• Title/Summary/Keyword: Integrity Information

Search Result 1,465, Processing Time 0.036 seconds

Design of Integrated Role-Based Access Control Model (통합 직무기반 접근제어 모델 설계)

  • 박진호;안성진
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.1-7
    • /
    • 2001
  • This paper design a role-based access control model that can resolves the complicated problems of access control requirements. In this paper, we designed an access control model which can control a permission making use up role-based access control, can guard the confidentiality, integrity and availability of information and can control illegal information flow. The designed access control model can protect resources from unauthorized accesses based on the role, multi-level security policies of security level, integrity level and ownership.

  • PDF

Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption

  • Babamir, Faezeh Sadat;Eslami, Ziba
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2940-2955
    • /
    • 2012
  • In this paper, we propose aggregate signcryption for achieving data security in UWSNs. The main challenge of these networks established in sensitive environments is offline sink visiting. Moreover, the sensors must retain collected data for long enough time to offload them onto the itinerant sink. Thus, the unattended nature of data collection intervals might offer the adversary the opportunity to apply various attacks without detection. In this paper, employing low order operations (in time and space), we propose a new secure scheme in which various security goals such as confidentiality (through encrypting), authentication and integrity (through signing) are achieved. In addition, the aggregation process of our scheme reduces the space and communication overheads both for sensors and sink, i.e. the proposed technique efficiently enables the sensors and sink to protect, verify and recover all the related data. We further compare our scheme with the best alternative work in the literature.

Equivalent Circuit Modeling Applying Rational Function Fitting (유리함수 근사를 이용한 등가회로 모델링)

  • Paek, Hyun;Ko, Jae-Hyung;Kim, Kun-Tae;Kim, Hyeong-Seok
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.1
    • /
    • pp.1-5
    • /
    • 2009
  • In this paper, we propose a method that applies Vector Fitting (VF) technique to the equivalent circuit model for RF passive components. These days wireless communication system is getting smaller and smaller. So EMI/EMC is an issue in RF. We can solve PI/SI (Power Integrity/Signal Integrity) that one of EMI/EMC problem apply IFFT for 3D EM simulation multiple with input signal. That is time consuming task. Therefore equivalent circuit model using RF passive component is important. VF schemes are implemented to obtain the rational functions. S parameters of the equivalent circuit model is compared to those of EM simulation in case of the microstrip line structure.

  • PDF

Transactions Ordering based Secure Concurrency Control Scheme (트랜잭션 순서 기반 보안 동시성 제어 기법)

  • Lee Won-Sup;Lee Sang-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.57-64
    • /
    • 2005
  • While the secure concurrency control schemes in multilevel secure database management systems synchronize transactions cleared at different security level they must consider the problem covert channel. although previous works achieve the confidentiality successfully, they overlook the integrity or the availability. For being evaluated as highly secure database systems , the multilevel secure database management systems must achieve the confidentiality, integrity, and the availability that are the well-known major security aspects. By use of verified transactions ordering relationship, in this Paper, we Propose a new secure concurrency control scheme that is capable of increasing the degree of fairness among transactions cleared at different security levels.

  • PDF

Security Analysis to an Biometric Authentication Protocol for Wireless Sensor Networks (WSN 환경에서 Biometric 정보를 이용한 사용자 인증 스킴의 안전성 분석)

  • Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.59-67
    • /
    • 2015
  • A novel authentication mechanism is biometric authentication where users are identified by their measurable human characteristics, such as fingerprint, voiceprint, and iris scan. The technology of biometrics is becoming a popular method for engineers to design a more secure user authentication scheme. In terms of physiological and behavioral human characteristics, biometrics is used as a form of identity access management and access control, and it services to identity individuals in groups that are under surveillance. In this article, we review the biometric-based authentication protocol by Althobati et al. and provide a security analysis on the scheme. Our analysis shows that Althobati et al.'s scheme does not guarantee server-to-user authentication. The contribution of the current work is to demonstrate this by mounting threat of data integrity and bypassing the gateway node on Althobati et al.'s scheme. In addition, we analysis the security vulnerabilities of Althobati et al.'s protocol.

A Study of Cross Certification between Realms in Public Key Infrastructure based on X.509 (X.509기반 PKI의 영역간 상호인증 프로토콜에 관한 연구)

  • 신광철
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.6
    • /
    • pp.845-852
    • /
    • 2001
  • Electronic commerce and application service is to universal on the internet, and a large quantity information transmitted on the network, It's needs procedure to access only permit objects for the integrity of information. In order to provide regional services is authentication for control resource and client identification. In particular, public key system is to implement in distributed environment, it is able to insurance users convenience and integrity at the same time. In this paper designed mechanism of cross certification between realms in PKI based on X.509 associated with DNS (Domain Name System) that is presented.

  • PDF

A Design Methodology on Signal Paths for Enhanced Signal Integrity of High-speed Communication System and a BIST Design for Backplane Boards Testing (고속 통신 시스템의 신호충실성 향상을 위한 선로 설계 방법론 및 Backplane Boards Testing를 위한 BIST 설계)

  • Jang, Jong-Gwon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1263-1270
    • /
    • 2000
  • The operation frequency of High-speed Communication System becomes very fast with the advanced technology of VLSI chips and system implementation. There may exist various types of noise sources degrading the signal integrity in this system. The present main system is made of backplane, so faults can be brought whenever a board is removed, replaced or added. This backplane boards testing is a very important process to verify the operation of system. firstly, we model the effects of the internal noises in the High-speed Communication System to the signal line and propose a new design method to minimize these effects. For the design methodology, we derive the characterization value for each mode land them construct the optimal simulation model. We compare the result of own proposing method with that fo the existing methods, through simulation and show that the quality of High-speed Communication System is significantly enhanced. Secondary our proposing BIST for the Backplane Boards Testing is designed to guarantee that there is no fault in the high-speed communication system.

  • PDF

A Study on WPMS for Integrity Preservation of Hyperlink in Web Site (웹 사이트에서 하이퍼링크의 무결성 유지를 위한 WPMS에 관한 연구)

  • Cho, Lee-Gi;Lee, Sung-Jae;Park, Na-Yeon;Kim, Won-Jung
    • Annual Conference of KIPS
    • /
    • 2003.11b
    • /
    • pp.1089-1092
    • /
    • 2003
  • TCP/IP 프로토콜을 기반으로 한 웹은 컴퓨터 기술과 통신 기술의 발달과 더불어 양적으로나 복잡도에 있어서 놀라운 속도로 성장하고 있다. 이에 따라 웹 사이트를 이용한 홍보나 기업의 이익을 목적으로 하는 웹 사이트들이 급속히 증가하면서 웹 페이지들의 추가, 삭제, 갱신 등 끊임없이 일어나고 있다. 이렇게 끊임없는 웹 페이지의 수정으로 인하여 링크가 끊어지는 등의 문제가 발생한 수 있는데, 이런 끊어진 링크의 발견은 쉽지 않고, 때에 따라서는 기업에 큰 손실을 가져올 수 있다. 본 논문에서는 웹 페이지 문서들 사이에 존재하는 관계성(Relationship)과 제약 조건(Constraint Condition)을 확장 UML을 통해 정의하여, 웹 페이지의 DLP(Dangling Link Problem)를 해결하기 위한 WPMS(Web Page Integrity Management System) 시스템을 제안하였다.

  • PDF

A Security Protection Framework for Cloud Computing

  • Zhu, Wenzheng;Lee, Changhoon
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.538-547
    • /
    • 2016
  • Cloud computing is a new style of computing in which dynamically scalable and reconfigurable resources are provided as a service over the internet. The MapReduce framework is currently the most dominant programming model in cloud computing. It is necessary to protect the integrity of MapReduce data processing services. Malicious workers, who can be divided into collusive workers and non-collusive workers, try to generate bad results in order to attack the cloud computing. So, figuring out how to efficiently detect the malicious workers has been very important, as existing solutions are not effective enough in defeating malicious behavior. In this paper, we propose a security protection framework to detect the malicious workers and ensure computation integrity in the map phase of MapReduce. Our simulation results show that our proposed security protection framework can efficiently detect both collusive and non-collusive workers and guarantee high computation accuracy.

Configuration of Network Based GNSS Correction System for Land Transportation Navigation (육상교통 항법을 위한 네트워크기반 위성항법보정 시스템의 구성)

  • Son, Minhyuk;Son, Eunseong;Lee, Eunsung;Heo, Moon-Beom;Nam, Gi-Wook
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.21 no.4
    • /
    • pp.17-26
    • /
    • 2013
  • In this paper, a configuration procedure of a transportation infrastructure system for GNSS based very precise real-time positioning is proposed. This infrastructure system consists of several receiving station, a central station, and communication sub-systems. The required performance, design, implementation and verification of each sub-system are explained respectively. The required performance can be broken down into accuracy, integrity, stability, processing time. The design of the each sub-system is performed in accordance with the required performance and each sub-system is built with regard to the design. Lastly the implemented system is verified in comparison with the required performance.