• Title/Summary/Keyword: S-Chain 모델

Search Result 209, Processing Time 0.024 seconds

A Study of RFID Access Control Security Model (RFID Access Control 보안 모델에 관한 연구)

  • Han, Dong-Hee;Kim, Dong-Jin;Kim, Soo-Hong
    • Proceedings of the KAIS Fall Conference
    • /
    • 2007.11a
    • /
    • pp.293-296
    • /
    • 2007
  • RFID는 유비쿼터스 환경 구축에 있어 가장 큰 비중을 차지하고 있다. 하지만 이에 따른 RFID에 저장된 개인정보 유출과 이를 오남용하는 문제에 대해 많은 비판들이 쏟아져 나오고 있으며 이에 대한 보안기술에 많은 관심이 모아지고 있다. 본 논문에서는 이러한 RFID의 보안모델 중 Access Control 기존 모델과 이를 보안한 RFID 2중 Access Control 보안모델을 제안한다. 2중 Access control모델은 기존 Hash-lock Access나 Hash-chain Method모델과 비슷한 구조를 가지고 있으나 도청에 의한 키값 노출에 대한 보안성을 가지고 있으며 Tag인증에 대한 값을 계속 변화 시켜 2중으로 Access Control에 대한 인증 정보를 보안하는 구조이다.

  • PDF

Web Page Recommendation using a Stochastic Process Model (Stochastic 프로세스 모델을 이용한 웹 페이지 추천 기법)

  • Noh, Soo-Ho;Park, Byung-Joon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.6
    • /
    • pp.37-46
    • /
    • 2005
  • In the Web environment with a huge amount of information, Web page access patterns for the users visiting certain web site can be diverse and change continually in accordance with the change of its environment. Therefore it is almost impossible to develop and design web sites which fit perfectly for every web user's desire. Adaptive web site was proposed as solution to this problem. In this paper, we will present an effective method that uses a probabilistic model of DTMC(Discrete-Time Markov Chain) for learning user's access patterns and applying these patterns to construct an adaptive web site.

A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations (사회공학 사이버작전을 고려한 사회공학 사이버킬체인 개념정립 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1247-1258
    • /
    • 2018
  • The Cyber Kill Chain originally proposed by Lockheed Martin defines the standard procedure of general cyber attacks and suggests tailored defensive actions per each step, eventually neutralizing the intent of the attackers. Defenders can effectively deal with Advanced Persistent Threat(APT)s which are difficult to be handled by other defensive mechanisms under the Cyber Kill Chain. Recently, however, social engineering techniques that exploits the vulnerabilities of humans who manage the target systems are prevail rather than the technical attacks directly attacking the target systems themselves. Under the circumstance, the Cyber Kill Chain model should evolve to encompass social engineering attacks for the improved effectiveness. Therefore, this paper aims to establish a definite concept of Cyber Kill Chain for social engineering based cyber attacks, called Social Engineering Cyber Kill Chain, helping future researchers in this literature.

Interference Analysis of RFID Gen-2 System Considering Both PHY and MAC Layers (PHY/MAC 계층을 모두 고려한 RFID Gen-2 시스템의 간섭 분석)

  • Yoon, Hyun-Goo;Choi, Sun-Woong;Jang, Byung-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.7
    • /
    • pp.752-760
    • /
    • 2010
  • This paper investigates the performance of EPCglobal Generation-2(Gen-2) radio frequency identification(RFID) protocol under reader-to-reader interfering environments. We establish a modified discrete-time Markov chain(DTMC) model for the Gen-2 and accordingly obtain quantitative results of query success rate(QSR) and tag identification speed (TIS). Extensive simulations validate our theoretical analysis and demonstrate that the number of tags over 100 has little impact on the performance. TIS linearly decreases by 10 tags/sec/reader as the number of interfering readers increases. Our model for Gen-2 protocol is also useful to study the performance of other RFID protocols.

A Proposal on the personalized integrated Education Model Using the Blockchain (블록체인을 활용한 개인 맞춤형교육 통합모델 제안)

  • Yu, Kyoung-sung;Kwon, Mee-Rhan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.451-456
    • /
    • 2019
  • Our students are shocked by the results that there is an inverse proportion between academic achievement and life satisfaction. Recently, the Organization for Economic Cooperation and Development (OECD) published the PISA 2015 Student Well-Being Report. According to the report, Korean students' education is the highest among OECD countries, but their life satisfaction is the 47th ranked among the 48 OECD and non-OECD countries.[1] This is the cause of the unilateral education using collective achievement in evaluation methods. Therefore, I propose a personalized integrated model utilizing block chain technology. I suggest a personalized education and evaluation system model using selective education and personal approval rather than from teachers' unilateral education. This will no longer open the student's achievement grade system to the public. This change will be accomplished utilizing block chain technology. This technology is characterized by security, transparency and dispersion. The result of this work can be used to improve students' quality of living through a management system of personalized education and evaluation, based on the nature of education.

Research on Technology, Process, and Strategic Fit of ICT Based Service Model (ICT 기반 융합 서비스 모델의 기술, 프로세스, 전략적 적합 연구)

  • Han, Hyun-Soo;Park, Keun-Young
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.4
    • /
    • pp.225-245
    • /
    • 2014
  • ICT based convergence application is one of the most prevalent industrial issue these days. Despite of criticalness and potential economic opportunities of the ICT based convergence, theoretical research to analyze the feasibility and estimate the economic impact of the application is rather limited. This paper is intended to fill this research gap. In this respect, we develop theoretical framework to quantitatively estimate the differential benefits of convergent applications, which necessarily include underling ICT technology's contribution attributes extractions, and resulting value increments engendered from user's process effectiveness when ICT based service application is adopted. The research model to assess the differential value of the ICT based service application is developed, grounded on theoretical framework of TPC (Technology-to-performance chain) and contingency fit theories. Scenario based survey method is adopted, and SmartPLS 2.0. is used for statistical analysis of the structural equation model using 312 questionnaire. Valid statistical results are presented to provide useful insight.

Bayesian Parameter Estimation for Prognosis of Crack Growth under Variable Amplitude Loading (변동진폭하중 하에서 균열성장예지를 위한 베이지안 모델변수 추정법)

  • Leem, Sang-Hyuck;An, Da-Wn;Choi, Joo-Ho
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.35 no.10
    • /
    • pp.1299-1306
    • /
    • 2011
  • In this study, crack-growth model parameters subjected to variable amplitude loading are estimated in the form of a probability distribution using the method of Bayesian parameter estimation. Huang's model is employed to describe the retardation and acceleration of the crack growth during the loadings. The Markov Chain Monte Carlo (MCMC) method is used to obtain samples of the parameters following the probability distribution. As the conventional MCMC method often fails to converge to the equilibrium distribution because of the increased complexity of the model under variable amplitude loading, an improved MCMC method is introduced to overcome this shortcoming, in which a marginal (PDF) is employed as a proposal density function. The model parameters are estimated on the basis of the data from several test specimens subjected to constant amplitude loading. The prediction is then made under variable amplitude loading for the same specimen, and validated by the ground-truth data using the estimated parameters.

A Relation-based Model for Analyzing Ecosystems of Products, Services and Stakeholders (제품 서비스 시장참여자의 에코시스템 분석을 위한 관계 기반 모델 개발)

  • Kang, Chang-Muk;Hong, Yoo-Suk;Kim, Kwang-Jae;Park, Kwang-Tae
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.37 no.1
    • /
    • pp.41-54
    • /
    • 2011
  • A central theme in recent IT (information technology) industry is a mobile ecosystem. While a concept of business ecosystem, which is an economic community of firms and individuals producing and consuming goods and services, has been around for about 20 years now, the recent spotlight is mainly caused by the enormous success of iPhone. Many hand-set makers or platform developers want to mimic Apple's iPhone ecosystem from which both application developers and hand-set users can benefit. In this study, a representation model of the business ecosystem is proposed for supporting systematic design and analysis of ecosystems. Whereas previous studies also proposed some representation models, they emphasized only on the value chain between participating players. The proposed model, which is named relation-based ecosystem model, represents an ecosystem with the requirement relationships between product and service components and the roles of players, as well as their value chain. Such comprehensive representation explicitly reveals the strategic difference between ecosystems. This advantage was illustrated by comparing a Korean traditional mobile ecosystem and an emerging smart-phone ecosystem represented by the proposed model.

An Analytical Investigation on the Cause for Mooring Chain Cut in a Naval Moored to a Buoy (부표계류 함정의 계류체인 절단원인에 관한 분석적 연구)

  • Lim, Bong Taeck
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.551-555
    • /
    • 2009
  • This study analyzed the cause for mooring chain cut in a naval ship moored, in preparation for a typhoon approach, to a buoy in a shelter. The result of the analysis led to a very interesting fact. That is, while officers usually understood the cut results from the fact that the wind and the tide were stronger than what the mooring chain can hold, according to the study, it was analyzed the impact power at the point where the mooring chain and the ship's body met was a main factor in the cut. Also, it was confirmed that the analytic result of the study is more logical from the point of mathematical analysis and that the cut corresponds to what the then-witnesses stated about the situation.

  • PDF

An Exploratory Research on Hierachical Causality of Personal Value, Benefits Sought and Clothing Product Attributes (의류 구매자의 가치관-추구혜택-제품 속성간의 게층적 인과관계에 관한 탐색적 연구)

  • 안소현;서용한;서문식
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.24 no.5
    • /
    • pp.652-662
    • /
    • 2000
  • Most of established study about consumer behavior was directly connected abstract value with concrete purchase behavior, nevertheless several recognizable process is intervened between abstract concept and concept behavior. Of course researchers suggest hierarchical causality through means-end chain model. However empirical study is insufficient. And it's not certain whether the consumer's personal value affects actual evaluation about product attributes. Thus the purpose of this paper was to explore hierarchical causality of personal value, benefits sought and clothing product attributes and to suggest an alternative approach method. For the empircial study the data sets were collected through 150 female consumers living in Pusan and SAS and LISREL VIII were used for statistical analysis. As the result, hierarchical causality suggested by means-end chain model was positively substantiated. That is, benefits sought is differentiated according to personal value, and actual product attributes are indirectly influenced by personal value through benefits sought. Benefits sought are found to be key mediating variables.

  • PDF