• Title/Summary/Keyword: Policy 서버

Search Result 341, Processing Time 0.024 seconds

Trend and Improvement for Privacy Protection of Future Internet (미래 인터넷 기술의 Privacy 보호 기술 동향 및 개선)

  • Kim, DaeYoub
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.405-413
    • /
    • 2016
  • To solve various problems of the Internet as well as to enhance network performance, various future Internet architectures utilize cached data in network nodes or in proxy servers. Named-data networking (NDN), one of future Internet architectures, implements in-network data caching functionality, and then responds itself to request messages. However, it can cause users' privacy invasion that the publisher of data can not engage in the sharing/using process of the data anymore after the data was cached in-network. So NDN implements both encryption-based access control and group access control. But, since such access control schemes need to exchange additional messages in order to search for a proper access control list and keys, it causes inefficiency. This paper surveys the access control schemes of NDN, and then proposes an improved scheme.

Social Network based Sensibility Design Recommendation using {User - Associative Design} Matrix (소셜 네트워크 기반의 {사용자 - 연관 디자인} 행렬을 이용한 감성 디자인 추천)

  • Jung, Eun-Jin;Kim, Joo-Chang;Jung, Hoill;Chung, Kyungyong
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.313-318
    • /
    • 2016
  • The recommendation service is changing from client-server based internet service to social networking. Especially in recent years, it is serving recommendations with personalization to users through crowdsourcing and social networking. The social networking based systems can be classified depending on methods of providing recommendation services and purposes by using memory and model based collaborative filtering. In this study, we proposed the social network based sensibility design recommendation using associative user. The proposed method makes {user - associative design} matrix through the social network and recommends sensibility design using the memory based collaborative filtering. For the performance evaluation of the proposed method, recall and precision verification are conducted. F-measure based on recommendation of social networking is used for the verification of accuracy.

A Design of a Context-Aware System in Solar Cell Equipment with the use of Multi-sensor (다중센서를 사용한 솔라셀 장비의 상황인지 시스템 설계)

  • Lim, Young-Chul;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.265-272
    • /
    • 2014
  • This study suggests a system for preventing and coping with diverse industrial accidents available for taking place in the industrial field by designing a context-aware system of the solar cell equipment with the use of multi-sensor. It installs multi-sensor in the surrounding and major positions of the solar cell equipment, acquires data on the surrounding situations and solar cell equipment from this device, and then save it into the local memory and transmits it to the server. The saved data recognizes a situation based on the context-aware algorithm and judges depending on the perceived result. An administrator comes to have environment available for monitoring the status on the production field and equipments with real time according to the judged outcome through the context-aware algorithm. The context-aware system in the industrial field, which is put today in the ubiquitous environment, will become a service of offering appropriate information for dealing with industrial accidents through real-time inspection.

Measuring and Improving Method the Performance of E-Commerce Websites (전자상거래 웹사이트의 성능 측정 및 향상 방법)

  • Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.223-230
    • /
    • 2017
  • In the current wireless Internet environment, using a mobile device to quickly access a web site is closely related to measuring the performance of a website. When accessing a website, the user has a long time to access the website and has no access to the website.In this case, the performance of the web site should be improved by measuring and analyzing the performance of the connection delay due to a problem of the web site.Among the performance measurement factors of Web sites, Web page loading time is a very important factor for a successful service business in the situation where most of e-commerce business is being developed as a web-based service.An open source tool was analyzed to analyze the performance of the e-commerce web page to present problems, software optimization methods and hardware optimization methods. Applying two optimization methods to suit the environment will enable stable and e-commerce websites.

Security Vulnerability and Countermeasures in Smart Farm (스마트 팜에서의 보안 취약점 및 대응 방안에 관한 연구)

  • Chae, Cheol-Joo;Han, Sang-Kyun;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.313-318
    • /
    • 2016
  • Recently, the smart farm development using a PC and smart phone to manag the farm for improving competitiveness is in progress. In the smart farm, by using the various ICT technology including RFID, Wi-Fi, ZigBee, Wireless LAN, and etc., the growing environment of the crop and animals can be managed with the remote. By using the network including not only the TCP/IP based wired network but also ZigBee, Wireless LAN, and etc., each of the devices installed in the smart farm transmits the growing environment data to the server. So, smart farms have information and network security vulnerability. Therefore, we propose the method that analyzes the security vulnerability which can begenerated in the smart farm and user authentication method.

Design of Image Tracking System Using Location Determination Technology (위치 측위 기술을 이용한 영상 추적 시스템 설계)

  • Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.143-148
    • /
    • 2016
  • There is increasing concern about security as a need for increased safety in the information industry society. However, it does not meet the needs for safety including CCTV. Therefore, in this paper, we link the processing technology using the image information to the IPS system consisting of GPS and Beacon. It designed a conventional RFID tag attached discomfort and image tracking system is limited to complement the disadvantages identifiable area. To this end, we designed a smart device and the Internet of Things convergence system and a research to ensure the accuracy and reliability of the IPS of the access control system. Finally, by leveraging intelligent video information using a PTZ camera, and set the entrant management policies it was carried out to control the situation and control. Also, by designing the integrated video tracking system, an authentication server, visualization systems were designed to establish an efficient technique for analyzing the IPS entrant behavior patterns.

Authentication Method using Multiple Biometric Information in FIDO Environment (FIDO 환경에서 다중 생체정보를 이용한 인증 방법)

  • Chae, Cheol-Joo;Cho, Han-Jin;Jung, Hyun Mi
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.159-164
    • /
    • 2018
  • Biometric information does not need to be stored separately, and there is no risk of loss and no theft. For this reason, it has been attracting attention as an alternative authentication means for existing authentication means such as passwords and authorized certificates. However, there may be a privacy problem due to leakage of personal information stored in the server. To overcome these weaknesses, FIDO solved the problem of leakage of personal information on the server by using biometric information stored on the user device and authenticating. In this paper, we propose a multiple biometric authentication method that can be used in FIDO environment. In order to utilize multiple biometric information, fingerprints and EEG signals can be generated and used in FIDO system. The proposed method can solve the problem due to limitations of existing 2-factor authentication system by authentication using multiple biometric information.

Design of School Commuting System using Beacon (비콘을 활용한 통학 시스템 설계)

  • Kim, Kyung-min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1941-1948
    • /
    • 2016
  • The incident during commuting to school happened frequently in these days, such that the government announced the student commuting safety policy for addressing to implement the safety management system of the unsafer school commuting zone. In this paper, a commuting tracking system is proposed that notifies the location of vehicles and the boarding status of student using BLE beacon and smart phone GPS function. The commuting tracking system that gets the data from the system server of driver's smart phone GPS location and UUID of the beacon which had provided students has configured to provide notifications to parents and related administrators. It provides real-time information about whether a student boarding, boarding times and bus locations for parents and administrators. It verifies the disembarking time for each student and also provides to driver to secure if any student tries to board the wrong school bus and if any students is left behind in the bus.

OpenID Based User Authentication Scheme for Multi-clouds Environment (멀티 클라우드 환경을 위한 OpenID 기반의 사용자 인증 기법)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.215-223
    • /
    • 2013
  • As cloud computing is activated, a variety of cloud services are being distributed. However, to use each different cloud service, you must perform a individual user authentication process to service. Therefore, not only the procedure is cumbersome but also due to repeated authentication process performance, it can cause password exposure or database overload that needs to have user's authentication information each cloud server. Moreover, there is high probability of security problem that being occurred by phishing attacks that result from different authentication schemes and input scheme for each service. Thus, when you want to use a variety of cloud service, we proposed OpenID based user authentication scheme that can be applied to a multi-cloud environment by the trusted user's verify ID provider.

Blockchain Technology for Healthcare Big Data Sharing (헬스케어 빅데이터 유통을 위한 블록체인기술 활성화 방안)

  • Yu, Hyeong Won;Lee, Eunsol;Kho, Wookyun;Han, Ho-seong;Han, Hyun Wook
    • The Journal of Bigdata
    • /
    • v.3 no.1
    • /
    • pp.73-82
    • /
    • 2018
  • At the core of future medicine is the realization of Precision Medicine centered on individuals. For this, we need to have an open ecosystem that can view, manage and distribute healthcare data anytime, anywhere. However, since healthcare data deals with sensitive personal information, a significant level of reliability and security are required at the same time. In order to solve this problem, the healthcare industry is paying attention to the blockchain technology. Unlike the existing information communication infrastructure, which stores and manages transaction information in a central server, the block chain technology is a distributed operating network in which a data is distributed and managed by all users participating in the network. In this study, we not only discuss the technical and legal aspects necessary for demonstration of healthcare data distribution using blockchain technology but also introduce KOREN SDI Network-based Healthcare Big Data Distribution Demonstration Study. In addition, we discuss policy strategies for activating blockchain technology in healthcare.