• Title/Summary/Keyword: Integrity Information

Search Result 1,465, Processing Time 0.028 seconds

Verification of Rule Bases Using Petri-net (페트리네드를 이용한 규칙베이스의 검증)

  • Jo, Sang-Yeop
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.430-440
    • /
    • 1997
  • The knowledge repressenatation technique by production rule has been popular method to represent to represent the experts'dxpertise in expert systems.In this paper,we propose a method to verify the integrity of rule base.Proposcd method models rule base as a Petri net and utilizes the systematic strucutural properties of the petri net for berifi-cation.We describe the pricesure to check rule base at both local and global level intermal verification.

  • PDF

A Study on the Blocking Probabilities of Single-buffered switching Networks with Time Slot Sequence Integrity of Multi-slot Calls (다중스롯호의 타임스롯 순서제어를 고려한 단일 버퍼 스위치의 호손율 특성에 관한 연구)

  • 성단근;정민영;강기원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.12
    • /
    • pp.1300-1312
    • /
    • 1991
  • In this paper we syudy the time slot sequence integrity(TSSI) of multi-slot calls in the single-buffered switching networks and analyze their traffic characteristics in terms of traffic mixture ratio, number of random searches for idle time slots, and their blocking probablities. This result can be utilized in the design of wideband switching networks in the single buffered systems, such as TDX IA/B swithcing systems, for accommodating multi slot calls.

  • PDF

Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms

  • Bekkouch, Souad;Faraoun, Kamel Mohamed
    • Journal of Information Processing Systems
    • /
    • v.11 no.3
    • /
    • pp.406-420
    • /
    • 2015
  • We present a secure and robust image watermarking scheme that uses combined reversible DWT-DCT-SVD transformations to increase integrity, authentication, and confidentiality. The proposed scheme uses two different kinds of watermarking images: a reversible watermark, $W_1$, which is used for verification (ensuring integrity and authentication aspects); and a second one, $W_2$, which is defined by a logo image that provides confidentiality. Our proposed scheme is shown to be robust, while its performances are evaluated with respect to the peak signal-to-noise ratio (PSNR), signal-to-noise ratio (SNR), normalized cross-correlation (NCC), and running time. The robustness of the scheme is also evaluated against different attacks, including a compression attack and Salt & Pepper attack.

Design of Spatial Data Model Supporting Semantic Integrity Constraint (의미적 무결성을 지원하는 공간 데이터 모델의 설계)

  • 임정옥;이영걸;배해영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10a
    • /
    • pp.48-50
    • /
    • 1999
  • 본 논문은 공간데이터와 비공간데이터를 통합처리하는 공간 데이터베이스 시스템에서 데이터의 의미적 무결성을 보장하는 확장된 공간 데이터 모델을 설계한다. 공간 데이터베이스 시스템에서 다루는 단순 객체가 아닌 추상화된 복합 객체로 다양한 유도 데이터에 대한 의미적 무결성을 데이터베이스 시스템 내부에서 효율적으로 유지해야 하며, 공간 데이터의 의미적 무결성 제약 조건을 사용자에 의해 정의할 수 있어야 한다. 본 논문에서는 공간 데이터베이스에서 사용하는 공간 데이터에 대한 무결성 정보를 술어 논리 형태로 표현하고 유지할 수 있는 무결성 공간 데이터 모델 (ISRDM: Integrity supported Spatial-Relational Data Model)을 제안한다. 제안된 공간 데이터 모델은 하부 단계 저장 구조, 개념적 데이터 표현 단계, 무결성 표현 단계가 독립적으로 구성되는 다단계 구조로 기존의 공간 데이터베이스 시스템을 용이하게 확장하고 다양한 응용 요구에 대해 유연하게 대처할 수 있도록 설계한다.

  • PDF

A Design of Access Control Mechanism for the Secure Use of Internet (안전한 인터넷 사용을 위한 접근제어 메커니즘 설계)

  • Lee, Ho;Jung, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.84-90
    • /
    • 2000
  • This paper presents a design of an access control mechanism that can resolves the complicated problems of access control requirements in internet environment. In this paper, we proposed an access control mechanism which can satisfy the combined goals of confidentiality integrity and availability of any resource. We defined an access control mechanism from the viewpoints of identity-based, rule-based and role-based policy and implemented 6 access control operations. The Proposed access control mechanism can protect resources from unauthorized accesses based on the multi-level security policies of security label, integrity level, role and ownership.

  • PDF

Improving efficiency of remote data audit for cloud storage

  • Fan, Kuan;Liu, Mingxi;Shi, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.2198-2222
    • /
    • 2019
  • The cloud storage service becomes a rising trend based on the cloud computing, which promotes the remote data integrity auditing a hot topic. Some research can audit the integrity and correctness of user data and solve the problem of user privacy leakage. However, these schemes cannot use fewer data blocks to achieve better auditing results. In this paper, we figure out that the random sampling used in most auditing schemes is not well apply to the problem of cloud service provider (CSP) deleting the data that users rarely use, and we adopt the probability proportionate to size sampling (PPS) to handle such situation. A new scheme named improving audit efficiency of remote data for cloud storage is designed. The proposed scheme supports the public auditing with fewer data blocks and constrains the server's malicious behavior to extend the auditing cycle. Compared with the relevant schemes, the experimental results show that the proposed scheme is more effective.

Enhanced Security Framework for E-Health Systems using Blockchain

  • Kubendiran, Mohan;Singh, Satyapal;Sangaiah, Arun Kumar
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.239-250
    • /
    • 2019
  • An individual's health data is very sensitive and private. Such data are usually stored on a private or community owned cloud, where access is not restricted to the owners of that cloud. Anyone within the cloud can access this data. This data may not be read only and multiple parties can make to it. Thus, any unauthorized modification of health-related data will lead to incorrect diagnosis and mistreatment. However, we cannot restrict semipublic access to this data. Existing security mechanisms in e-health systems are competent in dealing with the issues associated with these systems but only up to a certain extent. The indigenous technologies need to be complemented with current and future technologies. We have put forward a method to complement such technologies by incorporating the concept of blockchain to ensure the integrity of data as well as its provenance.

Securing C.I.A for Autonomous Vessels through the Application of VDI (VDI 적용을 통한 자율운항선박의 C.I.A 확보 방안 연구)

  • Choi, Youngryul;Baik, Namkyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.4
    • /
    • pp.41-46
    • /
    • 2022
  • In the fourth industrial era, when various technologies are fused and combined, new and advanced technologies from other industries are used extensively in the maritime industry field. New security threats are also increasing along with the development of new technologies. In addition, in incorporating convergence technologies into the maritime industry, various problems, such as communication definitions and procedures between technologies and customer-customized delays, occur. In this paper, for the problems mentioned above, research results on the network configuration of safer autonomous vessels by supplementing and fusing existing solutions rather than developing new technologies are proposed. In conclusion, the entire network consists of VDI and presents additional configurations to ensure confidentiality, integrity, and availability, which are the three security elements. According to the composition of such a convergence network, it is intended to help prepare countermeasures to protect internal data from external threats.

A comprehensive review on clay swelling and illitization of smectite in natural subsurface formations and engineered barrier systems

  • Lotanna Ohazuruike;Kyung Jae Lee
    • Nuclear Engineering and Technology
    • /
    • v.55 no.4
    • /
    • pp.1495-1506
    • /
    • 2023
  • For the safe disposal of high-level radioactive waste using Engineered Barrier Systems (EBS), bentonite buffer is used by its high swelling capability and low hydraulic conductivity. When the bentonite buffer is contacted to heated pore water containing ions by radioactive decay, chemical alterations of minerals such as illitization reaction occur. Illitization of bentonite indicates the alteration of expandable smectite into non-expandable illite, which threatens the stability and integrity of EBS. This study intends to provide a thorough review on the information underlying in the illitization of bentonite, by covering basic clay mineralogy, smectite expansion, mechanisms and observation of illitization, and illitization in EBS. Since understanding of smectite illitization is crucial for securing the safety and integrity of nuclear waste disposal systems using bentonite buffer, this thorough review study is expected to provide essential and concise information for the preventive EBS design.

Design and Development of Logger of Image Data Integrity Verification System (영상 데이터 무결성 검증 시스템을 위한 Logger 설계 및 개발)

  • Kim, Myeongjun;TaeGeun, Yu;seokwon, Jeong;Park, Jaesung;Kwon, Taeun;Kang, Yunhee
    • Annual Conference of KIPS
    • /
    • 2022.11a
    • /
    • pp.650-652
    • /
    • 2022
  • 최근 데이터를 기반 응용개발이 다양한 분야에서 진행되고 있으며, 수집 데이터는 주요한 의사결정에 사용되고 있다. 이러한 데이터 기반 응용은 데이터의 무결성(data integrity)의 보장과 데이터 생산 과정에서의 진본 확인을 위한 체계가 요구된다. 본 논문에서는 영상 데이터의 무결성 검증 시스템을 구성하는 Logger 설계와 개발을 기술한다. 개발된 Logger 는 해시값을 통해 영상 데이터의 신뢰성을 만족할 수 있다면 영상 데이터를 통해 학습되어 생성된 학습 모델에 대한 신뢰성 또한 보장할 수 있다. Logger 는 라즈베리파이 환경에서 구현한 후 FPS 를 변경하며, 무결성 검증을 실험한다.