• Title/Summary/Keyword: Security Function

Search Result 1,555, Processing Time 0.026 seconds

User-Level Delegation in Role-Based Access Control Model (역할기반 접근제어에 기초한 사용자 수준의 위임 기법)

  • 심재훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.49-62
    • /
    • 2000
  • Role-Based Access Control(RBAC) has recently received considerable attention as a alternative to traditional discretionary and mandatory access control to apply variant organizations function hierarchy of commercial or govemment. Also RBAC provides a delegation that is one of control principles in organization. In general delegation occurring in real organization is performed by an user giving permissions to another user. But, RBAC cannot implement these user-level delegation correctly. And delegation result in security problem such as destroying separation of duty policy information disclosure due to inappro-priate delegation. Besides security adminsitrator directly deals with that problem. In this thesis we suggests some methods that is created by the user.

A Study on the Function Development of Security System Using USB (USB를 활용한 보안 시스템 기능개발에 관한 연구)

  • Bak, Ji ye;Lee, Deok Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.472-474
    • /
    • 2020
  • in order to minimize damage from increasing personal information leakage and cyber risks, a new authentication system plan was devised that can be used in combination with existing authentication methods for the purpose of improving security. A more closed and extreme authentication method was established by installing a self-made security module using USB that can be easily utilized, enabling only individuals with registered USB to freely use information.

A Study on Enhancing Hash Function Security against Collision Search Attack (충돌쌍 탐색 공격에 대한 해쉬 함수 안전성 강화에 관한 연구)

  • Jeong, Eun-Jin;Han, Jeong-Hoon;Kim, Seung-Joo;Won, Dong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1120-1123
    • /
    • 2008
  • 단방향 암호화 함수인 해쉬 함수는 2005년 Wang의 새로운 공격법이 발표되면서 안전성에 대한 문제점이 조금씩 드러나기 시작하고 있다. Wang의 새로운 차분 공격법은 현재 가장 널리 사용하고 있는 해쉬 알고리즘인 SHA-1을 이론적으로 $2^{69}$의 계산으로 충돌을 찾을 수 있다고 하였다. 본 논문에서는 차분 공격이 이루어지는 방법과 Wang의 차분 공격이 지니는 두 가지 특성에 대해서 연구하였고, MDx계열의 해쉬 함수의 안전성에 대한 기존의 제시된 해결책과 다른, 한 블록의 모든 워드 값을 변형 처리한 방식을 제안한다.

Human Recogmotion based on Retinal Bifurcations and Modified Correlation Function

  • Amin Dehghani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.169-173
    • /
    • 2024
  • Nowadays high security is an important issue for most of the secure places and recent advances increase the needs of high-security systems. Therefore, needs to high security for controlling and permitting the allowable people to enter the high secure places, increases and extends the use of conventional recognition methods. Therefore, a novel identification method using retinal images is proposed in this paper. For this purpose, new mathematical functions are applied on corners and bifurcations. To evaluate the proposed method we use 40 retinal images from the DRIVE database, 20 normal retinal image from STARE database and 140 normal retinal images from local collected database and the accuracy rate is 99.34 percent.

Information Security Policy in Ubiquitous-Ecological City (u-Eco City에서의 정보보호 정책)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.43-48
    • /
    • 2012
  • In this paper, the requirements for information security are presented in the ubiquitous ecological(u-Eco) city. The various definition of ubiquitous city is analyzed first, the concept of the u-Eco City, services and major projects are then presented. The framework of the integrated operating center for u-Eco city is proposed, the privacy, data security and network facility protection in the center are analyzed. Unlike to previously proposed security algorithms, the light-weight encoding algorithms(such as block/stream encoding, pseudo-random generator, hash function, and public key encoding) in the u-Eco city center are required to communicate the information in the ubiquitous sensor network. Furthermore, the principal policies guaranteeing the secrecy and authentication for the private information are also presented.

Design of Security Management Function for SNMPv3 using Role-Based Access Control Model (역할기반 접근통제 모델을 이용한 SNMPv3 보안관리기능 설계)

  • 이형효
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.1-10
    • /
    • 2001
  • SNMPv3 provides the security services such as authentication and privacy of messages as well as a new flexible and extensible administration framework. Therefore, with the security services enabled by SNMPv3, network managers can monitor and control the operation of network components more secure way than before. But, due to the user-centric security management and the deficiency of policy-based security management facility, SNMPv3 might be inadequate network management solution for large-scaled networks. In this paper, we review the problems of the SNMPv3 security services, and propose a Role-based Security Management Model(RSM), which greatly reduces the complexity of permission management by specifying and enforcing a security management policy far entire network.

  • PDF

Design of Accident Situation ID Recording System using JPMP-SID Security Tag (보안 JPMP-SID Tag를 활용한 사고 상황 ID 기록 시스템 설계)

  • Choi, Jang-Sik;Choi, Sung-Yeol;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.85-90
    • /
    • 2011
  • JPMP SID Tag is the security senor tag to provides physical information protective function using sensor module, has impossible feature to copy and fake the data which is stored in the tag. So data which is stored in the JPMP SID Tag has authenticity, integrity, originality. Therefore JPMP SID Tag could be applied in the place where the security of data is demanded. This paper propose the system using the JPMP SID Tag to acquire and protect digital evidence where cause investigation of accident is necessary. Also, proposed systems is complement of software security with composition secondary control logic for JPMP SID tag access control.

Be study technical information protection in ubiqutious home networks (유비쿼터스 홈 네트워크에서의 정보보호 기술 연구)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.65-75
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at these papers, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS, DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding an external denial of service attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack like DoS, DDoS, IP Spoofing, and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

A Design and Analysis of PKCS #11 supporting the KCDSA mechanism (KCDSA 메커니즘을 제공하는 PKCS #11 설계 및 분석)

  • 김명희;김은환;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.141-151
    • /
    • 2004
  • According to the improvemnent of electronic commerce, the requirements of security devices are becoming increasingly pervasive. The security API must design easily and securely to support a compatibility feature between security devices. It is chosen the PKCS #11 interface by RSA Labs that shows the compatibility and extensibility standards of many application product and implementation, and supported KCDSA mechanism which is a korean digital signature standard. And the PKCS #11 security API defines new key management function which provides more secure key management ability. We suggest the object attributes and templates of KCDSA private and public key object, generate and verify digital signature using KCDSA mechanism. The PKCS #11 supporting KCDSA mechanism is designed, implemented using C-Language, tested a performance, and analyzed the security and compatibiltiy feature.

Design and Implementation of USIM Security Module for the Wireless Network Interworking (무선 네트워크 연동을 위한 USIM 보안 모듈 설계 및 구현)

  • Kim, Choon-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.41-49
    • /
    • 2007
  • USIM(UMTS Subscriber Identity Module) technology that accept 3GPP(3rd Generation Partnership Project) standards for information security supports security function in 3GPP. Supported security functions of USIM are confidentiality of user identity, mutual authentication and key agreement between end user and network, confidentiality of user data and data integrity. It is very important technology in wireless network. It makes secure environment that user and service provider can use securely mobile service in network. In this paper, design and implementation USIM security module that supports common network access method and authentication protocol in 3GPP and WLAN(Wireless LAN) and AAA (3A-Authentication Authorization Accounting) server system based RADIUS.