• Title/Summary/Keyword: Integrity Information

Search Result 1,465, Processing Time 0.026 seconds

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.

Reproductive Physiology of Pineal Hormone Melatonin (송과선 호르몬 멜타토닌의 생식 생리학)

  • 최돈찬
    • The Korean Journal of Zoology
    • /
    • v.39 no.4
    • /
    • pp.337-351
    • /
    • 1996
  • Melatonin Is a multifunctional hormone secreted from the pineal gland in the middle of cerebrum and cerebellum. Its synthesis and release reflect photopedod;Photopedod is a yearly predictable ambient factor that most animals utilize as an environmental cue for maximum survival. Hamsters maintaln reproductive activity in summer during which day length exceeds night time. Upon the advent of autumnal equinox they undergo gonadal regression. The photoperiodic effects are prevented by removal of the pineal gland and restored by the timed repiacument of melatonin. The results suggest that melatonin constitutes part of control mechanism whereby environmental information is transduced to neuroendocrine signal responsIble for the functional integrity of the reproductive system. From the studies for the action site of melatonin following the treatment of photopedod or melatonin in the lesion of a spedflc portion of hypothalamus, suprachiasmatic nuclei and pars tuberalis are shown to be a consensus site for melatonIn. The action of melatonin. In the regulation of reproduction is largely unknown. It is mainly due to the lack of acute effect of melatonin on gonadotropin secretion. However, reduction of the gonadotropln release and augmentation of the hypothalamic gonadotropin-releasing hormone (GnRH) content by long-term treatment of melatonln Indicate that constant presence of melatonln may partidpate in the regulation of sexual activity via the GnRH neuronal system. The action mechanism by which melatonin exerts Its effect on GnRH neuron needs to be eluddated. The inability of opiold analogues to affect the reproductive hormones in sexually regressed animals by inhibftory photopedod and melatonin suggests that the opioldergic neuron may be a prime intervening mediator. Recent cloning of melatonin receptor will contribute to investigate its anatomical Identification and the action mechanism of melatonin on target tissues at the molecular level.

  • PDF

A Design of AES-based WiBro Security Processor (AES 기반 와이브로 보안 프로세서 설계)

  • Kim, Jong-Hwan;Shin, Kyung-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.7 s.361
    • /
    • pp.71-80
    • /
    • 2007
  • This paper describes an efficient hardware design of WiBro security processor (WBSec) supporting for the security sub-layer of WiBro wireless internet system. The WBSec processor, which is based on AES (Advanced Encryption Standard) block cipher algorithm, performs data oncryption/decryption, authentication/integrity, and key encryption/decryption for packet data protection of wireless network. It carries out the modes of ECB, CTR, CBC, CCM and key wrap/unwrap with two AES cores working in parallel. In order to achieve an area-efficient implementation, two design techniques are considered; First, round transformation block within AES core is designed using a shared structure for encryption/decryption. Secondly, SubByte/InvSubByte blocks that require the largest hardware in AES core are implemented using field transformation technique. It results that the gate count of WBSec is reduced by about 25% compared with conventional LUT (Look-Up Table)-based design. The WBSec processor designed in Verilog-HDL has about 22,350 gates, and the estimated throughput is about 16-Mbps at key wrap mode and maximum 213-Mbps at CCM mode, thus it can be used for hardware design of WiBro security system.

A Study on dual harbour positioning system for E-Navigation Strategy (E-Navigation을 위한 항만측위시스템 이중화에 관한 연구)

  • Oh, Se-Woong;Park, Sang-Hyun;Cho, Deuk-Jae;Seo, Ki-Yeol;Park, Jong-Min;Suh, Sang-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.31 no.10
    • /
    • pp.807-812
    • /
    • 2007
  • With the advent of Electronic Chart Display and Information Systems(ECDIS) and Automatic Identification Systems (AIS) as the principal navigation equipment of E-navigation strategy, mariners will begin to practice "e-navigation" and increasingly rely upon these systems to navigate safely and efficiently. However, these electronic systems require "e-inputs" in order to function. At present, the choices for e-input are limited, and they are installation dependent. This means that the mariner must be suitably equipped in order to use an alternative e-input. If the primary e-input is lost, and the vessel is not equipped to make use of suitable alternative e-inputs, then continued operations will have to be done the "old fashioned way" using conventional navigation The final objective is a recommendation of dual harbor positioning system on the most appropriate mix of positioning systems to satisfy the marine needs for radionavigation, positioning services.

A Study on Conservation and Management of the Joseon Royal Tomb's System - Focused on Joseon Royal Tombs Under the Eastern District Management Office - (조선왕릉의 능제보존관리에 관한 연구 - 동부지구관리소 산하 조선왕릉을 중심으로 -)

  • Choi, Jong-Hee;Lee, Chang-Hwan;Hwang, Kyu-Man;Kim, Kyu-Yeon
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.3
    • /
    • pp.75-87
    • /
    • 2018
  • The purpose of this study is to investigate conservation and management methods of the Joseon Royal Tombs under the Eastern District Management Office. Through the literature survey, we understood the process of change of Joseon royal tombs, and through field surveys and interviews, we understood the status of the interior and the surrounding area. In this process, topography, land use and flow of human traffic, architecture and stone objects, water system, historical forests, and facilities were set as the main evaluation indicators. Urbanization has damaged the original terrains of Royal Tombs as national roads, buildings and facilities have constructed in the inner and outer area of Joseon Royal Tombs. Construction of underground passage, land purchase, relocation and demolition of the buildings are required for the conservation of the Royal Tombs area, and then it is necessary to recover the original terrain. In the case of land use and pathways, there are many disconnection of the original ritual circulation, they should be maintained to remind the sacred atmosphere of the royal tomb. And It is necessary to collect accurate information on the lost buildings and stoneworks through literature survey and excavation investigation, and that investigations should be lead to the exposure or restoration of the ruins. Historical forests require periodic and ongoing monitoring and management, and it is necessary to establish new entrance area and appropriate facilities following the long-Term conservation and management plan. These plans should be classified into short, medium and long-Term projects according to urgency and securing financial resources with a long perspective to implement continuous and systematic projects.

eMRA: Extension of MRA Considering the Relationships Between MDR Concepts (eMRA: MDR의 개념간 관계성을 고려한 MRA 확장)

  • Joo, Young-Min;Kim, Jangwon;Jeong, Dongwon;Baik, Doo-Kwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.3
    • /
    • pp.161-172
    • /
    • 2013
  • Metadata registry (MDR) is the international standard, developed by ISO/IEC for exchange and sharing data between databases. Many MDR systems are used in diverse domains such as medical service, bibliography, environment for sharing and integrating data. However, those systems have different physical structures individually because the MDR standard defines only the metamodel for registering and storing metadata. It causes heterogeneity between the system structures and requires additional cost to maintain interoperability. ISO/IEC 13249-8 Metadata Registry Access (MRA) is developing as an international standard to provide a consistent access facility to data stored in different metadata registries. However, MRA does not consider the relationships between the concepts (classes) defined in the MDR specification. It causes that incorrect query results returned from MDR systems. It also requires additional cost of modeling and rewriting queries to reflect each physical model. Therefore, this paper suggests eMRA which considers the relationships between the concepts in MDR. The comparative evaluations are described to show the advantages of eMRA. eMRA has superior performance in query modeling and referential integrity than MRA defined by the relationship between the concept of MDR.

Archives acquisition activities and rule of the colonial chosun government general (조선총독부의 기록수집 활동과 식민통치)

  • Lee, Seung Il
    • The Korean Journal of Archival Studies
    • /
    • no.15
    • /
    • pp.3-37
    • /
    • 2007
  • Until now, archives of colonial era preserved in each public institution including National Archives & Records Service can be called as the results of colonial chosun government general's records management activities. However, it is a fact that only the fragment of the archives from colonial era remained in public institutions without maintaining integrity of record. Therefore, it is virtually impossible to restore operations process of the era only with current records. It is somewhat because some records were institutionally abrogated by valuation selecting standard of colonial chosun government general, but it is more likely the result of systematic destruction of documents and records upon liberation. On the other hand, although records that were being preserved by colonial chosun government general's acquisition policy escaped the systematic abrogation, the scope and target of the historical records were changed according to acquisition policy. Historical records managed by each inquiry agency of colonial chosun government general were collected to be used for fundamental information of colonial rule or compilation of Chosun history. However, archives collected by colonial chosun government general could not escape partiality as a goal for colonial rule had priority over the standpoint for recording Korean society. Although records management system of colonial chosun government general was introduced from Japanese government's system, it clearly shows colonial characteristics in the process of collecting Chosun's historical records and its use.

Designing the Record Management Functions for Record Content Using Advantages of Cloud Storage (클라우드 저장소 장점을 활용한 기록 콘텐츠 관리기능 설계)

  • Yim, Jin-Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.3
    • /
    • pp.271-292
    • /
    • 2019
  • Recently, the central administrative agency changed its business management system to cloud-based On-nara 2.0. To transfer and manage the records of the cloud business management system, the National Archives Service has developed and distributed a cloud-based records management system. It serves as an opportunity to maximize the benefits of cloud computing and redesign the records management to be more effective and efficient. The process and method of electronic record management can be transformed through digital technologies. First, we can change the transfer method for electronic records. When the business and the records management systems share the same cloud storage, it is possible to transfer the content files between the two systems without moving the contents files physically, thus copying only the metadata and reducing the cost and the risk of integrity damage. Second, the strategy for allocating storage space for contents can be conceived. Assuming that the cloud storage is shared by the business and the record management systems, it is advantageous to distinguish the storage location based on the retention period of the content files. Third, systems that access content files, such as records creation, records management, and information disclosure systems, can share the cloud storage and minimize the duplication of content files.

Localization of Bilateral Hemisphere Lesion Using Combined Transcranial Magnetic Stimulation and Diffusion Tensor Imaging: Report of Two Cases (경두개 자기자극과 확산텐서 신경섬유로 검사를 통한 대뇌 병변의 국소화: 증례보고)

  • Lee, Hyung Nam;Oh, Young-Bin;Kim, Gi-Wook;Won, Yu Hui;Ko, Myoung-Hwan;Seo, Jeong-Hwan;Park, Sung-Hee
    • Journal of Electrodiagnosis and Neuromuscular Diseases
    • /
    • v.20 no.2
    • /
    • pp.106-111
    • /
    • 2018
  • Transcranial magnetic stimulation (TMS) has been a gold standard for investigating central motor pathways in humans. Diffusion tensor imaging with fiber tractography (DTI FT) is known for its usefulness in detecting white matter lesion in vivo. We investigated the clinical usefulness of elucidating the integrity and continuity of corticospinal tract (CST) by combined use of TMS and DTI FT in this study. We report two cases who have presented with left hemiparesis and evaluated by both TMS and DTI FT; 10-year-old boy with Mitochondrial Encephalomyopathy with Lactic Acidosis and Stroke-like episode syndrome and 20-year-old woman with traumatic brain injury. Combined use of TMS and DTI FT successfully led to localize the brain lesion that might cause motor impairment in patients with abnormal signal intensities in MRI. The results of this study suggest that TMS and DTI FT might provide the detailed information between function and anatomy of the CST, complementarily.

The psychological factors of creation of virtue women based on the relationship between Mrs. Park in and Samganghaengsildo's the virtuous women volume (<열녀함양박씨전>의 박씨와 『삼강행실도: 열녀편』의 관계를 통해 본 열녀제작의 심리적 요인)

  • Seo, Eun-A
    • Journal of Korean Classical Literature and Education
    • /
    • no.16
    • /
    • pp.273-296
    • /
    • 2008
  • The author analyzed the psychological factors which affected on the way of Mrs. Park in the became a virtuous woman and compared these psychological factors with a virtuous women in Samganghaengsildo based on the relationship between Mrs. Park in and Samganghaengsildo's the virtuous women volume. First of all, it's about the power of authority on women. The volume of Samganghaengsildo's virtuous women was about the group of women who were recognized as virtuous women by the king who had absolute power at the time period. The volume of Samganghaengsildo's virtuous women was very well known for women. This book had a huge impact on women since the government authority educated the women using this book. In addition, the incredible events which were written in Samganghaengsildo indicated that the behavior of virtue was the right thing to follow since even super power recognized it as a good thing to do and the woman might be punished when she didn't follow the behavior of virtue. Second, it was based on the similarity of circumstance and uncertainty for the future. Mrs. Park in showed similar behavioral patterns with a virtuous woman in Samganghaengsildo since she took her role model from the virtuous woman. When Mrs. Park lost her husband, she was not sure about her future and the volume of Samganghaengsildo pointed out that there was another world after the death and she would meet her husband again after the death. In addition, the incorrect information that she would feel better psychologically when she followed her dead husband instead of living herself. Third, it is about the resemblance of obsessive mind and self internalization. The examination of the record of Mrs. Park showed that Mrs. Park tried to internalize integrity, loyalty, and virtue of virtuous women in Samganghaengsildo and became herself like virtuous women. In addition, the woman's obsessive mindset remarkly reflected in Samganghaengsildo. For instance, Mrs. Park in held to the time of death of her husband and the writer who wrote about the behavior of Mrs. Park also emphasized that the time of death of Mrs. Park was closed to the time of the death of her husband. This explained that the obsessive mindset of women in the epic of virtue women could have influence on the women's mind who tried to show the similar behavior with a virtue woman and internalize it. Finally, the people of the day also were not free from it.