• Title/Summary/Keyword: OpenID

Search Result 92, Processing Time 0.023 seconds

A Study on Utilization of ORCID based Author Identifier at National Level (국가 차원의 ORCID 기반 저자 식별자 활용에 관한 연구)

  • Kim, Eun-Jeong;Noh, Kyung-Ran
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.28 no.3
    • /
    • pp.151-174
    • /
    • 2017
  • The diffusion of the internet, the advancement of ICT technology, and digital diffusion have facilitated the streamlining and acceleration of scholarly communication and speeding up research, and the paradigm of scholarly information dissemination is changing. This study introduces the ORCID, a unique author identifier, and examines the ORCID organization's activities, the advantages given to researchers and research institutes, and the membership status. In addition, this paper examines adoptions and utilizations of ORCID in major countries including USA, UK, Italy, and China. Based on this, this paper suggests the necessary considerations for utilizing ORCID in terms of governance, system elements, policy and institutional aspects in an effort to identify authors at national level.

An Efficiency Authentication Security Mechanism of VANET in Highway (고속도로에서 차량네트워크(VANET)의 효율적인 인증 보안 매커니즘)

  • Kim, Gab-In;Kim, Yong-Cahn;Lee, Jong-Kun
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.3
    • /
    • pp.57-64
    • /
    • 2016
  • Since the information transmitted in VANET is distributed in an open access environment, the security problem is one of the most critical issue in VANET. For the communicate efficiently in VANET, each RSU(Roadside Unit) or OBU(On-Board Units) need certain features that will help them to gather information, to inform their neighbors and to make decisions by considering all of the collected information. In this paper, we propose a novel authentication scheme guaranteeing secure RSUs to OBUs of VANET in highway used the ID-based authentication scheme. We show a usefulness and effectiveness of proposed authentication scheme after compared with previous works.

Functional Analysis of Gene ID1103135 Encoding a 3-Phytase Precursor Homologue of Streptomyces coelicolor (Streptomyces coelicolor의 3-Phytase 상동성 유전자 ID1103135의 기능분석)

  • 김미순;강대경;이홍섭;연승우;김태영;홍순광
    • Korean Journal of Microbiology
    • /
    • v.40 no.2
    • /
    • pp.81-86
    • /
    • 2004
  • Among the annotated ORFs of Streptomyces coelicolor, SCO7697 was supposed to encode for phytase (myo-inositol hexakisphosphate phosphohydrolase). The DNA fragment containing SCO7697 was cloned by the PCR from the chromosomal DNA of S.coelicolor A3(2)M. The cloned fragment was introduced into E. coli expres-sion vector, pET28a(+), to yield two recombinant plasmids, pET28-SP and pET28-LP, which were designed to encode different length of proteins. When the pET28-SP and pET28-LP were introduced into E. coli BL21, the transformants successfully overexpressed recombinant proteins, but the molecular weights of the expressed pro-teins were appeared bigger than those of expected in SDS-polyacrylamide gel electrophoresis. The shift of cul-tural temperature from 37 to $30^{\circ}C$ made most of expressed protein be solubilized. The expressed protein, however, did not show any phytase activity. When the DNA fragment with its own promoter placed on the E. coli-Streptomyces vector, pWHM3, and introduced into S. lividans, the phytase activity was not detected either. These results suggest that even though the SCO7697 was annotated as a probable phytase with high probability (E value is $6e^{-89}$), the real product doest not have phytase activity.

Integration Application of Node-Link Data Using Open LR Method (Open LR 기법을 이용한 노드-링크 데이터의 통합활용 방안에 관한 연구)

  • Kwon, Tae Ho;Choi, Yun-Soo
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.5
    • /
    • pp.78-87
    • /
    • 2021
  • This paper analyzes the range and attributes of the traffic information service between domestic public institutions and private companies, and suggests the possibility of joint application of node-link information for each company and the possibility of joint use of private traffic information. For this purpose, the present condition and attributes of domestic and foreign traffic information node-links (link length, node ID number, U-turn information, lane information, left turn information, right turn information, etc.) were analyzed. The analysis targets, the node-link of the national standard node and the two companies were analyzed. The area of the experiment was selected in Jongno-gu, Seoul, where standard-link information is complex, traffic volume is high, and various standard-links exist. The experiment was conducted by comparing and analyzing the traffic information attributes of three types of node-links and performing node-links overlapping matching (utilizing encoding_decoding method), and the possibility of matching node-links and attributes of different specifications was analyzed using Open LR technique.

An OpenAPI based Security Framework for Privacy Protection in Social Network Service Environment (소셜 네트워크 서비스 환경에서 개인정보보호를 위한 OpenAPI기반 보안 프레임워크)

  • Yoon, Yongseok;Kim, Kangseok;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1293-1300
    • /
    • 2012
  • With the rapid evolution of mobile devices and the development of wireless networks, users of mobile social network service on smartphone have been increasing. Also the security of personal information as a result of real-time communication and information-sharing are becoming a serious social issue. In this paper, a framework that can be linked with a social network services platform is designed using OpenAPI. In addition, we propose an authentication and detection mechanism to enhance the level of personal information security. The authentication scheme is based on an user ID and password, while the detection scheme analyzes user-designated input patterns to verify in advance whether personal information protection guidelines are met, enhancing the level of personal information security in a social network service environment. The effectiveness and validity of this study were confirmed through performance evaluations at the end.

An efficient ID-based authentication scheme based on the rth -residuosity problem in wireless environment (무선통신 환경에서 사용 가능한 고차잉여류 문제에 기반을 둔 자체 인증방식)

  • 이보영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.73-82
    • /
    • 1999
  • In an open network computing environment a host cannot to identity its users correctly to network services. In order to prevent this thing we present the design of a authentication scheme 솟 using the notion of rth -residuosity problem and discrete logarithm problem which is proposed by S. J. Park et al. The proposed scheme described here is efficient method for mutual authentication without leakage of users identity in mobile communication system that ensure user anonymity and untraceability.

Sampling based Network Flooding Attack Detection/Prevention System for SDN (SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템)

  • Lee, Yungee;Kim, Seung-uk;Vu Duc, Tiep;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.24-32
    • /
    • 2015
  • Recently, SDN is actively used as datacenter networks and gradually increase its applied areas. Along with this change of networking environment, research of deploying network security systems on SDN becomes highlighted. Especially, systems for detecting network flooding attacks by monitoring every packets through ports of OpenFlow switches have been proposed. However, because of the centralized management of a SDN controller which manage multiple switches, it may be substantial overhead that the attack detection system continuously monitors all the flows. In this paper, a sampling based network flooding attack detection and prevention system is proposed to reduce the overhead of monitoring packets and to achieve reasonable functionality of attack detection and prevention. The proposed system periodically takes sample packets of network flows with the given sampling conditions, analyzes the sampled packets to detect network flooding attacks, and block the attack flows actively by managing the flow entries in OpenFlow switches. As network traffic sampler, sFlow agent is used, and snort, an opensource IDS, is used to detect network flooding attack from the sampled packets. For active prevention of the detected attacks, an OpenDaylight application is developed and applied. The proposed system is evaluated on the local testbed composed with multiple OVSes (Open Virtual Switch), and the performance and overhead of the proposed system under various sampling condition is analyzed.

A Design of an Efficient Index Organization for XML Documents (XML 문서를 위한 효율적인 색인구조의 설계)

  • 안선하;박경환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.04a
    • /
    • pp.292-295
    • /
    • 2000
  • XML은 메타언어로써 구조적인 문서를 생성할 수있게 하며 이러한 구조적인 문서는 내용 기반검색,질의등의 처리가 가능하다는 것이다. XML문서의 논리적 구조를 표현하는 방법은 사용자 정의 문서타입(DTD)과 XML Schema 의 두가지 방식이 있으며, XML Schema 는 사용자 정의문서타입(DTD)에 비해 다양한 데이터 타입, namespace, Open-ended 데이터 모델등을 지원하여 문서의 구조 정의를 훨씬 더 유연하고 명시적이게 하게 하는 장점이있다. 본 논문에서는 XML 문서 검색을 위해 XML Schemadp 기반하여 내용 검색과 구조 검색을 효율적으로 지원하는 인덱스 구조를 제안한다. 요소들의 정의에 따르면 계층관계를 표현하기위한 구조정보와 XML 문서 인스턴스에서 나타나는 각 요소들의 순서정보를 요소의 ID로 사용함으로써 임의의 요소를 효율적으로 접근할 수 있게 한다.

  • PDF

P2P 사용자 인증과 OTP 분석

  • Moon, Yong-Hyuk;Kwon, Hyeok-Chan;Nah, Jae-Hoon;Jang, Jong-Soo
    • Review of KIISC
    • /
    • v.17 no.3
    • /
    • pp.32-40
    • /
    • 2007
  • 유비쿼터스 서비스 인프라로 부각되고 있는 P2P(Peer-to-Peer) 네트워크는 사용자 제작 콘텐트, 동영상, 파일 등으로 대표되는 지식 콘텐트뿐만 아니라, 컴퓨터 및 네트워크 자원(Resource)을 다양한 환경에서 N 대 N의 형태로 상호 공유 및 분배할 수 있는 구조적 가능성을 제공하고 있다. 그러나 "Open, Dynamic, Anonymous" 등의 특성을 기반으로 하는 P2P 네트워크는 신뢰적 ID(Identity) 생성 및 관리 그리고 이의 적절한 인증에 대한 지원 없이는 현실적으로 잠재적인 보안 위협에 노출되는 제약이 따르게 된다. 한편, 최근 금융보안업계가 주축이 되어 일회용패스워드로 지칭되는 OTP(One Time Password) 인증 메커니즘(Authentication Mechanism)을 제 1 등급 보안방법으로 명시화하고 있고, 온라인 업계에서도 이를 활용하는 기술적 시도 및 개발 사례가 늘어나고 있어, OTP 기술의 보안성 검토 및 활용 범위를 확대하는 방안에 대한 논의의 필요성이 대두되고 있다. 본고에서는 이러한 기술적 흐름 및 산업계 동향에 발맞춰 P2P 네트워크에서 사용자 인증을 위해 OTP 메커니즘을 활용하기 위한 방안에 대해 검토하고 이의 적용 가능성을 분석한다.

안전한 IoT 서비스를 위한 디바이스 보안과 플랫폼 보안 연동

  • Kim, Haeyong;Ji, JangHyun;Awaludin, Asep Muhamad;Kim, Howon
    • Review of KIISC
    • /
    • v.28 no.5
    • /
    • pp.26-30
    • /
    • 2018
  • 사물인터넷 서비스는 다양한 기능과 성능을 갖는 디바이스와 게이트웨이, 플랫폼, 서비스가 서로 상호 연동/통신함으로써 실현된다. 해당 서비스의 안전성 및 신뢰성을 보장하기 위해선 서비스 각 구성 요소에 적절한 보안 기술이 필요하다. 서비스 및 API 수준에서는 OpenID-connect, OAuth2, SAML, XACML과 같은 인증/인가, 접근 제어 기법이 필요하며, 플랫폼 및 프로토콜 수준에서는 MQTT, CoAP, HTTPS, RSPF 프로토콜 및 보안 절차가 필요하다. 한편, 이들 보안 기술은 공통적으로 TLS/DTLS 보안 프로토콜을 사용한다는 특성을 가진다. 이에, 본 논문에서는 사물인터넷의 디바이스, 게이트웨이, 플랫폼에서 손쉽게 사용될 수 있도록 TLS/DTLS 보안 칩 개발 사례를 소개하고 이를 TLS 오픈 소프트웨어 스택인 mbedTLS와의 연동 사례를 소개함으로써 사물인터넷 구성 요소에 공통적으로 활용 가능한 보안 기술 구현 사례를 살펴본다.