• Title/Summary/Keyword: Model checking

Search Result 569, Processing Time 0.028 seconds

Analysis of influencing on Inefficiencies of Korean Banking Industry using Weighted Russell Directional Distance Model (가중평균 러셀(Russell) 방향거리함수모형을 이용한 은행산업의 비효율성 분석)

  • Yang, Dong-Hyun;Chang, Young-Jae
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.117-125
    • /
    • 2019
  • This study measured inefficiencies of Korean banks with weighted Russell directional distance function, WRDDM, for the years of 2004-2013. Checking contributions of inputs and outputs to these inefficiencies, we found that non-performing loan as undesirable output was the most influential factor. The annual average of inefficiencies of Korean banks was 0.3912, and it consisted of non-performing loan 0.1883, output factors 0.098 except non-performing loan, input factors 0.098. The annual average inefficiency went sharply up from 0.2995 to 0.4829 mainly due to the sharp increase of inefficiency of non-performing loan from 0.1088 to 0.2678 before and after 2007-2008 Global financial crisis. We empirically showed the non-performing loan needed to be considered since it was the most important factor among the influential factors of technical inefficiency such as manpower, total deposit, securities, and non-performing loan. This study had some limitation since we did not control financial environment factor in WRDDM.

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.

Inelastic Dynamic Demands of a RC Special Moment Frame Building (철근 콘크리트 특수 모멘트 골조 건물의 비탄성 동적 요구값)

  • Kim, Tae-Wan
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.9 no.5 s.45
    • /
    • pp.11-19
    • /
    • 2005
  • Seismic design of a building is usually performed by using the linear static procedure. However, the actual behavior of the building subjected to earthquake is inelastic and dynamic in nature. Therefore, inelastic dynamic analysis is required to evaluate the safety of the structure designed by the current design codes. For the validation, a RC special moment resisting frame building was chosen and designed by IBC 2003 representing new codes. Maximum plastic rotation and dissipated energy of some selected members were calculated for examining if the inelastic behavior of the building follows the intention of the code, and drift demand were calculated as well for checking if the building well satisfies the design drift limit. In addition, the effect of including internal moment resisting frames (non lateral resisting system) on analyses results was investigated. As a result of this study, the building designed by IBC 2003 showed the inelastic behavior intended in the code and satisfied the design drift limit. Furthermore, the internal moment resisting frames should be included in the analytical model as they affect the results of seismic analyses significantly.

A Fault Tolerant Transaction Management in Multidatabase Systems (멀티 데이타베이스 시스템에서 고장을 허용하는 트랜잭션 관리)

  • Sin, Seong-Cheol;Hwang, Bu-Hyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.2
    • /
    • pp.172-183
    • /
    • 1994
  • In the multidatabase systems(MDBS), local autonomy and global consistency are important issues. Global consistency could be maintained by a global concurrency control algorithm and a global recovery algorithm. In this thesis, we propose a global concurrency control algorithm to ensure local autonomy and to guarantee global serializability, and a global recovery algorithm which is possible to recover the multudatabase from any failures. The proposed global concurrency control algorithm uses bottom-up approach, based on three-level transaction processing model. It can produce a local history that the execution order of subtransactions is identical to their serialization order by using dummy-operations in the server when an indirect conflict is caused between subtransactions due to local transactions. At the global module, it can efficiently validate global serializability of global transactions by checking global serializability only for the global transactions which conflict with each other.

  • PDF

Security Verification of a Communication Authentication Protocol in Vehicular Security System (자동차 보안시스템에서 통신 인증프로토콜의 보안성 검증)

  • Han, Myoungseok;Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.229-234
    • /
    • 2014
  • Vehicular electronic communication system has continued to develop in favor of high performance and user convenience with the evolution of auto industry. Yet, due to the nature of communication system, concerns over intruder attacks in transmission sections have been raised with a need for safe and secure communication being valued. Any successful intruder attacks on vehicular operation and control systems as well as on visual equipment could result in serious safety and privacy problems. Thus, research has focused on hardware-based security and secure communication protocols. This paper proposed a safe and secure vehicular communication protocol, used the formal verification tool, Casper/FDR to test the security of the proposed protocol against different types of intruder attacks, and verified that the proposed protocol was secure and ended without problems.

Verification of Safety in a RFID Security Authentication Protocol Using Session and Public Keys (세션키 및 공개키를 이용한 RFID 보안 인증 프로토콜의 안전성 검증)

  • Bae, Woo Sik;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.325-332
    • /
    • 2012
  • Due to its communication vulnerability resulting in a range of problems, e.g. eavesdropping, information exposure, traffic analysis and spoofing, RFID system becomes the target of attackers. Accordingly, many investigators have proposed various protocols to the extent of theorem proving or verification as the implementation is challenging. This paper thus proposes a safe RFID security protocol using public keys, session keys, hashes, XORs, and random numbers. Timestamps and hashes are applied to the most vulnerable section between readers and tags to detect attacks in attack signals with time difference. Also, to prevent tag information from being exposed in the last session, hash operation is adopted before communication. Finally, in this paper, we designed a RFID security protocol using public and session keys applicable to real systems and verified the security of the proposed protocol with a differentiated formal verification technique.

Proposition of Response Modification Factor of Low-rise Steel Intermediate Moment Frame in Korea using FEMA P695 (FEMA P695를 이용한 국내 저층 철골 중간모멘트골조의 반응수정계수 제안)

  • Han, A Rum;Kim, Taewan;Yu, Eunjong
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.18 no.1
    • /
    • pp.37-43
    • /
    • 2014
  • In current seismic design code, steel moment frames are classified into ordinary, intermediate, and special moment frames. In the case of special moment frames which have large R-factor, economic design is possible by reducing the design lateral force. However, there is difficulty for practical application due to constraints such as strong column-weak beam requirement. This study evaluated if steel intermediate moment frame could maintain enough seismic capacity when the R-factor is increased from 4.5 to 6. As for the analytical models, steel moment frames of 3 and 5 stories were categorized into four performance groups according to seismic design category. Seismic performances of the frames were evaluated through the procedure based on FEMA P695. FEMA P695 utilizes nonlinear static analysis(pushover analysis) and nonlinear dynamic analysis(incremental dynamic analysis, IDA). In order to reflect the characteristics of Korean steel moment frames on the analytical model, the beam-column connection was modeled as weak panel zone where the collapse of panel zone was indirectly considered by checking its ultimate rotational angle after an analysis is done. The analysis result showed that the performance criteria required by FEMA P695 was satisfied when R-factor increased in all the soil conditions except $S_E$.

How Destination Image Factors Affect Domestic Tourists Revisit Intention to Ba Ria-Vung Tau Province, Vietnam

  • GIAO, Ha Nam Khanh;NGAN, Nguyen Thi Kim;PHUC, Nguyen Pham Hanh;TUAN, Huynh Quoc;HONG, Ha Kim;ANH, Huynh Diep Tram;NHU, Duong Thi Huynh;LAN, NgoThi
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.6
    • /
    • pp.209-220
    • /
    • 2020
  • This research examines the affect of destination image factors on revisit intention of domestic tourists at Ba Ria Vung-Tau (BRVT), by questioning directly 510 domestic tourists. The convenient sampling method is used in dividing the crowds into four groups; the four main surveyed areas in BRVT are: Vung Tau, Long Hai-Phuoc Hai, Xuyen Moc and Con Dao. A combination of qualitative and quantitative methodologies were utilized.A focus group of 10 domestic tourists wasset up to review and explore the variousfactors as well as the conceptual model. An in-depth interview with 12 participants was developed to fine-tune measurement items. The questionnaire applied a 5-point Likert scale. Checking the reliability by Cronbach's Alpha, exploratory factor analyzing and linear multiple regression were used with the SPSS program. The results show that there are eight main destination image factors affecting domestic tourists revisit intention to BRVT using linear regression and arranged by decreasing importance: Infrastructure, Variety Seeking, Accessibility, Local food, Atmosphere, Environment, Price Value, Leisure and Entertainment. From that, the research offers some suggestions and policy recommendations for the tourism business and provincial policy-makers to identify the main issues and develop better customer services to increase domestic tourists'revisit intention.

Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy

  • Yu, Haiyang;Cai, Yongquan;Kong, Shanshan;Ning, Zhenhu;Xue, Fei;Zhong, Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5039-5061
    • /
    • 2017
  • Cloud storage becomes a new trend that more and more users move their data to cloud storage servers (CSSs). To ensure the security of cloud storage, many cloud auditing schemes are proposed to check the integrity of users' cloud data. However, most of them are based on public key infrastructure, which leads to complex certificates management and verification. Besides, most existing auditing schemes are inefficient when user uploads a large amount of data or a third party auditor (TPA) performs auditing for multiple users' data on different CSSs. To overcome these problems, in this paper, we propose an efficient and secure auditing scheme based on identity-based cryptography. To relieve user's computation burden, we introduce a proxy, which is delegated to generate and upload homomorphic verifiable tags for user. We extend our auditing scheme to support auditing for dynamic data operations. We further extend it to support batch auditing in multiple users and multiple CSSs setting, which is practical and efficient in large scale cloud storage system. Extensive security analysis shows that our scheme is provably secure in random oracle model. Performance analysis demonstrates that our scheme is highly efficient, especially reducing the computation cost of proxy and TPA.

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs

  • Zafar, Faheem;Khan, Abid;Ahmed, Mansoor;Khan, Majid Iqbal;Jabeen, Farhana;Hamid, Zara;Ahmed, Naveed;Bashir, Faisal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2851-2873
    • /
    • 2016
  • Cloud storage as a service provides high scalability and availability as per need of user, without large investment on infrastructure. However, data security risks, such as confidentiality, privacy, and integrity of the outsourced data are associated with the cloud-computing model. Over the year's techniques such as, remote data checking (RDC), data integrity protection (DIP), provable data possession (PDP), proof of storage (POS), and proof of retrievability (POR) have been devised to frequently and securely check the integrity of outsourced data. In this paper, we improve the efficiency of PDP scheme, in terms of computation, storage, and communication cost for large data archives. By utilizing the capabilities of JAR and ZIP technology, the cost of searching the metadata in proof generation process is reduced from O(n) to O(1). Moreover, due to direct access to metadata, disk I/O cost is reduced and resulting in 50 to 60 time faster proof generation for large datasets. Furthermore, our proposed scheme achieved 50% reduction in storage size of data and respective metadata that result in providing storage and communication efficiency.