• Title/Summary/Keyword: Identification-based trust

Search Result 53, Processing Time 0.025 seconds

Design of Secure Protocol based on trust model and trust values for Ubiquitous Sensor Networks (Ubiquitous Sensor Network에서 안전성 증가를 위한 신뢰모델과 신뢰값에 관한 프로토콜 설계)

  • Jang, Kun Won;Suh, Jang Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Mobile devices do not need the fixed network infrastructure in ad-hoc network, these devices communicate each other through the distributed control. Accordingly, mobile devices can discover several services using dynamic searching method and provide safely public ownership of these services. Ad-hoc network needs the distributed control and topology of dynamic network because the limited power for processing and network communication. This paper is devoted to provide the secure protocol that provides efficient services discovery using SDP(Service Discovery Protocol) and considers the security requirements. Proposed protocol provides the distributed control based on PKI without central server, the discovery of trusted service, secure telecommunication, the identification among mobile devices, and service access control by user authority.

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.

INTEGRATED DIAGNOSTIC TECHNIQUE FOR NUCLEAR POWER PLANTS

  • Gofuku, Akio
    • Nuclear Engineering and Technology
    • /
    • v.46 no.6
    • /
    • pp.725-736
    • /
    • 2014
  • It is very important to detect and identify small anomalies and component failures for the safe operation of complex and large-scale artifacts such as nuclear power plants. Each diagnostic technique has its own advantages and limitations. These facts inspire us not only to enhance the capability of diagnostic techniques but also to integrate the results of diagnostic subsystems in order to obtain more accurate diagnostic results. The article describes the outline of four diagnostic techniques developed for the condition monitoring of the fast breeder reactor "Monju". The techniques are (1) estimation technique of important state variables based on a physical model of the component, (2) a state identification technique by non-linear discrimination function applying SVM (Support Vector Machine), (3) a diagnostic technique applying WT (Wavelet Transformation) to detect changes in the characteristics of measurement signals, and (4) a state identification technique effectively using past cases. In addition, a hybrid diagnostic system in which a final diagnostic result is given by integrating the results from subsystems is introduced, where two sets of values called confidence values and trust values are used. A technique to determine the trust value is investigated under the condition that the confidence value is determined by each subsystem.

Individual-level Associations Between Indicators of Social Capital and Alcohol Use Disorders Identification Test Scores in Communities With High Mortality in Korea

  • Kim, Jang-Rak;Jeong, Baekgeun;Park, Ki-Soo;Kang, Yune-Sik
    • Journal of Preventive Medicine and Public Health
    • /
    • v.53 no.4
    • /
    • pp.245-255
    • /
    • 2020
  • Objectives: This study examined associations among social capital indicators (social participation and generalized trust) at the individual level and alcohol use, which was quantified using Alcohol Use Disorders Identification Test (AUDIT) scores. Methods: In total, there were 8800 participants in community health interviews, including 220 adults sampled systematically from a resident registration database of each of 40 sub-municipal administrative units of local (city or county) governments. Adjusted odds ratios (aORs) and 95% confidence intervals (CIs) were calculated using polychotomous logistic regression. Results: The aORs for abstainers versus people with AUDIT scores of 0-7, based on 3 questions on generalized trust, in comparison to those with no positive responses, were 1.15 (95% CI, 0.99 to 1.34) for 1 positive response, 1.16 (95% CI, 0.98 to 1.37) for 2 positive responses; and 1.39 (95% CI, 1.20 to 1.61) for 3 positive responses. The aORs for abstainers versus people with AUDIT scores of 0-7, in comparison to participation in no organizations, were 0.61 (95% CI, 0.54 to 0.69) for participation only in informal organizations; 2.16 (95% CI, 1.57 to 2.99) for participation only in religious organizations; 2.41 (95% CI, 1.10 to 5.29) for participation only in volunteer organizations; and 0.65 (95% CI, 0.57 to 0.74) for participation in formal organizations. Participants in formal social organizations, regardless of their participation in informal organizations, were more likely to have AUDIT scores of 8-15 (aOR, 1.29; 95% CI, 1.04 to 1.60) or ≥16 (aOR, 1.65; 95% CI, 1.22 to 2.23) than to have scores of 0-7. Conclusions: Our findings may have implications for health policy to reduce alcohol problems.

Secure RFID-based Payment System against Various Threats (위.변조에 안전한 RFID 지급결제시스템)

  • Kim, In-Seok;Choi, Eun-Young;Lee, Dong-Hoon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.141-146
    • /
    • 2007
  • Barcodes have been widely used to implement automatic identification systems but there are various problems such as security weakness or distance restriction in scanning barcode signals in a barcode-based automatic identifcation systems. Recently researchers are gradually interested in radio frequency identification (RFID) and RFID systems have been applied to various fields than before. Especially one of RFID application fields, a bank system uses RFID tagged bankontes to prevent illegal transactions such as counterfeiting banknotes and money laundering. In this paper, we propose a RFID system for protecting location provacy of a banknote holder. In addition, our paper describes that a trust party can trace a counterfeit banknote holder to provide against emergencies.

Corporate Social Responsibility and Consumer-Company Identification in Vietnamese Project-Based Organizations

  • NGUYEN, Linh Tran Cam
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.8
    • /
    • pp.157-166
    • /
    • 2021
  • In the past four decades, corporate social responsibility (CSR) issues have grown substantially due to the increasing demand for transparency and growing expectations that corporations should manage and improve their social, environmental, and economic performance. As a result, most organizations, companies, and governments provide CSR reports, while a large number of companies are still engaged in defining and integrating CSR into several aspects of their business. CSR is an obligation to society (Lee, 2020). The linkage between CSR and consumer-company identification (CCI) is important under company stakeholders. Consumers who care about those issues often change their shopping habits to bring greater value to the community. They will avoid buying environmentally or socially harmful products, and actively seek the products and services of the companies that carry out social responsibility. Companies conducting CSR activities such as charity works or environmental activities will be easy to associate as a responsible organization for always meeting the necessity of society. Therefore, companies must consider CSR a long-term strategy. The strategic approach to CSR plays an increasingly significant part in the business competitiveness - which helps create companies' values while gains trust and respect from the consumers, partners in particular, and the social community in general. This study is conducted to show evidence from project-based organizations about the CSR factors that influence consumer loyalty and the impact level of those factors on customer loyalty.

A Proposal on Blockchain-based Artwork Trading System for Popularization of Fine Art (예술의 대중화를 위한 블록체인 기반 예술품 거래 플랫폼 제안)

  • Lee, Eun Mi
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.10
    • /
    • pp.209-215
    • /
    • 2018
  • The level of cultural enjoyment in Korea has improved every year, but the culture that the general public possesses artworks has not developed so much. Most artwork trading systems, from traditional ones to the latest blockchain-based ones, are designed for expensive artwork trading and are hardly accessible to the general public. In this paper, we propose a blockchain-based artwork trading system that can improve the culture of the general public's art collection and contribute to the popularization of fine art. The proposed system consists of three interacted blockchains for identification, artwork registration and smart contract. The proposed system utilizes the advantages of the blockchain system for users to provide trust to each other, and introduces the concept of art notebook for artists to build trust in their own artwork. Since the proposed system builds a trust system through participants rather than experts or external organizations, it can reduce the cost of trading and deal with artworks that can be owned by the general public.

Research on the Influence of the Use of VR Technology in Dance Creation on the Willingness of Dance Directors to Use: Focusing on the Ease of Cognition and the Mediating Effect of Usefulness

  • Wu, Nuowa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.6
    • /
    • pp.117-124
    • /
    • 2019
  • In the field of dance creation, the use of film and television skills, cyberspace, action sets, computer graphics and other technology and media technology have made the creative environment for dance art that it rapidly improves and presents a new situation. Especially in the dance creation part, VR technology can show many possibilities and can be used as a tool to fully satisfy the choreographer's intention and imagination. Therefore, this study analyzes the acceptance model of virtual reality technology in dance creative education, and we will examine the effect of social influence, shared trust, innovation, interest, and self-efficacy on perceived usefulness and perceived ease. Second, we will examine the effect of perceived usefulness and perceived ease on intention to use. The study is targeted at ordinary dance creators who currently reside in Hebei Province, China. The survey was conducted for approximately 30 days from March 16th to April 17th. The total number of valid samples collected was 377. The results of the identification of the hypotheses between variables based on the questionnaire data are as follows: Firstly, social influence, shared trust, innovation, interest, and self-efficacy have a positive impact on perceived usefulness, perceived ease. Secondly, perceived usefulness, perceived ease has a positive effect on the intention to use. In view of the above research results, the theoretical significance and limitations of this research and the future research directions are discussed in depth.

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

Study on the New Re-identification Process of Health Information Applying ISO TS 25237 (ISO TS 25237을 적용한 보건의료정보의 새로운 재식별 처리에 관한 연구)

  • Kim, Soon Seok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.25-36
    • /
    • 2019
  • With the development of information and communication technology, hospitals that electronically process and manage medical information of patients are increasing. However, if medical information is processed electronically, there is still room for infringing personal information of the patient or medical staff. Accordingly, in 2017, the International Organization for Standardization (ISO) published ISO TS 25237 Health Information - Pseudonymization[1]. In this paper, we examine the re - identification process based on ISO TS 25237, the procedure and the problems of our proposed method. In addition, we propose a new processing scheme that adds a re-identification procedure to our secure differential privacy method [2] by keeping a mapping table between de-identified data sets and original data as ciphertext. The proposed method has proved to satisfy the requirements of ISO TS 25237 trust service providers except for some policy matters.