• Title/Summary/Keyword: Key sharing

Search Result 611, Processing Time 0.026 seconds

A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks (네트워크 취약점 검색공격 탐지 시스템을 위한 안전한 통신 프레임워크 설계)

  • You, Il-Sun;Kim, Jong-Eun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.1-10
    • /
    • 2003
  • In this paper, we propose a secure communication framework for interaction and information sharing between a server and agents in DS-NVSA(Detection System of Network Vulnerability Scan Attacks) proposed in〔1〕. For the scalability and interoperability with other detection systems, we design the proposed IDMEF and IAP that have been drafted by IDWG. We adapt IDMEF and IAP to the proposed framework and provide SKTLS(Symmetric Key based Transport Layer Security Protocol) for the network environment that cannot afford to support public-key infrastructure. Our framework provides the reusability of heterogeneous intrusion detection systems and enables the scope of intrusion detection to be extended. Also it can be used as a framework for ESM(Enterprise Security Management) system.

A Study on Management and Transfer of Knowledge/Information/Technology for Technopoleis Vitalization (과학기술단지 활성화를 위한 지식/정보/기술 관리 및 전파에 관한 연구)

  • Sung, Tae-Kyung
    • Asia pacific journal of information systems
    • /
    • v.10 no.4
    • /
    • pp.57-75
    • /
    • 2000
  • Most current literature on knowledge and technology transfer(Appropriability Model, Dissemination Model, and Knowledge Utilization Model), describe the process of transfer in details, but has limitation in terms of their application in contemporary high-tech industries since most studies have not provided plausible explanation on levels and factors affecting transfer of knowledge and/or technology. To overcome these limitations, the four levels of knowledge and technology transfer are suggested: Knowledge and Technology Creation(Level I), Sharing(Level II), Implementation(Level III), and Commercialization(Level IV). Comprehensive literature identifies sixteen variables affecting the process and results of knowledge and technology transfer. The survey results show four key factors in knowledge and technology transfer: Communication, Distance, Equivocality, and Motivation, Communication refers to the degree to which a medium is able to efficiently and accurately conveys task-relevant information and media while distance involves both physical and cultural proximity. Equivocality refers to the degree of concreteness of knowledge and technology to be transferred while motivation involves incentives for and the recognition of the importance of knowledge and technology transfer activities. Further analysis shows that there are four distinctive clusters and they show very contrasting characteristics in terms of four key factors. The careful mapping of the four clusters on the four key factors show very informative knowledge and technology transfer patterns, the Knowledge and Technology Transfer Grid. Finally, actions to increase communication interactivity and motivation, and to reduce cultural distance and equivocality are suggested.

  • PDF

The Functional Requirements of Core Elements for Research Data Management and Service (연구 데이터 관리 및 서비스를 위한 핵심요소의 기능적 요건)

  • Kim, Juseop;Kim, Suntae;Choi, Sangki
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.3
    • /
    • pp.317-344
    • /
    • 2019
  • Increasing the value of data, paradigm shifts in research methods, and specific manifestations of open science indicate that research is no longer text-centric, but data-driven. In this study, we analyzed the services for DCC, ICPSR, ANDS and DataONE to derive key elements and functional requirements for research data management and services that are still insufficient in domestic research. Key factors derived include DMP writing support, data description, data storage, data sharing and access, data citations, and data management training. In addition, by presenting functional requirements to the derived key elements, this study can be applied to construct and operate RDM service in the future.

Development of Unique Registration Number System for Construction Site Integrated DB (건설 통합DB 구축을 위한 시공현장등록번호 체계 개발)

  • Hur, Youn Kyoung;Lee, Seung Woo;Yoo, Wi Sung;Kim, Sung Hwan;Sung, Yookyung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2023.05a
    • /
    • pp.367-368
    • /
    • 2023
  • Kiscon, Seumteo, KONEPS and CSI are representative construction-related DBs. All four DBs are operated by the public. However, the characteristics of data are different depending on the purpose. Therefore, it is difficult to utilize integrated data and it is only used sparingly. Creating and sharing a unique key that can identify a construction site will enable integrated accumulation and management of construction-related data for various purposes. At this point, it is most efficient to assign a unique key based on KISCON. KISCOn data conforms to the construction site definition and covers most of the public, private, architectural and civil works. In addition, there is an advantage in that DB construction is performed in the construction situation, which is a relatively preceding process. In the future, it is necessary to create a practical construction site integrated DB through the production of an integrated key table containing linkage information of unique keys for site management, performance indicators, and statistics production.

  • PDF

A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing

  • Hundera, Negalign Wake;Mei, Qian;Xiong, Hu;Geressu, Dagmawit Mesfin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.455-472
    • /
    • 2020
  • As a user in modern societies with the rapid growth of Internet environment and more complicated business flow processes in order to be effective at work and accomplish things on time when the manager of the company went for a business trip, he/she need to delegate his/her signing authorities to someone such that, the delegatee can act as a manager and sign a message on his/her behalf. In order to make the delegation process more secure and authentic, we proposed a secure and efficient identity-based proxy signcryption in cloud data sharing (SE-IDPSC-CS), which provides a secure privilege delegation mechanism for a person to delegate his/her signcryption privilege to his/her proxy agent. Our scheme allows the manager of the company to delegate his/her signcryption privilege to his/her proxy agent and the proxy agent can act as a manager and generate signcrypted messages on his/her behalf using special information called "proxy key". Then, the proxy agent uploads the signcrypted ciphertext to a cloud service provider (CSP) which can only be downloaded, decrypted and verified by an authorized user at any time from any place through the Internet. Finally, the security analysis and experiment result determine that the proposed scheme outperforms previous works in terms of functionalities and computational time.

Distributed Access Privilege Management for Secure Cloud Business (안전한 클라우드 비즈니스를 위한 접근권한 분산관리)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.369-378
    • /
    • 2011
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server. And we construct the model of access privilege management using AONT based XOR threshold Secret Sharing, In addition, our scheme enable to grant weight for access privilege using XOR Share. In chapter 4, we differentiate existing scheme and proposed scheme.

The tunnel model tests of material development in different surrounding rock grades and the force laws in whole excavation-support processes

  • Jian Zhou;Zhi Ding;Jinkun Huang;Xinan Yang;Mingjie Ma
    • Geomechanics and Engineering
    • /
    • v.36 no.1
    • /
    • pp.51-69
    • /
    • 2024
  • Currently, composite lining mountain tunnels in China are generally classified based on the [BQ] method for the surrounding rock grade. Increasingly, tunnel field construction is replicated indoors for scale down model tests. However, the development of analogous materials for model tests of composite lining tunnels with different surrounding rock grades is still unclear. In this study, typical Class III and V surrounding rock analogous materials and corresponding composite lining support materials were developed. The whole processes of excavation-support dynamics of the mountain tunnels were simulated. Data on the variation of deformations, contact pressures and strains on the surrounding rock were obtained. Finally, a comparative analysis between model tests and numerical simulations was performed to verify the rationality of analogous material development. The following useful conclusions were obtained by analyzing the data from the tests. The main analogous materials of Class III surrounding rock are barite powder, high-strength gypsum and quartz sand with fly ash, quartz sand, anhydrous ethanol and rosin for Class V surrounding rock. Analogous materials for rockbolts, steel arches are replaced by aluminum bar and iron bar respectively with both shotcrete and secondary lining corresponding to gypsum and water. In addition, load release rate of Class V surrounding rock should be less than Class III surrounding rock. The fenestration level had large influence on the load sharing ratio of the secondary lining, with a difference of more than 30%, while the influence of the support time was smaller. The Sharing ratios of secondary lining in Class III surrounding rock do not exceed 12%, while those of Class V surrounding rock exceed 40%. The overall difference between the results of model tests and numerical simulations is small, which verifies the feasibility of similar material development in this study.

A Polynomial-based Study on the Protection of Consumer Privacy (소비자 프라이버시 보호에 관한 다항식 기반 연구)

  • Piao, Yanji;Kim, Minji
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.145-158
    • /
    • 2020
  • With the development and widespread application of online shopping, the number of online consumers has increased. With one click of a mouse, people can buy anything they want without going out and have it sent right to the doors. As consumers benefit from online shopping, people are becoming more concerned about protecting their privacy. In the group buying scenario described in our paper, online shopping was regarded as intra-group communication. To protect the sensitive information of consumers, the polynomial-based encryption key sharing method (Piao et al., 2013; Piao and Kim, 2018) can be applied to online shopping communication. In this paper, we analyze security problems by using a polynomial-based scheme in the following ways : First, in Kamal's attack, they said it does not provide perfect forward and backward secrecy when the members leave or join the group because the secret key can be broken in polynomial time. Second, for simultaneous equations, the leaving node will compute the new secret key if it can be confirmed that the updated new polynomial is recomputed. Third, using Newton's method, attackers can successively find better approximations to the roots of a function. Fourth, the Berlekamp Algorithm can factor polynomials over finite fields and solve the root of the polynomial. Fifth, for a brute-force attack, if the key size is small, brute force can be used to find the root of the polynomial, we need to make a key with appropriately large size to prevent brute force attacks. According to these analyses, we finally recommend the use of a relatively reasonable hash-based mechanism that solves all of the possible security problems and is the most suitable mechanism for our application. The study of adequate and suitable protective methods of consumer security will have academic significance and provide the practical implications.

Design and Implementation of Double-Key based Light Weight Security Protocol in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 더블키를 이용한 경량 보안 프로토콜 설계 및 구현)

  • Zhung, Yon-Il;Lee, Sung-Young
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.239-254
    • /
    • 2007
  • Ubiquitous computing supports environment to freely connect to network without restrictions of place and time. This environment enables easy access and sharing of information, but because of easy unauthorized accesses, specified security policy is needed. Especially, ubiquitous sensor network devices use limited power and are small in size, so, many restrictions on policies are bound to happen. This paper proposes double-key based light weight security protocol, independent to specific sensor OS, platform and routing protocol in ubiquitous sensor network. The proposed protocol supports safe symmetric key distribution, and allows security manager to change and manage security levels and keys. This had a strong merit by which small process can make large security measures. In the performance evaluation, the proposed light weight security protocol using double-key in ubiquitous sensor network allows relatively efficient low power security policy. It will be efficient to ubiquitous sensor network, such as smart of ace and smart home.

A Study on the Impact of the SCM practices on the Supplier Network Responsiveness, the Product Innovation and the Market Access Time of Export Companies (수출기업의 공급사슬관리가 공급자 네트워크 대응성과 제품혁신 및 시장접근시간에 미치는 영향에 관한 연구)

  • CHOI, Doo-Won;PAK, Myong-Sop;PARK, Jin-Woo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.71
    • /
    • pp.325-350
    • /
    • 2016
  • As the new competitive environment become more global, technologically oriented and customer driven, as customers continually demand higher quality, faster response, and greater reliability of products and services, the new global market demands a more customer responsive behaviour by companies and firms have responded with innovative products and improved manufacturing processes to manufacture products. Further, the shift from traditional manufacturing and purchasing to JIT manufacturing and purchasing requires customers and suppliers to shift from adversarial relationships to strategic partnerships, and information sharing, so as to attain flexibility, reliability, and speed. SCM practices such as supplier collaboration and information sharing is considered as a key to attaining supplier network responsiveness and enhancing the product innovation and the market access time. The current research investigates the effect of SCM practices on supplier network responsiveness, the product innovation and the market access time of export companies. Thus by providing empirical evidence of the said relationships, this study offers useful guidelines for measuring and improving the supplier network responsiveness of a firm, facilitating further research in the area.

  • PDF