• Title/Summary/Keyword: Private Security Agent

Search Result 29, Processing Time 0.024 seconds

Anonymity for Low-Power Sensor Node in Ubiquitous Network (유비쿼터스 네트워크에서 저 전력 센서노드의 익명성)

  • Kim, Dong-Myung;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.177-184
    • /
    • 2006
  • The sensors in a ubiquitous network are limited because of the low power and ultra light weight, so many studies have revolved around the sensor. This study improves the process of the registration and authorization and suggests a way to minimize discloser of privacy by using an alias. We introduce RA(Relay Agent) for the restrict function of sensor node, and improve anonymity for private information of each sensor node by assigning alias from SM(Service Manager) in procedure of registration and authentication. The privacy of sensor node is secure in procedure of registration, authentication, and communication between nodes. We could improve the level of security with the only partial increment of computation power of RA and SM without an increase in the amount of sensor nodes.

  • PDF

A Study on the Analysis of Trump Administration Cybersecurity Policy: Focusing on Critical Infrastructure (트럼프 행정부의 주요기반시설 사이버보안 정책분석에 관한 연구)

  • Kim, Geunhye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.907-918
    • /
    • 2019
  • The purpose of this study is to understand the cybersecurity policies and critical infrastructure protection of the United States through analyzing Donald Trump's administration executive orders, the national cyber strategy, and the legislation. The analysis has three findings. First, the Department of Homeland Security (DHS) became a main agent in the cybersecurity while the role of the White House was reduced. Second, Trump's administration expanded its role and mission in the policy area by extending the meaning of critical infrastructure. Third, in the case of cyber threats, the government can be involved in the operation of critical infrastructures in the private sector. The opinions of the professional bureaucrats and DHS were more reflected in the direction of the cybersecurity policy than those of the White House. In contrast to Barack Obama's administration, the Trump administration's cybersecurity strategies were not much studied. This study provides insights for improving cybersecurity policies and critical infrastructure protection.

VPN Traversal Scheme in Hierarchical MIPv4 environment (계층적 이동 IPv4 환경에서 VPN 운영 방안)

  • Sung, Su-Lyun;Kang, Jung-Ho;Shin, Young-Tae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.519-526
    • /
    • 2004
  • This paper presents an efficient interoperation scheme of a VPN(Virtual Private Network) and Mobile IP using a hierarchical structure of a FA(Foreign Agent). In the proposed scheme, the GFA(Gateway Foreign Agent) plays a role of VPN gateway on behalf of the MN(Mobile Node). When the MN moves in the same GFA domain, because the GFA has already an IPsec security association with a VPN gateway in the home network of the MN, the MN does not need an IPsec re-negotiaion. In this way, our mechanism reduces a message overhead and a delay resulted from an IPsec negotiation. And a MN can send a data to a correspondent node without a packet leakage. We show a performance of our scheme by using a discrete analytical model. Analytical results demonstrated that the total processing cost calculated by a registration update cost and a packet delivery cost is significantly reduced through our proposed scheme.

Public Key Infrastructure of Electronic Bidding System using the Fingerprint Information (지문 정보를 이용한 공개키 기반의 전자입찰시스템)

  • Park, So-Ah;Chae, Cheol-Joo;Cho, Han-Jin;Lee, Jae-Kwang
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.69-77
    • /
    • 2012
  • In the case of the password-based PKI technology, because it protects by using the password which is easy that user memorizes the private key, he has the problem about the password exposure. In addition, in the system of electronic bidding, the illegal use using the authentic certificate of the others increases. Recently, in order to solve this problem, the research about the PKI technology using the biometrics is actively progressed. If the bio information which the user inputs for the bio authentication is converted to the template, the digest access authentication in which the security is strengthened than the existing authentication technology can be built. Therefore, in this paper, we had designed and developed the system of electronic bidding which it uses the most widely used fingerprint information in the biometrics, it stores the user fingerprint information and certificate in the fingerprint security token and can authenticate the user. In case of using the system of electronic bidding of the public key infrastructure using the fingerprint information proposed in this paper the agent bid problem that it uses the certificate of the others in not only user authentication intensification but also system of electronic bidding can be concluded.

An Efficient and Secure Handover Mechanism for MVPN Services (MVPN 서비스 제공을 위한 효율적이고 안전한 핸드오버 메커니즘)

  • Woo, Hyun-Je;Kim, Kyoung-Min;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.62-72
    • /
    • 2007
  • Mobile Virtual Private Network (MVPN) provides VPN services without geographical restriction to mobile workers using mobile devices. Coexistence of Mobile IP (MIP) protocol for mobility and IPsec-based VPN technology are necessary in order to provide continuous VPN service to mobile users. However, Problems like registration failure or frequent IPsec tunnel re-negotiation occur when IPsec-based VPN Gateway (GW) and MIP are used together. In order to solve these problems, IETF proposes a mechanism which uses external home agent (x-HA) located external to the corporate VPN GW. In addition, based on the IETF proposal, a mechanism that assigns x-HA dynamically in the networks where MN is currently located was also proposed with the purpose to reduce handover latency as well as end-to-end delay. However, this mechanism has problems such as exposure of a session key for dynamic Mobility Security Association (MSA) or a long latency in case of the handover between different networks. In this paper, we propose a new MVPN protocol in order to minimize handover latency, enhance the security in key exchange, and to reduce data losses cause by handover. Through a course of simulation, the performance of proposed protocol is compared with the existing mechanism.

The relationship of the office given condition of the country important facility private security and job satisfaction degree (국가중요시설 경비원의 직무여건과 직무만족도의 관계)

  • Son, Ki-Ho
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.103-135
    • /
    • 2012
  • The object is that this research searches the relationship of the office given condition actual condition of the country important facility private security guard and job satisfaction degree. In order to grasp and analyze the real state of the country important facility private security guards directly, the questionnaire, that is the general measurement tool, was utilized and the guard whom it works in the airport, the port region and general work place, that is the national important facility of Busan and Ulsan area, was aimed at. The enough survey object was illustrated to the facility and person in charge in the security company and the item was previewed and the total 400 sheets was distributed and 331 sheets (82.8%) except the doubleness subject intention and incongruent questionnaire was utilized for the analysis. The statistic processing of collected data utilized the SPSS version 15.0 the statistical package program through data coding and cleaning process and performed the frequency analysis, reliability analysis, t-test, one way analysis of variance, Pearson analysis, and regression analysis. The relationship of the office given condition actual condition of the guard about the national important facility and job satisfaction degree was classified into the interpersonal relationship, task characteristic, office environment, and complement factor and the difference of the job satisfaction degree according to the general characteristic was verified. If the conclusion obtained through the method of study described in the above looked at, for as to general tendency, the low wages and poor field environment was continued. In the general characteristic, the man was higher than the excitation about the job satisfaction level. As there was lots of the age and the scholarship was low, the age was high. And as there was lots of the career and income, the police of a petition or search and guide staff was high and the job satisfaction degree in which relatively the employee and the other job group is high so that the case of being the former student incidence can be the poorest was shown rather than the facility security agent. As the interrelation analysis result job satisfaction was high, the change of occupation pseudo was low and the organizational commitment degrees was increased. The regression analysis result job satisfaction degree was exposed to reach the meaningful effect on the change of occupation pseudo and organizational commitment. It had an effect on the change of occupation pseudo as the task characteristic and office ambient level was low. It had an effect on the organizational commitment as the extend of satisfaction about the task characteristic and interpersonal relationship, complement, and office ambient level were high. If the research result of this time is integrated, the support of the political system including the interpersonal relationship thesis between top and bottom of the organized I and substantial complement actualization is urgently needed between the office given condition improvement effort in the country important facility defense manpower field and police of a petition and special guard.

  • PDF

A Study on Privatization of Traffic Policing (교통경찰업무의 민영화에 관한 연구)

  • Lee, Sang-Hun
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.265-283
    • /
    • 2008
  • Modern society often faces 3Cs:change, competition, and customer. The main issue of today's police science study, therefore, circles around how public police effectively cope with the radically changed environment. As one of the workable and appealing policy tools to reform the police, the privatization has been not only strongly supported in terms of a theoretical study, but also widely used in practice all over the world. However, Policing has been widely regarded as an exclusively public-sector activity conducted by sworn officer, but a large and increasing share of the aggregate demand for public safety and security is being handled by the private sector. This study examines on the very practical one, how contracting out, most widely used as the privatization alternatives, is perceived and put into practiced in the field of traffic police services. This study is intended to examine recent shifts toward privatization of traffic policing. Although some people regard police services as inappropriate for privatization, most everyone else have persuasively considered that many police services are not public goods or, at least, not pure public goods. We can consider that there are three types of privatization with respect to traffic policing, that is, user-financed police services, contracting out, and some degree of service shedding. As society changes, so must traffic policing. And it is needed to enhance the ability of traffic police and private to accomplish their primary mission, to serve and protect the public.

  • PDF

Through Monitoring Solution Child Abuse and Children's Rights at Child Care Center (어린이집에서의 아동학대와 아동권리 모니터링을 통한 해결방안)

  • Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.55-66
    • /
    • 2013
  • Child abuse is urgent and important issue that dominates child's life and influences lifetime. Especially, the children who use the daycare facilities are vulnerable to ill-treatment because of young age, resulting in being serious in after-affect of its abuse. In case of being serious, a child may lead to death. Also, the main agent is absent that will speak for the abused child's injustice and ask for help. Thus, the child abuse has many cases of coming to a close always as children's miserable sacrifice. Hence, the child care center employees will need to recognize a fact that the child abuse is not a private problem within home any more, but a serious crime, and to be confronted by early finding and reporting abuse as a responsible person for report. When the child care center employees fully perform a role as a responsible person for report of child abuse and when the cooperation between child protection service and day care center is properly made after report, the daycare facilities will be able to play a role of child safety network, which protects children of being put in the exclusion.

Relation between Leisure Constraints and Participation by Leisure Types of Security Agent (시큐리티요원의 여가유형에 따른 여가제약과 참가의 관계)

  • Kim, Kyong-Sik;Kim, Chan-Sun;Park, Young-Man
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.826-835
    • /
    • 2009
  • This study is to examine the relation between leisure constraints and participation by leisure type of security agents. By using purposive sampling method, this study collected 387 questionnaires in 14 private security service registered in 2009 at the Seoul National Police Agency. Cronbach's $\alpha$ .673. The conclusion are as follow. First, leisure constraints difference in socio-demographic characteristics such as sex, age, education level, income, position, job pattern. Second, in case of hobby and cultural activities, higher time constraints showed lesser frequency of participation, higher structural constraints showed lesser period of participation, higher personal constraints showed lesser intensity of participation. On the other hand, high time constraitns had high intensity of participation. In case of play and entertainment activities, even with high self-conscious constraints, it showed increased frequency and period of participation and high personal constraints showed increased period of participation but in contrast, higher structural constraints showed decreased frequency of participation and period. In case of viewing and appreciative activities, even with high interpersonal constraints, frequency and period of participation increased and higher time constraints also had increased period of participation. On the other hand, higher structural constraints showed decrease in frequency of participation and period.