• Title/Summary/Keyword: Security technologies

Search Result 1,846, Processing Time 0.032 seconds

Efficient Authorization Conflict Detection Using Prime Number Graph Labeling in RDF Access Control (RDF 접근 제어에서 소수 그래프 레이블링을 사용한 효율적 권한 충돌 발견)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.35 no.2
    • /
    • pp.112-124
    • /
    • 2008
  • RDF and OWL are the primary base technologies for implementing Semantic Web. Recently, many researches related with them, or applying them into the other application domains, have been introduced. However, relatively little work has been done for securing the RDF and OWL data. In this article, we briefly introduce an RDF triple based model for specifying RDF access authorization related with RDF security. Next, to efficiently find the authorization conflict by RDF inference, we introduce a method using prime number graph labeling in detail. The problem of authorization conflict by RDF inference is that although the lower concept is permitted to be accessed, it can be inaccessible due to the disapproval for the upper concept. Because by the RDF inference, the lower concept can be interpreted into the upper concept. Some experimental results show that the proposed method using the prime number graph labeling has better performance than the existing simple method for the detection of the authorization conflict.

Efficiency Analysis of Defense Industry Company Using DEA and Super-SBM (DEA와 Super-SBM을 이용한 국내 방위산업체 효율성 분석)

  • Baek, Ji-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.130-139
    • /
    • 2020
  • The defense industry is a future-oriented industry, in which high-tech technologies are concentrated. In addition, it is a key industry for maintaining national security, and the R&D of the defense industry is very important. With the introduction of a competitive system by defense industry companies, the necessity of improving the efficiency and productivity of defense industry companies is emerging. In this study, the efficiency of the defense industry was measured using the CCR and BCC model. In addition, super efficiency was derived using the Super-SBM model. For this study, the 2019 defense industry management analysis data of the Korea Defense Industry Association (KDIA) was used, and the analysis was performed by setting the number of researchers and investments of domestic defense industry companies as the input variables and sales as the output variables. Through this study, it is expected that the defense industry's R&D efficiency will be grasped, which will help establish a policy for fostering the defense industry in the future.

SDCS: Secure D-CAS System for Secure Contents Download in Ubiquitous Environment (SDCS: 유비쿼터스 환경의 안전한 콘텐츠 다운로드를 위한 안전한 D-CAS 시스템)

  • Yeo, Sang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.2
    • /
    • pp.249-257
    • /
    • 2010
  • The emerging ubiquitous environment is improving IT technologies and the popularization of broadband Internet is encouraging creation and sharing of various contents. The contents include the concept of production and circulation of digital information/contents, in forms of characters, codes, voices, sounds, client and videos for being used on the Internet and networks. The contents are widely shared in networks and users can have a wide range of knowledge and gain the freedom of presentation from them. So now users participations are augmented gradually. However, many contents without acquiring agree of copyright are sharing on the Internet, so many problems happen in the manufacturing process of digital contents. To solve this problem, many research projects to limit contents utilization onto legitimate users and to provide secure contents protection and download, are in progress. Therefore, in this paper, we propose a secure D-CAS system (SDCS) which provides security for contents downloading.

Design of Ubiquitous Payment Process for Enhancing Seamlessness and Privacy (연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계)

  • Lee, Kyoung Jun;Jeong, Mu Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.3
    • /
    • pp.1-13
    • /
    • 2006
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. Payment, however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, strong personal device, and peer-based information transactions. We also propose U-SDT Protocol integrating technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF

A Mutual Authentication Protocol based on Hash Function for Efficient Verification of User Entitlement in IPTV Service (IPTV 서비스에서 사용자의 수신자격을 효율적으로 판별할 수 있는 해쉬 함수 기반의 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Jung, Yoon-Sung;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.187-197
    • /
    • 2010
  • The fusion stream of recent broadcasting and communication make multimedia content served in the area of broadcasting into IPTV service which transmits it through high-speed internet, cable TV net and satellite net in realtime. However, as the digital broadcasting service is extended to various media, the security of IPTV service content provided to users by service provider is not fully supported by CAS(Conditional Access System) provided by existing broadcasting system. This paper proposes interactive certification protocol which can efficiently distinguish the receiving-qualification of user between Set-Top Box and Smart Card which are parts of configurations for IPTV system. The proposed protocol uses hash function to make Set-Top Box transmit receiving-qualification about the channel fee which user pays more properly than existing protocol. Also, the proposed protocol uses session key generated between receiver and smart card through inter certification process and encrypts EMM not the service to be used by anyone illegally.

An Online Voting System based on Ethereum Block-Chain for Enhancing Reliability (신뢰성 향상을 위한 이더리움 블록체인 기반의 온라인 투표 시스템)

  • Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.563-570
    • /
    • 2018
  • Existing online voting is not being used for public elections due to uncertainty about security threats, and offline voting costs a lot of money. As an alternative, blockchain is emerging. Applying blockchain technology to online voting will ensure transparency and confidentiality, because voter information and aggregate information are distributed and managed. Since a blockchain distributes the voting information, it will be more secure than existing central server - based online voting systems. If blockchain technology is applied to public elections, and the transparency and confidentiality of the voting information is guaranteed, the cost of voting will be greatly reduced. This paper tries to apply to an online voting system the Ethereum platform from among the blockchain technologies. Ethereum is a highly scalable blockchain technology that provides a smart contract based on the Solidity language to develop an online voting contract and to distribute the contract to each voter. Each voter votes on the contract that has been distributed, and the votes are distributed to other voters. The experiment verifies the consistency of the stored voting information.

An Algorithm for Referential Integrity Relations Extraction using Similarity Comparison of RDB (유사성 비교를 통한 RDB의 참조 무결성 관계 추출 알고리즘)

  • Kim, Jang-Won;Jeong, Dong-Won;Kim, Jin-Hyung;Baik, Doo-Kwon
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.115-124
    • /
    • 2006
  • XML is rapidly becoming technologies for information exchange and representation. It causes many research issues such as semantic modeling methods, security, conversion far interoperability with other models, and so on. Especially, the most important issue for its practical application is how to achieve the interoperability between XML model and relational model. Until now, many suggestions have been proposed to achieve it. However several problems still remain. Most of all, the exiting methods do not consider implicit referential integrity relations, and it causes incorrect data delivery. One method to do this has been proposed with the restriction where one semantic is defined as only one same name in a given database. In real database world, this restriction cannot provide the application and extensibility. This paper proposes a noble conversion (RDB-to-XML) algorithm based on the similarity checking technique. The key point of our method is how to find implicit referential integrity relations between different field names presenting one same semantic. To resolve it, we define an enhanced implicity referentiai integrity relations extraction algorithm based on a widely used ontology, WordNet. The proposed conversion algorithm is more practical than the previous-similar approach.

  • PDF

Technical, Individual and Situational Factors Affecting Intention to Use of Mobile Easy Payment Service : Focusing on the Moderating Effects of Subjective Norms (기술, 개인, 상황 특성이 모바일 간편 결제서비스 이용의도에 미치는 영향 : 주관적 규범의 조절효과)

  • Park, Hyunsun;Kim, Sanghyun
    • Journal of Digital Convergence
    • /
    • v.16 no.6
    • /
    • pp.105-115
    • /
    • 2018
  • With the development of information and communication technologies, popularization of smart phones, and relaxation of the government regulation, mobile easy payment service is rapidly growing as a major financial service. Therefore, this study examines factors that influence the intention to use mobile easy payment service through empirical analysis. We collected 386 responses by survey and formed structural equation modeling with AMOS 22.0. The results show that technical factors(relative advantage, security), individual factor(self-efficacy), situational factors(trust in prior services and satisfaction of prior services) had a positive effect on the perceived value. In addition, perceived value had a positive effect on the intention to use mobile easy payment services. Lastly, subjective norms are closely related to the relationship between perceived value and intention to use mobile easy payment services. The results can be expected to provide useful references to the Fintech related industry fields.

UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk

  • Cheng, Yong;Ma, Jun;Ren, Jiangchun;Mei, Songzhu;Wang, Zhiying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2276-2291
    • /
    • 2017
  • Data protection of removable storage devices is an important issue in information security. Unfortunately, most existing data protection mechanisms are aimed at protecting computer platform which is not suitable for ultra-low-power devices. To protect the flash disk appropriately and efficiently, we propose a trust based USB flash disk, named UTrustDisk. The data protection technologies in UTrustDisk include data authentication protocol, data confidentiality protection and data leakage prevention. Usually, the data integrity protection scheme is the bottleneck in the whole system and we accelerate it by WH universal hash function and speculative caching. The speculative caching will cache the potential hot chunks for reducing the memory bandwidth pollution. We adopt the symmetric encryption algorithm to protect data confidentiality. Before mounting the UTrustDisk, we will run a trusted virtual domain based lightweight virtual machine for preventing information leakage. Besides, we prove formally that UTrustDisk can prevent sensitive data from leaking out. Experimental results show that our scheme's average writing throughput is 44.8% higher than that of NH scheme, and 316% higher than that of SHA-1 scheme. And the success rate of speculative caching mechanism is up to 94.5% since the access pattern is usually sequential.

The Present State of Domestic Alert Systems for Cyber Threats (사이버 위협에 대한 국내 경보 체계 현황)

  • 이도훈;백승현;오형근;이진석
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.251-257
    • /
    • 2004
  • Todays, the more information technologies(IT) like internet is developed, the more main facilities of individuals and social organizations get deeply involved in IT. Also, the trend of cyber threats such as internet worms and viruses is moving from local pc attacks to IT infrastructure attacks by exploiting inherent vulnerabilities of IT. Social organizations has a limit to response these attacks individually, and so the systematic coordinate center for social organizations is necessary. To analyze and share cyber threat information is performed prior to the construction of the coordinate center. In this paper, we survey domestic alert systems for cyber threats of related organizations and companies, and then classify them into two categories by the range of threat assessment: global alert systems for global If infrastructure and individual alert systems for each threat. Next, we identify problems of domestic alert systems and suggest approaches to resolve them.

  • PDF