• Title/Summary/Keyword: Security mechanisms

Search Result 400, Processing Time 0.027 seconds

Modern Paradigm of Organization of the Management Mechanism by Innovative Development in Higher Education Institutions

  • Kubitsky, Serhii;Domina, Viktoriia;Mykhalchenko, Nataliia;Terenko, Olena;Mironets, Liudmyla;Kanishevska, Lyubov;Marszałek, Lidia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.141-148
    • /
    • 2022
  • The development of the education system and the labor market today requires new conditions for unification and functioning, the introduction of an innovative culture in the field of Education. The construction of modern management of innovative development of a higher education institution requires consideration of the existing theoretical, methodological and practical planes on which its formation is based. The purpose of the article is to substantiate the modern paradigm of organizing the mechanism of managing the innovative development of higher education institutions. Innovation in education is represented not only by the final product of applying novelty in educational and managerial processes in order to qualitatively improve the subject and objects of management and obtain economic, social, scientific, technical, environmental and other effects, but also by the procedure for their constant updating. The classification of innovations in education is presented. Despite the positive developments in the development of Education, numerous problems remain in this area, which is discussed in the article. The concept of innovative development of higher education institutions is described, which defines the prerequisites, goals, principles, tasks and mechanisms of university development for a long-term period and should be based on the following principles: scientific, flexible, efficient and comprehensive. The role of the motivational component of the mechanism of innovative development of higher education institutions is clarified, which allows at the strategic level to create an innovative culture and motivation of innovative activity of each individual, to make a choice of rational directions for solving problems, at the tactical level - to form motives for innovative activity in the most effective directions, at the operational level - to monitor the formation of a system of motives and incentives, to adjust the directions of motivation. The necessity of the functional component of the mechanism, which consists in determining a set of steps and management decisions aimed at achieving certain goals of innovative development of higher education institutions, is proved. The monitoring component of the mechanism is aimed at developing a special system for collecting, processing, storing and distributing information about the stages of development of higher education institutions, prediction based on the objective data on the dynamics and main trends of its development, and elaboration of recommendations.

Network Architecture and Fast Vertical Handover Scheme for UMTS-WLAN Interworking (UMTS-WLAN 간 빠른 수직적 핸드오버 제공을 위한 연동망 모델 및 핸드오버 방식)

  • Kim, In-Cheol;Lee, Sung-Kuen;Kim, Eal-Lae;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.492-501
    • /
    • 2007
  • UMTS-WLAN interworking approach can make the best use of the advantages of both networks by eliminating the stand-alone defects of the two services. For the interworking mechanisms of WLANs and UMTS networks, two major solutions have been proposed, namely loose coupling and tight coupling. The loose coupling approach provides separate data paths for WLAN and UMTS. On the other hand, the tight coupling provides a full integration of the WLAN network and the UMTS core network. The loose coupling has been preferred due to the simplicity and less reconfiguration requirement. However, loose coupling is worse in seamless mobility, QoS provision, and network security. In order to lessen the problems involved in the UMTS-WLAN interworking approaches, we propose a new interworking network architecture and a fast vertical handover scheme by employing Mobility Anchor(MA) for interworking between the two different networks. MA can enable authentication and session initialization before L2 handover of the mobile terminal, so that the seamless and fast vertical handover become possible. Thru analysis and numerical experiments, we proved that the proposed scheme has been validated.

Implementation of a Secure Wireless LAU System using AP Authentication and Dynamic Key Exchange (AP 인증 및 동적 키 분배를 이용한 안전한 무선랜 시스템 구현)

  • Lee, Jong-Hu;Lee, Myung-Sun;Ryou, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.497-508
    • /
    • 2004
  • The existing wireless LAN standard IEEE802.11b has many vulnerabilities from security point of view. The authentication mechanisms in IEEE802.11b have many vulnerabilities. As a result to complement the weak of IEEE802.11b authentication, the IEEE802.1x had been developed in the sense of providing strong user authentication with appropriate mechanism. But this mechanism does not perform AP authentication and there are also some weak points. And in confidentiality and message Integrity case, WEP is weak from key stream reuse attack, IV reuse attack and so on. For that reason, in this paper we propose secure wireless LAN system. Our system provides strong user authentication, confidentiality, and message integrity based on existing IEEE802.1x framework and TLS.

A Design of Advanced Channel Creation in e-Passport (전자여권의 향상된 채널생성 기법 설계)

  • Lee, Gi-Sung;Jeon, Sang-Yeob;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4814-4821
    • /
    • 2012
  • An e-passport is equipped with bio information by adding the non-attachable IC chip with a smart function. In order to solve such a problem, the user's privacy is protected by using the BAC, PA, AA and EAC mechanisms. However, the password key used in the BAC mechanism is made of the combination of the MRZ values. As a result, it is possible to decode the password by using the indiscriminate attacking program after finding out the combined rules of MRZ. This thesis suggests the mechanism with an improved level of efficiency through the time-stamp values by using the information of images and fingerprints and checking the forge or falsification of the e-passport when establishing a safe channel between the chip of the e-passport and the decoding system.

A Study on the Application of International Law through Disputes Settlement in Northeast Asia Fishing Ground (동북아 어장에서의 어업분쟁 해결 사례를 통한 국제법 적용 방안)

  • Lee, Woo-Do;Kim, Nam-Soo;Lee, Jin-Soo
    • The Journal of Fisheries Business Administration
    • /
    • v.48 no.3
    • /
    • pp.15-32
    • /
    • 2017
  • This article's aim is to review the jurisprudence which has emerged pursuant to the international dispute settlement provisions and to provide a provisional expectation as to the future of international dispute settlement under "UNCLOS". Globally, marine fisheries play an important role in ocean biodiversity and the food security of millions of people, providing a vital source of high-quality dietary protein and supporting individuals' livelihoods and income. In the 1982 Convention, the establishment of co-operative mechanisms for effective monitoring, control, surveillance and enforcement, decision-making procedures facilitating the adoption of such measures of conservation and management, and the promotion of the peaceful settlement of disputes are called for. In this study, 'Northeast Asian Sea' means that the Yellow/East China Sea, the East Sea, the Ohotsk Sea, the Kamchaka Sea, the Alaska Sea, and the Bering Sea surrounded by Korea, China, Japan, Russia, U.S.A. and Canada including their EEZs. There are several bilateral fisheries agreements existing in Northeast Asian area, the Fisheries Agreement between Republic Korea and Japan, between Republic of Korea and China, between China and Japan, between Republic Korea and U.S.A., between Republic Korea and Russia, between Russia and Japan, And there are several regional fisheries organizations existing in Northeast Asian area, for example NPAFC(Convention for the Conservation of Anadromous Stocks in the North Pacific Ocean), CBSPC (Convention on the Central Bering Sea Pollack Conservation), PICES(North Pacific Marine Science Organization), NPFC(North Pacific Fishery Commi-ssion) etc. It analyzed the proliferation of bilateral treaties and multilateral treaties due to the adoption of the EEZ in Northeast Asia reviewed the strengthening of management rights on the high seas marine living resources and marine environment preservation of regional fisheries organizations. In view of the changes in the international fisheries mechanism this paper suggested the future direction of the country in overseas fisheries. We concluded as follows. We shall apply bilateral treaties first, regional fisheries organizations' treaties secondly, and provisions under "UNCLOS" for dispute settlement last.

Insider Trading on Nonpublic Information and Shareholders' Wealth (비공개정보(非公開情報)를 이용한 내부자거래(內部者去來)와 주주(株主)의 부(富))

  • Kim, Wi-Saeng
    • The Korean Journal of Financial Management
    • /
    • v.8 no.1
    • /
    • pp.139-153
    • /
    • 1991
  • This paper examines the pecuniary effects stemming from insider trading in the equities of firms targeted for acquisition. Illegal exchanges by those having advantageous information are found to result in excessive returns to stockholders of the sought firms. However, unusual market activities are not typical immediately subsequent to the illegal trading date, suggesting that nonpublic information is synthesized by market mechanisms with sufficient speed so that others cannot profit by imitating the better informed traders. The obtained evidence does not support the contention that insider trading on nonpublic information harms the outsider stockholders of involved firms.

  • PDF

Structural and Functional Analyses of ProGuard Obfuscation Tool (프로가드 난독화 도구 구조 및 기능 분석)

  • Piao, Yuxue;Jung, Jin-Hyuk;Yi, Jeong Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.654-662
    • /
    • 2013
  • Android applications can be easily decompiled owing to their structural characteristics, in which applications are developed using Java and are self-signed so that applications modified in this way can be repackaged. It will be crucial that this inherent vulnerability may be used to an increasing number of Android-based financial service applications, including banking applications. Thus, code obfuscation techniques are used as one of solutions to protect applications against their forgery. Currently, many of applications distributed on Android market are using ProGuard as an obfuscation tool. However, ProGuard takes care of only the renaming obfuscation, and using this method, the original opcodes remain unchanged. In this paper, we thoroughly analyze obfuscation mechanisms applied in ProGuard, investigate its limitations, and give some direction about its improvement.

The Impact of Multi-dimensional Trust for Customer Satisfaction

  • Choi, Jae-Won;Sohn, Chang-Soo;Lee, Hong-Joo
    • Management Science and Financial Engineering
    • /
    • v.16 no.2
    • /
    • pp.81-97
    • /
    • 2010
  • Trust is one of the most important aspects of the relationship between retailers and consumers in e-commerce. Users may have concerns about transaction security or personal information leakage when they engage in transactions over the Internet. It can be difficult to attract customers if the retailers or service providers cannot establish trust with their customers. There have been many studies of trust-building mechanisms between customers and e-storefronts. However, little work has been done on identifying the relationships between customer satisfaction, purchase intention, and trust. In addition, trust building occurs in the pre- and post-purchase phases of an e-commerce transaction, as well as gradually over repeated transactions. Thus we distinguish between cue-based trust and experience-based trust. The objective of this study was to explain the impact of trust on customer satisfaction and purchase intention in relation to e-commerce sites from the perspective of a multi-dimensional concept of trust. We surveyed 350 undergraduate students and obtained 331 responses for analysis. The result of our analysis showed that cue-based trust has a positive relationship with trust based on experience. Although the two concepts of trust have positive relationships with satisfaction, the path coefficient of trust based on experience was higher than that of cue-based trust. In addition, the purchase intention mediates the relationship between cue-based trust and experience-based trust.

Screening Rice Cultivars for Resistance to Bacterial Leaf Blight

  • Fred, Agaba Kayihura;Kiswara, Gilang;Yi, Gihwan;Kim, Kyung-Min
    • Journal of Microbiology and Biotechnology
    • /
    • v.26 no.5
    • /
    • pp.938-945
    • /
    • 2016
  • Bacterial leaf blight (BLB) caused by Xanthomonas oryzae pv. oryzae (Xoo) is one of the most serious threats to rice production. In this study, screening of rice for resistance to BLB was carried out at two different times and locations; that is, in a greenhouse during winter and in an open field during summer. The pathogenicity of Xoo race K1 was tested on 32 Korean rice cultivars. Inoculation was conducted at the maximum tillering stage, and the lesion length was measured after 14 days of inoculation. Five cultivars, Hanareum, Namcheon, Samgdeok, Samgang, and Yangjo, were found to be resistant in both the greenhouse and open-field screenings. Expression of the plant defense-related genes JAmyb, OsNPR1, OsPR1a, OsWRKY45, and OsPR10b was observed in resistant and susceptible cultivars by qRT-PCR. Among the five genes tested, only OsPR10b showed coherent expression with the phenotypes. Screening of resistance to Xoo in rice was more accurate when conducted in open fields in the summer cultivation period than in greenhouses in winter. The expression of plant defense-related genes after bacterial inoculation could give another perspective in elucidating defense mechanisms by using both resistant and susceptible individuals.

A Macroscopic Framework for Internet Worm Containments (인터넷 웜 확산 억제를 위한 거시적 관점의 프레임워크)

  • Kim, Chol-Min;Kang, Suk-In;Lee, Seong-Uck;Hong, Man-Pyo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.9
    • /
    • pp.675-684
    • /
    • 2009
  • Internet worm can cause a traffic problem through DDoS(Distributed Denial of Services) or other kind of attacks. In those manners, it can compromise the internet infrastructure. In addition to this, it can intrude to important server and expose personal information to attacker. However, current detection and response mechanisms to worm have many vulnerabilities, because they only use local characteristic of worm or can treat known worms. In this paper, we propose a new framework to detect unknown worms. It uses macroscopic characteristic of worm to detect unknown worm early. In proposed idea, we define the macroscopic behavior of worm, propose a worm detection method to detect worm flow directly in IP packet networks, and show the performance of our system with simulations. In IP based method, we implement the proposed system and measure the time overhead to execute our system. The measurement shows our system is not too heavy to normal host users.