• Title/Summary/Keyword: Integrity Verification System

Search Result 118, Processing Time 0.021 seconds

Successful ERP Operations: Process Integration Perspectives and an Agent-Based Support System

  • Park, Kwangho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.19-27
    • /
    • 2003
  • Any ERP system pushes a company toward full process integration and solves the fragmentation of information. However, the tight process integration can propagate and magnify mistakes made in one department into the other departments in real time. Thus, it can be posited that a central support system for the coordination can help ERP users and administrators dig out problems, take care of tedious validation and verification, and maintain process integration of ERP with great consistency. This paper ,proposes an agent-based ERP operations support system (EOSS) that aims at achieving and maintaining process integration of ERP at the highest level possible. With EOSS, the process integrity is monitored, with anomalies prevented as early as possible and repaired as precisely as possible.

  • PDF

A DDMPF(Distributed Data Management Protocol using FAT) Design of Self-organized Storage for Negotiation among a Client and Servers based on Clouding (클라우딩 기반에서 클라이언트와 서버간 협상을 위한 자가 조직 저장매체의 DDMPF(Distributed Data Management Protocol using FAT) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yang, Seung-Hae
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1048-1058
    • /
    • 2012
  • This paper proposes the DDMPF(Distributed Data Management Protocol using FAT) which prevents data loss and keeps the security of self-organized storages by comprising a client, a storage server, and a verification server in clouding environment. The DDMPF builds a self-organized storage server, solves data loss by decentralizing the partitioned data in it in contrast to the centralized problem and the data loss caused by the storage server problems of existing clouding storages, and improves the efficiency of distributed data management with FAT(File Allocation Table). And, the DDMPF improves the reliability of data by a verification server's verifying the data integrity of a storage server, and strengthens the security in double encryption with a client's private key and the system's master key using EC-DH algorithm. Additionally, the DDMPF limits the number of verification servers and detects the flooding attack by setting the TS(Time Stamp) for a verification request message and the replay attack by using the nonce value generated newly, whenever the verification is requested.

Verification of Structural Integrity for Cylindrical Subsonic Vehicle (원통형 아음속 비행체 구조 건전성 확인)

  • Choi, Youn Gyu;Noh, Kyung-Ho;Gil, Geun Suk;Jeon, Jong Geun;Baek, Joo Hyun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.9
    • /
    • pp.773-780
    • /
    • 2015
  • In this paper, the structural integrity for a cylindrical vehicle in subsonic environments is verified. In order to confirm static structural safety for the cylindrical vehicle in extreme maneuver condition, the structure analysis and full-scale static structure test are carried out. The commercial finite element codes, MSC. Patran/Nastran is used for numerical simulation. The full-scale static structure test equipment consists of the counterbalance system, loading system and data acquisition system. Besides, the dynamic characteristics for the cylindrical vehicle are reviewed by performing an impact hammer test.

Railway Software Analysis Tool using Symbolic Execution Method (심볼릭 수행 방법을 이용한 철도 소프트웨어 코드분석 도구제안)

  • Jo, Hyun-Jeong;Hwang, Jong-Gyu;Shin, Duck-Ho
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.4
    • /
    • pp.242-249
    • /
    • 2016
  • The railway system is being converted to the computer system from the existing mechanical device, and the dependency on software is being increased rapidly. Though the size and degree of complexity of software for railway system are slower than the development speed of hardware, it is expected that the size will be grown bigger gradually and the degree of complexity will be increased also. Accordingly, the validation of reliability and safety of embedded software for railway system was started to become influential as the important issue. Accordingly, various software test and validation activities are highly recommended in the international standards related railway software. In this paper, we presented a software coding analysis tool using symbolic execution for railway system, and presented its result of implementation.

Proxy Based Application Digital Signature Validation System (프락시 기반 애플리케이션 전자서명 검증 시스템)

  • Kwon, Sangwan;Kim, Donguk;Lee, Kyoungwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.743-751
    • /
    • 2017
  • As smart phones are becoming popular, an operating system is being used at wearable devices, home appliances and smart TVs. A user is able to use various applications on devices with operating system, but there is an increased threat of hacker. Thus, the technology for detecting the forgery of applications is becoming more important on operating system. To detect the forgery of the application, a digital signature technology is used on the filed of application digital signature. According to W3C recommendation, the signing process of application digital signature must be performed at least twice, and the applications which are signed by the application digital signature have to be validated for all signature files when the application is installed in the operating system. Hence, the performance of the application digital signature validation system is closely related to the installer performance on the operating system. Existing validation system has performance degradation due to redundancy of integrity verification among application components. This research was conducted to improve the performance of the application digital signature validation system. The proposal of validation system which is applied proxy system shows a performance improvement compared to the existing verification system.

Chaincode-based File Integrity Verification Model (체인코드 기반의 파일 무결성 검증 모델)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.4
    • /
    • pp.51-60
    • /
    • 2021
  • Recent advances in network and hardware technologies have led to active research and multiple network technologies that fuse blockchain technologies with security. We propose a system model that analyzes technologies using existing blockchain and verifies the integrity of files using private blockchain in a limited environment. The proposed model can be written as a chain code of Hyperleisure Fabric, a private blockchain platform, and verified for integrity of files through Hyperleisure Explorer, a private blockchain integrated management platform. The system performance of the proposed model was analyzed from a developer perspective and from a user perspective. As a result of the analysis, there are compatibility problems according to the version of various modules to run the blockchain platform, and only limited elements such as chain code status and groups can be checked.

A Study on the Blockchain-Based Bill of Lading System to Improve Usability (사용성 개선을 위한 블록체인 기반 선하증권 거래 시스템 연구)

  • Lee, Ju-young;Kim, Hyun-a;Sung, Chae-min;Kim, Joung-min;Kim, Sungwook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.7
    • /
    • pp.283-290
    • /
    • 2022
  • Blockchain is a technology that secures integrity and transparency by distributing and storing transaction details within multiple node networks. Recently, research is being conducted to secure integrity by applying blockchain to Bill of Lading (B/L documents) of monetary value. In this paper, we study a blockchain-based bill of lading system to improve usability. The shippers register the issued bill of lading on the blockchain, and banks in each country read it to conduct L/C transactions. The consignees receive the goods after completing certification with a quick response code (QR) containing the bill of lading information. Through this, shippers enjoy merits in that they can shorten the time and cost of sending shipping documents by mail and prove the integrity of the documents. The consignees have the advantage of being able to check the documents at the same time as they are registered and trust the transaction. Finally, on the bank side, the security of shipping documents is ensured and verification can be done quickly.

Railway System Functional Safety and Certification (철도 시스템 기능 안전(Functional Safety) 및 인증)

  • Kim, You-Ho;Lee, Soo-Hwan;Park, Kang-Hun;Ko, Tae-Kuk
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.63 no.4
    • /
    • pp.226-235
    • /
    • 2014
  • Nowadays, railroads are considered the most efficient form of mass transportation. Furthermore, it is necessary that railroads be paired with state-of-the-art safety equipment. Unfortunately, it is impossible to prevent 100% of accidents that may be caused by system or human errors. In order to prevent future accidents, RAMS activity and Functional Safety Certification are required for new systems that are under development. In this paper we evaluate the necessity of the application of RAMS and the performance of RAMS in the system development process. We also explore the Safety Evaluation Procedure required for RAMS certification.

The Development of a Remote User Interface for the Manipulator using the Ethernet (이더넷을 이용한 매니퓰레이터의 원격 유저 인터페이스 개발)

  • Lee, Jong-Soo;Ryoo, Sung-Yop;Lee, Ki-Ju
    • Proceedings of the KIEE Conference
    • /
    • 1998.11b
    • /
    • pp.558-560
    • /
    • 1998
  • The operation of robot manipulators has a restriction that the operator must reside at the factory, where the manipulator is used. To overcome this restriction, we propose a remote control system using the internet, the system which runs on the Window 95 environment is composed of the remote client which transfers commands to the server which control and manage the manipulator in the factory. In the control of Hong-ik Direct Drive Arm, it is necessary to consider the complex nonlinear parameters causing the mutual interaction between joints, so we use two TMS320C31 DSP chips in the controller for the real time dynamic control algorithms. For the test of system integrity and the verification of the mathematical modeling, we apply CTM, PD and VSS control algorithms and the simulation results are satisfactory.

  • PDF

Digital Watermarking of Medical Image Based on Public Key Encryption Algorithm Considering ROI (ROI를 고려한 공개키 암호화 알고리즘 기반 의료영상 디지털 워터마킹)

  • Lee Hyung-Kyo;Kim Hee-Jung;Seong Tack-Young;Kwon Ki-Ryong;Lee Jong-Keuk
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1462-1471
    • /
    • 2005
  • Recently, the medical image has been digitized by the development of computer science and digitization of the medical devices. There are needs for database service of the medical image and long term storage because of the construction of PACS(picture archiving and communication system) following DICOM(digital imaging communications in medicine) standards, telemedicine, and et al. However, it also caused some kinds of problems, such as illegal reproduction of medical image, proprietary rights and data authentication. In this paper, we propose the new digital watermarking technique for medical image based on public key encryption algorithm for integrity verification. It prevents illegal forgery that can be caused after transmitting medical image data remotely. The watermark is the value of bit-plane in wavelet transform of the original image for certification method of integrity verification. We proposed the embedding regions are randomly chosen considering ROI, and a digital signature is made using hash function of MD5 which input is a secret key. The experimental results show that the watermark embedded by the proposed algorithm can survive successfully in image processing operations and that the watermark's invisibility is good.

  • PDF