• 제목/요약/키워드: Electronic Security Systems

검색결과 452건 처리시간 0.024초

다중등급 보안 정책을 적용한 전자결재 모듈의 개발 (Building an Electronic Approval Module Using Multi-Level Security)

  • 김진성;안병혁
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제11권1호
    • /
    • pp.175-198
    • /
    • 2002
  • This paper is to develop a security module for electronic approval systems. Electronic documents are created, transmitted and saved in the company's intranet computer network. Transmitting electronic documents, however, brings us a security problem. Communications among various computer systems are exposed to many security threats. Those threats are eavesdropping, repudiation, replay back etc. The main purpose of this paper is to develop a module which provides the security of electronic documents while they are passed from one place to another This paper applies Multi-Level security to the electronic approval system that guarantees security of electronic documents from many threats. Multi-Level security controls the access to the documents by granting security level to subject users and object electronic documents. To prevent possible replay back attacks, this paper also uses one time password to the system. The security module is composed of client program and server one. The module was developed using Microsoft Visual Basic 6.0 and Microsoft SQL Server 7.0. The code uses Richard Bondi's WCCO(Wiley CryptoAPI COM Objects) library functions which enables Visual Basic to access Microsoft CryptoAPI.

  • PDF

ITS 통합 공항 보안시스템에 관한 고찰 (A Study on the ITS integrated airport security system)

  • 김천석
    • 한국전자통신학회논문지
    • /
    • 제8권2호
    • /
    • pp.339-344
    • /
    • 2013
  • 공항 경비보안은 공항의 시설 및 자산을 도난, 범죄 등으로부터 예방하기 위하여 살피고 지키는 활동이다. 이러한 활동을 효율적으로 할 수 있도록 지원하는 시스템을 보안시스템이라 할 수 있다. 보안시스템은 보안센터시스템, CCTV시스템, 출입통제 시스템, 침입감지시스템, 경비통신시스템, 경고방송시스템, 보안네트워크시스템, 외곽침입감지시스템, 검색시스템 및 정보보안시스템이 있으며 이에 대하여 살펴보고자 한다.

기계경비시스템 운용현황 고찰과 운용품질개선 방안 (The Operating Status of Security Alarm Systems and the Polices for Inproving the Operational Quality)

  • 신상엽
    • 시큐리티연구
    • /
    • 제8호
    • /
    • pp.197-218
    • /
    • 2004
  • This study has been conducted to provide data that contribute to increasing efficiency of 'Private Security', which is cooperated by customer, security companies and the police which carried out 'Public Law Enforcement' and controls security companies. To reach this purpose, we investigated the status of the 'Security Alarm Systems' operated by security service companied in Korea, analyzed arising problems, considered the polices for improving the operational quality. 'Electronic Security Systems' will increase working efficiency in performing 'Private Security'. There can be no two opinions on this matter. Therefore, it can be supposed that the improvement of operational quality of 'Electronic Security System' is an important factor to accomplish security services. 'Security Alarm System' is one of the 'Electronic Security System'. The critical problems in operating 'Security Alarm system' are unnecessary response by false alarm and nuisance alarm. To reduce the problems, it is suggested that security specialist officially licensed should improve security planning, installation and maintenance, and the 'Alarm Verification System' should be introduced with appropriate facilities.

  • PDF

우리나라 전자지불시스템 현황 분석을 통한 안전한 전자지불시스템의 연구 (Development of a Secure Electronic Payment System based on the Analysis of Current Korean Electronic Payment Systems)

  • 송용욱;이재규;황재훈
    • Journal of Information Technology Applications and Management
    • /
    • 제10권3호
    • /
    • pp.93-108
    • /
    • 2003
  • As Electronic Commerce is popularized, crimes related to Electronic Commerce are also increasing, Electronic shopping malls and payment gateways focus their attention on network security of payment information or the sizes of encryption keys, In real world, however, the payment-related crimes in electronic shopping malls are not based on the security hole of encryption mechanism of the payment systems, but on the customers carelessness or the insecurity of server systems of merchants or financial institutes. So, this research analyzes the structure of current electronic payment systems, investigates the payment-related crimes, addresses the structural problems of the Korean electronic payment systems, and suggests an alternative general architecture for secure payment systems by incorporating the concept of separation of order information and payment information.

  • PDF

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6057-6078
    • /
    • 2018
  • Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

SET기반 전자상거래의 보안위협요소 분석 및 대응 방안에 관한 연구 (A Study on the Security Vulnerabilities and Defense Mechanism for SET-based Electronic Commerce)

  • 김상균;강성호
    • 한국전자거래학회지
    • /
    • 제4권2호
    • /
    • pp.59-79
    • /
    • 1999
  • In order to construct a successful electronic commerce system, three main essential factors must be satisfied to obtain the best effective outcomes. The three main essential factors are as follows : economic factor, effectiveness factor and convenient factor. In order to understand the role of these three factors, one must have some insight knowledge about security to assist him to implement these three factors in his construction of an electronic commerce system. This paper analyses a implementation mechanism of security systems based on the SET 1.0 standard for electronic commerce systems, thus providing an effective plan for the construction of a security system in the SET-based electronic commerce field. This paper helps to analyse the elements of security vulnerabilities in the SET 1.0 standard implementation and also helps to understand the SET 1.0 protocol.

  • PDF

기계경비시스템 오경보의 효율적 관리를 위한 복합형 방범센서에 관한 연구 (For the efficient management of electronic security system false alams Study on hybrid Crime sensor)

  • 김민수;이동휘
    • 융합보안논문지
    • /
    • 제12권5호
    • /
    • pp.71-77
    • /
    • 2012
  • 경비의 형태는 과거 인력 경비에서 현대에 이르러 기계경비로 점차 전환되고 있다. 이는 기계경비가 인력경비에 비해 효율적이기 때문이다. 하지만 기계경비 시스템의 운용에 있어 오경보로 인해 기계경비의 높은 기대효과에도 불구하고 발전을 저해하는 요소로 인해 기계경비의 성장을 더디게 하고 있다. 이에 본 논문은 연구는 IPA(Importance Performance Analysis)기법을 이용하여 기계경비 시스템 운용에 있어 결함성 측면의 제거가 기계경비의 발전에 있어 그 중요도가 얼마나 높은지를 살펴보고, 또한 기술적 측면에서 기계경비 시스템의 오동작을 최소화할 수 있는 복합형 방범 센서를 제시하고자 한다.

전자상거래에서의 인증 알고리즘에 관한 연구 (A Study of Authentication Algorithm in Electronic Commerce)

  • 김영선
    • 경영과정보연구
    • /
    • 제6권
    • /
    • pp.1-19
    • /
    • 2001
  • Partial transactions which use computer networks are formed in the cyberspace due to rapid progress of communication and computer technology. Electronic business transactions have security problems according to the special quality of opening networks, while it can be approached easily by anyone without being tied to time and places through Internets. To revitalize the electronic business transactions, security technology which can establish its security and trust is the prior task and both safe information communication and better information security service offer are essential factors. The method to exchange information through Internets must be made after confirming one another's exact connection in the mutual identity certification to prevent a lot of threat which can occur in the use of password techniques. To satisfy these electronic business transactions, we intend to increase understanding of authentication algorithm provided with authentication function of messages and users as well to plan safety and trust of business information and contents in the electronic business transactions.

  • PDF

Physical Layer Security for Two-Way Relay NOMA Systems with Energy Harvesting

  • Li, Hui;Chen, Yaping;Zou, Borong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.2094-2114
    • /
    • 2022
  • Due to the wide application of fifth generation communication, wireless sensor networks have become an indispensable part in our daily life. In this paper, we analyze physical layer security for two-way relay with energy harvesting (EH), where power splitter is considered at relay. And two kinds of combined methods, i.e., selection combining (SC) and maximum ratio combining (MRC) schemes, are employed at eavesdropper. What's more, the closed-form expressions for security performance are derived. For comparison purposes, this security behaviors for orthogonal multiple access (OMA) networks are also investigated. To gain deeper insights, the end-to-end throughput and approximate derivations of secrecy outage probability (SOP) under the high signal-to-noise ratio (SNR) regime are studied. Practical Monte-Carlo simulative results verify the numerical analysis and indicate that: i) The secure performance of SC scheme is superior to MRC scheme because of being applied on eavesdropper; ii) The secure behaviors can be affected by various parameters like power allocation coefficients, transmission rate, etc; iii) In the low and medium SNR region, the security and channel capacity are higher for cooperative non-orthogonal multiple access (NOMA) systems in contrast with OMA systems; iv) The systematic throughput can be improved by changing the energy conversion efficiency and power splitting factor. The purpose of this study is to provide theoretical direction and design of secure communication.

국내 보안관제 체계의 현황 및 분석 (Current Status and Analysis of Domestic Security Monitoring Systems)

  • 박시장;박종훈
    • 한국전자통신학회논문지
    • /
    • 제9권2호
    • /
    • pp.261-266
    • /
    • 2014
  • 국내 보안관제센터들의 현황을 검토하였으며, 보안관제 체계의 특징인 패턴기반 보안관제체계와 중앙집중형 보안관제 체계에 대한 분석과 장단점을 분석하였다. 또한 국내 보안관제 체계 발전방안에서는 기존 패턴 기반의 중앙집중형 관제 체계가 가지고 있는 문제점을 개선하기 위해 이상행위 탐지기반의 허니넷과 다크넷을 분석하여 이를 적용한 발전 방안을 기술하였다.