• Title/Summary/Keyword: Key Management System

Search Result 1,989, Processing Time 0.032 seconds

THE MULTILEVEL SECURITY PROBLEM OVER CLASS SEMIGROUPS OF IMAGINARY QUADRATIC NON-MAXIMAL ORDERS

  • KIM, YONGTAE
    • Honam Mathematical Journal
    • /
    • v.28 no.2
    • /
    • pp.185-196
    • /
    • 2006
  • A scheme based on the cryptography for enforcing multilevel security in a system where hierarchy is represented by a partially ordered set was first introduced by Akl et al. But the key generation algorithm of Akl et al. is infeasible when there is a large number of users. In 1985, MacKinnon et al. proposed a paper containing a condition which prevents cooperative attacks and optimizes the assignment in order to overcome this shortage. In 2005, Kim et al. proposed key management systems for multilevel security using one-way hash function, RSA algorithm, Poset dimension and Clifford semigroup in the context of modern cryptography. In particular, the key management system using Clifford semigroup of imaginary quadratic non-maximal orders is based on the fact that the computation of a key ideal $K_0$ from an ideal $EK_0$ seems to be difficult unless E is equivalent to O. We, in this paper, show that computing preimages under the bonding homomorphism is not difficult, and that the multilevel cryptosystem based on the Clifford semigroup is insecure and improper to the key management system.

  • PDF

Implementation of an RFID Key Management System for DASH7

  • Vegendla, Aparna;Seo, Hwajeong;Lee, Donggeon;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.19-25
    • /
    • 2014
  • The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with respect to the implementation of a crypto exchange over a DASH7 network. Effective key management is an important factor for privacy and security. If organizations are not careful about where and how keys are stored, they leave the encrypted data vulnerable to theft. In this regard, we present a key management system designed for efficient key management through public key infrastructure authentication as well as a non-repudiation feature for the DASH7 standard. We analyze the performance of the proposed system on a basis of various performance criteria such as latency and throughput.

A Study on Management Performance by ISO/TS 16949 Quality Management System Certification (ISO/TS16949 품질경영시스템 인증에 따른 경영성과에 관한 연구)

  • Park, Jong-Young;Hong, Jung-Eui;Kim, Kwang-Soo
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2009.11a
    • /
    • pp.269-288
    • /
    • 2009
  • After enterprise get a certification in acquisition, the core requirements of ISO/TS 16949 standard is pull out the Performance Indicators by process access approach during the settlement and operation of system, and the pulled key performance indicators classified into the customer intention process, support process and management process and analyzed the effect to the management result. This study conducted with following step. Firstly, preceding research, the literature and investigation analysis about process approach method which is the special characteristics of ISO/TS 16949 standard. Secondly, each process of ISO/TS 16949 standard is classified and deduced the key performance indicators followed process access method. Finally, get a enterprise survey data related to improvement of Performance Indicator and analyzed by SPSS statistical software.

  • PDF

A Study on Management Performance by ISO/TS 16949 Quality Management System Certification (ISO/TS16949 품질경영시스템 인증에 따른 경영성과에 관한 연구)

  • Park, Jong-Young;Hong, Jung-Eui;Kim, Kwang-Soo
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.3
    • /
    • pp.227-237
    • /
    • 2009
  • After enterprise get a certification in acquisition, the core requirements of ISO/TS 16949 standard is pull out the Performance Indicators by process access approach during the settlement and operation of system, and the pulled key performance indicators classified into the customer intention process, support process and management process and analyzed the effect to the management result. This study conducted with following step. Firstly, preceding research, the literature and investigation analysis about process approach method which is the special characteristics of ISO/TS 16949 standard. Secondly, each process of ISO/TS 16949 standard is classified and deduced the key performance indicators followed process access method. Finally, get a enterprise survey data related to improvement of Performance Indicator and analyzed by SPSS statistical software.

Quality Management Performance Evaluation Using A Computer Support System (컴퓨터 지원시스템을 활용한 품질경영 성과측정)

  • Shin, Wan-Seon;Kang, Eun-Kyung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.24 no.4
    • /
    • pp.529-537
    • /
    • 1998
  • Appropriate performance evaluation is a key successful factor for continuous improvement and systematic management support in the implementation of quality management. This research deals with the development of a computer support system for performance evaluation of quality management and its application to a real world problem. It, first, investigates existing performance evaluation methods and classifies them into three styles. A number of key factors for designing computer support systems are then elicited by analyzing the characteristics of the existing methods in terms of the requirements needed for a successful evaluation tool. The computer support system is designed by incorporating the key factors in the system design process and it is implemented as a network version. Finally, a case study is performed in order to verify the proposed support system. The pros and cons of the system are also discussed.

  • PDF

Exploring Factors and Elements of Coordination between Key Account Management Units and Non-key Account Management Units: Case Study in an IT-related Machinery and System Vendor

  • Tonai, Shoko
    • Asia Marketing Journal
    • /
    • v.18 no.1
    • /
    • pp.1-22
    • /
    • 2016
  • Studies in key account management (KAM) have identified the importance of cross-functional coordination in firms to effectively implement KAM. However, these studies have ignored how companies integrate KAM and other customer management (non-KAM). This paper explores coordination design between KAM units and non-KAM units by analyzing a case study through three dimensions: front-end coordination, back-end-coordination, and organizational translation at the beginning of research. The case study shows that non-KAM conditions can require a modification of the coordination design. This research performs an in-depth analysis of changes in the implementation of sales reforms for an IT-related machinery and system vendor in Japan. Data sources include interviews with KAM units and non-KAM sales units and an analysis of secondary data. This paper suggests that studying the coordination between KAM units and non-KAM units will further our understanding of internal coordination in KAM research.

An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server (개인키 위탁관리 서버를 이용한 전자의무기록 지문인증 모델)

  • Lee, Yong-Joon;Jeon, Taeyeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.1-8
    • /
    • 2019
  • Medical information is an important personal information for patients, and it must be protected. In particular, when medical personnel approach electronic medical records, authentication for enhanced security is essential. However, the existing public certificate-based certification model did not reflect the security characteristics of the electronic medical record(EMR) due to problems such as personal key management and authority delegation. In this study, we propose a fingerprint recognition-based authentication model with enhanced security to solve problems in the approach of the existing electronic medical record system. The proposed authentication model is an EMR system based on fingerprint recognition using PEMS (Private-key Escrow Management Server), which is applied with the private key commission protocol and the private key withdrawal protocol, enabling the problem of personal key management and authority delegation to be resolved at source. The performance experiment of the proposed certification model confirmed that the performance time was improved compared to the existing public certificate-based authentication, and the user's convenience was increased by recognizing fingerprints by replacing the electronic signature password.

Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices

  • Koo, Han-Seung;Kwon, O-Hyung;Lee, Soo-In
    • ETRI Journal
    • /
    • v.32 no.2
    • /
    • pp.204-213
    • /
    • 2010
  • In this paper, we investigate the possible security threats to downloadable conditional access system (DCAS) host devices. We then propose a DCAS secure micro (SM) and transport processor (TP) security protocol that counters identified security threats using a secure key establishment and pairing management scheme. The proposed protocol not only resists disclosed SM ID and TP ID threats and indirect connection between TA and TP threats, but also meets some desirable security attributes such as known key secrecy, perfect forward secrecy, key compromised impersonation, unknown key-share, and key control.

A Group Key Management Architecture in Mobile Network Environments (이동네트워크 환경에서의 그룹키 관리구조)

  • 박영호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.89-100
    • /
    • 2002
  • In this paper, we propose a group key management architecture for the secure group communications in mobile netwowrks and authenticated key agreement protocol for this system. Most of existing group key management schemes un certificates based on the public key for the purpose of user authentication and key agreement in secure fashion however, we use the ICPK(Implicitly Certified Public key) to reduce the bandwidth for a certificate exchanging and to improve a computational efficiency. In this architecture, we use two-tier approach to deal with key management where the whole group is divided into two parts; the first is a cell groups consisted of mobile hosts and another is a control group consisted of cell group managers. This approach can provide flexibility of key management such that the affection for a membership change is locally restricted to the cell group which is an autonomous area of the CGM(Cell Group Manager).

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.13-18
    • /
    • 2011
  • Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.