• Title/Summary/Keyword: Information Security Product

Search Result 310, Processing Time 0.024 seconds

AraProdMatch: A Machine Learning Approach for Product Matching in E-Commerce

  • Alabdullatif, Aisha;Aloud, Monira
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.214-222
    • /
    • 2021
  • Recently, the growth of e-commerce in Saudi Arabia has been exponential, bringing new remarkable challenges. A naive approach for product matching and categorization is needed to help consumers choose the right store to purchase a product. This paper presents a machine learning approach for product matching that combines deep learning techniques with standard artificial neural networks (ANNs). Existing methods focused on product matching, whereas our model compares products based on unstructured descriptions. We evaluated our electronics dataset model from three business-to-consumer (B2C) online stores by putting the match products collectively in one dataset. The performance evaluation based on k-mean classifier prediction from three real-world online stores demonstrates that the proposed algorithm outperforms the benchmarked approach by 80% on average F1-measure.

International Competitiveness of Information Security Industry (정보보안 산업의 국제 경쟁력 분석)

  • Kim, Pang-ryong;Gwen, Su-cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.279-280
    • /
    • 2018
  • This study examines the status of Korea's information security industry through mutual comparison between Korea and the world, and also suggests policy implications. In the world information security industry, we find that the service market is far greater in sales and the market attractiveness than the product market, but in Korea, the opposite result is obtained. The results of this study suggest that it is urgent to take measures to increase the value added of information security products with weak income generation capability and it is necessary to introduce the restructuring of the main market of information security industry from product market to service market.

  • PDF

A Study on Utilization of CC Security Function Components in IT Security Products (정보보호 제품에서 CC 보안기능의 활용도에 관한 연구)

  • Choi Sung Ja;Choi Sang Soo;Lee Gang Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.207-216
    • /
    • 2005
  • It is difficult to decide which security functions(class, family, component) in the Common Criteria(CC) are important, since there is no research result about the frequency of use of security functions in real security product or Protection Profiles(PPs). Thus, we survey security functions in CC and 33 PPs that can be classified by 10 product types, and create a set of 'frequency of use of security functions' in CC and each types of security product. Our research results are useful for development of a new classification schema, as well as, estimation of development and evaluation efforts of security products.

Convergence Security Provider Self-Conformity System (융합보안 공급자 자기 적합성 제도)

  • Baik, Namkyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.53-61
    • /
    • 2019
  • In this paper, we propose 'a self - conformance system of convergence security provider' to provide basic data for security and reliability of convergence industrial technology, system and service. It is difficult to evaluate convergence security systems, limited to information and communication service providers, unable to check convergence security items, burden of submission documents, difficulty in measuring convergence security service level and we will summarize product and service-based requirements that can be integrated and systematically measure the level of convergence security and define renewed life cycle-based convergence security information and content security and assurance requirements. On the basis of this, each convergence security company declares conformity with the standard itself without the certification of the certification body, and introduces the provider conformity certification system which can manufacture and sell. This will enable the company to strengthen its competitiveness through timely launch and implementation of products and services and cost reduction.

An assurance level and product type based evaluation effort model for CC evaluation (CC기반에서 보증수준 및 제품유형을 동시에 고려한 평가업무량 모델)

  • Choi, Sang-Soo;Choi, Seung;Lee, Wan-Seok;Lee, Kang-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.25-34
    • /
    • 2004
  • Common Criteria(CC, ISO/IEC 15408) is an international standard for evaluation of Information Suity Systems(ISS). There need a suitable evidence of estimation of evaluation cost in an evaluation facility under the CC-based evaluation and assurance scheme. In this paper, we propose an evaluation effort model, which is based not only on assurance-level but also on product-type of ISS, by means of real experience of real evaluators, use-ratio concept and the Function Point of security function. The model is based not on a real evaluation environment of evaluation facility, but on CC, public PPs and product specific STs. Our result might be used as a basic model for estimation of evaluation cost and time of ISS in an CC-based evaluation and assurance scheme.

The Study on the security of Smartphone (스마트폰 보안 기술 분석)

  • Lee, Young Sook;Kim, Jee Yeon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.91-105
    • /
    • 2010
  • With the release Apple's iPhone, smartphone is enjoying a tremendous popularity. Security experts pointed the smartphone security risks and KCC(Korea Communications Commission) published safety rules for smartphone users. In this paper we surveyed market and product trends of smartphone and analyzed the security technology of smartphoen OS including Symbian, iPhone OS, Windows Mobile and Android.

A Security Platform based on CORBA and its Application (CORBA 기반의 보안 플렛폼과 그 응용)

  • Na, Jung-Chan;Kim, Yeong-Gyun;Kim, Gyeong-Beom;Kim, Myeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3278-3288
    • /
    • 1999
  • This paper proposes a security platform, called SCAP(Security platform for CORBA based APplication), to cope with potential threats in a distributed object system. SCAP supports CORBA security specification announced by OMG. SCAP is comprised of four functional blocks, which co-work with ORB to provide security services: Authentication Block, Association Block, Access Control Block, and Security Information Management Block. It is designed to support Common Secure Interoperability Functionality Level 2, which is useful for large-scale intra-, or inter-network based applications. Actual security services, which are dependent on supporting security technology, will be provided as external security service for replace ability. Implementation issues such as how to simulate an interceptor mechanism using a commercial ORB product without source code, and how to extend Current object required for security services are also described. At the end of the paper, the SCAP applied to the web environment is described to show its practical utilization.

  • PDF

Government Information Security System with ITS Product Pre-qualification (사전 검증을 통한 행정정보보호시스템 도입 방안)

  • Yeo, Sang-Soo;Lee, Dong-Bum;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.5
    • /
    • pp.763-772
    • /
    • 2009
  • According as information-oriented society is propelled, development of various information security systems is achieved, and introduction of information security system is increasing for service offer securing from nation and public institution. In particular, government information system is increasing interest about security assessment service of government information system because verification about security is weighed first of all. Accordingly, study about various security assessment services is preceded in domestic and overseas. In this paper, analyze security assessment service of Britain and Canada, and we proposed about pre-qualification introduction plan of government information system that can offer user of nation and public institution reliability.

  • PDF

Design of Collaborative BOM Management System for Small and Medium Enterprises (중소 제조기업을 위한 협업환경지원 BOM 관리 시스템 설계)

  • Kim, Bo-Hyun;Jung, So-Young;Baek, Jae-Yong;Lee, Sung-Jin;Lee, Seok-Woo;Choi, Hun-Zong
    • Korean Journal of Computational Design and Engineering
    • /
    • v.14 no.4
    • /
    • pp.254-260
    • /
    • 2009
  • Most commercial PDM (product data management) systems, which have been released recently by overseas famous software vendors, are still expensive and heavy to apply to small and medium enterprises (SMEs). Proposed in this paper are an architecture and functions of collaborative BOM (bill-of-material) management system (cBOM-MS) which supports the internal BOM management by BOM Navigator, provides SMEs with constructing the collaborative BOM via Collaborative BOM Portal, and proposes an interface to extract BOM automatically from commercial CAD systems. In the design of cBOM-MS, BOM Navigator and cBOM Portal are positioned separately to reinforce the information security about product data during product development process.

A Study on Intrusion Alert Redustion Method for IDS Management (침입탐지 시스템 관리를 위한 침입경보 축약기법 적용에 관한 연구)

  • Kim, Seok-Hun;Jeong, Jin-Young;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.1-6
    • /
    • 2005
  • Today the malicious approach and information threat against a network system increase and, the demage about this spread to persnal user from company. The product which provides only unit security function like an infiltration detection system and an infiltration interception system reached the limits about the composition infiltration which is being turn out dispersion anger and intelligence anger Necessity of integrated security civil official is raising its head using various security product about infiltration detection, confrontation and reverse tracking of hacker. Because of the quantity to be many analysis of the event which is transmitted from the various security product and infiltration alarm, analysis is difficult. So server is becoming the charge of their side. Consequently the dissertation will research the method to axis infiltration alarm data to solve like this problem.

  • PDF