• Title/Summary/Keyword: Party School

Search Result 265, Processing Time 0.034 seconds

Threats Analysis and Mobile Key Recovery for Internet of Things (IoT 환경에서의 보안위협 분석과 모바일 키 복구)

  • Lee, Yunjung;Park, Yongjoon;Kim, Chul Soo;Lee, Bongkyu
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.5
    • /
    • pp.918-923
    • /
    • 2016
  • IoT should be considered security risk environments such as various platforms and services including smart devices that can be mounted on household electric appliances, healthcare, car, and heterogeneous networks that are connected to the Internet, cloud services and mobile Apps.. In this paper, we provide analysis of new security threats, caused by open-platform of IoT and sensors via the Internet. Also, we present the key recovery mechanism that is applied to IoT. It results to have compatibility with given research, reduces network overhead, and performs key recovery without depending on key escrow agencies or authorized party.

A Study on the Activities and Decision Factors between In-house vs. Outsourcing Reverse Logistics Processes (역물류(Reverse Logistics)의 아웃소싱을 위한 연구)

  • Kim, Young-Ah
    • Proceedings of the Korean DIstribution Association Conference
    • /
    • 2006.08a
    • /
    • pp.119-131
    • /
    • 2006
  • Reverse logistics (RL) covering the flow of products/parts in a reverse direction from product returns to product disposal. Companies are faced with a decision on whether to manage RL in house or to outsource it to a RL third party service provider (3PSP). A survey was conducted in 2004 to study RL outsourcing practices. Through the survey, various RL functions outsourced in industry are identified, and the factors considered to decide between in-house vs. outsourcing RL management are studied along with their importance. In addition, this research presents the performance measures of a 3PSP and problems faced by companies while managing RL in-house and outsourcing.

  • PDF

The Main Character and Evaluation of China's New Electronic Signature Legislation (중국 전자서명법의 주요내용 및 평가와 전망)

  • Han, Sang-Hyun
    • The Journal of Information Technology
    • /
    • v.9 no.3
    • /
    • pp.1-14
    • /
    • 2006
  • China has recently (28 August 2004) adopted a new act legalizing the electronic signature. This new act provides electronic signatures with the same legal status as handwritten signatures, and states that on-line certification providers will have to be created in order to ensure the security of on-line operations made using said signatures. This new act is intended to increase Chinese electronic business, and thus to raise the revenue China can expect from said business. And the law grants electronic signatures the same legal effect as handwritten signatures and seals in business transactions, and sets up the market access system for online certification providers to ensure the security of e-commerce. As Internet trade requires a reliable third party to identify the signers, the credibility of online certifying organizations is significant for the transaction security. So, considering the weakness of China's social credibility system, the law regulates that the online signatures certification providers should be approved and administered by governments.

  • PDF

Data hiding in partially encrypted HEVC video

  • Xu, Dawen
    • ETRI Journal
    • /
    • v.42 no.3
    • /
    • pp.446-458
    • /
    • 2020
  • In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC-CABAC bin strings in a format-compliant manner. Then, the data hider embeds the secret message into the encrypted HEVC videos using the specific coefficient modification technique. Consequently, it can be used in third-party computing environments (more generally, cloud computing). For security and privacy purposes, service providers cannot access the visual content of the host video. As the coefficient is only slightly modified, the quality of the decrypted video is satisfactory. The encrypted and marked bitstreams meet the requirements of format compatibility, and have the same bit rate. At the receiving end, data extraction can be performed in the encrypted domain or decrypted domain that can be adapted to different application scenarios. Several standard video sequences with different resolutions and contents have been used for experimental evaluation.

Construction of Test Process for Third Party Test Organization (제3자 시험 기관을 위한 시험 프로세스의 구축)

  • Lee, Ha-Yong;Hwang, Suk-Hyung;Yang, Hae-Sool
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.317-320
    • /
    • 2005
  • 고품질의 소프트웨어를 개발하기 위한 방안으로 품질평가를 통해 문제점을 발견해서 보완하는 과정을 활용할 수 있다. 최근, 소프트웨어 품질 평가 및 인증에 관한 국가적인 체계가 구축되고 실질적인 인증활동이 수행되고 있으나 인증의 관점에서 확립되어 있는 표준화된 절차가 미흡하여 효과적인 품질 평가 및 인증을 위한 절차의 개발이 요구되고 있다. 현재, 소프트웨어 제품의 품질평가를 위한 프로세스로서 ISO/IEC 14598이 6개 부분으로 구성되어 있으며, 이 프로세스를 적용하여 품질평가에 적용하거나 품질향상을 도모하려는 연구가 활발히 진행되고 있다. 본 연구에서는 제3자 시험자의 관점에서 활용할 수 있는 소프트웨어 품질평가 프로세스인 ISO/IEC 14598-5를 중심으로 표준에서 정의하고 있지 않은 시험전 과정과 후 과정에 대한 부분을 포함하고 프로세스의 각 단계별로 구체적인 실제적인 활동을 포함하여 보완하였다.

  • PDF

Challenges and Effective Management of Supply Chain in Wine Industry and Agribusiness

  • Ngoe, Tata Joseph
    • Agribusiness and Information Management
    • /
    • v.4 no.2
    • /
    • pp.32-41
    • /
    • 2012
  • Studies have shown that the future of the wine market rests on the effective and efficient changes in technology to the supply chain used by most of the major global players. In today's wine industry, companies are faced with the ever-shifting demand for their products, strict regulation and increasing price competition. Even at that, mature companies in the wine industry are succeeding by scaling up production, streamlining their supply chains, expanding into new geographic areas, implementing more efficient processes, cleverly marketing products, and focusing on ever closer relationships with suppliers, partners and customers. However, this paper looks at supply chain challenges in the wine industry from a global perspective presented in the inbound, manufacturing and outbound processes as well as offer effective solutions in order for companies to gain a competitive advantage and succeed on a global level.

  • PDF

The Activation Strategy of Electronic Payment Industry Using Scenario Planning : Focusing Simple Payment (시나리오 플래닝을 통한 국내 전자결제 산업의 활성화 전략 : 간편결제를 중심으로)

  • Han, Chejin;Cho, Keuntae
    • Korean Management Science Review
    • /
    • v.33 no.1
    • /
    • pp.59-75
    • /
    • 2016
  • The domestic simple payment service was not activated yet compared to foreign countries and there are many things to complement in the legal, institutional, and technical aspects. The future image of the domestic electronic payment propulsion was considered by the scenario planning focusing on the simple payment. Total 6 future scenarios were drawn through the scenario planning, and 3 major strategy directions for attaining the preferred future scenario were drawn. This study drew a meaningful scenario through various analyses and industry specialist questionnaire about the future of the simple payment service which will be a crucial change of the domestic electronic payment under the uncertain future situation, and suggested an implication for the government and every interested party who provides the industrial service to prepare for the future.

Computational Tridimensional Protein Modeling of Cry1Ab19 Toxin from Bacillus thuringiensis BtX-2

  • Kashyap, S.;Singh, B.D.;Amla, D.V.
    • Journal of Microbiology and Biotechnology
    • /
    • v.22 no.6
    • /
    • pp.788-792
    • /
    • 2012
  • We report the computational structural simulation of the Cry1Ab19 toxin molecule from B. thuringiensis BtX-2 based on the structure of Cry1Aa1 deduced by x-ray diffraction. Validation results showed that 93.5% of modeled residues are folded in a favorable orientation with a total energy Z-score of -8.32, and the constructed model has an RMSD of only $1.13{\AA}$. The major differences in the presented model are longer loop lengths and shortened sheet components. The overall result supports the hierarchical three-domain structural hypothesis of Cry toxins and will help in better understanding the structural variation within the Cry toxin family along with facilitating the design of domain-swapping experiments aimed at improving the toxicity of native toxins.

Wavelet-Based Digital Image Watermarking by Using Lorenz Chaotic Signal Localization

  • Panyavaraporn, Jantana;Horkaew, Paramate
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.169-180
    • /
    • 2019
  • Transmitting visual information over a broadcasting network is not only prone to a copyright violation but also is a forgery. Authenticating such information and protecting its authorship rights call for more advanced data encoding. To this end, electronic watermarking is often adopted to embed inscriptive signature in imaging data. Most existing watermarking methods while focusing on robustness against degradation remain lacking of measurement against security loophole in which the encrypting scheme once discovered may be recreated by an unauthorized party. This could reveal the underlying signature which may potentially be replaced or forged. This paper therefore proposes a novel digital watermarking scheme in temporal-frequency domain. Unlike other typical wavelet based watermarking, the proposed scheme employed the Lorenz chaotic map to specify embedding positions. Effectively making this is not only a formidable method to decrypt but also a stronger will against deterministic attacks. Simulation report herein highlights its strength to withstand spatial and frequent adulterations, e.g., lossy compression, filtering, zooming and noise.

A Study on Access Control Mechanism for 3rd Party Applications Process on Smart Digital TV (스마트 디지털 TV에서의 제3자 개발 애플리케이션을 위한 보안 요구사항 분석)

  • Park, Seon-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.820-823
    • /
    • 2010
  • 최근 스마트폰의 대중적 확산으로 인해 소프트웨어 및 콘텐츠에 대한 관심이 빠르게 증대되고 있으며, 제3자 개발자들이 애플리케이션 및 콘텐츠들을 개발하여 시장에 진입할 수 있는 앱스토어와 같은 제3자 애플리케이션 마켓도 함께 증가하고 있다. 이에 따라 제3자 개발 애플리케이션이 스마트기기에 설치되어 동작할 때 발생 가능한 보안 위협 및 이에 대한 대응 기술 연구가 주목받고 있다. 본 연구는 임베디드 리눅스 기반의 디지털 TV 환경에서 제3자 애플리케이션이 구동될 때 발생 가능한 보안 위협에 대응하기 위해서 필요한 보안 요구사항을 분석하고, 제3자 개발 애플리케이션의 전체 생명 주기를 고려한 보안 정책 관리 방법을 제안한다.