• Title/Summary/Keyword: Information Security Contents

Search Result 702, Processing Time 0.032 seconds

The Authentication Structure Based Mobile PKI (모바일 PKI 기반한 인증 구조)

  • 김미혜;서세영
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.67-75
    • /
    • 2004
  • In this paper, we design an authentication model based mobile PKI (Public Key Infrastructure). The authentication mood consists of Root-CA Home-network agent and Foreign-network agent. CA will going to gave the delegation ticket to Home-Agent or Foreign-Agent when they request. The authentication mode information security is various characteristic more then high speed, mobile network and low cost more then previous structure of assure information security.

  • PDF

Streaming Contents Execution Point Analysis using Activated Events on Smart Devices (스마트 단말에서의 이벤트 기반 스트리밍 콘텐츠 재생 시점 탐지 방법)

  • Na, Seung Jae;Seo, Chang Wook;Kim, Min Cheol;Lee, Hyung-Woo;Jeong, Chi Yoon;Han, Seungwan
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.61-64
    • /
    • 2015
  • 최근 청소년들의 스마트 단말 사용이 급격히 증가하면서, 스마트 단말을 통하여 유해 콘텐츠에 접근하는 비중이 점점 더 늘어나고 있다. 이에 본 논문에서는 스마트 단말에서 스트리밍 콘텐츠가 실행되는 메커니즘을 분석하고, 이를 기반으로 실행 이벤트의 연관성을 분석하여 스트리밍 콘텐츠가 재생되는 시점을 자동으로 탐지할 수 있는 방법을 제안하였다. 제안된 방법을 사용하면 스마트 단말에서 스트리밍 유해 콘텐츠를 효과적으로 차단 할 수 있을 것으로 기대된다.

  • PDF

A Study on the LCMS Model for u-Learning (u-Learning을 위한 LCMS 시스템 연구)

  • Woo, Young-Hwan;Chung, Jin-Wook;Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.37-42
    • /
    • 2005
  • Development of Information Technology and knowledge information society transfer brought huge change of education training field. According as Ubiquitous society approaches, e-Learning will be evolving by u-Learning. This presages in other form with present that professor-learner environment may change. This study proposes and embodied administration method of various studying contents by development of Learning environment, And through operation platform analysis, proposed LMS that can do practical use of contents efficiently.

  • PDF

Reversible Binary Image Watermarking Method Using Overlapping Pattern Substitution

  • Dong, Keming;Kim, Hyoung Joong;Choi, Yong Soo;Joo, Sang Hyun;Chung, Byung Ho
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.990-1000
    • /
    • 2015
  • This paper presents an overlapping pattern substitution (PS) method. The original overlapping PS method as a reversible data hiding scheme works well with only four pattern pairs among fifteen possible such pairs. This paper generalizes the original PS method so that it will work well with an optimal pair from among the fifteen possible pattern pairs. To implement such an overlapping PS method, changeable and embeddable patterns are first defined. A class map is virtually constructed to identify the changeable and embeddable pairs. The run-lengths between consecutive least probable patterns are recorded. Experiments show that an implementation of our overlapping PS method works well with any possible type of pairs. Comparison results show that the proposed method achieves more embedding capacity, a higher PSNR value, and less human visual distortion for a given embedding payload.

A Study on the Development and Application of Cryptography Teaching Program for Vocational High School Mathematics (상업 정보 계열 고등학교 암호 교육 프로그램 개발 및 적용에 관한 연구)

  • Park, Joong-Soo;Chung, Sang-Cho
    • Journal of the Korean School Mathematics Society
    • /
    • v.12 no.3
    • /
    • pp.231-245
    • /
    • 2009
  • The purpose of this study is to develop a contents when we are going to introduce cryptography and information security for vocational high school students. For this we do a survey of the students' level for understanding of information security and the 7th curriculum for school mathematics, 2007 revised curriculum for school mathematics, the curriculum for vocational high school, and we search for the material that connects between mathematics subjects and vocational subjects. We develop a text book that introduces information security and cryptography. After we teach vocational high school students by using this developed book, we get the result that learning cryptography with computer programming makes a good motivation of learning mathematics and roles a parameter between mathematics curriculum and vocational curriculum. As a result we propose that the developed contents can be used in 'Practical Mathematics' in the 7th curriculum for school mathematics or 'Application of Mathematics' in 2007 revised curriculum for school mathematics.

  • PDF

A Recommender System Using Factorization Machine (Factorization Machine을 이용한 추천 시스템 설계)

  • Jeong, Seung-Yoon;Kim, Hyoung Joong
    • Journal of Digital Contents Society
    • /
    • v.18 no.4
    • /
    • pp.707-712
    • /
    • 2017
  • As the amount of data increases exponentially, the recommender system is attracting interest in various industries such as movies, books, and music, and is being studied. The recommendation system aims to propose an appropriate item to the user based on the user's past preference and click stream. Typical examples include Netflix's movie recommendation system and Amazon's book recommendation system. Previous studies can be categorized into three types: collaborative filtering, content-based recommendation, and hybrid recommendation. However, existing recommendation systems have disadvantages such as sparsity, cold start, and scalability problems. To improve these shortcomings and to develop a more accurate recommendation system, we have designed a recommendation system as a factorization machine using actual online product purchase data.

A Study on the Mitigation of Anxiety that Negatively Affect Information Security Compliance (정보보안 준수에 부정적 영향을 미치는 걱정 완화에 대한 연구)

  • Hwang, Inho
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.153-165
    • /
    • 2021
  • The purpose of this study is to find precedent factors that positively and negatively affect the information security compliance intention. In detail, the study finds precedent factors to reduce anxiety that negatively affects compliance intentions, and confirms that feedback moderates the negative relationship between anxiety and compliance intention. The questionnaire was targeted at office workers working in organizations with information security policies, and research hypothesis verification was conducted through structural equation modeling to analyze main effects and moderation effects. As a result of the study, anxiety had a negative effect on the compliance intention, and the organizational culture that was raised through management support reduced anxiety of employees. In addition, feedback mitigated the negative impact relationship between anxiety and compliance intention. The implications of this study were to suggest a direction to mitigate the anxiety of the employees of the organization through the introduction and operation of information security technology.

Analysis on Zhou et al.'s ID-Based Authenticated Group Key Agreement To Exchange Secure Contents among Group Users (그룹 사용자간 안전한 콘텐츠 전송을 위한 Zhou의 ID-기반의 인증된 그룹 키 교환 프로토콜 분석)

  • Choi, Jae-Tark;Kwon, Jeong-Ok;Yoon, Seok-Koo
    • Journal of Broadcast Engineering
    • /
    • v.13 no.1
    • /
    • pp.79-85
    • /
    • 2008
  • An authenticated group key agreement protocol allows a group of parties communicating over an insecure network to share a common secret key. In this paper, we show that Zhou et al.'s ID-based authenticated group key agreement schemes do not provide forward secrecy.

A Study on Multi-Media Contents Security Using Android Phone for Safety Distribution (멀티미디어 콘텐츠의 안전한 유통을 위한 안드로이드 폰에 기반을 둔 보안에 관한 연구)

  • Shin, Seung-Soo;Kim, Yong-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.231-239
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

The Effects of User's Security Awareness on Password Security Behavior (정보보안의식이 패스워드 보안행동에 미치는 영향에 관한 연구)

  • Ha, Sang-Won;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.14 no.2
    • /
    • pp.179-189
    • /
    • 2013
  • With the rapid development of information technology in 21st century, networks are being used with various devices. Most human actions are processed through cyber space, and it is no longer separate from daily life; it has changed into one of the most important aspects of human life. Unfortunately, in cyber space, certification method has not only technical problems, but also ethological problems. Many users seemed to use the same password throughout several sites. And for a long period they refused to change it or made a small change from the earlier password. This research aims to discuss general factors of choosing and using passwords within information security through statistical analysis.