• Title/Summary/Keyword: Security-enhanced development

Search Result 101, Processing Time 0.032 seconds

Design and Implementation of a Client Mail Security System for Secure Mail Exchange using Public Key Infrastructure (공개키 기반 구조에서 안전한 메일 전송을 위한 클라이언트 메일 보안 시스템 설계 및 구현)

  • 정창렬;고진광
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.149-157
    • /
    • 2003
  • Recently, the Internet enhanced by development of IT makes the processing and exchanging of information, As the Internet is sending and receiving digitized documents over the Internet e-mail system. The security of document information is being threated when exchanging digitized documents over an open network such as the Internet. The degree of threat is even higher when sensitive documents are involved Therefore, in this paper, the secure e-mail system on a client is designed and implemented in order to make secure exchanging of digitized documents. By using the public key infrastructure in which encrypted mail transmission, proof of delivery and integrity of the message are garanted, unauthorized manipulation, illegal acquisition and mutual authentication problem can be prevented in order to secure the document information which is crucial and sensible when exchanging the digitized document over the Internet. Futhenmore, by using the SET protocol based on public key cryptography, the secure mail system is designed and implemented in order for the users not having any professional knowledge to deal with the system easily and friendly in GUI environment.

Abolition of the Japan's 3 Principles on Arms Exports and Defense Industry (일본의 무기수출 3원칙 폐지와 방위산업)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.23-32
    • /
    • 2014
  • Japan has abolished the 3 Principles on Arms Exports and announced the new 3 Principles on Transfer of Defense Equipment and Technology. This article investigates the backgrounds of the abolition of the old regulation on banning arms exports. Japan government repealed 3 principles on arms exports to develop military industry and they insist that they pursue their national strategy called "Proactive Contribution to Peace." The future changes in defense industry due to the new principles are examined with the analysis of the defense industry indicators. The home production of the arms could be continued. However the international cooperation for the co-development and co-production of the weapon systems would be increased with not only the US but also the various countries. At the same time the efforts to export arms overseas are anticipated to be enhanced by the Japanese government and defense companies.

A Study for a Method of Designing of Security Domain Infrastructure and Its Efficiency Measuring (네트워크 보안 서비스 향상을 위한 도메인 구조설계와 성능분석 방법)

  • Moon, Song-Chul;Noh, Si-Choon;Jung, Ji-Moon
    • Journal of Digital Contents Society
    • /
    • v.11 no.3
    • /
    • pp.331-339
    • /
    • 2010
  • On intranet system, it is essential element for providing information to decrease response time. To realize this efficiencies of response time of the network, a lot of research have been conducted. The purpose of the research and implementation is to shorten the response time of information system. We can realize final goal of information system through fast response time. This final goal of information system is to secure the performance efficiency within the required time. In order to acquire the method of warranty of fast response time, the efficient measurement method is essential. This research suggests a latency test techniques being used on infrastructure system and also offers a response time measurement methodology. Methodology proposed in this research has proven that it is possible to measure response time through the scheduled method. Also it is possible to develop a enhanced networking capabilities, and information system capabilities for the development of information system.

Design of Mobile-based Security Agent for Contents Networking in Mixed Reality (융합현실에서 콘텐츠 네트워킹을 위한 모바일 기반 보안 중계 설계)

  • Kim, Donghyun;Lim, Jaehyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.22-29
    • /
    • 2019
  • Due to the development of ICT technology, convergence reality contents are utilized as technology for providing services in various industrial fields by visualizing various information such as sensor information and shared information in a service platform showing only simple three-dimensional contents. Research is underway to reduce the weight of applications by transmitting the resources of the object to be enhanced to the network as the information and the contents to be provided increase. In order to provide resources through the network, servers for processing various information such as pattern information, content information, and sensor information must be constructed in a cloud environment. However, in order to authenticate data transmitted and received in real-time in a cloud environment, there is a problem in that the processing is delayed and a delay phenomenon occurs in the rendering process and QoS is lowered. In this paper, we propose a system to distribute cloud server which provides augmented contents of convergent reality service that provides various contents such as sensor information and three - dimensional model, and shorten the processing time of reliable data through distributed relay between servers Respectively.

Prevalence of Mycotoxins and Their Consequences on Human Health

  • Omotayo, Oluwadara Pelumi;Omotayo, Abiodun Olusola;Mwanza, Mulunda;Babalola, Olubukola Oluranti
    • Toxicological Research
    • /
    • v.35 no.1
    • /
    • pp.1-7
    • /
    • 2019
  • Mycotoxin contamination is a global phenomenon and causes a wide array of negative effects and other complications. This study focused on commonly found mycotoxins in Africa and the possible means of prevention or reduction of their contaminating effects. Mycotoxins are secondary metabolites of mold and fungi; they are generally toxic to living organisms. Hundreds of mycotoxins have been identified thus far, with some, such as aflatoxins, ochratoxins, trichothecenes, zearalenone, fumonisins, and patulin, considered agro-economically important. Several factors contribute to the presence of mycotoxins in food, such as climatic conditions, pest infestation, and poor harvest and storage practices. Exposure to mycotoxins, which occurs mostly by ingestion, leads to various diseases, such as mycotoxicoses and mycoses that may eventually result in death. In light of this, this review of relevant literature focuses on mycotoxin contamination, as well as various methods for the prevention and control of their prevalence, to avert its debilitating consequences on human health. Clear evidence of mycotoxin contamination is present in Africa, and it was therefore recommended that adequate prevention and control of these toxic substances in our food system should be encouraged and that appropriate measures must be taken to ensure food safety as well as the enhanced or long-lifespan of the African populace. Governments, research institutions, and non-governmental organizations should tailor the limited resources available to tackle mycotoxin prevalence, as these will offer the best prospects for successful development of a sustainable food system in Africa.

Blockchain-based Copyright Management System Capable of Registering Creative Ideas (창의적인 아이디어를 등록할 수 있는 블록체인 기반의 저작권 관리시스템)

  • Hwang, Jung-sik;Kim, Hyun-gon
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.57-65
    • /
    • 2019
  • Creative works such as webtoon and web novel are part of property rights. However, illegal copies of them are distributed on the internet easily, which raises social issues in today's society. In order to tackle these problems, this paper proposes and presents a blockchain based copyright management system that ensures forgery prevention, robust security features, improving trading performance, cost-effective, and enhanced visibility. The system allows a user to register creative works formally just the same as before registration and also to register simple creative ideas just anytime. In the latter case, if an idea or a thought flashes across through somebody's mind, he or she can register it to the system immediately without formal registration process and afterward, can utilize a way to prove its originality through the system. Regarding large size images and video files of creative works, the system reduces data size and storage volume sharply to be processed by network entities by storing original creative works separately and including only the hash result of creative works to the transactions.

A study on the algorithms to achieve the data privacy based on some anonymity measures (익명성 관련 측도에 기반한 데이터 프라이버시 확보 알고리즘에 관한 연구)

  • Kang, Ju-Sung;Kang, Jin-Young;Yi, Ok-Yeon;Hong, Do-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.149-160
    • /
    • 2011
  • Technique based on the notions of anonymity is one of several ways to achieve the goal of privacy and it transforms the original data into the micro data by some group based methods. The first notion of group based method is ${\kappa}$-anonymity, and it is enhanced by the notions of ${\ell}$-diversity and t-closeness. Since there is the natural tradeoff between privacy and data utility, the development of practical anonymization algorithms is not a simple work and there is still no noticeable algorithm which achieves some combined anonymity conditions. In this paper, we provides a comparative analysis of previous anonymity and accuracy measures. Moreover we propose an algorithm to achieve ${\ell}$-diversity by the block merging method from a micro-data achieving ${\kappa}$-anonymity.

Integrated Power Optimization with Battery Friendly Algorithm in Wireless Capsule Endoscopy

  • Mehmood, Tariq;Naeem, Nadeem;Parveen, Sajida
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.338-344
    • /
    • 2021
  • The recently continuous enhancement and development in the biomedical side for the betterment of human life. The Wireless Body Area Networks is a significant tool for the current researcher to design and transfer data with greater data rates among the sensors and sensor nodes for biomedical applications. The core area for research in WBANs is power efficiency, battery-driven devices for health and medical, the Charging limitation is a major and serious problem for the WBANs.this research work is proposed to find out the optimal solution for battery-friendly technology. In this research we have addressed the solution to increasing the battery lifetime with variable data transmission rates from medical equipment as Wireless Endoscopy Capsules, this device will analyze a patient's inner body gastrointestinal tract by capturing images and visualization at the workstation. The second major issue is that the Wireless Endoscopy Capsule based systems are currently not used for clinical applications due to their low data rate as well as low resolution and limited battery lifetime, in case of these devices are more enhanced in these cases it will be the best solution for the medical applications. The main objective of this research is to power optimization by reducing the power consumption of the battery in the Wireless Endoscopy Capsule to make it battery-friendly. To overcome the problem we have proposed the algorithm for "Battery Friendly Algorithm" and we have compared the different frame rates of buffer sizes for Transmissions. The proposed Battery Friendly Algorithm is to send the images on average frame rate instead of transmitting the images on maximum or minimum frame rates. The proposed algorithm extends the battery lifetime in comparison with the previous baseline proposed algorithm as well as increased the battery lifetime of the capsule.

A Hybrid Optimized Deep Learning Techniques for Analyzing Mammograms

  • Bandaru, Satish Babu;Deivarajan, Natarajasivan;Gatram, Rama Mohan Babu
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.73-82
    • /
    • 2022
  • Early detection continues to be the mainstay of breast cancer control as well as the improvement of its treatment. Even so, the absence of cancer symptoms at the onset has early detection quite challenging. Therefore, various researchers continue to focus on cancer as a topic of health to try and make improvements from the perspectives of diagnosis, prevention, and treatment. This research's chief goal is development of a system with deep learning for classification of the breast cancer as non-malignant and malignant using mammogram images. The following two distinct approaches: the first one with the utilization of patches of the Region of Interest (ROI), and the second one with the utilization of the overall images is used. The proposed system is composed of the following two distinct stages: the pre-processing stage and the Convolution Neural Network (CNN) building stage. Of late, the use of meta-heuristic optimization algorithms has accomplished a lot of progress in resolving these problems. Teaching-Learning Based Optimization algorithm (TIBO) meta-heuristic was originally employed for resolving problems of continuous optimization. This work has offered the proposals of novel methods for training the Residual Network (ResNet) as well as the CNN based on the TLBO and the Genetic Algorithm (GA). The classification of breast cancer can be enhanced with direct application of the hybrid TLBO- GA. For this hybrid algorithm, the TLBO, i.e., a core component, will combine the following three distinct operators of the GA: coding, crossover, and mutation. In the TLBO, there is a representation of the optimization solutions as students. On the other hand, the hybrid TLBO-GA will have further division of the students as follows: the top students, the ordinary students, and the poor students. The experiments demonstrated that the proposed hybrid TLBO-GA is more effective than TLBO and GA.

Debug Port Protection Mechanism for Secure Embedded Devices

  • Park, Keun-Young;Yoo, Sang-Guun;Kim, Ju-Ho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.2
    • /
    • pp.240-253
    • /
    • 2012
  • In this paper we propose a protection mechanism for the debug port. While debug ports are useful tools for embedded device development and maintenance, they can also become potential attack tools for device hacking in case their usage is permitted to hackers with malicious intentions. The proposed approach prevents illicit use of debug ports by controlling access through user authentication, where the device generates and issues authentication token only to the server-authenticated users. An authentication token includes user access information which represents the user's permitted level of access and the maximum number of authentications allowed using the token. The device authenticates the user with the token and grants limited access based on the user's access level. The proposed approach improves the degree of overall security by removing the need to expose the device's secret key. Availability is also enhanced by not requiring server connection after the initial token generation and further by supporting flexible token transfer among predefined device groups. Low implementation cost is another benefit of the proposed approach, enabling it to be adopted to a wide range of environments in demand of debug port protection.