information (STVI: elevation, apparent electrical conductivity $(EC_a)$, slope), large temporal variability information (LTVI : inorganic N, Olsen P, soil moisture), and remote sensing information (green, red, and NIR bands and normalized difference vegetation index (NDVI), green normalized difference vegetation index (GDVI)). Second order Akaike's Information Criterion (AICc) and Stepwise multiple regression were used to develop the best-fitting equations in each system (information groups). The models with $\Delta_i\leq2$ were selected and 22 and 37 models were selected at Moody and Brookings, respectively. Based on the results, the most useful variables to estimate corn yield were different in each field. Elevation and $EC_a$ were consistently the most useful variables in both fields and most of the systems. Model selection was different in each field. Different number of variables were selected in different fields. These results might be contributed to different landscapes and management histories of the study fields. The most common variables selected by AICc and Stepwise were different. In validation, Stepwise was slightly better than AICc at Moody and at Brookings AICc was slightly better than Stepwise. Results suggest that the Alec approach can be used to identify the most useful information and select the 'best' yield models for production fields.

A Secure Electronic Payment System in Intelligent Transportation Systems Using the Dedicated Short Range Communications (단거리 전용통신을 이용한 지능형 교통시스템에서의 안전한 전자 지불 시스템)

  • Jang Chung-Ryong;Lee Yong-Kwon
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.4
    • /
    • pp.71-78
    • /
    • 2004
  • Dedicated Short Range Communications(DSRC) as a prominent communications candidate for Intelligent Transportation Systems(ITS) have been developed to support ITS applications such as value-added information service, e-commerce, electronic toll payment, etc. These various applications associated with electronic payment through unsecure communication channel of DSRC suffer from security threats. To ensure secure payment, we have adopted appropriate cryptographic mechanisms including encipherment, authentication exchange and digital signature. The cryptographic mechanisms require to use cryptographic keys established between two communication entities. In this paper, we propose a secure electronic payment system which is designed to have some functions for strong authentication, encryption, key agreement, etc. Especially, we adopt domestic developed cryptographic algorithms such as EC-KCDSA and SEED for digital signature and block cipher, respectively. We can show those mechanisms are appropriate for the secure electronic payment system for ITS services under the DSRC wireless environment in aspects of constrained computational resource use and processing speed.

  • PDF

A Study on the IUU Governance System of Regional Fishery Management Organization and Major State (국제 지역 수산 관리 기구와 주요 국가의 IUU 통제제도 연구)

  • Park, Min-Gyu
    • The Journal of Fisheries Business Administration
    • /
    • v.41 no.3
    • /
    • pp.103-127
    • /
    • 2010
  • The FAO reports that IUU fishing activities have widespread economic, social, and management consequences, including depriving legitimate fishers of harvest opportunities. It affects all fisheries from small scale to industrial. It also affects the ability of governments to support sustainable livelihoods for fishers and, more broadly, to achieve food security. The complexity of IUU requires various measures to combat IUU fishing such as adoption of IUU vessel lists; stronger port State controls; improved monitoring, control and surveillance (MCS); implementation of market-related measures to help ensure compliance; and capacity-building assistance. Trade and market measures reduce opportunities for IUU fishing activities by precluding or impeding access to markets for IUU product in a manner consistent with international law. ICCAT, CCAMLR, and IATTC, have put in place trade tracking programs or catch documentation schemes, and WCPFC is considering such a program. Vessel lists assist enforcement authorities in determining which vessels are or are not authorized to be fishing or conducting fishing support activities in specified areas. A number of RFMOs maintain records of IUU vessels: CCAMLR, IATTC, ICCAT, NAFO, NASCO, NPAFC, WCPFC. Section 608 of the US MSRA calling on the Secretary of Commerce, in consultation with the Secretary of State, and in cooperation with relevant regional fishery management councils and any relevant advisory committees, to take actions to improve the effectiveness of international fishery management organizations in conserving and managing stocks under their jurisdiction. EU IUU Regulation entered into force on 1 January 2010, was intended to regulate the highly complex multi-channel fisheries supply system of the European Community (EC) in an effort to improve global fisheries sustainability.

A Study on the Exchange and Evidential Method & Evidential weight of Electronc Document (전자문서의 대체성과 증거방법 및 증거능력에 관한 고찰)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.2 no.1
    • /
    • pp.53-64
    • /
    • 1999
  • Due to the trend that the wave of the information society is rapidly expanding on a global basis, the level of informatization is emerging as one of the important elements for national competitiveness. To take a competitive position for individuals, corporations, or states beyond their survival in the rapidly changing information environment, they should be able to manage and transmit various information with swiftness and security Today, the exchange of electronic documents or data, through PC which were unknown in the past is indispensable to the expansion of electronic commerce(EC) and eventually contributes to promoting the information society. The improvement of productivity and efficiency through the exchange of electronic documents or data has been recognized as a means to enhance the competitiveness of corporations and states. The United States, the European nations, Japan, and the newly industrialized countries such as Singapore and Taiwan, have been contriving the utilization of electronic documents and the expansion of EC on the strategical dimension of each nation. To activate the use of electronic documents, thus, the purpose of this study is to examine the current environment concerning the use of electronic documents, to investigate the related legal barriers, and to propose some suggestions for reforming the legal system.

  • PDF

Data Block based User Authentication for Outsourced Data (아웃소싱 데이터 보호를 위한 데이터 블록 기반의 상호 인증 프로토콜)

  • Hahn, Changhee;Kown, Hyunsoo;Kim, Daeyeong;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1175-1184
    • /
    • 2015
  • Recently, there has been an explosive increase in the volume of multimedia data that is available as a result of the development of multimedia technologies. More and more data is becoming available on a variety of web sites, and it has become increasingly cost prohibitive to have a single data server store and process multimedia files locally. Therefore, many service providers have been likely to outsource data to cloud storage to reduce costs. Such behavior raises one serious concern: how can data users be authenticated in a secure and efficient way? The most widely used password-based authentication methods suffer from numerous disadvantages in terms of security. Multi-factor authentication protocols based on a variety of communication channels, such as SMS, biometric, or hardware tokens, may improve security but inevitably reduce usability. To this end, we present a data block-based authentication scheme that is secure and guarantees usability in such a manner where users do nothing more than enter a password. In addition, the proposed scheme can be effectively used to revoke user rights. To the best of our knowledge, our scheme is the first data block-based authentication scheme for outsourced data that is proven to be secure without degradation in usability. An experiment was conducted using the Amazon EC2 cloud service, and the results show that the proposed scheme guarantees a nearly constant time for user authentication.

Research on regional spatial information analysis platform about NTIS raw data (국가과학기술지식 원시데이터에 관한 지역 공간정보 분석 플랫폼 연구)

  • Lim, Jung-Sun;Kim, Sanggook;Bae, Seoung Hun;Kim, Kwang-Hoon;Won, Dong-Kyu
    • Journal of Cadastre & Land InformatiX
    • /
    • v.50 no.2
    • /
    • pp.21-35
    • /
    • 2020
  • Due to the coronavirus pandemic and diplomatic disputes, governments are actively developing a policy to revitalize·reshore manufacturing and to diversify international cooperations. In order to develop such a policy, it is very important to compare and analyze domestic·international geospatial information. Over the decade, the US·EC governments have conducted a series of national researches to build data-based tools that can monitor·analyze regional geospatial information driven by government R&D investments. In the case of the EC system, it can compare geospatial information in domestic and international(including Korea) regions. Compared to US·EC cases, Korean examples of national researches with available data analplatform need future improvements. Current study is investigating an automated analysis methodologies using "National Institute of Science and Technology Information (NTIS)" DB, which was national security data until recently. Research on data-mining regional geospatial information can contribute to support policy fields that need to discover new issues in response to unexpected social problems such as recently faced corona and trade disputes.

Breaking the Silence: Revealing the limits of Preschool Teachers' Cultural and Linguistic Competence (CLC) in Saudi Arabia

  • Allehyani, Sabha Hakim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.222-234
    • /
    • 2022
  • Background: Within the framework of the new Saudi Vision 2030, the education system is keen on developing Early Childhood (EC) curricula to meet the needs of children from diverse cultural and linguistic backgrounds, in addition to preparing teachers to be the main driving forces in this field. To achieve these strategic goals, the professional development of teachers has taken the lead in terms of their continuous professional achievements. Purpose: The recent study tended to explore the promotion of Cultural and Linguistic Competence (CLC) of teachers in preschool institutions in different sectors in the Kingdom of Saudi Arabia (KSA) include public, private and international. Method: In the current study, (n=300) of preschool female teachers, who had experience teaching children from diverse language and cultural backgrounds, participated voluntarily by filling out the exploratory questionnaire. It was designed on a five-point Likert scale. The credibility of the scale and the validity of the questionnaire were ascertained, and the content for which it was designed verified in terms of the purposes of the current investigation. Results: The results revealed that preschool female teachers in the private preschool settings have a higher level of CLC compared to those who were teaching in public and international preschools in KSA. In the private sector, preschool female teachers showed create abilities to provide culturally responsive environments for diverse students, applying various communication styles, and showing proper attitudes and values toward diversity. Implication: The current study provided key implications for policy makers regarding the promotion of CLC for all teachers, particularly preschool in government settings in KSA. It contributed to revealing the cultural awareness of preschool teachers' values and attitudes toward diversity.

Application of peak based-Bayesian statistical method for isotope identification and categorization of depleted, natural and low enriched uranium measured by LaBr3:Ce scintillation detector

  • Haluk Yucel;Selin Saatci Tuzuner;Charles Massey
    • Nuclear Engineering and Technology
    • /
    • v.55 no.10
    • /
    • pp.3913-3923
    • /
    • 2023
  • Todays, medium energy resolution detectors are preferably used in radioisotope identification devices(RID) in nuclear and radioactive material categorization. However, there is still a need to develop or enhance « automated identifiers » for the useful RID algorithms. To decide whether any material is SNM or NORM, a key parameter is the better energy resolution of the detector. Although masking, shielding and gain shift/stabilization and other affecting parameters on site are also important for successful operations, the suitability of the RID algorithm is also a critical point to enhance the identification reliability while extracting the features from the spectral analysis. In this study, a RID algorithm based on Bayesian statistical method has been modified for medium energy resolution detectors and applied to the uranium gamma-ray spectra taken by a LaBr3:Ce detector. The present Bayesian RID algorithm covers up to 2000 keV energy range. It uses the peak centroids, the peak areas from the measured gamma-ray spectra. The extraction features are derived from the peak-based Bayesian classifiers to estimate a posterior probability for each isotope in the ANSI library. The program operations were tested under a MATLAB platform. The present peak based Bayesian RID algorithm was validated by using single isotopes(241Am, 57Co, 137Cs, 54Mn, 60Co), and then applied to five standard nuclear materials(0.32-4.51% at.235U), as well as natural U- and Th-ores. The ID performance of the RID algorithm was quantified in terms of F-score for each isotope. The posterior probability is calculated to be 54.5-74.4% for 238U and 4.7-10.5% for 235U in EC-NRM171 uranium materials. For the case of the more complex gamma-ray spectra from CRMs, the total scoring (ST) method was preferred for its ID performance evaluation. It was shown that the present peak based Bayesian RID algorithm can be applied to identify 235U and 238U isotopes in LEU or natural U-Th samples if a medium energy resolution detector is was in the measurements.