• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.024 seconds

Secure Healthcare Data Management and Sharing Platform Based on Hyperledger Fabric (하이퍼레저 패브릭 기반의 안전한 헬스케어 데이터 관리 및 공유 플랫폼 개발 연구)

  • Choi, Ye-Jin;Kim, Kyoung-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.95-102
    • /
    • 2020
  • In this paper, we present a healthcare data integration management and sharing platform based on a permissioned blockchain-based system called the Hyperledger fabric. The Hyperledger fabric allows patients to easily access their data, share the data with agencies that need it, and also reward participants. The healthcare data is stored in the blockchain by a de-identification process. Privacy is protected by setting detailed access rights to the stored data. The proposed model provides higher security than other models using a public blockchain. This study confirms that patient data can be stored more securely, by comparing the data stored in the blockchain with that from existing information storage methods.

A risk management methodology for maritime logistics and supply chain applications

  • Mokhtari, Kambiz;Ren, Jun
    • Ocean Systems Engineering
    • /
    • v.4 no.2
    • /
    • pp.137-150
    • /
    • 2014
  • In the marine industry although there has been significant growth towards safety, security and risk assessments or risk-based strategies such as marine insurance and regulations to avoid the risks of damage to properties and the environment or the prospect of premature death caused by accidents etc, the moves toward managing the risks which are linked directly to the business functions and decision making processes have been very slow. Furthermore in the marine industry most perceptions, methodologies and frameworks of dealing with hazards, risks, safety and security issues are for their assessment rather than their management. This trend reveals the fact that in different marine industry sectors such as logistics and shipping there is a lack of coherent risk management framework or methodology from which to understand the risk-based decisions especially for the purpose of design, construction, operation, management and even decommissioning of the marine related applications. On the other hand risk management is not yet viewed holistically in the marine industry in order to, for example, assign a right person, i.e. risk manager, who can act as a coordinator and advisor with responsibilities that are only specific to risk management. As a result this paper, by examining the present physical borders and risk-based activities in the marine industry, aims to propose an appropriate risk management methodology in addition to the emergent role of risk managers which will enable the industry users initially to become familiar with the concept of risk management at its holistic level. In the later stages this eventually can lead to development of risk management capabilities at an exclusive level and its integration into the marine industry functions in future.

Design and Performance Analysis of u-TSMVPN for Intelligent Transportation Systems (지능형 교통시스템을 위한 u-TSMVPN의 설계와 성능분석)

  • Jeon, Hae-Nam;Jeong, Jongpil
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.32-45
    • /
    • 2013
  • Globally, intelligent vehicles and telematics research and development through the integration of IT technology in the vehicle are significant increasing. Real-time data communication for intelligent transportation system (ITS) is very important. It collects real-time data from the vehicle and provides the information collected from ITS center. We propose an effective and secure communication scheme for these communication procedures. In particular, our proposed SIP-based MVPN reduces signaling cost and has many advantages in security aspects. In addition, our proposed scheme performs the mobility management applying NEMO (Network Mobility) for the communication between the vehicles. In other words, we propose an ITS communication mechanism of SIP-based mobile VPN and V2V NEMO. Finally, our performance analysis show that the ITS of SIP-based MVPN is significantly reducing the handoff signaling cost.

Study on the Korea Information System of Criminal Justice Services (형사사법정보시스템(KICS)의 활용실태 및 개선방안)

  • Shin, Sung Shik
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.141-147
    • /
    • 2015
  • KICS is intended to facilitate the computerization of the criminal justice process and realize a quick and transparent criminal justice process. Thus, it has been operating in the field of criminal justice by establishing criminal justice portal for the empowerment of the people. While in 2008 the opposition by the Court concerns the independent function of the judiciary and privacy violations presented in conjunction with its own operating system between the judiciary and other institutions. KICS improve office productivity by creating documents in a single criminal justice agencies to reduce costs, and costs of document exchange between criminal justice agencies. Secondly, the decision-making process is simplified by using the electronic documentation system and speed up, bind and document handling procedures ranging from preserving documents received are reduced dramatically contribute to the competitiveness of the organization through business improvement. Third, The use of an electronic document stored in the information is easy, and it is possible to easily access a variety of information can facilitate the realization of an open state by smoothly to provide information about the people. Finally, KICS building a network of criminal legal systems to maximize the benefits and the electronic integration effect it is being evaluated to improve the overall efficiency of the criminal legal system.

A construction Plan for the integrated information network of sports industry (스포츠산업 통합정보망 구축 방안)

  • Jun, Sunhye;Kang, SeungAe;Kim, Hyuncheol;Kwon, Hyungil;Kang, Sunyoung;Kim, Yeojin;Jeon, Heejun
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.63-69
    • /
    • 2013
  • This research analyze the current status pertaining to the sport industry's information system and information network in Korea to propose integrated information network of sport industry construction measures with the goal of optimizing vertical and horizontal network formation, and knowledge information sharing and dissemination. To construct integrated information network of sport industry, literature examination and meeting of experts to search for measures are utilized. This paper analyze the realities of the sport industry's information system and information network in Korea to propose the following when it comes to the measures to realize sport industry's information integration. First, DB for sport industry relate information that factored in the Ontology is being developed. In other words, it is necessary to design a DB that factors in the Semantic Web. Second, once the DB relate to the sport industry that factored in the Ontology is developed, it is necessary to build RSS/Atom based active network that enables exchange of organic information among them.

A Study on Efficient Distributed Data Processing POS System of PKI Based (PKI 기반의 효율적인 분산처리 Point of sales 시스템에 관한 연구)

  • Park Gil-Cheol;Kim Seok-Soo;Kang Min-Gyun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.43-50
    • /
    • 2005
  • POS system that become that is supply net administration and computerization fetters of customer management that become point in istribution network constructed database and use XML-Encryption that is certificate techniques of PKI and standard of security for security that is XML's shortcoming and design distributed processing POS system using XML for data integration by introduction of Ubiquitous concept. This POS system has four advantages. First, Because there is no server, need not to attempt authentication and data transmission every time. Second, can integrate data base by XML and improve portability of program itself. Third, XML data in data transmission because transmit data after encryption data safe .Fourth, After encode whenever process data for data breakup anger of POS system client program and elevation of the processing speed, transmit at because gathering data at data transmission.

  • PDF

Extended GTRBAC Model for Access Control Enforcement in Enterprise Environments (기업환경의 접근제어를 위한 확장된 GTRBAC 모델)

  • Park Dong-Eue;Hwang Yu-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.211-224
    • /
    • 2005
  • With the wide acceptance of the Internet and the Web, volumes of information and related users have increased and companies have become to need security mechanisms to effectively protect important information for business activities and security problems have become increasingly difficult. This paper proposes a improved access control model for access control enforcement in enterprise environments through the integration of the temporal constraint character of the GT-RBAC model and sub-role hierarchies concept. The proposed model, called Extended GT-RBAC(Extended Generalized Temporal Role Based Access Control) Model, supports characteristics of GTRBAC model such as of temporal constraint, various time-constrained cardinality, control now dependency and separation of duty constraints(SoDs). Also it supports unconditional inheritance based on the degree of inheritance and business characteristics by using sub-roles hierarchies in order to allow expressing access control policies at a finer granularity in corporate enterprise environments.

  • PDF

Extended GTRBAC Delegation Model for Access Control Enforcement in Enterprise Environments (기업환경의 접근제어를 위한 확장된 GTRBAC 위임 모델)

  • Hwang Yu-Dong;Park Dong-Gue
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.17-30
    • /
    • 2006
  • With the wide acceptance of the Internet and the Web, volumes of information and related users have increased and companies have become to need security mechanisms to effectively protect important information for business activities and security problems have become increasingly difficult. This paper proposes a improved access control model for access control enforcement in enterprise environments through the integration of the temporal constraint character of the GT-RBAC model. sub-role hierarchies concept and PBDM(Permission Based Delegation Model). The proposed model. called Extended GT-RBAC(Extended Generalized Temporal Role Based Access Control) delegation Model. supports characteristics of GTRBAC model such as of temporal constraint, various time-constrained cardinality, control flow dependency and separation of duty constraints (SoDs). Also it supports conditional inheritance based on the degree of inheritance and business characteristics by using sub-roles hierarchies and supports permission based delegation, user to user delegation, role to role delegation, multi-step delegation and temporal delegation by using PBDM.

  • PDF

Strategic Business Process Based on Business Intelligence by Connected with BPM & 6 Sigma (BPM과 6 Sigma 연계에 의한 BI기반의 전략적 비즈니스 프로세스)

  • Park, Sang-Min;Nam, Ho-Ki;Shin, Seung-Ho;Kim, Qui-Nam
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.27-37
    • /
    • 2007
  • Companies have to take agility against change of environment and build up the capacity of new value creation in today's management environment. Until now, there are so many management method for efficiency of management, rationality of management and IT (information technology) supported this method by integration of enterprise task and process automation. but company's competitiveness through the efficiency of management realized the limitations recently. so companies needs the new management method to raise core value of enterprise. This study applies strategy intelligence which is some part of Business Intelligence. We can identify the core value driver by using this method. and the core value driver is connected the KPI (key performance indicator) of processes in BPM (Business Process Management). This help the management of process focused on value driver. and some part of activity driver that effect the process performance can be use the Six Sigma method to strategic business process. This study first introduces the concept of Business Intelligence, Business Process Management and Six Sigma. and then efficient connection plan for value based strategic business process is introduces.

  • PDF

A Design of Protocol for Credit Card Transaction on PDA Using ECC (타원곡선 암호를 이용한 PDA 기반의 신용카드 결제 프로토콜 설계)

  • Yu, Seong-Jin;Kim, Seong-Youl;Youn, Chun-Kyun;Chung, Il-Yong
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.1033-1040
    • /
    • 2003
  • In order to provode information services on M-Commerce, a payment solution with security function should be required. User's mobile terminals for using M-Commerce services are diversifying to cellular phone, PDA, Smart phone etc. Among them, intergration of PDA's interface and mobile connection overcomes the weak point of existing cullular phone depending on information via the internet. In this paper, the protocol for a credit card transaction on PDA using ECC is presented. Secure Card module on this protocol encrypts user's information such as private information, delivery information and credit card information and store them on PDA in order to free from inputting information whenever it is used. This scheme also offers security services on M-Commerce including authentication, confidentiality, integration, non-repudiation and so on.