• Title/Summary/Keyword: Security requirements

Search Result 1,093, Processing Time 0.054 seconds

The Role of Investment Attraction in Vietnamese Industrial Parks and Economic Zones in the Process of International Economic Integration

  • Dzung, Nguyen Tien;Tuan, Nguyen Anh;Tinh, Do Phu Tran
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.4 no.3
    • /
    • pp.27-34
    • /
    • 2017
  • This study aims to assess the attraction of foreign direct investment in Vietnamese economic zones (including industrial zones and economic zones). The main research method used are synthesis and comparison analysis based on the data collected from the surveyed group comprising of enterprises operating in the economic zones in the Middle (Chu Lai, Nhon Hoi, Dung Quat) and the Southern (the largest island: Phu Quoc). After conducting surveys, research results show that there is a difference between the assessment and the level to meet the requirements of investors with business environment, expressed through the following criteria: (1) the infrastructure; (2) quality of public services; (3) preferential policies; (4) labor; (5) market; and (6) social services. Based on the assessment of the identified criteria, this paper had suggested six number of recommendations to promote the role of attracting foreign direct investment capital into the economic zones in Vietnam: (1) implementing the "one-stop-shop" policy; (2) continuing to improve the infrastructure of economic zones; (3) prevent and ensure the security of economic zones; (4) implementing vocational training activities to improve quality of human resources; (5) development of supporting industries; (6) raising the quality of capital invested in the economic zone.

A Study on Standardization of Copyright Collective Management for Digital Contents (디지털콘덴츠 집중관리를 위한 표준화에 관한 연구)

  • 조윤희;황도열
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.301-320
    • /
    • 2003
  • The rapidly increasing use of the Internet and advancement of the communication network, the explosive growth of digital contents from personal home pages to professional information service the emerging file exchange service and the development of hacking techniques . these are some of the trends contributing to the spread of illegal reproduction and distribution of digital contents, thus threatening the exclusive copyrights of the creative works that should be legally protected Accordingly, there is urgent need for a digital copyright management system designed to provide centralized management while playing the role of bridge between the copyright owners and users for smooth trading of the rights to digital contents, reliable billing, security measures, and monitoring of illegal use. Therefore, in this study, I examined the requirements of laws and systems for the introduction of the centralized management system to support smooth distribution of digital contents, and also researched on the current status of domestic and international centralized management system for copyrights. Furthermore, 1 tried to provide basic materials for the standardization of digital contents copyright management information through the examination of the essential elements of the centralized digital contents management such as the system for unique identification the standardization for data elements, and the digital rights management (DHM) .

Computational Analytics of Client Awareness for Mobile Application Offloading with Cloud Migration

  • Nandhini, Uma;TamilSelvan, Latha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3916-3936
    • /
    • 2014
  • Smartphone applications like games, image processing, e-commerce and social networking are gaining exponential growth, with the ubiquity of cellular services. This demands increased computational power and storage from mobile devices with a sufficiently high bandwidth for mobile internet service. But mobile nodes are highly constrained in the processing and storage, along with the battery power, which further restrains their dependability. Adopting the unlimited storage and computing power offered by cloud servers, it is possible to overcome and turn these issues into a favorable opportunity for the growth of mobile cloud computing. As the mobile internet data traffic is predicted to grow at the rate of around 65 percent yearly, even advanced services like 3G and 4G for mobile communication will fail to accommodate such exponential growth of data. On the other hand, developers extend popular applications with high end graphics leading to smart phones, manufactured with multicore processors and graphics processing units making them unaffordable. Therefore, to address the need of resource constrained mobile nodes and bandwidth constrained cellular networks, the computations can be migrated to resourceful servers connected to cloud. The server now acts as a bridge that should enable the participating mobile nodes to offload their computations through Wi-Fi directly to the virtualized server. Our proposed model enables an on-demand service offloading with a decision support system that identifies the capabilities of the client's hardware and software resources in judging the requirements for offloading. Further, the node's location, context and security capabilities are estimated to facilitate adaptive migration.

Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks

  • Shen, Jian;Tan, Haowen;Moh, Sangman;Chung, Ilyong;Liu, Qi;Sun, Xingming
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.453-462
    • /
    • 2015
  • Body area networks (BANs) have emerged as an enabling technique for e-healthcare systems, which can be used to continuously and remotely monitor patients' health. In BANs, the data of a patient's vital body functions and movements can be collected by small wearable or implantable sensors and sent using shortrange wireless communication techniques. Due to the shared wireless medium between the sensors in BANs, it may be possible to have malicious attacks on e-healthcare systems. The security and privacy issues of BANs are becoming more and more important. To provide secure and correct association of a group of sensors with a patient and satisfy the requirements of data confidentiality and integrity in BANs, we propose a novel enhanced secure sensor association and key management protocol based on elliptic curve cryptography and hash chains. The authentication procedure and group key generation are very simple and efficient. Therefore, our protocol can be easily implemented in the power and resource constrained sensor nodes in BANs. From a comparison of results, furthermore, we can conclude that the proposed protocol dramatically reduces the computation and communication cost for the authentication and key derivation compared with previous protocols. We believe that our protocol is attractive in the application of BANs.

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

Improvements of the Hsiang-Shih's remote user authentication scheme using the smart cards (스마트카드를 이용한 Hsiang-Shih의 원격 사용자 인증 스킴의 개선에 관한 연구)

  • An, Young-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.119-125
    • /
    • 2010
  • Recently Hsiang-Shih proposed the user authentication scheme to improve Yoon et al's scheme. But the proposed scheme has not been satisfied security requirements considering in the user authentication scheme using the password based smart card. In this paper, we proved that Hsiang-Shih's scheme is vulnerable to the off-line password guessing attack. In other words, the attacker can get the user's password using the off-line password guessing attack on the scheme when the attacker steals the user's smart card and extracts the information in the smart card. Also, the improved scheme based on the hash function and random number was introduced, thus preventing the attacks, such as password guessing attack, forgery attack and impersonation attack etc. And we suggested the effective mutual authentication scheme that can authenticate each other at the same time between the user and server.

A Study on Application for Super Speed Maglev Railway of System Engineering Technology (시스템 엔지니어링 기법의 초고속 자기부상철도 적용에 관한 연구)

  • Han, Young-Jae;Jo, Jung-Min;Lee, Jin-Ho;Kim, Dong-Hyun;Lee, Chul-Ung
    • Journal of the Korean Society for Railway
    • /
    • v.18 no.4
    • /
    • pp.317-324
    • /
    • 2015
  • A super speed maglev is a complicated system integrating electric, electronic, mechanic, civil and construction engineering. So, there must be an integrative system to monitor and manage operation requirements and standard features of each subsystem and the interfaces between each technology. As an indispensable part that can ensure whole system performance, a secure interface for each individual subsystem is an important management item of system engineering. By securing the interface performance of each individual subsystem, system failure can be effectively prevented in advance. Based on system engineering techniques, improvement of security and reliability for a super speed maglev is described in this research.

3D Mesh Watermarking Using Projection onto Convex Sets (볼록 집합 투영 기법을 이용한 3D 메쉬 워터마킹)

  • Lee Suk-Hwan;Kwon Seong-Geun;Kwon Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.2 s.308
    • /
    • pp.81-92
    • /
    • 2006
  • This paper proposes a robustness watermarking for 3D mesh model based on projection onto convex sets (POCS). After designing the convex sets for robustness and invisibility among some requirements for watermarking system, a 3D-mesh model is projected alternatively onto two constraints convex sets until the convergence condition is satisfied. The robustness convex set are designed for embedding the watermark into the distance distribution of the vertices to robust against the attacks, such as mesh simplification, cropping, rotation, translation, scaling, and vertex randomization. The invisibility convex set are designed for the embedded watermark to be invisible. The decision values and index that the watermark was embedded with are used to extract the watermark without the original model. Experimental results verify that the watermarked mesh model has invisibility and robustness against the attacks, such as translation, scaling, mesh simplification, cropping, and vertex randomization.

Performance Improvement for Increased Communication Speed in Anonymous Network using GeoIP (GeoIP를 이용한 익명 네트워크에서 통신 속도 향상을 위한 성능 개선)

  • Park, Kwang-Cheol;Lim, Young-Hwan;Lim, Jong-In;Park, Won-Hyung
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.75-85
    • /
    • 2011
  • Although progress in information technology has made our life prosperous. But it accompanied a number of adverse effects in various aspects. Especially, internet according to the increasing requirements for privacy and security, IP concealment network technologies to ensure the anonymity are constantly being developed. IP concealment network technologies is aiding the user to bypass the blocked sites can be used to access for information gathering, and they could be used for a malicious hacker to hide his attacks. However, due to complex routing path, local communication bandwidth sangyiham, and internode encryption there are also disadvantages that communication speed is significantly less. In this paper, the research for improving the performance of anonymous networks is to proceed by the communication speed measurement that using GeoIP the particular country with high-bandwidth is Specified or path length is limited.

The Susceptibility of Electronic Circuits inside the Cavity by HPEM(High Power Electromagnetics) Environment (금속 함체내부로 입사되는 고출력 전자기 펄스에 대한 전자회로의 민감성 분석)

  • Hwang, Sunl-Mook;Kwon, Hae-Ok;Huh, Chang-Su;Choi, Jin-Soo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.12
    • /
    • pp.1892-1897
    • /
    • 2012
  • Modern electronic circuits are of importance for the function of communication, traffic systems and security systems. An intentional threat to these systems could be of big casualties and economic disasters. This study has examined susceptibility of electronic circuits inside the cavity by HPEM(High Power Electromagnetics). The UWB measurements were done at an anechoic chamber using a RADAN voltage source, which can generate a transient impulse of about 200 kV. The HPEM wave penetrated inside the metal case appeared to the long damped ringwave of pulse length compared with the incident wave. In addition, the resonant frequency generated inside the metal case occurred primarily in the range of 1~3 GHz. The frequency band of 1~3 GHz was influenced on the electronic circuit, which was confirmed by an external antenna and an internal absorber. The electronic circuit was influenced by HPEM infiltrated into the cavity at the 86 kV/m out of the metal cases. Also in case of an absorber the susceptibility of an electronic circuit was smallest among other cases(aperture, antenna). It is considered that absorber has a function absorbing electromagnetic wave infiltrated into the cavity and simultaneously limiting resonance by varying a boundary condition inside the cavity. Based on the results, electronic equipment systems could be applied to protection that has suited system requirements.