• Title/Summary/Keyword: Forgery Analysis

Search Result 70, Processing Time 0.04 seconds

A Study for International Standardization of China Arbitration System (중국중재제도의 국제표준화에 대한 연구)

  • Kim, Suk-Chul
    • Journal of Arbitration Studies
    • /
    • v.18 no.3
    • /
    • pp.117-138
    • /
    • 2008
  • This study lies on building the International Standardization of China Arbitration System for improving a relationship of mutual trust and the safety trade between China and other worldwide countries, especially, South Korea as their one of the biggest trading partners through the comparative analysis of China and UNCITRAL Arbitration Law. In this analysis, the differences from China and UNCITRAL in arbitration law are like belows ; lack of arbitrator's international mind, the limitation of private property right, prohibition of Ad. hoc arbitration, arbitrator's biased nationalism, localism, and their short specialties. a deficiency of the objectiveness for arbitrator's election, a judgement rejection of claimants by using nonattendance and walkout, impossibility of prior and temporary property custody for execution of arbitration award. etc. For the improvement of the International Standardization of China Arbitration, this paper propose as follows: 1) Extension of private property right, reorganization of tax system, realization of open competition, exclusion of 'Sinocentrism', globalization of arbitration system 2) The abolition of old fashioned bureaucracy with approval for ad.hoc arbitration 3) An education for arbitrator's internationalization, specialty, and to promote legal knowledge 4) A settlement of the third country arbitrators' selection for reflecting interested party's decision by the court in a selection system of arbitration committee. 5) Institutionalization of arbitration judgment that prevent for claimant's avoidance by using a withdrawal and an intentional absent 6) A permission of the right of claimant's court custody directly before the begging of arbitration request for the prevention for destruction of evidence and property concealment 7) Grant of the arbitration tribunal's interim measures of protection for private property preservation to the third party, proof security, prevention from the loss that selling the corruptible goods 8) Improvement of arbitration's efficiency from the exclusion of the obstacles that are forgery, concealed evidence, and arbitrator's bribe taking Lastly, I hope that this study will serve to promote friendly economic relationship between China and South Korea and strive for international equilibrium through the achievement of China Arbitration's International Standardization. I will finish this paper with a firm belief that this will lead to more advanced studies.

  • PDF

A Study On Security Threat Analysis and Government Solution for Civil Service Online (대민서비스 온라인 보안위협 분석 및 대응방안 연구)

  • Choi, Do-Hyun;Jun, Mun-Seog;Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2014
  • As the number of public institution web sites and civil services based on electronic government has increased from the past until now, there is an increasing demand for security of the overall electronic civil services such as possibility for forgery and falsification of electronic documents. Existing studies proposed security threats and response methods on an electronic government service (G4C) from the perspective of service provider. In this study, the scope of analysis was expanded to analyze security technology used for each service type on 289 web sites providing civil services and to present response methods on security threats. The aim of this paper is to discuss practical responses to civil services and core problems of civil services in electronic government that need to be resolved.

An Analysis on the Media Reports Frames regarding Special Naturalization of Foreign Athletes (외국인 운동선수 특별귀화 관련 언론보도 프레임 분석)

  • Lee, Jangwon;Lim, Seungyup
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.295-306
    • /
    • 2017
  • The purpose of the study was to explore media frames and its contents regarding foreign athletes' naturalization to Korea. For data, 101 media reports from the year of 2014 to 2016 were collected and analyzed. As results, in the simple-fact-report frame, facts regarding foreign athletes' naturalization process and results of the matches were reported. In the economic frame, legitimacy of the naturalization was supported by emphasizing its benefits. In the humane-interest frame, personal history and difficulty as foreign athletes were described. In the conflict frame, negative effects by the foreign athletes' naturalization were mainly reported.. In the morality/responsibility attribution frame, Chelsey Lee's document forgery case was mostly highlighted that later issued naturalized athletes' morality and following legal actions.

Implementation and Analysis Performance of CCM-UW based AES, ARIA Blockcipher for Underwater Environment (수중무선통신 환경에 적합한 AES, ARIA 블록암호 기반 CCM-UW 구현 및 성능 분석)

  • Lee, Jae-Hoon;Park, Minha;Yun, Nam-Yeol;Yi, Okyeon;Park, Soo-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.115-118
    • /
    • 2014
  • Underwater Wireless Communication System can be useful for research of quality of water, ocean resources exploration, analysis ocean environment and so on. However, there exist security threats including data loss, data forgery, and another variety of security threats, because of characteristics of water, various geographical factors, intended attack, etc. To solve these problem, in this paper, we propose a CCM-UW mode of operation modified form of CCM mode of operation, providing data confidentiality, integrity, origin authentication and anti-attack prevent, for the Underwater Wireless Communication System. By implementing CCM-UW in MACA protocol(Underwater Wireless Communication MAC Protocol) and measuring speed of communication, we confirm the applicability of the security and analyze the communication environment impact.

  • PDF

A Study on the Application Method of Munition's Quality Information based on Big Data (빅데이터 기반 군수품 품질정보 활용방안에 대한 연구)

  • Jeon, Sooyune;Lee, Donghun;Bae, Manjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.6
    • /
    • pp.315-325
    • /
    • 2016
  • Due to the expansion of data and technical progress in the military industry, it is important to extract meaningful information for assuring quality and making policies. The analysis of trends and decision making based on big data is helpful for increasing productivity in business and finding new business opportunities. We propose an application to collect reliable quality information for munitions and build a big data platform for using the accumulated information and numerical data. We verified the proposed platform using the Test Report Information Service (TRIS) system and suggest a method that utilizes unstructured and semi-structured data accumulated by TRIS. Thus, we expect that the proposed platform will help in building infrastructure for military data, making efficient strategies, and analyzing trends for assuring munitions quality.

Accident Information Based Reliability Estimation Model for Car Insurance Smart Contract (자동차보험용 스마트 컨트랙트를 위한 사고정보 기반 신뢰도 산정 모델)

  • Lee, Soojin;Kim, Aeyoung;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.4
    • /
    • pp.89-100
    • /
    • 2020
  • In order to reduce the time and cost used in insurance processing, studies have been actively carried out to apply blockchain smart contract technology to car insurance. However, by using traffic data that is insufficient to prove accidents, existing studies are being exposed to the risk of insurance fraud, such as forgery and overstated damage by malicious insurers. To solve this problem, we propose an accident data-based reliability estimation model by using both various types of data through sensors, RSUs, and IoT devices embedded in automobiles and smart contracts. In particular, the regression model was applied in consideration of the weight estimation according to the type of traffic accident data and the reliability estimation model trained according to various accident situations. The proposed model is expected to effectively reduce fraud and insurance litigation while providing transparency in the insurance process and streamlining it is well.

Detecting CSRF through Analysis of Web Site Structure and Web Usage Patterns (웹사이트 구조와 사용패턴 분석을 통한 CSRF 공격 탐지)

  • Choi, Jae-Yeong;Lee, Hyuk-Jun;Min, Byung-Jun
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.9-15
    • /
    • 2011
  • It is difficult to identify attack requests from normal ones when those attacks are based on CSRF which enables an attacker transmit fabricated requests of a trusted user to the website. For the protection against the CSRF, there have been a lot of research efforts including secret token, custom header, proxy, policy model, CAPTCHA, and user reauthentication. There remains, however, incapacitating means and CAPTCHA and user reauthentication incur user inconvenience. In this paper, we propose a method to detect CSRF attacks by analyzing the structure of websites and the usage patterns. Potential victim candidates are selected and website usage patterns according to the structure and usage logs are analyzed. CSRF attacks can be detected by identifying normal usage patterns. Also, the proposed method does not damage users' convenience not like CAPTCHA by requiring user intervention only in case of detecting abnormal requests.

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

e-Forensic Tool Research for Obtaining Legal Evidence Ability of Digital Evidence by Intelligence Inspection (디지털 증거물의 법적능력 확보를 위한 정보감사용 e-Forensic 툴 연구)

  • Kim, Seungyong;Kim, Gyeongyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.2
    • /
    • pp.267-275
    • /
    • 2017
  • This research is about the development of e-forensic tool that extract & analyze different forms of digital evidence that individuals come across in a disaster scene. The tool utilizes digital forensic techniques which makes the tool efficient in any disaster analysis situation. In order for the forensic evidence to be selected as legal evidence, the evidence needs to be proven that it is in its original state with no forgery involved. This is where the e-forensic tool comes in, as its ability to collect digital evidence during investigation has proven; that the tool can keep the evidence in its original state and increase the integrity by generating hash TAG and adding the forensic evidence to a password encoded file.

Security Analysis and Improvements of a Biometrics-based User Authentication Scheme Using Smart Cards (스마트 카드를 이용한 생체인식 기반 사용자 인증 스킴의 안전성 분석 및 개선)

  • An, Young-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.159-166
    • /
    • 2012
  • Many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2010, Chang et al. proposed an improved biometrics-based user authentication scheme without concurrency system which can withstand forgery attack, off-line password guessing attack, replay attack, etc. In this paper, we analyze the security weaknesses of Chang et al.'s scheme and we have shown that Chang et al.'s scheme is still insecure against man-in-the-middle attack, off-line biometrics guessing attack, and does not provide mutual authentication between the user and the server. And we proposed the improved scheme to overcome these security weaknesses, even if the secret information stored in the smart card is revealed. As a result, the proposed scheme is secure for the user authentication attack, the server masquerading attack, the man-in-the-middle attack, and the off-line biometrics guessing attack, does provide the mutual authentication between the user and the remote server. And, in terms of computational complexities, the proposed scheme is more effective than Chang et al.'s scheme.