• Title/Summary/Keyword: Key Management Mechanism

Search Result 231, Processing Time 0.025 seconds

Genome Wide Analysis of the Potato Soft Rot Pathogen Pectobacterium carotovorum Strain ICMP 5702 to Predict Novel Insights into Its Genetic Features

  • Mallick, Tista;Mishra, Rukmini;Mohanty, Sasmita;Joshi, Raj Kumar
    • The Plant Pathology Journal
    • /
    • v.38 no.2
    • /
    • pp.102-114
    • /
    • 2022
  • Pectobacterium carotovorum subsp. carotovorum (Pcc) is a gram-negative, broad host range bacterial pathogen which causes soft rot disease in potatoes as well as other vegetables worldwide. While Pectobacterium infection relies on the production of major cell wall degrading enzymes, other virulence factors and the mechanism of genetic adaptation of this pathogen is not yet clear. In the present study, we have performed an in-depth genome-wide characterization of Pcc strain ICMP5702 isolated from potato and compared it with other pathogenic bacteria from the Pectobacterium genus to identify key virulent determinants. The draft genome of Pcc ICMP5702 contains 4,774,457 bp with a G + C content of 51.90% and 4,520 open reading frames. Genome annotation revealed prominent genes encoding key virulence factors such as plant cell wall degrading enzymes, flagella-based motility, phage proteins, cell membrane structures, and secretion systems. Whereas, a majority of determinants were conserved among the Pectobacterium strains, few notable genes encoding AvrE-family type III secretion system effectors, pectate lyase and metalloprotease in addition to the CRISPR-Cas based adaptive immune system were uniquely represented. Overall, the information generated through this study will contribute to decipher the mechanism of infection and adaptive immunity in Pcc.

Effects of cultivation ages and modes on microbial diversity in the rhizosphere soil of Panax ginseng

  • Xiao, Chunping;Yang, Limin;Zhang, Lianxue;Liu, Cuijing;Han, Mei
    • Journal of Ginseng Research
    • /
    • v.40 no.1
    • /
    • pp.28-37
    • /
    • 2016
  • Background: Panax ginseng cannot be cultivated on the same land consecutively for an extended period, and the underlying mechanism regarding microorganisms is still being explored. Methods: Polymerase chain reaction and denaturing gradient gel electrophoresis (PCR-DGGE) and BIO-LOG methods were used to evaluate the microbial genetic and functional diversity associated with the P. ginseng rhizosphere soil in various cultivation ages and modes. Results: The analysis of microbial diversity using PCR-DGGE showed that microbial communities were significantly variable in composition, of which six bacterial phyla and seven fungal classes were detected in P. ginseng soil. Among them, Proteobacteria and Hypocreales dominated. Fusarium oxysporum, a soilborne pathogen, was found in all P. ginseng soil samples except R0. The results from functional diversity suggested that the microbial metabolic diversity of fallow soil abandoned in 2003was the maximum and transplanted soil was higher than direct-seeding soil and the forest soil uncultivated P. ginseng, whereas the increase in cultivation ages in the same mode led to decreases in microbial diversity in P. ginseng soil. Carbohydrates, amino acids, and polymers were the main carbon sources utilized. Furthermore, the microbial diversity index and multivariate comparisons indicated that the augmentation of P. ginseng cultivation ages resulted in decreased bacterial diversity and increased fungal diversity, whereas microbial diversity was improved strikingly in transplanted soil and fallow soil abandoned for at least one decade. Conclusion: The key factors for discontinuous P. ginseng cultivation were the lack of balance in rhizosphere microbial communities and the outbreak of soilborne diseases caused by the accumulation of its root exudates.

MOFT : Scalable Key management of secure multicast using 7FT mechanism for mobile-IP network (MOFT : Mobile-IP네트워크에서 확장성을 제공하는 멀티캐스트 그룹 키 관리)

  • 윤미연;김기영;신용태
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.292-294
    • /
    • 2001
  • 멀티캐스트 정보보호 기술은 순수만 멀티캐스트 기술을 실용화 하는데 있어서 없어서는 안될 기술이다. 멀티캐스트 정보보호 기술에서 이슈가 되는 것은 여러 가지가 있으나, 본 논문에서는 인증된 수신자만이 데이터를 볼 수 있도록 하기 위해 필요한 키의 분배 및 rekey 연산에 대해 제안된 몇 가지 기술을 알아보고. 무선환경에서도 확장성을 제공할 수 있는 방안으로 기존의 OFT(One-way Function Tree) 메커니즘을 토대로 하는 WOFT(Mobile OFT) 메커니즘을 제안하고 제안하는 MOFT 메커니즘의 효율성을 분석한다.

  • PDF

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity

  • Li, Chun-Ta;Lee, Cheng-Chi;Weng, Chi-Yao;Fan, Chun-I
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.119-131
    • /
    • 2013
  • With the explosive growth of computer networks, many remote service providing servers and multi-server network architecture are provided and it is extremely inconvenient for users to remember numerous different identities and passwords. Therefore, it is important to provide a mechanism for a remote user to use single identity and password to access multi-server network architecture without repetitive registration and various multi-server authentication schemes have been proposed in recent years. Recently, Tsaur et al. proposed an efficient and secure smart card based user authentication and key agreement scheme for multi-server environments. They claimed that their scheme satisfies all of the requirements needed for achieving secure password authentication in multi-server environments and gives the formal proof on the execution of the proposed authenticated key agreement scheme. However, we find that Tsaur et al.'s scheme is still vulnerable to impersonation attack and many logged-in users' attack. We propose an extended scheme that not only removes the aforementioned weaknesses on their scheme but also achieves user anonymity for hiding login user's real identity. Compared with other previous related schemes, our proposed scheme keeps the efficiency and security and is more suitable for the practical applications.

Secure and Efficient Key Management Scheme for Wireless Mesh Network (무선 메쉬망에서의 안전하고 효율적인 키관리 스킴)

  • Salam, Md. Iftekhar;Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

Transforming Inter-Organizational Information Systems into Electronic Commerce Marketplaces: Development of B2B Electronic Commerce in China's Pharmaceutical Industry

  • Li Mingzhi;Tu Yulin;Wang Xiaochen;Reimers Kai
    • Management Science and Financial Engineering
    • /
    • v.11 no.3
    • /
    • pp.61-78
    • /
    • 2005
  • The aim of this paper is to identify the barriers to the B2B e-commerce development in China's pharmaceutical industry and to devise an effective strategy for its future development. Built on a detailed investigation of the market structure and recent development of electronic commerce in China's pharmaceutical industry, this paper proposes that the key issue in the development of effective B2B e-commerce business models is the successful transformation of the inter- organizational information systems into electronic marketplaces. In order to ensure the success of such electronic marketplaces, a government driven approach will be needed. In the process, designing an incentive compatible mechanism of coordinating the interest of all the market players will be the prerequisite.

An implementation and security analysis on H.235 for VoIP security on embedded environments (임베디드 환경에서의 H.235 기반 VoIP 보안 단말 구현 및 안전성 분석에 관한 연구)

  • 김덕우;홍기훈;이상학;정수환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.1007-1014
    • /
    • 2004
  • In this paper, H.235 based security mechanism for H.323 multimedia applications was implemented in embedded environment. H.235 covers authentication using HMAC-SHAI -96, authenticated Diffie-Hellman key exchange, security capability exchange, session key management for voice encryption, and encryption functions such as DES, 3DES, RC2. H.235-based mechanisms were also analyzed in terms of its security and possible attacks.

Fast and Secure Handoff Mechanism for Mobile IPv6 based on IEEE 802.11 (IEEE 802.11 기반의 고속의 안전한 Mobile IPv6 핸드오프 메커니즘)

  • Kang, Hyun-Sun;Park, Chang-Seop
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.2
    • /
    • pp.205-215
    • /
    • 2010
  • It is necessary to provide a fast and secure handover for seamless real-time multimedia services based on IEEE 802.11. In this paper, we propose FMIPv6 handoff protocol integrating L2/L3 layer based on IEEE 802.11 WLAN environment. In that, we propose a hierarchical key management scheme and authentication mechanism for protecting the handover signaling messages. The number of connections with AAA server is minimized for the fast handover. It is also compared and analyzed the handover cost with previous method.

Design of Safe AP Certification Mechanism on Wireless LAN (무선 LAN 상에서 안전한 AP 인증 메커니즘 설계)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.33-38
    • /
    • 2011
  • Current IEEE 802.11 standard is very vulnerable that between the AP and STA authentication and security mechanisms is widely known. Therefore, IEEE has proposed security architecture RSN (Robust Security Network) for 802.11. RSN is used the access control, authentication, and key management based on the IEEE 802.1X standard. In this paper, IEEE 802.1X or 802.11 a combination of several models proposed for the vulnerability, and session hijacking or MiM (Man-in the-Middle) attacks to respond, the authentication mechanism Was designed to the access control between the STA and the AP.

Business Modeling Focused on the Viewpoint of Goal and Customer (목표 및 고객 관점에서의 비즈니스 모델링)

  • Byun, Dae-Ho;Iijima, Jun-Ichi
    • IE interfaces
    • /
    • v.18 no.2
    • /
    • pp.193-204
    • /
    • 2005
  • The modeling of business processes is key component of any improvement or re-engineering endeavor. Present trends of business modeling methodologies are to include the social context of an organization. Although various methodologies have been developed specially for the business process field and have a social context, it is not in terms of goals and customers, but processes, activities, and tasks. We describe our stance on business process modeling, based on the viewpoint of goal and customer. First, we formalize a goal-oriented business process model and its evaluation mechanism. Second, we propose a methodology of business process modeling, which starts from perceiving and describing interactions between organization and customer from the customer's viewpoint.