• Title/Summary/Keyword: Key issue

Search Result 1,219, Processing Time 0.022 seconds

Integration of PKI and Fingerprint for User Authentication

  • Shin, Sam-Bum;Kim, Chang-Su;Chung, Yong-Wha
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1655-1662
    • /
    • 2007
  • Although the PKl-based user authentication solution has been widely used, the security of it can be deteriorated by a simple password. This is because a long and random private key may be protected by a short and easy-to-remember password. To handle this problem, many biometric-based user authentication solutions have been proposed. However, protecting biometric data is another research issue because the compromise of the biometric data will be permanent. In this paper, we present an implementation to improve the security of the typical PKI-based authentication by protecting the private key with a fingerprint. Compared to the unilateral authentication provided by the typical biometric-based authentication, the proposed solution can provide the mutual authentication. In addition to the increased security, this solution can alleviate the privacy issue of the fingerprint data by conglomerating the fingerprint data with the private key and storing the conglomerated data in a user-carry device such as a smart card. With a 32-bit ARM7-based smart card and a Pentium 4 PC, the proposed fingerprint-based PKI authentication can be executed within 1.3second.

  • PDF

Rethinking Information Technology-Organizational Structure Relationship (정보기술과 조직구조의 관련성에 대한 재고찰)

  • Seong, Tae-Gyeong
    • Asia pacific journal of information systems
    • /
    • v.5 no.1
    • /
    • pp.129-163
    • /
    • 1995
  • Past research linking information technology and organizational structure has been inconclusive and contradictory. The purpose of this study is to resolve some of this confusion by taking into consideration one theoretical issue and three methodological problems. The one theoretical issue is an assessment of the importance of environment as a key external variable constraining both organizational structure and the use of information technology. To date, there has been no systematic, empirical research on the conceptual linkage among all three of these variables. The three methodological issues concern measurement problems associated with (1) controlling for different levels of analysis, (2) establishing a clear operationalization of information technology, and (3) differentiating institutional and questionnaire approaches to data collection. The research results in four conclusions. First, data confirm the environment as a key external variable in the linkage between information technology and organizational structure. Second, three central dimensions of information technology are identified: Growth of Capacity, extensiveness of information technology use, and information technology sophistication. Third, in order to maximize the explanatory power of information technology on other organizational constructs, it is necessary to differentiate between the actual use of information technology as opposed to the mere presence of information technology. Fourth, carefully designed questionnaire measures reveal no significant differences from institutional measures in the assessment of key organizational constructs.

  • PDF

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.

A Key Management System for Cloud Services Based on Proxy Server Using Self-Creating Algorithm (셀프 생성 알고리즘을 사용한 프락시 서버를 기반으로 한 클라우드 서비스를 위한 키 관리 시스템)

  • Sung, Soonhwa;Youn, Cheong
    • Journal of KIISE
    • /
    • v.43 no.9
    • /
    • pp.1052-1059
    • /
    • 2016
  • A key role in cloud computing systems that is becoming an issue is implementing a database on untrusted cloud servers requiring the complexity of key management. This study proposes a key management system using Self Proxy Servers to minimize key executions and improve the performance of cloud services by generating Self-Creating Algorithms where the data owner is not directly concerned with related keys when a user sends an encrypted database a query. The Self Proxy Server supports active and autonomous key managements as a distributed server if any trouble should arise from a cloud key server and for an efficient cloud key management. Therefore, the key management system provides secure cloud services by supporting confidentiality of a cloud server database.

A Study for the Determination of Key Issues in Information Systems Management of Financial Institutions in Korea (우리나라 금융기관 정보시스템 관리에 있어서 핵심과제분야의 파악을 위한 연구)

  • Seo, Gil-Su
    • Asia pacific journal of information systems
    • /
    • v.2 no.2
    • /
    • pp.55-69
    • /
    • 1992
  • There have been several studies on the key issues in information systems (IS) management. This study replicates the Society for Information Management (SIM) survey done in U.S.A. to investigate the key issues in IS management in Korea. This survey focused especially on the professions in financial institutions. A three-round Delphi method was employed to collect the opinions of participants and obtain a reasonable level of consensus about the key IS management issues of financial institutions in Korea. The number one issue identified was top management support, followed by recruitment and development of IS human resources. This article also compares the key IS management issues of financial institutions and those of manufacturing industries in Korea.

  • PDF

Development of large bore superconducting magnet for wastewater treatment application

  • Liu, Huiming;Xu, Dong;Shen, Fuzhi;Zhang, Hengcheng;Li, Laifeng
    • Progress in Superconductivity and Cryogenics
    • /
    • v.19 no.1
    • /
    • pp.13-16
    • /
    • 2017
  • Water issue, especially water pollution, is a serious issue of 21st century. Being an significant technique for securing water resources, superconducting magnetic separation wastewater system was indispensable. A large bore conduction-cooled magnet was custom-tailored for wastewater treatment. The superconducting magnet has been designed, fabricated and tested. The superconducting magnet was composed of NbTi solenoid coils with an effective horizontal warm bore of 400 mm and a maximum central field of 2.56T. The superconducting magnet system was cooled by a two-stage 1.5W 4K GM cryocooler. The NbTi solenoid coils were wound around an aluminum former that is thermally connected to the second stage cold head of the cryocooler through a conductive copper link. The temperature distribution along the conductive link was measured during the cool-down process as well as at steady state. The magnet was cooled down to 4.8K in approximately 65 hours. The test of the magnetic field and quench analysis has been performed to verify the safe operation for the magnet system. Experimental results show that the superconducting magnet reached the designed magnetic performance.

The ways for ginsenoside Rh2 to fight against cancer: the molecular evidences in vitro and in vivo.

  • Qi-rui Hu;Yao Pan;Han-cheng Wu;Zhen-zhen Dai;Qing-xin Huang;Ting Luo;Jing Li;Ze-yuan Deng;Fang Chen
    • Journal of Ginseng Research
    • /
    • v.47 no.2
    • /
    • pp.173-182
    • /
    • 2023
  • Cancer is a global public health issue that becomes the second primary cause of death globally. Considering the side effects of radio- or chemo-therapy, natural phytochemicals are promising alternatives for therapeutic interventions to alleviate the side effects and complications. Ginsenoside Rh2 (GRh2) is the main phytochemical extracted from Panax ginseng C.A. Meyer with anticancer activity. GRh2 could induce apoptosis and autophagy of cancer cells and inhibit proliferation, metastasis, invasion, and angiogenesis in vitro and in vivo. In addition, GRh2 could be used as an adjuvant to chemotherapeutics to enhance the anticancer effect and reverse the adverse effects. Here we summarized the understanding of the molecular mechanisms underlying the anticancer effects of GRh2 and proposed future directions to promote the development and application of GRh2.

Methods on improvements of the poor oral bioavailability of ginsenosides: Pre-processing, structural modification, drug combination, and micro- or nano- delivery system

  • Qi-rui Hu;Huan Hong;Zhi-hong Zhang;Hua Feng;Ting Luo;Jing Li;Ze-yuan Deng;Fang Chen
    • Journal of Ginseng Research
    • /
    • v.47 no.6
    • /
    • pp.694-705
    • /
    • 2023
  • Panax ginseng Meyer is a traditional Chinese medicine that is widely used as tonic in Asia. The main pharmacologically active components of ginseng are the dammarane-type ginsenosides, which have been shown to have anti-cancer, anti-inflammatory, immunoregulatory, neuroprotective, and metabolic regulatory activities. Moreover, some of ginsenosides (eg, Rh2 and Rg3) have been developed into nutraceuticals. However, the utilization of ginsenosides in clinic is restrictive due to poor permeability in cells and low bioavailability in human body. Obviously, the dammarane skeleton and glycosyls of ginsenosides are responsible for these limitations. Therefore, improving the oral bioavailability of ginsenosides has become a pressing issue. Here, based on the structures of ginsenosides, we summarized the understanding of the factors affecting the oral bioavailability of ginsenosides, introduced the methods to enhance the oral bioavailability and proposed the future perspectives on improving the oral bioavailability of ginsenosides.

Legal Systems and Practice of Intellectual Property Protection in Japan and China: A Comparative Analysis

  • Cai, Wanli
    • Asian Journal of Innovation and Policy
    • /
    • v.7 no.1
    • /
    • pp.190-206
    • /
    • 2018
  • This article focuses on the legal systems and practice of intellectual property protection in Japan and China, including the relating civil litigation and administrative litigation procedures. The challenge of balancing the relationship between an invalidation trial and an invalid defense during the process of civil patent infringement litigation is a common issue to be solved in both Japan and China. In addition, it is quite usual that the IP products are being imported and exported across the borders due to the expansion of international trade. Accordingly, one of the most symbolic and difficult issues is how to balance the development of international trade and IP protection in each country. In other words, there is a practical issue regarding whether a parallel import of patented products is acceptable to a country or not. The key to determining this issue depends on the judgment of international exhaustion.

Trust-based Relay Selection in Relay-based Networks

  • Wu, Di;Zhu, Gang;Zhu, Li;Ai, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2587-2600
    • /
    • 2012
  • It has been demonstrated that choosing an appropriate relay node can improve the transmission rate for the system. However, such system improvement brought by the relay selection may be degraded with the presence of the malicious relay nodes, which are selected but refuse to cooperate for transmissions deliberately. In this paper, we formulate the relay selection issue as a restless bandit problem with the objective to maximize the average rate, while considering the credibility of each relay node, which may be different at each time instant. Then the optimization problem is solved by using the priority-index heuristic method effectively. Furthermore, a low complexity algorithm is offered in order to facilitate the practical implementations. Simulation results are conducted to demonstrate the effectiveness of the proposed trust-based relay selection scheme.