• Title/Summary/Keyword: Policy-Based Security Server

Search Result 59, Processing Time 0.025 seconds

Hybrid PKI Public Certificate Security Method Based on Device ID (디바이스 ID 기반의 하이브리드 PKI 공인 인증 보안 기법)

  • Son, Young-Hwan;Choi, Woon-Soo;Kim, Ki-Hyun;Choi, Han-Na;Lee, Dae-Yoon;Oh, Chung-Shick;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.5
    • /
    • pp.113-124
    • /
    • 2010
  • In this study, the hybrid authorization quotation technique is based on the device ID for the integrity of the source region guarantee of user certificate, in order to improve the convenience and security for user in the hybrid PKI certificate Mechanism for authentication. The feature of the model in which it is presented from this paper is 5. First, because the user can select the policy himself in which it matches with each authentication situation and security level, the convenience can be improved. Second, the integrity of the source region of the user certificate can be guaranteed through the comparison of the DLDI Key, that is the hash-value of the device ID. Third, the security can be improved by continuously changing an encoding, and the value of the key in which it decodes through the EOTP Key. Fourth, the index value is added to a certificate, and the storage of a certificate is possible at the Multi-Device. Fifth, since the addi the inan aratus for the integrity of the source region guarantee of a certificate is not needed, the authentication process time can be reduced and the computational load of the certificate server can be reduced also.

A study on stock price prediction system based on text mining method using LSTM and stock market news (LSTM과 증시 뉴스를 활용한 텍스트 마이닝 기법 기반 주가 예측시스템 연구)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.223-228
    • /
    • 2020
  • The stock price reflects people's psychology, and factors affecting the entire stock market include economic growth rate, economic rate, interest rate, trade balance, exchange rate, and currency. The domestic stock market is heavily influenced by the stock index of the United States and neighboring countries on the previous day, and the representative stock indexes are the Dow index, NASDAQ, and S & P500. Recently, research on stock price analysis using stock news has been actively conducted, and research is underway to predict the future based on past time series data through artificial intelligence-based analysis. However, even if the stock market is hit for a short period of time by the forecasting system, the market will no longer move according to the short-term strategy, and it will have to change anew. Therefore, this model monitored Samsung Electronics' stock data and news information through text mining, and presented a predictable model by showing the analyzed results.

u-Healthcare Service Authentication Protocol based on RFID Technology (RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.153-159
    • /
    • 2012
  • Now a days, U-healthcare comes into the spotlight as a new business model which combines RFID technology with medical service in the well-being era and IT popularization. U-healthcare service needs a method that can deals with hand-writing, overlap data, forgery and falsification of data, difference between information version that happen in medical process because of graft between RFID technology and u-healthcare. This paper proposes RFID based user certification protocol to protect user's privacy who gets medical service through U-healthcare. In the protocol, secret information of patient does the XOR with the secret key that is created in the hospital to reconsider the stability of security system of U-healthcare and user's data forgery and falsification and privacy and then saves it in the secret key field of patient in DB table. Also, it informs the case of illegal access to certification server and make it approved the access of u-healthcare service by differentiating whether u-healthcare is illegal or not.

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.

A Secure Personal Health Record System for Handling of Emergency Situations (응급 상황 처리를 위한 안전한 개인건강기록 시스템)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.117-123
    • /
    • 2016
  • In recent years, Personal Health Record (PHR) has emerged as a patient-centric model of health information exchange. The Personal Health Record (PHR) owners enjoy the full right of accessing their records anywhere and anytime making storage and retrieval more efficient. Due to the sensitivity and confidential nature of the PHR, however, the PHR is maintained in a secure and private environment with the individual determining rights of access. In this paper, we propose a system which enables access to the user's PHR in the event of emergency. In emergency situation where the user is unconscious, the emergency staff can use the PHR information to request a emergency access to the PHR server based on the predefined rights of access for PHR. Under the proposed system, the PHR owner can specify a fine grain access control policy during emergency situations.

Blockchain Technology for Healthcare Big Data Sharing (헬스케어 빅데이터 유통을 위한 블록체인기술 활성화 방안)

  • Yu, Hyeong Won;Lee, Eunsol;Kho, Wookyun;Han, Ho-seong;Han, Hyun Wook
    • The Journal of Bigdata
    • /
    • v.3 no.1
    • /
    • pp.73-82
    • /
    • 2018
  • At the core of future medicine is the realization of Precision Medicine centered on individuals. For this, we need to have an open ecosystem that can view, manage and distribute healthcare data anytime, anywhere. However, since healthcare data deals with sensitive personal information, a significant level of reliability and security are required at the same time. In order to solve this problem, the healthcare industry is paying attention to the blockchain technology. Unlike the existing information communication infrastructure, which stores and manages transaction information in a central server, the block chain technology is a distributed operating network in which a data is distributed and managed by all users participating in the network. In this study, we not only discuss the technical and legal aspects necessary for demonstration of healthcare data distribution using blockchain technology but also introduce KOREN SDI Network-based Healthcare Big Data Distribution Demonstration Study. In addition, we discuss policy strategies for activating blockchain technology in healthcare.

Legal Institutional Improvement for Activating National Supercomputing Ecosystem (국가슈퍼컴퓨팅 생태계 활성화를 위한 법제도 개선방안)

  • Huh, Taesang;Jung, Yonghwan;Koh, Myoungju
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.641-651
    • /
    • 2021
  • Supercomputers have played an important role in various fields such as science, industry, national security and solutions for social issues, and their demand is increasing significantly as their use is strengthened in areas using big data and AI. Recently, competition for global exascale system development is accelerating based on various architectures, and the era of exascale computing is expected to come in the near future. However, the foundation of the domestic supercomputing ecosystem was lost due to the decline of the server industry in the past, and although the related law was enacted to supplement and foster it, it has not been able to perform its function smoothly. Therefore, this article examines the problems in the current legal system through the analysis of the relevant legal system and the status of the supercomputing ecosystem, and suggests improvements so that the relevant legal system, which can accommodate the reinforcement of the role of the government·national center·professional center, support for industries, promotion of commercialization of research results, and flexibility of government promotion policies, can prepare the basis for the promotion of the supercomputing R&D project.

Designing and Implementing IOT-based Casino Information System (Windows OS, Windows Server) (IOT 기반의 카지노정보시스템 설계 및 구현(Windows OS, Windows Server))

  • LEE, Dae Kun;NA, Seung You
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.151-160
    • /
    • 2015
  • As a lexical meaning, casino is defined as "a certified gambling house, equipped with recreational facilities such as dance and music, etc., where people play roulette or cards." Casinos started from 17th to 18th century for European nobility and their social meetings and established a casino industry framework in the United States in the 1930s. The success of the casino business leads to the increase of sales; it became very helpful for the local and national government revenues and also for the related incidental tasks. Casino operations include a variety of fields, such as general customer management, dealer game management, security, account management, currency exchange, re-exchange management, marketing management, comp management and placement management, etc. These operations should be organically connected to each other by information systems such as a groupware, ERP and Customer Relationship Management (CRM), etc. In addition, in order to effectively manage comprehensive entertainment service, including accommodation and tourism, it is necessary to develop an information system which supports casino business and collateral entertainment service, collects the data generated throughout the business and provides information about the situations of management. Thus, this study will propose a casino information system designed and implemented, considering these details.

The Research about Role Area of RT in Digital Environment - Centers on PACS Workplace -

  • Jung, Young-Tae;Park, Bum-Jin;Son, Gi-Gyeong;Jung, Jae-Ho;Kang, Hee-Doo
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.13 no.1
    • /
    • pp.13-20
    • /
    • 2011
  • Now a days in our society, occupation boundaries have become blurred, and come into the limelight in the prior occupation or miss about new workplace. Medical area is no exception also, So we face urgent problem about protecting and spreading RT work-sphere simultaneously. This research allow to identify on RT role area of digital environment that is obscure profession-realm specially, and open up a new field hereafter. We examined present RT role area of digital environment in the more than thirty medical facility(general or university hospital) through questionnaire/visit survey from PACS administrator. Survey sentence comprises total 29 sentence over all main quadrisection-(eX. hospital formation & treatment state and PACS team composition & organization and PACS team workplace and PACS team daily workload), We performed comparative analysis in general contents perspectively. further more, divided main 5 section based on upper analysis and then manufactured output in consideration of each medical facility's operation state. There are comparative problem of hospital policy, So we maintained information security of each facility exhaustively. First, we separated a survey output into main 5 section as follows-(eX. PACS server & maintenance manage, Client/interlock manage, PACS data conversion, 3D reconstruction, PACS data im/export)-that received by 35 medical facility. And then manufactured output with comparative analysis about RT role area each section, general IT managing team about medical environment was out of existence that fill up with RT manpower in the surveyed medical facility consequently. What is worse, hospitals that entirely fill up with another worker were 3 place amazingly. Our specific statistic results show, the respondents was 63% that agree with reorganization of formation base on independence team, and supplement of the personnel average -continuous with upper agreement simply-was about 2.64. Further more, if reorganization break out with only RT manpower, quota TO will increase by geometric progression. Protecting and spreading role workplace is much accounted of the our inevitable project surely and more than 95% PACS administrator's have confidence in this proposition unconditionally. Henceforth, look forward to meeting the RT vision of many-sided multiplayer, based on acquire a specialized IT knowledge actively and open up a new work-field with frontier spirit.

  • PDF