• Title/Summary/Keyword: Secure Web

Search Result 261, Processing Time 0.028 seconds

A Study of Improved Session Management for Mobile Web under BYOD environment (BYOD 환경을 고려한 모바일 웹을 위한 세션 관리 개선 방안 연구)

  • Kim, Young-hun;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1117-1124
    • /
    • 2015
  • This paper explains a web session management system for mobile web environment with BYOD(Bring Your Own Device). This system operates by enhanced secure session token. This system consists of an unique identifier, time stamp, and encryption algorithm. The Unique identifier in this system classifies each mobile device for web security based on mobile environment with BYOD. And the Time stamp in this system that determine session effectiveness for web security. Also the Cipher algorithm in this system that protects session token information for web security. This paper analysis a security of session management system running on mobile web environment using the simulation techniques. The proposed method is more suitable than the other methods under enviroment mobile web environment with BYOD.

A Study on Providing Secure Storage and User Authentication Using MTM on Mobile Platform (모바일 플랫폼에서 MTM을 이용한 보안영역 제공 및 인증에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.293-302
    • /
    • 2011
  • The various information services can be delivered by smartphone through advanced high-speed mobile communication. A smartphone is a mobile device that offers more powerful computing capacity than feature phone. Therefore this device can provide such as web surfing, editing documents, playing video, and playing games. A lot of personal information stored on smartphone. Because it has High usability. Personal information Leaks if the smart phone is lost or stolen may become a big problem. In this paper we have analyzed existing method for providing secure storage and user authentication on mobile platform and derived security requirement. Therefore we propose the following scheme that satisfy security requirement. Proposed scheme providing secure storage with preventing authentication bypass, and availability from damaged data to access secure area.

An Efficient Scheme for Web Services Performance Improvement (웹 서비스 성능 개선 방안)

  • Huh Eui-Nam;Lee Pil-Woo
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.4
    • /
    • pp.31-41
    • /
    • 2005
  • This paper proposes a novel Web Services enhancement method, which enhances XML based e-commerce and Web Services securely and efficiently. Recently, the ratio of XML Denial of Services (XDOS) is increased significantly However, XML data is visible only at the target application site or the application layer. Thus, an efficient and secure mechanism handling XML data on the network layer to provide fast performance on the server and protect XDOS at network level is strongly required basic component. This paper presents many issues and gives useful results from the various experiments to support an implemented XAN platform.

  • PDF

VLC4WoT : Visible Light Communication for Web of Things

  • Durgun, Mahmut;Gokrem, Levent
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1502-1519
    • /
    • 2020
  • Recently, new devices have been developed for the Internet of Things concept. The devices commonly use RF (Radio Frequency) based wireless communication. With the increase in the number of devices, the space allocated for the radio frequency band in wireless communication fills rapidly. Visible Light Communication (VLC) is an alternative, secure and economical communication technology that uses light instead of radio frequencies. While Web of Things (WoT) is the adaptation of the experience and knowledge acquired from the web into the internet of things ecosystems. By combining these two technologies, the development of the Visible Light Communication for Web of Things (VLC4WoT) system, which can use VLC and WoT technologies, has been our motivation. In our study, microcontroller control circuit was created for VLC4WoT system. Control of the circuits over the internet was performed. VLC based receiver and transmitter units have been developed for wireless communication. Web based interface was created for control. The test apparatus consisting of four objects with four outputs and a transfer unit was carried out. In this test, communication was achieved successfully. It was presented in the study that VLC can be used in the web of things architecture. In the future, it is envisaged to use this system as a safe and economical system in indoor environments.

Analysis and response of Petya to Ransomware (웹 기반의 보안 취약점 분석과 대응방안)

  • Kim, Seon-Yong;Kim, Ki-Hwan;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.480-482
    • /
    • 2017
  • The web is used in various ways such as shopping, news, and searching through a web browser. As the Web becomes more and more common, it is often the case that someone is trying to steal personal information or confidential documents from a company, so security must be paid to ensure security on the web. For this reason, you should be aware of the vulnerabilities that are being exploited maliciously in your web applications and improve security with secure coding. In this paper, we propose a method of detecting hacking and how to deal with vulnerabilities due to some weak points on the web.

  • PDF

A Study of Security Policy Adaptation to WAF using Correlation Analysis (상관분석을 활용한 웹방화벽 정책 적용 방안 연구)

  • Kim, Chang-hong;Choi, Dae-young;Yi, Jeong-hyun;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.261-263
    • /
    • 2014
  • The public services without going through the web is now about to become impossible. To solve these kinds of security issues about the web, the government announced that a secure coding for web server is mandatory since 2012. In the domestic market, the web firewall has been promoted and widely sold as one of the best solutions for the existing web problems. In this study, with providing the effective way operator can apply security policies for the web firewall, more stable web services can be presented.

  • PDF

A Design of Web Server Architecture Environment for Reliability Enhancement and Secure Web Services (신뢰성 향상과 안전한 웹 서비스를 위한 웹 서버 아키텍처 환경의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.343-350
    • /
    • 2010
  • In the existing design of web server architecture, data encryption technique is used to keep the reliability, stability, and safety of web service. But the use of data encryption technique wastes the work of cpu while decreasing throughput of web server and increasing average response time so that it shows negative effect on the capacity of web application server. Also, the latest web applications require security and safety for the safe internet communication. Therefore, this paper suggests the improved web server which uses thread pool and Non-blocking I/O adding new web service modules to the existing web server for the safe web service, provides reliability and safety to show the safe web service capacity. And we compare and evaluate the safety and capacity through experiment on the existing traditional Tomcat based web server and the proposed system to evaluate the safety and capacity of the proposed web server system.

The Design and Implementation of Secure-ReXpis System with Internet Environment (인터넷 환경 하에서의 Secure-ReXpis 시스템 설계 및 구현)

  • 안경림;박상필;백혜경;임병찬;박준홍;고대식
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.3
    • /
    • pp.101-113
    • /
    • 2001
  • Security is very important in EC(Electronic Commerce) environment because exchanged information(that is transaction details, private data, charges data(card-no, accounts), etc) is various and is very sensitive. So, In this paper, we propose Secure-ReXpis(Reliable St excellent Xh3 Processing Infrastructure) System that transfer message and support Message Level Security(Encryption/Decryption and Digital Signature). And we implement Message Confidentiality Service, User Authentication & Message Integrity Service and Non-Repudiation Service among the various Security Services. This system support XML message format and EDI message, WEB Data and Private Format Data, etc.

  • PDF

An Efficient WWW Metering Scheme based on Hash Functions (해쉬함수 기반의 효율적인 WWW 사용량 측정 방안)

  • Shin, Weon;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.2
    • /
    • pp.133-139
    • /
    • 2000
  • In this paper we propose a secure and an efficient metering scheme for measuring the usage and the popularity of web pages. The proposed scheme is based on the cryptographic secure hash functions. Since the metering schemes based on cryptographic technology provides security, efficiency, accuracy and anonymity comparing to the existing metering schemes in WWW, they have the advantages that are secure against attempts by servers who inflate the number of clients and against attempt of collaboration of severs and clients.

  • PDF

A Study on Secure Role-Based Access Control (안전한 직무 기반 접근 제어에 대한 연구)

  • Lee, Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.119-124
    • /
    • 2001
  • In the paper, is proposed a secure role-based access control model that not only has s functions such as security, integrity and flow control, but also can easily meet access requirements of role-based social organizations. The proposed role-based access control mod designed based on proven existing rule-based access control mechanisms in order to be app real access control systems. The model proposed in the paper is simple and secure. It can be used for the web-based application systems working on the Internet.

  • PDF