• Title/Summary/Keyword: Secure Development

Search Result 1,865, Processing Time 0.03 seconds

International Development Cooperation for Human Resources Development in Marine and Fisheries Sector in Indonesia (인도네시아 해양수산분야 인적자원개발을 위한 국제개발협력 방향)

  • Deni Aulia;Kyoung-Mi Kang
    • The Journal of Fisheries Business Administration
    • /
    • v.54 no.2
    • /
    • pp.15-29
    • /
    • 2023
  • This study aims to establish a development strategy for higher education in Indonesia's marine and fisheries sector and to present a direction for international development cooperation through evaluating policies and current problems related to higher education in marine and fisheries sector. To achieve the goals of human resources development in marine and fisheries sector, Indonesian government needs to secure non-salary expenditures to strengthen support for areas directly related to the effects of education, such as improving educational facilities, expanding scholarships, and so on. Education institution needs to develop effective teaching methods and systematic practice-based curriculum that reflects the needs of the local fishermen community and fisheries industry. In addition, it is necessary to support the supply of manpower throughout the fisheries industry. Fisheries industry needs to stop relying on the government or education institutions to secure excellent human resources and actively participate and cooperate in the education field so that excellent human resources can flow into the industry. Based on this strategy, international development cooperation for human resources development in Indonesia's marine and fisheries sector should focus on qualitative rather than quantitative expansion of higher education institutions.

An Improvement of the Guideline of Secure Software Development for Korea E-Government (대한민국 전자정부 소프트웨어 개발보안 가이드 개선 방안 연구)

  • Han, Kyung Sook;Kim, Taehwan;Han, Ki Young;Lim, Jae Myung;Pyo, Changwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1179-1189
    • /
    • 2012
  • We propose an improvement on the Guideline of Secure Software Development for Korea e-Government that is under revision by the Ministry of Public Administration and Security in 2012. We adopted a rule-oriented organization instead shifting from the current weakness-oriented one. The correspondence between the weakness and coding rules is identified. Also, added is the coverage of diagnostic tools over the rules to facilitate the usage by programmers during coding period When the proposed guideline is applied to secure software development, the weakness would be controlled indirectly by enforcing coding rules. Programmers responsibility would be limited to the compliance of the rules, while the current version implies that it is programmers responsibility to guarantee being free from the weakness, which is hard to achieve at reasonable cost.

An Implementation of Secure boot Using TPM in Embedded System (TPM을 활용한 임베디드 시스템 환경의 보안 부팅 구현)

  • Kim, Jin-Woo;Lee, Sang-Gil;Ko, Jae-Yong;Lee, Cheol-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.949-960
    • /
    • 2019
  • Due to miniaturization of electronic devices and development of IoT(Internet of Things), embedded system have been used in various field. Meanwhile, there is a potential vulnerability by the insufficient of system's security. In this paper, we implement secure boot using TPM to protect the integrity of embedded system environment. The Suggestion considers the required availability in the embedded system and detects the system's tampering at secure boot process via TPM. In addition, we have reinforced the confidentiality through AES encryption of the kernel at secure boot.

Development of home meal replacement products by food processing and packaging technology (식품 가공기술과 포장기술을 활용한 가정대용식 제품 개발)

  • Yu, A-Reum;Choi, Yun-Sang;Hong, Jung Sun;Choi, Hee-Don
    • Food Science and Industry
    • /
    • v.50 no.3
    • /
    • pp.39-50
    • /
    • 2017
  • In order to secure competitiveness of the home meal replacement (HMR) industry from a long-term perspective, development of packaging and processing technologies must be achieved. The development of technology that can secure freshness, nutrition, and taste but secures the shelf life is the key to the future growth of HMR. The future of HMR can be considered in terms of nutrition, environment and safety. From the nutritional point of view, it is expected that development of healthy HMR such as low-salt, low-sugar, low-fat, and high fiber and premium HMR with functional ingredient enhanced, and personalized HMR for silver, infant and patients will be done. And it is expected that development of HMR utilizing environmentally friendly food or local food, development of energy reduction and environmentally friendly disinfection technology, development of environmentally friendly packaging material, and providing information on HMR preparation using QR code and RFID from the environmental and safe point of view.

Nutritional Status of Young Adults by Food Security Level: Analysis of Data from the Korea National Health and Nutrition Examination Survey (2008-2018) (식품안정성 수준에 따른 청년의 영양섭취상태: 국민건강영양조사 2008-2018년 자료 활용)

  • Kim, Eun-kyung;Kim, Se-Na;Kwon, Yong-seok;Park, Young Hee;Lee, Jin-Young
    • Journal of the Korean Society of Food Culture
    • /
    • v.36 no.5
    • /
    • pp.455-463
    • /
    • 2021
  • This study was conducted to examine the status of food consumption and nutrition intake of young adults according to food security using data from the Korea National Health and Nutrition Examination Survey (KNHANES) (2008~2018). A total of 10,655 young adults aged 19~34 years participated in the study. The subjects in the moderately/severely food insecure group consumed less fruits, vegetables, meat, nuts and seeds than those in food secure/mildly food insecure group after adjusting for confounding factors. The moderately/severely food insecure group significantly decreased mean adequacy ratio (MAR) and nutrient adequacy ratio (NAR) for protein, vitamin A, riboflavin, niacin, vitamin C, calcium, phosphorus and iron compared to the food secure/ mildly food insecure group. The percentages of the participants consuming a daily diet with carbohydrate, protein, vitamin A, thiamin, riboflavin, niacin, vitamin C, phosphorus and iron less than the estimated average requirement (EAR) increased in the moderately/severely food insecure group compared with the food secure group. This study suggested that the nutrition intake of young adults was related to food security status. These findings can be used as basic data for developing nutritional policies for young adults.

One-Snapshot Algorithm for Secure Transaction Management in Electronic Stock Trading Systems (전자 주식 매매 시스템에서의 보안 트랜잭션 관리를 위한 단일 스냅샷 알고리즘)

  • 김남규;문송천;손용락
    • Journal of KIISE:Databases
    • /
    • v.30 no.2
    • /
    • pp.209-224
    • /
    • 2003
  • Recent development of electronic commerce enables the use of Electronic Stock Trading Systems(ESTS) to be expanded. In ESTS, information with various sensitivity levels is shared by multiple users with mutually different clearance levels. Therefore, it is necessary to use Multilevel Secure Database Management Systems(MLS/DBMSs) in controlling concurrent execution among multiple transactions. In ESTS, not only analytical OLAP transactions, but also mission critical OLTP transactions are executed concurrently, which causes it difficult to adapt traditional secure transaction management schemes to ESTS environments. In this paper, we propose Secure One Snapshot(SOS) protocol that is devised for Secure Transaction Management in ESTS. By maintaining additional one snapshot as well as working database SOS blocks covert-channel efficiently, enables various real-time transaction management schemes to be adapted with ease, and reduces the length of waiting queue being managed to maintain freshness of data by utilizing the characteristics of less strict correctness criteria. In this paper, we introduce the process of SOS protocol with some examples, and then analyze correctness of devised protocol.

A Secure Authentication and Key Agreement Scheme for Smart Grid Environments without Tamper-Resistant Devices (스마트 그리드 환경에서 변조 방지 디바이스를 사용하지 않는 안전한 사용자 인증 및 키 합의 방식)

  • Park, Ki-Sung;Yoon, Dae-Geun;Noh, SungKee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.313-323
    • /
    • 2020
  • With the development of smart grid technologies, a user can use the secure and reliable power services in smart gird environments. However, the users are not secure against various potential attacks because the smart gird services are provided through the public channel. Therefore, a secure and lightweight authentication and key agreement scheme has become a very important security issue in smart grid in order to guarantee user's privacy. In 2019, Zhang et al. proposed a lightweight authentication scheme for smart gird communications. In this paper, we demonstrate that Zhang et al.'s scheme is vulnerable to impersonation and session key disclosure attacks, and then we propose a secure authentication and key agreement scheme for smart grid environments without tamper-resistant devices. Moreover, we perform the informal security and the BAN logic analysis to prove that our scheme is secure various attacks and provides secure mutual authentication, respectively. We also perform the performance analysis compared with related schemes. Therefore, the proposed scheme is efficiently applicable to practical smart gird environments.

Secure Boot Security Requirements for Cryptographic Modules against Supply Chain Threats (공급망 위협에 대응하기 위한 암호모듈의 안전한 부팅 보안 요구사항 제안)

  • Jong Wook Park;Sanghan Lee;Bonseok Koo;Seon Yeob Baek;Sang Yun Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.989-1000
    • /
    • 2023
  • In order to respond to supply chain threats, active research and development efforts are underway for software tamper prevention technologies such as Secure Boot and management systems like Software Bill of Materials(SBOM). Particularly, the Trusted Computing Group (TCG) is introducing standards for Trusted Platform Module(TPM) to provide a secure and trustworthy computing boot environment. This paper emphasizes the need for introducing secure booting technology for cryptographic modules to ensure that they remain safe and provide reliable functionality even in the face of supply chain threats. Furthermore, it analyzes vulnerabilities in cryptographic modules verified by the ISO/IEC 19790 standard and proposes security requirements for secure booting of cryptographic modules to address these vulnerabilities.

A Study of Web Application Development Method for Secure Coding Approach Based on SDLC Steps (SDLC 설계절차에 기반한 웹 애플리케이션 시큐어코딩 접근방법 연구)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.93-99
    • /
    • 2012
  • As the most common application development of software development time, error-free quality, adaptability to frequent maintenance, such as the need for large and complex software challenges have been raised. When developing web applications to respond to software reusability, reliability, scalability, simplicity, these quality issues do not take into account such aspects traditionally. In this situation, the traditional development methodology to solve the same quality because it has limited development of new methodologies is needed. Quality of applications the application logic, data, and architecture in the entire area as a separate methodology can achieve your goals if you do not respond. In this study secure coding, the big issue, web application factors to deal with security vulnerabilities, web application architecture, design procedure is proposed. This proposal is based on a series of ISO/IEC9000, a web application architecture design process.

A Study On The Development MLS (MLS(Multi Level Secure) 연구 개발 동향)

  • 최창민;김상훈;정정수
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.108-111
    • /
    • 2003
  • 컴퓨터 시스템이 다수의 사용자에게 다수의 응용을 제공하는 특성을 갖게 되면서 데이터 보안 문제에 대한 관심이 높아지게 되었다. 시스템 관리자나 소프트웨어 개발자들은 권한이 있는 사용자들에게만 특정 데이터 또는 자원을 제공하기 위해 서로 다른 종류의 접근제어(Access Control) 구현에 대한 문제가 대두 되었다. 본 논문에서는 특정 사용자에게 데이터 또는 자원을 제공하기 위한 접근제어 방법인 MLS(Multi Level Secure)의 정의와 구조를 알아보면 MLS의 연구개발 동향에 대하여 알아본다.

  • PDF