• Title/Summary/Keyword: Security mechanisms

Search Result 400, Processing Time 0.021 seconds

Combined effects of food and exercise on anaphylaxis

  • Kim, Cheol Woo;Figueroa, Arturo;Park, Chan Ho;Kwak, Yi Sub;Kim, Kwi Baek;Seo, Dae Yun;Lee, Hyung Rock
    • Nutrition Research and Practice
    • /
    • v.7 no.5
    • /
    • pp.347-351
    • /
    • 2013
  • Food-dependent exercise-induced anaphylaxis (FDEIAn) is induced by different types and various intensities of physical activity, and is distinct from food allergies. It has been shown that consumption of allergenic food followed by exercise causes FDEIAn symptoms. Intake of allergenic food or medication before exercise is a major predisposing factor for FDEIAn. Urticaria and severe allergic reactions are general symptoms of FDEIAn. Dermatological tests and serum IgE assays are the typical prescreening methods, and have been used for several decades. However, these screening tests are not sufficient for detecting or preventing FDEIAn. It has been found that exercise may stimulate the release of mediators from IgE-dependent mast cells that can result in FDEIAn when a certain threshold level has been exceeded. Mast cell degradation might be a major factor to induce FDEIAn but this has not been determined. A number of foods have been reported to be involved in the onset of FDEIAn including wheat, eggs, chicken, shrimp, shellfish, nuts, fruits, and vegetables. It is also known that aspirin increases the occurrence of type I allergy symptoms when combined with specific foods. Moreover, high intensity and frequent exercise are more likely to provoke an attack than low intensity and less frequent exercise. In this paper, we present the current views of the pathophysiological mechanisms underlying FDEIAn within the context of exercise immunology. We also present a detailed FDEIAn definition along with etiologic factors and medical treatment for cholinergic urticaria (UC) and exercise-induced anaphylaxis (EIA).

EPCglobal Network-Based Internet Escrow Service for Secure e-Commerce (EPCglobal 네트워크 기반 인터넷 에스크로 서비스)

  • Kim, Dong-Min;Huh, Jung-Hyun;Lee, Yong-Han;Rhee, Jong-Tae
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.4
    • /
    • pp.87-106
    • /
    • 2006
  • Today as the scale of e-commerce constantly expands, the number and the amount of the consumer frauds are also increasing very rapidly, without sufficient levels of systematic support to prevent them. Internet Escrow service is one of the promising payment mechanisms, which guarantees secure electronic trades and payments. Especially, if the real-time product delivery information is available via RFID-based track-and-trace environment, the security and efficiency of the Internet Escrow services would be improved a lot. In this research, proposed a novel approach to integrate EPCglobal Network, which is a de-facto standard for RFID-based information network model, with Internet Escrow services. The proposed service model was implemented in the form of "Integrated Financial Platform", which supports the contracts among trading partners and the payment via Escrow services by being fully integrated with bank systems. Using the implemented EPCglobal Network-based Escrow service system, we would be able not only to shorten the money-flow cycle and to develop new kinds of loan services, but also to overcome the problems of existing Escrow services including the lack of product-related information and the delay of purchasing decisions.

  • PDF

UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk

  • Cheng, Yong;Ma, Jun;Ren, Jiangchun;Mei, Songzhu;Wang, Zhiying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2276-2291
    • /
    • 2017
  • Data protection of removable storage devices is an important issue in information security. Unfortunately, most existing data protection mechanisms are aimed at protecting computer platform which is not suitable for ultra-low-power devices. To protect the flash disk appropriately and efficiently, we propose a trust based USB flash disk, named UTrustDisk. The data protection technologies in UTrustDisk include data authentication protocol, data confidentiality protection and data leakage prevention. Usually, the data integrity protection scheme is the bottleneck in the whole system and we accelerate it by WH universal hash function and speculative caching. The speculative caching will cache the potential hot chunks for reducing the memory bandwidth pollution. We adopt the symmetric encryption algorithm to protect data confidentiality. Before mounting the UTrustDisk, we will run a trusted virtual domain based lightweight virtual machine for preventing information leakage. Besides, we prove formally that UTrustDisk can prevent sensitive data from leaking out. Experimental results show that our scheme's average writing throughput is 44.8% higher than that of NH scheme, and 316% higher than that of SHA-1 scheme. And the success rate of speculative caching mechanism is up to 94.5% since the access pattern is usually sequential.

Performance Analysis of Packet Sampling Mechanisms for DDoS Attack Detection (DDoS 공격 탐지를 위한 패킷 샘플링 기법들의 성능 분석)

  • Kang Kil-Soo;Lee Joon-Hee;Choi Kyung-Hee;Jung Gi-Hyun;Shim Jae-Hong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.711-718
    • /
    • 2004
  • Packet sampling is the techniques to collect a part of the packets through network and analyze the characteristicsof the traffic for managing the network and keeping security. This paper presents a study on the sampling techniques applied to DDoS traffic and on the characteristics of the sampled traffic to detect DDoS attack efficiently and improve traffic analysis capacity. Three famous sampling techniques are evaluated with different sampling rates on various DDoS traffics. To analyze traffic characteristics, one of the DDoS attack detection method. Traffic Rate Analysis (TRA) is used. Simulation results verify that using sampling techniques preserve the traffic characteristics of DDoS and do not significantly reduce the detection accuracy.

A Study on the Improvement of Protection System for Public Interest Reporters

  • Lee, Young-Woo;Jang, Su-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.195-200
    • /
    • 2020
  • Korea enacted the Protection of Public Interest Reporters Act in March 2011 to protect whistleblowers from acts of infringement of public interest in the private sector. Most acts of infringement of the public interest are carried out secretly within the organization, which is known to the outside world by reports from members of the organization who are well aware of the problems within the organization. However, whistleblowers are at a disadvantage due to reporting and are reluctant to report. In addition, measures are needed to strengthen institutional mechanisms such as confidentiality, protection of personal information, responsibility, and prohibition of disadvantageous measures to effectively protect reporters due to lack of practical protective measures. Therefore, practical protection measures for whistleblowers are needed in line with the purpose of protecting whistleblowers, and measures to expand the corresponding compensation system will also be needed. Therefore, in this study, we would like to review the main contents of the current system for protecting whistleblowers in Korea and suggest reasonable improvement measures for protecting whistleblowers.

A Study on Amplification DRDoS Attacks and Defenses (DRDoS 증폭 공격 기법과 방어 기술 연구)

  • Choi, Hyunsang;Park, Hyundo;Lee, Heejo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.5
    • /
    • pp.429-437
    • /
    • 2015
  • DDoS attacks have been used for paralyzing popular Internet services. Especially, amplification attacks have grown dramatically in recent years. Defending against amplification attacks is challenging since the attacks usually generate extremely hugh amount of traffic and attack traffic is coming from legitimate servers, which is hard to differentiate from normal traffic. Moreover, some of protocols used by amplification attacks are widely adopted in IoT devices so that the number of servers susceptible to amplification attacks will continue to increase. This paper studies on the analysis of amplification attack mechanisms in detail and proposes defense methodologies for scenarios where attackers, abused servers or victims are in a monitoring network.

Implementation and Performance Evaluation of Database Encryption for Academic Affairs System (교무업무시스템을 위한 데이터베이스 암호화 구현 및 성능 평가)

  • Kim, Bo-Seon;Hong, Eui-Kyeong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.1
    • /
    • pp.1-12
    • /
    • 2008
  • Database encryption is one of the important mechanisms for prohibiting internal malicious users and outside hackers from utilizing data. Frequent occurrences of encryption and decryption cause degradation of database performance so that many factors should be considered in implementing encryption system. In this paper, we propose an architecture of database encryption system and data encryption module. In addition we suggest extended SQL in order to manage data encryption and decryption. In implementing database encryption system, we adopt ARIA encryption algorithm which is proved to be the most fast one among Korea standardized encryption algorithm. We use an single key for each database in encrypting data rather than using several keys in order to improve performance. Research over performance evaluation of database encryption system is rare up to now. Based on our implemented system, we provide performance evaluation results over various H/W platforms and compare performance differences between plain text and encrypted data.

  • PDF

Evaluation of Rainwater Utilization for Miscellaneous Water Demands in Different Types of Buildings Using Geographic Information System

  • Kim, Jinyoung;An, Kyoungjin;Furumai, Hiroaki
    • Environmental Engineering Research
    • /
    • v.18 no.2
    • /
    • pp.85-90
    • /
    • 2013
  • This study is an attempt to quantify rainwater utilization and miscellaneous water demand in Tokyo's 23 special wards, the core of the urban area in Tokyo, Japan, in order to elucidate the potential of further rainwater utilization. The rainwater utilization for miscellaneous appropriate water demands, including toilet flushing, air conditioning, and garden irrigation, were calculated for six different types of building: residential house, office, department store, supermarket, restaurant, and accommodation. Miscellaneous water demands in these different types of building were expressed in terms of equivalent rainfall of 767, 1,133, 3,318, 1,887, 16,574, and 2,227 (mm/yr), respectively, compared with 1,528 mm of Tokyo's average annual precipitation. Building types, numbers and its height were considered in this study area using geographic information system data to quantify miscellaneous water demands and the amount of rainwater utilization in each ward. Area precipitation-demand ratio was used to measure rainwater utilization potential for miscellaneous water demands. Office and commercial areas, such as Chiyoda ward, showed rainwater utilization potentials of <0.3, which was relatively low compared to those wards where many residential houses are located. This is attributed to the relatively high miscellaneous water demand. In light of rainwater utilization based on building level, the introduction of rainwater storage mechanisms with a storage depth of 50 mm for six different types of buildings was considered, and calculated as rainfall of 573, 679, 819, 766, 930, and 787 (mm), respectively. Total rainwater utilization using such storage facilities in each building from 23 wards resulted in the retention of 102,760,000 $m^3$ of water for use in miscellaneous applications annually, and this volume corresponded to 26.3% of annual miscellaneous water demand.

Design and Evaluation of an Anomaly Detection Method based on Cross-Feature Analysis using Rough Sets for MANETs (모바일 애드 혹 망을 위한 러프 집합을 사용한 교차 특징 분석 기반 비정상 행위 탐지 방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.27-35
    • /
    • 2008
  • With the proliferation of wireless devices, mobile ad-hoc networking (MANETS) has become a very exciting and important technology. However, MANET is more vulnerable than wired networking. Existing security mechanisms designed for wired networks have to be redesigned in this new environment. In this paper, we discuss the problem of anomaly detection in MANET. The focus of our research is on techniques for automatically constructing anomaly detection models that are capable of detecting new or unseen attacks. We propose a new anomaly detection method for MANETs. The proposed method performs cross-feature analysis on the basis of Rough sets to capture the inter-feature correlation patterns in normal traffic. The performance of the proposed method is evaluated through a simulation. The results show that the performance of the proposed method is superior to the performance of Huang method that uses cross-feature based on the probability of feature attribute value. Accordingly, we know that the proposed method effectively detects anomalies.

  • PDF

On the Implementation of the Multiple Service for the Smart Card Application Programs (스마트카드 응용프로그램의 다중 서비스 기법 구현에 관한 제안)

  • 김시관;임은기
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.1
    • /
    • pp.69-76
    • /
    • 2004
  • Recently, smart cards with multi-applications loaded are becoming popular owing to many advantages. As many casual users would like to reduce the number of plastic cards, and card issuers want to upgrade the existing applications or add the new applications, and developers wish to reduce the development turn-around time, multi-applications smart cards are becoming important. In addition, many advantages exist between the business partners as smart card applications can share critical information. New operating systems such as JavaCard and MULTOS are suggested for the multi-applications smart card service recently. In this paper, after we review the principles of operations of smart card, we propose the various security mechanisms for the multi-application JavaCard service environment, which is becoming de facto standard in the industry.

  • PDF