• Title/Summary/Keyword: IT security

Search Result 11,473, Processing Time 0.045 seconds

A Crypto-processor Supporting Multiple Block Cipher Algorithms (다중 블록 암호 알고리듬을 지원하는 암호 프로세서)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Bae, Gi-Chur;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2093-2099
    • /
    • 2016
  • This paper describes a design of crypto-processor that supports multiple block cipher algorithms of PRESENT, ARIA, and AES. The crypto-processor integrates three cores that are PRmo (PRESENT with mode of operation), AR_AS (ARIA_AES), and AES-16b. The PRmo core implementing 64-bit block cipher PRESENT supports key length 80-bit and 128-bit, and four modes of operation including ECB, CBC, OFB, and CTR. The AR_AS core supporting key length 128-bit and 256-bit integrates two 128-bit block ciphers ARIA and AES into a single data-path by utilizing resource sharing technique. The AES-16b core supporting key length 128-bit implements AES with a reduced data-path of 16-bit for minimizing hardware. Each crypto-core contains its own on-the-fly key scheduler, and consecutive blocks of plaintext/ciphertext can be processed without reloading key. The crypto-processor was verified by FPGA implementation. The crypto-processor implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,500 gate equivalents (GEs), and it can operate with 55 MHz clock frequency.

Effects of Short-Term Music Therapy in Fire Fighters with Post-Traumatic Stress Risk (외상 후 스트레스 위기 소방관에 대한 단기간 음악치료의 효과)

  • Shim, Gyu-Sik;Kim, Nam-Song;Bang, Sung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.6
    • /
    • pp.4040-4047
    • /
    • 2015
  • The purpose of this study was to analyze a change in Post-traumatic Stress Disorder (PTSD) level and the continuity of the effects in music therapy by applying short-term music therapy program in fire fighters with Post-traumatic Stress (PTS). Forty two fire fighters in 3 districts were randomly assigned to experimental group (21 subjects) and control group (21 subjects). Music therapy was applied in totally 10 sessions by two sessions (120 minutes) a day for 5 days. PTS level was measured immediately after the end of program, after 4 weeks, and after 12 weeks. As a result, PTS level has significantly decreased into $8.90{\pm}4.55$ from $26.52{\pm}2.32$ right after the music therapy program(p<0.05). And the effect was shown to be continued significantly up to after 4 weeks($11.95{\pm}4.57$) and after 12 weeks($13.76{\pm}5.62$)(p<0.05). As a result of research, it is considered that the music therapy is effective approach for reduction in PTS as for fire fighters who belong to the group with high risk of PTSD. Accordingly, the application of regular program for managing fire fighters' mental health is understood to likely to contribute to enhancing the field service competence.

Hippocratic XML Databases: A Model and Access Control Mechanism (히포크라테스 XML 데이터베이스: 모델 및 액세스 통제 방법)

  • Lee Jae-Gil;Han Wook-Shin;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.684-698
    • /
    • 2004
  • The Hippocratic database model recently proposed by Agrawal et al. incorporates privacy protection capabilities into relational databases. Since the Hippocratic database is based on the relational database, it needs extensions to be adapted for XML databases. In this paper, we propose the Hippocratic XML database model, an extension of the Hippocratic database model for XML databases and present an efficient access control mechanism under this model. In contrast to relational data, XML data have tree-like hierarchies. Thus, in order to manage these hierarchies of XML data, we extend and formally define such concepts presented in the Hippocratic database model as privacy preferences, privacy policies, privacy authorizations, and usage purposes of data records. Next, we present a new mechanism, which we call the authorization index, that is used in the access control mechanism. This authorization index, which is Implemented using a multi-dimensional index, allows us to efficiently search authorizations implied by the authorization granted on the nearest ancestor using the nearest neighbor search technique. Using synthetic and real data, we have performed extensive experiments comparing query processing time with those of existing access control mechanisms. The results show that the proposed access control mechanism improves the wall clock time by up to 13.6 times over the top-down access control strategy and by up to 20.3 times over the bottom-up access control strategy The major contributions of our paper are 1) extending the Hippocratic database model into the Hippocratic XML database model and 2) proposing an efficient across control mechanism that uses the authorization index and nearest neighbor search technique under this model.

Design of Communication Board for Communication Network of Nuclear Safety Class Control Equipment (원자력 안전등급 제어기기의 통신망을 위한 통신보드 설계)

  • Lee, Dongil;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.185-191
    • /
    • 2015
  • This paper suggest the safety class communication board in order to design the safety network of the nuclear safety class controller. The reactor protection system use the digitized networks because from analog system to digital system. The communication board shall be provided to pass the required performance and test of the safety class in the digital network used in the nuclear safety class. Communication protocol is composed of physical layer(PHY), data link layer(MAC: Medium Access Control), the application layer in the OSI 7 layer only. The data link layer data package for the cyber security has changed. CRC32 were used for data quality and the using one way communication, not requests and not responses for receiving data, does not affect the nuclear safety system. It has been designed in accordance with requirements, design, verification and procedure for the approving the nuclear safety class. For hardware verification such as electromagnetic test, aging test, inspection, burn-in test, seismic test and environmental test in was performed. FPGA firmware to verify compliance with the life-cycle of IEEE 1074 was performed by the component testing and integration testing.

A Study on Analysis of Damaged Facilities in Rural Area by Storm and Flood Hazard (풍수해에 의한 농촌지역 피해시설 현황 분석)

  • Lim, Chang-Su;Oh, Yun-Kyung;Lee, Seung Chul;Kim, Eun-Ja;Choi, Jin-Ah
    • Journal of Korean Society of Rural Planning
    • /
    • v.22 no.2
    • /
    • pp.19-29
    • /
    • 2016
  • Disasters that occur most frequently in rural areas are drought, flood, damages from wind and cold weather. Among these, damages from storm and flood and drought are the main disasters and recently, these are occurring on a large scale due to unusual weather conditions. Under such circumstances, projects and researches on disasters in rural areas are under way but they are mostly targeting one area or making approaches focusing on repair facilities, maintenance project of facilities in small streams, and disaster management, so there have not been enough studies on the current status of overall damaged facilities in the rural areas. Against this backdrop, through the analysis of the current status of damaged facilities due to storm and flood in rural areas, this study aims to provide base data for policies needed for disaster recovery planning and maintenance work of rural areas. For the analysis of damaged facilities due to storm and flood in rural areas, using the annual report on disasters issued by Ministry of Public Safety and Security and based on the occurrence rate of estimated damage in each city and district for the past 10 years(2004~2013), 8 areas with the highest number of occurrence and cost of damage were found from each province and target areas were selected. Then, regarding the selected target areas, the General Plan for Reducing Damages from Storm and Flood, which is the report on top-level plan for preventing disasters, was secured and the current status of damaged facilities were analyzed. After organizing the analysis of current status, the tendency of damaged facilities due to storm and flood in rural areas, the items of damaged facilities depending on the types of storm and flood damages, and risk factors were suggested. Based on this result, in order to generalize the results of follow-up researches, it is thought that disaster recovery planning and establishing the system of remodeling items necessary for maintenance work would be possible by analyzing damage investigation items recorded in additional researches on rural areas, researches on natural disasters, and recovery plan instructions and by conducting on-site investigation on the damaged villages from storm and flood in rural areas.

A Study on Developing the Model of Reasonable Cost Calculation for Privacy Impact Assessment of Personal Information Processing System in Public Sector (공공기관 개인정보 처리시스템의 개인정보 영향평가를 수행하기 위한 합리적인 대가 산정 모델 개발에 관한 연구)

  • Shin, Young-Jin
    • Informatization Policy
    • /
    • v.22 no.1
    • /
    • pp.47-72
    • /
    • 2015
  • According to the progress of national informatization throughout the world, infringement and threaten of privacy are happening in a variety of fields, so government is providing information security policy. In particular, South Korea has enhanced personal impact assessment based on the law of personal information protection law(2011). But it is not enough to effect the necessary cost calculation standards and changeable factors to effect PIA. That is, the budgets for PIA was calculated lower than the basic budget suggested by Ministry of Government Administration Home affairs(2011). Therefore, this study reviewed the cost calculation basis based on the literature review, cost basis of similar systems, and reports of PIA and obtained to the standard with Delphi analysis. As a result, the standards of PIA is consisted to the primary labors and is utilized to how the weights by division of target system, construction and operating costs of target system, type of target systems, etc. Thus, the results of this study tried to contribute to ensure the reliability of PIA as well as the transparency of the budget for privacy in public sector.

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

Consecutive Difference Expansion Based Reversible DNA Watermarking (연속적 차분 확장 기반 가역 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.51-62
    • /
    • 2015
  • Of recent interests on high capacity DNA storage, DNA watermarking for DNA copyright protection, and DNA steganography for DNA secret communication are augmented, the reversible DNA watermarking is much needed both to embed the watermark without changing the functionality of organism and to perfectly recover the host DNA sequence. In this paper, we address two ways of DE based reversible DNA watermarking using noncoding DNA sequence. The reversible DNA watermarking should consider the string structure of a DNA sequence, the organism functionality, the perfect recovery, and the high embedding capacity. We convert the string sequence of four characters in noncoding region to the decimal coded values and embed the watermark bit into coded values by two ways; DE based multiple bits embedding (DE-MBE) using pairs of neighbor coded values and consecutive DE-MBE (C-DE-MBE). Two ways process the comparison searching to prevent the false start codon that produces false coding region. Experimental results verified that our ways have more high embedding capacity than conventional methods and produce no false start codon and recover perfectly the host sequence without the reference sequence. Especially C-DE-MBE can embed more high two times than DE-MBE.

Realization of a Web-based Distribution System for the Monitoring of Business Press Releases and News Gathering Robots (기업 보도자료 모니터링을 위한 웹기반 배포시스템 및 기사 수집로봇 구현)

  • Shin, Myeong-Sook;Oh, Jung-Jin;Lee, Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.103-111
    • /
    • 2013
  • At present, a variety of Korean news stories have been about important online content and its importance in the press is becoming higher. Diverse news from businesses are provided to the public as press releases through newspapers or broadcasting media. For such news to become information for a press release, enterprises visit reporters, use e-mails, faxes, or couriers to deliver the information. However, such methods have problems with time, human resources, expenses, and file damage. Also, with these methods it is bothersome for enterprises to check what has been released and for the press to make frequent contact with enterprises for interviews and for content to be released. Therefore, this study aimed to realize a distribution system which enterprises can use to distribute data to be released to the press and to easily check what is to be released while the press can ask for interview requests in a simple way, as well as a news gathering robot that can collects news on the enterprises involved from articles online or in portal sites.

A Convergence Study of Cultural Competence Dimensions of Nurses and Nursing Students (간호사와 간호대학생의 문화적 역량 구성요소에 관한 융합적 연구)

  • Han, Kyung-A;Moon, Hee;Sun, Chun-Ja
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.9
    • /
    • pp.239-250
    • /
    • 2021
  • This study has been conducted to identify the theoretical understanding of cultural competence by systematically reviewing national and international quantitative studies on 'nurses' and 'nursing students' cultural competence dimensions. A literature search was conducted over approximately three months from June to August 2020, targeting academic journals and dissertations published from January 1, 2010, to December 31, 2019. Literature extraction was conducted according to the PRISMA guidelines, and 67 papers from a total of 1,175 were selected for the systematic literature review. As a result, the most commonly measured component was cultural perception, other dimensions included cultural knowledge, cultural skills, cultural sensitivity, cultural encounter, cultural attitude, cultural behavior, cultural longings and cultural receptivity, cultural experience, cultural security, cultural ethics, cultural beliefs, cultural practice, motivation and curiosity, cultural emotions and empathy. Therefore, in order to improve the cultural competency of nurses and nursing students, it is necessary to seek consensus and a multifaceted approach that is essential in each society based on various components.