• 제목/요약/키워드: Service identity

검색결과 517건 처리시간 0.033초

FIDO2 CTAP을 활용한 전자서명 방법 (A Method of Digital Signature Using FIDO2 CTAP)

  • 조한구;이경호
    • 정보보호학회논문지
    • /
    • 제29권5호
    • /
    • pp.1049-1062
    • /
    • 2019
  • 국가 공인인증서는 미리 신원 확인된 사용자 개인정보에 기초하여 발급된 사용자인증서로서 대부분의 전자금융거래와 사용자 인증에 활용되는 보편적인 인증수단이 되었으며 전자정부와 국내 이용편익에 많은 기여를 하였다. 그러나 이용방법에 대한 웹 표준규격의 부재로 인하여 별도의 플러그인을 설치하는 등의 불편함이 따랐고 이를 개선하고 자 하는 노력이 지속되어 왔다. 본 논문에서는 FIDO2 (Fast Identity Online v2) CTAP(Client to Authentication Protocol) 규격 내 확장(extension) 영역을 활용한 인증서 전자서명 방법을 제시함으로써 인증서 이용환경에 대한 문제점을 해결하고자 한다.

Comparative Analysis of the Roles and Identities of Artists and Fashion designers

  • Suh, Seunghee
    • 패션비즈니스
    • /
    • 제25권6호
    • /
    • pp.70-80
    • /
    • 2021
  • The purpose of this study is to compare and analyze the identities and roles so that they can grasp their social roles and directions. Artists show a change in identity from the deification of modern artists with freedom and genius to artists who challenge the cognitive aspect of art and redefine the scope and concept of artists by expanding their social role. Artists dreaming of an ideal art utopia, in which art, society, politics, and daily life are coordinated, are constantly presenting the social role and direction of art through the combination and challenge of new ways of art and craft, beauty and function, creative imagination, and public service. Fashion designers act as contemporary genius artists, creators who express the appearance of the times, practitioners who advocate social values and changes, members of business in the fashion system, celebrities who are spotlighted by the public at the center of the fashion industry, or fashion influencers. Thus, fashion designers are complex or selective in their role depending on the fashion philosophy of individual designers or location given within the fashion system. They are becoming the subject of creating the culture of the times by expressing social ideology or playing a role in practicing art in life that leads social culture so as to raise the value of fashion in their development and satisfy cultural enjoyment of fashion consumers who consume art in everyday life.

스마트카드를 이용한 안전한 경량급 사용자 인증 스킴의 설계 (Security Enhancement of Lightweight User Authentication Scheme Using Smartcard)

  • 이영숙
    • 융합보안논문지
    • /
    • 제20권4호
    • /
    • pp.209-215
    • /
    • 2020
  • 인터넷을 통한 통신환경은 연결 가능한 사물들 간에 효율적인 통신을 제공한다. 이런 환경에서의 정보통신은 우리에게 편리함을 제공하기는 하나 여러 형태의 보안위협이 도사리고 있는 실정이다. 인터넷을 이용하여 원격으로 접속하여 제공받는 서비스에 존재하는 보안위협 중 대부분은 전송되는 정보의 유출과 클라이언트 서버 간 인증에 대한 손실이다. 2016년 Ahmed 등이 스마트카드를 이용한 안전한 경량급 사용자 인증 스킴을 제안하였다. 그러나 Kang등이 제안한 논문에서 그들이 제안 프로토콜은 identity guessing attack에 취약하고 session key confirmation을 달성할 수 없다는 것을 주장하였다. 본 논문은 Ahmed 등이 제안한 논문의 취약점을 개선하여 더욱 안전하고 효율적인 경량급 사용자 인증 스킴을 제안하였다.

The Effects of the Talent Types on Purchasing Behavior of Beauty-Service products

  • Koo, In-Sook
    • 패션비즈니스
    • /
    • 제16권3호
    • /
    • pp.45-62
    • /
    • 2012
  • This study aims to examine the effect of talent types on the purchasing behaviour of beauty-service products in 367 adults(female and male). The present study is the first to consider both talent types and the purchasing behaviour of beauty-service products correlates to appearance management behaviour. Frequency analysis showed that the mean of 8 talent types of 367 participants was 3.324. The highest talent type of 367 participants was interpersonal talent, the lowest talent type was logical-mathematical talent among 8 talent types. There were statistically significant relationships between the talent types(specially, bodily-kinesthetic talent and interpersonal talent) and the purchasing criteria of beauty-service products on the correlation analysis. And the effects of 8 talent types on the purchasing frequency of 4 beauty-service products were significant on the regression analysis, specifically, the results showed that the most significant among 8 talent factors was the interpersonal talent, next, the bodily-kinesthetic was. Thus, the more purchasing frequency of beauty-services products, the higher interpersonal talent were, and the better affinity with others were. As a results, the interpersonal talent factor and bodily-kinesthetic talent factor among 8 talent factors were ultimately affecting the appearance management behaviour. The higher the score, it was concluded that the subject was more active in beauty-related behavior. Conclusively, the appearance is a form of personal asset for one's self-fulfillment, and strong and beautiful appearance is a medium to improve self-esteem and dominance. It is possessing a significant influence in personal satisfaction, self-identity, and social success.

시립 도서관 애플리케이션 서비스 방안 연구 -용인시 도서관 애플리케이션을 중심으로- (An Improvement of the Public Library Application Service -Focused on the Young-In Si Library Application Service-)

  • 김다은;김승인
    • 디지털융복합연구
    • /
    • 제15권3호
    • /
    • pp.301-306
    • /
    • 2017
  • 스마트폰의 대중화로 각종 애플리케이션 서비스의 수요가 증가하는 추세이고, 이용자 또한 지속해서 늘어나고 있다. 이에 반해, 학생들과 일반 시민들의 삶에 큰 영향을 미치고 있는 도서관 애플리케이션 서비스에 관한 연구는 아직 부족한 상태이다. 본 연구는 용인시 도서관 애플리케이션 서비스에 대하여 실제 사용자들 및 예비 사용자들이 어떻게 인식하고 있으며, 그 요구사항은 무엇인지 알아보았다. 연구 방법으로는 안드로이드와 아이튠즈 앱스토어에 있는 용인시 도서관 애플리케이션에 관한 실제 사용자들의 리뷰를 분석하여 사용 시 불편한 점과 개선해야 할 점을 도출하였다. 현재 애플리케이션 서비스는 직관적이나 전체적인 디자인과 아이덴티티 확립이 필요하고, 개인화가 가능한 메인 페이지가 요구된다. 향후 본 연구를 바탕으로 다른 지역의 도서관도 사용자 특성에 맞춘 구체적인 가이드라인을 제시할 수 있기를 기대한다.

소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점 (Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective)

  • 정남호;한희정;구철모
    • Asia pacific journal of information systems
    • /
    • 제22권4호
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권12호
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

스마트폰 기반의 클라우드 컴퓨팅 보안 인증 연구 (A Study of Security Authentication for Cloud Computing Based on Smart Phone)

  • 정윤수;김용태
    • 한국통신학회논문지
    • /
    • 제37C권11호
    • /
    • pp.1027-1035
    • /
    • 2012
  • 클라우드 컴퓨팅의 편리성과 확장성을 기반으로 웹과 모바일의 기능을 결합한 스마트폰이 최근 큰 관심을 받고 있다. 그러나 현재 출시되고 있는 클라우드 서비스들은 대부분 모바일 단말과 서버간의 단순 데이터 동기화 기반 응용 서비스 수준에 그치고 있어 통신사들이 개발한 비즈니스 모델의 상호운용성에 문제가 있다. 본 논문에서는 클라우드 컴퓨팅의 편리성과 확장성을 유지하면서 스마트폰 간 서로 다른 비즈니스 모델을 사용하는 스마트폰의 사용자를 효율적으로 통합 관리할 수 있는 서비스 보안 인증 모델을 제안한다. 제안 모델은 현재 운영중인 클라우드 컴퓨팅 시스템에서 효과적으로 활용할 수 있도록 스마트폰 사용자의 신분확인 및 권한/접근제어 등을 연동하여 통합 커뮤니케이션 업무의 원활한 서비스가 유지될 수 있도록 스마트폰의 사용자 정보를 인증한다.

그리드서비스와 포털간의 대칭키 기반 사용자 단일인증에 관한 연구 (Symmetric key based user authentication between Grid Service and Portal)

  • 황대복;허대영;황선태
    • 한국컴퓨터정보학회논문지
    • /
    • 제12권3호
    • /
    • pp.19-26
    • /
    • 2007
  • 최근 포털 시스템이 그리드환경의 사용자 인터페이스로 많이 이용되고 있다. 전통적인 포털 시스템은 아이디와 패스워드를 사용자 인증방식으로 사용하는 반면 그리드 시스템은 공개키와 개인키로 이루어진 대칭키를 기반으로 사용자 인증을 수행한다. 이와 관련하여 포털 시스템의 사용자 계정과 그리드 시스템의 대칭키를 중심으로 포털과 그리드시스템의 통합에 대한 많은 연구가 진행중이다. 특히 GAMA와 PURSE 처럼 아이디, 패스워드 방식에 익숙한 사용자의 편의성에 초점을 둔 연구가 활발하다. 그러나 그리드 환경은 네트워크를 통한 연결을 전제로 하기 때문에 공유되는 데이터와 자원의 보호가 중요하다. 따라서 본 논문에서는 UI 계층에서 대칭키를 사용하여 포털 시스템과 그리드 시스템의 인증 방식을 단일화함으로써 그리드의 사용자 환경에서도 보안 수준을 향상시키는 방안을 제안하고자 한다.

  • PDF

21 세기 지식정보화시대 패러다임 전환과 농촌지도사업 활력화 방안 (Paradigm Shift for the 21st Century of Knowledge Information Era and Measures for Activating Agricultural Extension Services)

  • 김진군;박성준
    • 농촌지도와개발
    • /
    • 제7권2호
    • /
    • pp.279-288
    • /
    • 2000
  • Agricultural extension services in Korea are faced with increasing demands for more efficient production and managerial technology according to globalization and free trade system. At the same time, three steps of organizational restructuring in 1998 and 1999 resulted in decreased number of organization and manpower, thus, resulting confusion in implementing extension services. To cope with the international and national challenges, Korean agricultural extension services should try paradigm shift including the followings; 1. To establish identity of agricultural extension services in Korea through making laws and regulations in terms of concept, roles, principles. implementation and methods. 2. To implement vitalizations plan through enhancement of national extension service such as food production. raising local specialty products for domestic consumption and producing strategic agricultural products for export. expanding capability of rural women, increasing opportunity for management consultation, supporting digital technology information, and promoting morale and capability of extension educators. 3. To reform agricultural extension system through adjusting the functions of extension service of the Rural Development Administration, regionalizing city and county extension center to provincial level, and changing the status of directors of extension centers from city /county to national government.

  • PDF