• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.027 seconds

A Proposal for Transmission Method of Safety CRL to Distributed OCSP Group (분산된 OCSP 그룹으로 안전한 인증서 취소 목록 전달 방법에 관한 연구)

  • Ko Hoon;Jang Uijin;Shin Yongtae
    • Journal of Internet Computing and Services
    • /
    • v.5 no.2
    • /
    • pp.33-40
    • /
    • 2004
  • PKI(Public Key Infrastructure) issues a certificate for providing Integrity of public key. and it Inspects the validity by downloading CRL(Certificate Revocation List) for checking the validity of certificate. But. it imposes a burden on processing of certificate due to Increase of user and the size of CRL, Lately, OCSP(Online Certificate Status Protocol), which examines the validity on online, is published as an alternative plan. But, it makes a problem due to concentration of just one certificate repository, Accordingly we propose the scheme that OCSP server is arranged in distributed area and then the information is safely transmitted to OCSP server.

  • PDF

Security Algorithm for Vehicle Type Recognition (에지영상의 비율을 이용한 차종 인식 보안 알고리즘)

  • Rhee, Eugene
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.77-82
    • /
    • 2017
  • In this paper, a new security algorithm to recognize the type of the vehicle with the vehicle image as a input image is suggested. The vehicle recognition security algorithm is composed of five core parts, such as the input image, background removal, edge areas extraction, pre-processing(binarization), and the vehicle recognition. Therefore, the final recognition rate of the security algorithm for vehicle type recognition can be affected by the function and efficiency of each step. After inputting image into a gray scale image and removing backgrounds, the binarization is performed by extracting only the edge region. After the pre-treatment process for making outlines clear, the type of vehicles is categorized into large vehicles, passenger cars and motorcycles through the ratio of height and width of the vehicle.

Password Authenticated Joux's Key Exchange Protocol (패스워드 인증된 Joux의 키 교환 프로토콜)

  • Lee Sang-gon;Hitcock Yvonne;Park Young-ho;Moon Sang-jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.73-92
    • /
    • 2005
  • Joux's tripartite key agreement protocol is one of the most prominent developments in the area of key agreement. Although certificate-based and ID-based authentication schemes have been proposed to provide authentication for Joux's protocol, no provably secure password-based one round tripartite key agreement protocol has been proposed yet. We propose a secure one round password-based tripartite key agreement protocol that builds on Joux's protocol and adapts PAK-EC scheme for password-based authentication, and present a proof of its security.

Review the Recent Fraud Detection Systems for Accounting Area using Blockchain Technology

  • Rania Alsulami;Raghad Albalawi;Manal Albalawi;Hetaf Alsugair;Khaled A. Alblowi;Adel R. Alharbi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.109-120
    • /
    • 2023
  • With the increasing interest in blockchain technology and its employment in diverse sectors and industries, including: finance, business, voting, industrial and many other medical and educational applications. Recently, the blockchain technology has played significant role in preventing fraud transactions in accounting systems, as the blockchain offers high security measurements, reduces the need for centralized processing, and blocks access to the organization information and system. Therefore, this paper studies, analyses, and investigates the adoption of blockchain technology with accounting systems, through analyzing the results of several research works which have employed the blockchain technology to secure their accounting systems. In addition, we investigate the performance of applying the deep learning and machine learning approaches for the purpose of fraud detection and classification. As a result of this study, the adoption of blockchain technology will enhance the safety and security of accounting systems, through identifying and classifying the possible frauds that may attack the accounting and business organizations.

The Analysis of KASS Operational Mitigation Methods and Continuity Cases Based on ICAO Standards (ICAO 표준 기반 KASS 운영 상 완화조치 및 연속성 사례 분석)

  • Yun-Jung Choi;Dong-Hwan Bae;Hyo-Jung Yoon;Donghwan Yoon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.13 no.2
    • /
    • pp.131-136
    • /
    • 2024
  • This paper deal with a method for calculating the continuity of Korea Augmentation Satellite System (KASS), which was completed in Korea in December 2023, and a plan to respond in the event that a continuity hazard situation occurs during operation. For this purpose, the International Civil Aviation Organization (ICAO) Satellite Based Augmentation System (SBAS) continuity standards, Wide Area Augmentation System (WAAS), and European Geostationary Navigation Overlay Service (EGNOS) continuity cases are examined in this paper. According to the measures recommended by the ICAO, when the number of continuity risks exceeds a certain level and the level drops drastically, various mitigation operations by country are implemented. Through this, if KASS does not meet ICAO continuity standards in the future, such measures can be referred to. In addition, this paper computes the short-term KASS continuity during the test broadcast period. Although continuity does not meet the ICAO standards, although this test period is too short, further meaningful analysis in the future is required. Additionally, this paper carried out an analysis of the timing and period to systematically calculate the meaningful value of continuity.

Relationship among User's Security Need Sufficiency, Customer Satisfaction and Life Satisfaction in Electronic Security System (기계경비시스템 이용자의 안전욕구충족과 이용만족 및 생활만족의 관계)

  • Kim, Chan-Sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.614-619
    • /
    • 2009
  • This study aims at diagnosing the relationship among user's security need Sufficiency, customer satisfaction and life satisfaction in electronic security system. For the achievement of this study selected electronic security system users in Seoul as a population for about 25 days from June 20th, 2008 to July 15th, 2008, segmented Han river based in 5 areas and extracted 1 dong per each area. This study selected 378 peoples by distributing 400 unities in total for each 80 peoples throughout purposive sampling method. The final 302 samples were used in statistics. Collected data was analyzed based on the aim of this study using SPSSWIN 16.0, and factor analysis, reliability analysis, stepwise multiple regression analysis and path analysis were used as statistic techniques to analyze. The conclusions are the followings; First, The higher bodily, environmental, mental, informational, and physical security need the more body and property protection satisfaction and facility customer satisfaction. The higher bodily, environmental, and mental security need the more employee service satisfaction. Second, The higher bodily, environmental, informational, and physical security need are perceived, the more influence is marked with life satisfaction and security life satisfaction. Third, The higher personal and property protection, facility, and employee service satisfaction the more security life satisfaction. Also, the higher customer service and personal and property protection satisfaction are perceived, the more influence is marked with life satisfaction. Fourth, Security need sufficiency has little influence on life satisfaction directly, but it has high influences on life satisfaction through customer satisfaction of electronic security system.

  • PDF

Effects of Perceived Autonomy Support on Intrinsic Motivation and Passion for Major students of Security Martial Arts (경호무도 전공자의 지각된 자율성지지가 내재적 동기 및 열정에 미치는 영향)

  • Yang, Jin-Young;Lim, Tae-Hee;Kim, Dong-Hyun
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.87-112
    • /
    • 2016
  • The purpose of this study was to investigate the influence of perceived autonomy support on intrinsic motivation and passion for major students of security martial arts. The subjects were selected 317 people to security martial arts majors universities in the metropolitan area extraction using a convenience sample. AS autonomy support, intrinsic motivation, and passion by research tools construct validity were utilized for statistical verification. Data were analyzed through descriptive statistics, frequency analysis, exploratory factors analysis, reliability analysis, correlation analysis using the SPSS 21.0 and confirmatory factors analysis and structural equation modeling(SEM) using AMOS 21.0. The results of this study were as follows. First, autonomy support of major students for security martial arts had a positive impact on intrinsic motivation. Second, autonomy support of major students for security martial arts had a positive impact on harmonious passion. Third, autonomy support of major students for security martial arts had a impact on obsessive passion. Forth, intrinsic motivation of major students for security martial arts had a positive impact on harmonious passion. Fifth, intrinsic motivation of major students for security martial arts had a negative impact on obsessive passion. The results of structural equation modeling showed that intrinsic motivation partially mediated the relationship between autonomy support and harmonious passion. And the relationships between autonomy support and obsessive passion were completely mediated by the intrinsic motivation.

  • PDF

A Study on Aviation Security System on Airport (국제민간항공협약의 표준과 관행을 고려한 공항보안체계의 문제점고찰)

  • Yoo, Kwang-Eui
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.19 no.1
    • /
    • pp.165-182
    • /
    • 2004
  • According to the Annex 17 to the Convention on International Civil Aviation, an appropriate authority of each contracting state has to define and allocate tasks and coordinate activities between the departments, agencies and other organizations of the State, airport and aircraft operators and other entities concerned with or responsible for the implementation of various aspects of the national civil aviation security programme. It is generally recognized that the three major parties responsible for the aviation security at an airport are appropriate government departments, airport operator and airlines. The airlines are the beneficiaries of security activities as well as the provider of security activities. So, their responsibilities have been critical in protecting civil aviation from unlawful interferences. The airport has to take leading role in implementing security tasks at airport area because the airport operator is the provider of airport facilities and services to its customer and the security activities belong to its services. The government has the responsibilities not only for establishing regulatory system but also for oversighting the implementation of aviation security activities. The paper is to review the revision of aviation security regulation and the changes of aviation security responsibilities, and costs and task assignment in Republic of Korea after September 11 event. The responsibilities, tasks and costs assigned to airlines, airport operators and government are introduced and evaluated in terms of economic fairness, effectiveness and efficiency of aviation security activities. The drawbacks of new legal system are pointed out and the suggestions to remedy them are proposed as conclusions.

  • PDF

Water security assessment of Asian countries for sustainable water management (지속가능한 물 관리를 위한 아시아 국가별 물 안보 평가)

  • Park, Seo-Yeon;Lee, Seungho;Lee, Hyun-Ju;Lee, Joo-Heon
    • Journal of Korea Water Resources Association
    • /
    • v.53 no.spc1
    • /
    • pp.719-730
    • /
    • 2020
  • Recognizing a complexity of global water challenges, such as water shortage, water pollution, water-related disasters, and degradation of water environments, this study introduces the newly established concept and definition of water security and water security assessment framework based on the review of previous works on water security. In order to critically assess the situations of water security of each country, an water security assessment framework is employed highlighting the four core areas: 1) social equity; 2) economic efficiency; 3) environmental sustainability; and 4) resilience to water-related disasters. 28 Asian countries have been selected and evaluated for the level of water security, and as a consequence, Japan, Malaysia and South Korea demonstrate a high degree of water security whereas India, Pakistan and the Philippines show a relatively low level of water security. The significance of this study lies in clarifying weak areas in water security as well as suggesting the areas that should be improved for achieving sustainable water management.

A Study on Effective Methods to Enhance the Role of Private Security Firm for security Management in the Site of Performing Arts Events (공연장 안전관리 실태 및 개선에 따른 민간경비 역할증대에 관한 연구)

  • You, Young Il
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.2
    • /
    • pp.158-170
    • /
    • 2012
  • Citizens'income has been increased along with the trend of rapid changes in society, and the quality of their lives has been improved as well. As much as the degree of increase of quality of life, the number of spectators for performing art events, etc. who desire to fulfill their needs for enjoyment of varied cultural performances have been increasing, and also a large number of spectators enjoys a variety of festivals being held in each provincial area as well as international events: we still remember such frantic rooting shown by citizens during 2002 World Cup drawing attention and interest of entire nation. There are always risks of loss of human lives if accidents occur as there sult of close-packed crowd gathered at the same time. Therefore, it is required to prepare adequate security measures in order to prevent various accidents before hand. It is hoped that this research work would be of help for further efficient and systematic security management for the performing arts centers or public theaters encouraging the event organizer and the private security firm and the Korea Private Security Association to exert great effort and investments in further projects for development of security technology. Also, it is required to build a performance culture to consider audience's safety first from the beginning to the end of the event on the basis of efficient security management. Furthermore, spect at or sare required to recognize the fact that safety in the site for performing arts should be guaranteed for everyone's sake, and, to achieve this, they are obliged to be more cooperative with the event organizer and the private security firm, forming a trinity all together, in order not to have safety threatening situations in the site of performing arts events.