• Title/Summary/Keyword: Public authorized

Search Result 68, Processing Time 0.021 seconds

Similar Patterns for Semi-blind Watermarking

  • Cho, Jae-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.4
    • /
    • pp.251-255
    • /
    • 2004
  • In this paper, we present a watermarking scheme based on the DWT (Discrete Wavelet Transform) and the ANN (Artificial Neural Network) to ensure the copyright protection of the digital images. The problem to embed watermark is not clear to select important coefficient in the watermarking. We used the RBF (Radial-Basis Function) to solve the problem. We didn't apply the whole wavelet coefficients, but applied to only the wavelet coefficients in the selected node. Using the ANN, although even the watermark casting process and watermark verification process are in public, nobody knows the location of embedding watermark except of authorized user. As the result, the watermark is good at the strength test-filtering, geometric transform and etc.

Conceptual Design of a Remote Monitoring and Control System for Nuclear Power Plants

  • Lee Seung Jun;Kim Jong Hyun;Seong Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.35 no.3
    • /
    • pp.243-250
    • /
    • 2003
  • Nuclear power plants (NPPs) will be highly connected network enabled systems in the future. Using the network and web enabled tools, NPPs will be remotely monitored by operators at any time from any place connected to the network via a general web browser. However, there will be two major issues associated with this implementation. The first is the security issue. Only the authorized persons need to be allowed to access the plant since NPP is a safety-critical system. However, the web technology is open to the public. The second is the network disturbance issue. If operators can not access the plant due to network disturbances, the plant will come into the out-of-control situation. Therefore, in this work, we performed a conceptual design of a web-based remote monitoring and control system (RMCS) considering these issues.

Secure Host Mobility in the Mobile IPv6 Network (MIPv6망에서 안전한 호스트 이동성 지원 방안)

  • Kim, Jung-Ju;Hong, Sug-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.82-85
    • /
    • 2005
  • In the MIPv6 network, when mobile nodes move into new newtwork, they need to find the new access router and points(AR/AP) for the newtwork. Unless they are not connected to authorized AR/APs, they can be exposed to a lot of attacks. In this paper we propose a protocol to authenticate AR/AR and MN each other. This protocol is based on the public key scheme which is used in the SEcure Neighbor Discovery(SEND) protocol.

  • PDF

A Password-Based Searchable Encryption using Smart Cards (스마트 카드를 이용한 패스워드 기반의 검색 가능한 암호화 기술)

  • Lee, Dong-Kun;Rhee, Hyun-Sook;Lim, Jong-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.56-61
    • /
    • 2012
  • User authentication is a necessity to set up secure system which only an authorized user can use various resource on the Internet. Encryption is to provide data privacy. Also, searchable encryption is to provide both data privacy and efficient management of data by searching with a keyword. The public key based searchable encryption requires in advance the authentication of user's public key as well as the secure management of a publlic/private key of a user, respectively. In cloud, it is purpose to use cloud various resources by using various devices, meanwhile, it is not sufficient resource that some devices manage public/private keys and certificates and it is not easy to implement these clients. To solve this problem, we propose a password-based saerchable encryption using smart cards which are temper-resistant devices.

A Proposal for an Organizational System that Implements a Planning Agreement in Local Small and Medium Sized City -Focused on System of Architect for Public Work of Yeongju City (지방중소도시의 지역발전투자협약 추진체계 구축제언 - 영주시 공공건축가제도를 중심으로 -)

  • Do, Hyun-Hak;Byun, Kyeonghwa
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.21 no.4
    • /
    • pp.61-68
    • /
    • 2019
  • This research aimed to propose an organizational system that implements a planning agreement in local small and medium sized city, Korea. To conduct this research, three successful cases were deduced using integration systems to investigate purpose and background of the planning agreement. Articles, reports, media, and participation in meetings and workshops related on this topic are used for collecting data and interview of regional activists and experts, and public officials were carried out. Among them, the case of Yeongju city that used the new integration system instead of pre-adminstration system was examined in detail. There are three local governments; Yeongwol-gun, Jeungpyeong-gun, and Yeongju city which have successfully fulfilled projects from various departments of central adminstration not projects of planning agreement. The similarity noticed between those three cases is to continue various projects from several departments of central adminstration for numerous years and contribute to regional revitalization. A successful factor was to establish organizational system and manage it for the integration plan and performance for appropriate regional and administrative characteristics. In particular, in the case of Yeongju city, organization for urban architectural management composed of civilian experts were formed, authorized status on administrative organization was established, and the function and role were identified. It is helpful to other local governments to carry out the projects of planning agreement as the case of Yeongju city is now a new method.

미국공공도서관의 봉사활동에 미친 연방정부의 역할에 관한 고찰-LSA와 LSCA를 중심으로

  • 최달현
    • Journal of Korean Library and Information Science Society
    • /
    • v.3
    • /
    • pp.89-109
    • /
    • 1976
  • In modern times, it has been a most imporant problem for the community to make nation's information resources a\-ailable to all the people ~vithf ree and even access. In Nelson Associate's National platz for library service appeared in 1948, 50 million Americans were served by public libraries with inadequate service and 35 million have had no library service. Library Services Act signed bq- President Eisenhower in 1956 was a result of continuous efforts of AL.1 for 20 years. It aimed to extend public library service to rural population less than ten thousands. LSA was succeeded by LSCA in 1964 and continued with several amendments so far. 620 million dollars of Federal funds were put into local library administrati1.e agencies during 1957-1974 for the extension of library service and construction of library buildings. Federal funds also encouraged local library administrative agencies to ha\-e more interest in library and information service and carry out their own library programs. However, there are many current problems in Amierican pubic libraries still now, that is, uneven growth of public libraries, uneven distribution of information resources, inadequate library service to a large part of population, insufficient supply of library funds, lack of nationwide library network beyond local admini-strative jurisdictions and so on. National Advisory Commission on Libraries, Committee on Libraries, National Conference of Library and Inforination Science are results of government efforts to meet those problems and carry out effecti1.e nation's library policies. In other part, Congress authorized to open the White House Conference on Library and Information Science before 1978 to make a reco:nn:endation fostering the library use. It is expected that the elected President Carter will put more efforts in developing library and information services, for LSA and LSCA were mainly pushed ahead by Democratic Party. In conclusion I could find some factors through these analysis that would be of some help to develop nation's library and information services, especially in developing countries.

  • PDF

AI Security Plan for Public Safety Network App Store (재난안전통신망 앱스토어를 위한 AI 보안 방안 마련)

  • Jung, Jae-eun;Ahn, Jung-hyun;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.458-460
    • /
    • 2021
  • The provision and application of public safety network in Korea is still insufficient for security response to the mobile app of public safety network in the stages of development, initial construction, demonstration, and initial service. The available terminals on the Disaster Safety Network (PS-LTE) are open, Android-based, dedicated terminals that potentially have vulnerabilities that can be used for a variety of mobile malware, requiring preemptive responses similar to FirstNet Certified in U.S and Google's Google Play Protect. In this paper, before listing the application service app on the public safety network mobile app store, we construct a data set for malicious and normal apps, extract features, select the most effective AI model, perform static and dynamic analysis, and analyze Based on the result, if it is not a malicious app, it is suggested to list it in the App Store. As it becomes essential to provide a service that blocks malicious behavior app listing in advance, it is essential to provide authorized authentication to minimize the security blind spot of the public safety network, and to provide certified apps for disaster safety and application service support. The safety of the public safety network can be secured.

  • PDF

Ciphertext Policy-Attribute Based Encryption with Non Monotonic Access Structures (비단조 접근 구조를 갖는 CP-ABE 방식)

  • Sadikin, Rifki;Moon, SangJae;Park, YoungHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.21-31
    • /
    • 2013
  • A ciphertext policy-attribute based encryption(CP-ABE) scheme can be used to realize access control mechanism without a trusted server. We propose an attribute-based access control mechanism by incorporating a CP-ABE scheme to ensure only authorized users can access the sensitive data. The idea of CP-ABE is to include access control policy in the ciphertexts, in which they can only be decrypted if a user possesses attributes that pass through the ciphertext's access structure. In this paper, we prove a secure CP-ABE scheme where the policy can be expressed in non-monotonic access structures. We further compare the performance of our scheme with the existing CP-ABE schemes.

A Study for PKI Based Home Network System Authentication and Access Control Protocol (PKI 기반 홈 네트워크 시스템 인증 및 접근제어 프로토콜에 관한 연구)

  • Lee, Young-Gu;Kim, Jung-Jae;Kim, Hyun-Chul;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.592-598
    • /
    • 2010
  • A home network system is made up of subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. So, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this paper designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

Basic Design of Software for Environmental Life-Cycle Assessment of Electric Motor Unit(EMU) (전동차 환경 전과정 평가(LCA)를 위한 소프트웨어 기본설계)

  • Kim Yong-Ki;Lee Jae-Young;Moon Kyeong-Ho;Mok Jai-Kyun;Eun Jong-Hwan
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.1033-1038
    • /
    • 2005
  • As a global effort to conservate the environment, life cycle assessment(LCA) which considers the environmental impact through the life cycle of a product, from acquiring of resources to scrapping, has been actively applied. The LCA is a tool to calculate quantitatively the environmental impacts caused by products or services through their life cycles. The list of numerous data should be analyzed, stored and conducted in order to assess the environmental impacts. Therefore, it is necessary to develop a software for LCA, which can perform the interpretation as well as the environment impact assessment to execute the analysis of such a large number of data effectively. At this time, for the existing some kinds of general LCA softwares, the information about all of input and output should be fed directly and the conclusion is deduced by linking to the database from the public authorized organizations. That makes it possible to evaluate the environmental grades accurately, but it is too slow and difficult for general users to operate and applied it into an electric motor unit(EMU). Therefore, in this research, the basic model was designed, which is based on construction of database structure of the software and organization of architecture, to develop an advanced software for EMU according to user and purpose of it by benchmarking of domestic and international softwares. The result of this study would be applied to develop the LCA software in the future.

  • PDF