• Title/Summary/Keyword: Name Identifier

Search Result 41, Processing Time 0.024 seconds

Confidentiality Service Scheme Extending the DAA on HTTP Environment (HTTP환경에서 DAA를 이용한 비밀성 보안서비스 지원 방안)

  • 조인준;정희경;송기평;이준섭;구경철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.305-311
    • /
    • 1999
  • IETF(Internet Engineering Task Force) RFC 2069 recommend to accept the DAA(Digest Access Authentication) scheme ill the HTTP 1.1(Hype. Text Transfer Protocol 1.1). When the client want to access the protected URI resources with Web Server, the BAA scheme is not considered to be a secure method of user authentication, as the user name and password are passed over the network as clear text. But, The DAA scheme is proposed to create a access authentication method which avoids the serious flaws of BAA(ie, passed over the network as clear text). The flaw of DAA is not supported the confidentiality services between client and server. This paper is proposed a confidentiality service scheme for HTTP environment, as an extension to DAA

  • PDF

Dynamic DNS design for HIP (HIP을 적용한 동적 DNS 설계)

  • Jung-Soo Park;In-June Jo
    • The Journal of Engineering Research
    • /
    • v.6 no.2
    • /
    • pp.125-130
    • /
    • 2004
  • In the current Internet, IP addresses does not support Mobility and Multi-homming because it depend on their topological location. To resolve these problems, IETF hip WG introduces Host Identity Protocol that separates the endpoint identifier and locator roles of IP addresses. However the DNS that was presented for the HIP had only a part of the expansion design from the existing DNS function, so it was not an absolute complete method. This paper propose how the dymanic DNS has been designed so that it support the HIP completely. We added the Host Identity Namespace and the Rendezvous Server Namespace, defined the new PRs in DNS.

  • PDF

Hybrid Hierarchical Architecture for Mobility Management in Mobile Content Centric Networking (이동 콘텐트 중심 네트워킹 구조에서의 하이브리드 계층적 이동성 관리 방안)

  • Lee, Ji-hoon
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1147-1151
    • /
    • 2018
  • As personal users create and share lots of contents at any time and any places, new networking architecture such as content centric networking (CCN) has emerged. CCN utilizes content name as a packet identifier, not address. However, current CCN has a limitation for content source mobility management. The movement of content sources cause long delivery latency and long service disruption. To solve that, a hierarchical mobility management was was proposed. However, the hierarchical mobility management scheme has still the loss of interest packets and long handoff latency. So, this paper presents the hybrid hierarchical mobility management in mobile CCN environements to reduce both the loss rate of interest packets and the handoff latency. It is shown from the performance evaluations shows that the proposed scheme provides low loss rate of control message.

Describing Attributes and Relationships of Families in Cataloging Rules (목록규칙에 있어 가계(家系)의 속성과 관계의 기술)

  • Lee, Changsoo
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.3
    • /
    • pp.27-49
    • /
    • 2015
  • The purpose of this study is to suggest the ways to apply describing attributes and relationships of families to Korean Cataloging Rules. In order to achieve the objective of this study, the FRAD conceptual model, and the cataloging rules such as RDA, DACS2 and KCR2 were analyzed. For describing attributes of families, this study analyzed name, type, date, place, prominent member, hereditary title, language, history, and identifier of families. For describing relationships of families, this study investigated describing relationships to families associated with each resource, such as a work, an expression, a manifestation, and an item, and describing relationships between families, relationships between families and persons, and relationships between families and corporate bodies. Based on these analyses, this study suggested the application methods of describing attributes and relationships of families in Korean Cataloging Rules.

Efficient Hierarchical Mobility Management Scheme for Mobile Content Centric Networking (이동 컨텐츠 중심 네트워크에서의 효율적인 계층적 이동성 관리 방안)

  • Lee, Jihoon;Lee, Juyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.37-41
    • /
    • 2018
  • As individuals generate and share various content anytime and anywhere, new networking architectures, such as content-centric networking (CCN) using the content name as a packet identifier, have been in the spotlight recently. However, the current CCN hardly takes into account node mobility problems, especially the mobility of content sources. The movement of content sources causes long delivery latency and long service disruptions. To solve that, the tunneling-based redirection scheme was proposed. However, the tunneling-based scheme requires a location-update procedure whenever the network changes, which creates many control messages and causes long latency. So, this paper presents hierarchical mobility management of mobile CCN to reduce the number of control messages and handoff latency. Performance evaluation shows that the proposed scheme can provide low control overhead, which results in network scalability.

Java Automatic Identifier Renaming Technique and Protection Method (자바 자동 식별자 리네이밍 기법 및 보호 방법)

  • Kim, Ji-Yun;Hong, Soo-Hwa;Go, Nam-Hyeon;Lee, Woo-Seung;Park, Yong-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.709-719
    • /
    • 2015
  • This paper introduces a proper renaming service using variable action and security services against the analysis techniques in Java code. The renaming service that is introduced is separated into API pattern and loop condition. We present our scheme algorithm with known Java obfuscation techniques and tools in order to help readers understanding, and implement prototype to prove practicality in this paper. Test result using prototype shows 73% successful variable renaming rate. Using our scheme, cooperators can intuitionally understand all of code. Also, It helps malware analysts to predict malware action by variable name. But application source code that is developed by Java is exposed to hackers easily using our scheme. So we introduce Java application code protection methods, too.

A Study on Integrated ID Authentication Protocol for Web User (웹 사용자를 위한 통합 ID 인증 프로토콜에 관한 연구)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.197-205
    • /
    • 2015
  • Existing Web authentication method utilizes the resident registration number by credit rating agencies separating i-PIN authentication method which has been improved authentication using resident registration number via the real name confirmation database. By improving the existing authentication method, and it provides the available integrated ID authentication on Web. In order to enhance safety, the proposed authentication method by encrypting the user of the verification value, and stores the unique identifier in the database of the certificate authority. Then, the password required to log in to the Web is for receiving a disposable random from the certificate authority, the user does not need to remember a separate password and receives the random number by using the smart phone. It does not save the user's personal information in the database, and it is easy to management of personal information. Only the integration ID needs to be remembered with random number on every time. It doesn't need to use various IDs and passwords if you use this proposed authentication methods.

A Study on Derivation of Technical Elements for Joint Use of Copyright Rights Group Data by ISNI Korea Consortium (ISNI Korea 컨소시엄의 저작권 권리 단체 데이터 공동 활용을 위한 기술요소 도출 연구)

  • Park, Jin Ho;Kwak, Seung Jin;Lee, Seungmin;Oh, Sang Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.31 no.1
    • /
    • pp.379-392
    • /
    • 2020
  • The purpose of this study is to present technical elements to improve the data utilization of the ISNI Korea Consortium, which is operated by the National Library of Korea, which is responsible for the registration of Korean names. The ISNI Korea Consortium aims to register various creation-related information in addition to bibliographic-related individual and organization name information. To this end, this study examines the ISNI Korea consortium, which is a data provider's consultative body, among other things, the metadata status of copyright organizations and the linked data specification of ISNI. As a result, data acquisition, refining, storage, identifier management, consortium metadata management, five in total, and RDF data management (repository) in terms of linked data, RDF data issuance, RDF data retrieval, RDF data inquiry, RDF data Eight technical elements, including download, ontology inquiry, standard term inquiry and mapping information management, were derived.

Implementation and Utilization of Decentralized Identity-Based Mobile Student ID (분산 ID 기반 모바일 학생증 구현과 활용)

  • Cho, Seung-Hyun;Kang, Min-Jeong;Kang, Ji-Yun;Lee, Ji-Eun;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1115-1126
    • /
    • 2021
  • In this paper, we developed a mobile student ID providing a self sovereignty identity (SSI) which replaces the conventional plastic-type student ID that includes private information of a student such as a name, a student number, a facial photo, etc. The implemented mobile student ID solves the problem of exposing student's identity due to a loss or a theft of a plastic-type student ID, and it has a structure and process of FRANCHISE model which is developed by a concept of a decentralized Identity(DID) of a Blockchain, in which specialized for convenience as an electronic student ID through an application on a smart phone device. In addition, it protects student's privacy by controlling personal information on oneself. By using a smartphone, not only it easily identifies the student but also it expands to several services such as participation in school events, online authentication, and a student's exchange program among colleges.

A Study on Considerations in the Authority Control to Accommodate LRM Nomen (LRM 노멘을 수용하기 위한 전거제어시 고려사항에 관한 연구)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.1
    • /
    • pp.109-128
    • /
    • 2021
  • This paper is to explore considerations in authority control to accommodate LRM nomen entities through the literature reviews, the analysis of RDA rules, and the opinion survey of domestic catalog experts. As a result, for authority control, considerations were proposed in the aspect of nomen's attribute elements, catalog description, and MARC authority format. First, it is necessary to describe in as much detail as possible the category, the scheme, intended audience, the context of use, the reference source, the language, the script, the script conversion as the attributes of the nomen with the status of identification, note, and indifferentiated name indicators added in RDA. Second, the description method of attribute elements and relational elements of nomen can be unstructured, structured, identifier, and IRI as suggested in RDA, and vocabulary encoding scheme (VES) and string encoding scheme (SES) should be written for structured description, Also, cataloging rules for structuring authorized access points and preferred names/title should be established. Third, an additional expansion plan based on Maxwell's expansion (draft) was proposed in order to prepare the MARC 21 authority format to reflect the LRM nomen. (1) The attribute must be described in 4XX and 5XX so that the attribute can be entered for each nomen, and the attributes of the nomen to be described in 1XX, 5XX and 4XX are presented separately. (2) In order to describe the nomen category, language, script, script conversion, context of use, and date of usage as a nomen attribute, field and subfield in MARC 21 must be added. Accordingly, it was proposed to expand the subfield of 368, 381, and 377, and to add fields to describe the context of use and date of usage. The considerations in authority control for the LRM nomen proposed in this paper will be the basis for establishing an authority control plan that reflects LRM in Korea.