• Title/Summary/Keyword: Spring Security

Search Result 33, Processing Time 0.025 seconds

A Driving Mechanism of Outdoor Security Robots for High Speed Applications (고속 주행용 실외 경비로봇을 위한 구동 메커니즘)

  • Jeong, Hae-Kwan;Koh, Doo-Yeol;Woo, Chun-Kyu;Kwak, Yoon-Keun
    • The Journal of Korea Robotics Society
    • /
    • v.4 no.2
    • /
    • pp.163-168
    • /
    • 2009
  • In this paper, a new driving mechanism of security robotswhich should overcome obstacles with stability even though movingin high speed is introduced. The driving mechanism has spring-based suspension and two wheels positively necessary to overcome obstacles. From the driving mechanism, it is mainly discussed how we can decrease overshoot and impulse occurred when the robot is in the process of overcoming obstacles. Finally, design parameters of the driving mechanism which guarantees stable motion while overcoming obstacles is deduced based on simulation results. Experiments are also followed to demonstrate how well the manufactured system works in its early stage of the practical use.

  • PDF

A Study on eGovFrame Security Analysis and Countermeasures (eGovFrame 보안 분석 및 대응 방안에 관한 연구)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.181-188
    • /
    • 2023
  • The e-Government standard framework provides overall technologies such as reuse of common components for web environment development such as domestic government/public institutions, connection of standard modules, and resolution of dependencies. However, in a standardized development environment, there is a possibility of updating old versions according to core versions and leakage of personal and confidential information due to hacking or computer viruses. This study directly analyzes security vulnerabilities focusing on websites that operate eGovFrame in Korea. As a result of analyzing/classifying vulnerabilities at the internal programming language source code level, five items associated with representative security vulnerabilities could be extracted again. As a countermeasure against this, the security settings and functions through the 2 steps (1st and 2nd steps) and security policy will be explained. This study aims to improve the security function of the e-government framework and contribute to the vitalization of the service.

The condition and the analysis of the problems of the Japanese - The change of the Korean geriatric security law - (일본 유료 노인홈의 현황과 그 문제점 분석 - 우리나라 노인 복지법 개정에 즈음하여 -)

  • 신경주
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 1993.09a
    • /
    • pp.13-20
    • /
    • 1993
  • In Korea, the elderly support has been accomplished by the families in the extended family system with the influence of the transmigration and the confucianism thought. But in Korea the drastic changes of society such as, the growth of the elderly pollution, the urbanization, the decrease of the birth rate, the increase of the working women, the growth of the nuclear families, etc., make the family difficult to take care of the elderly. Therefore, some people insist on the construction of the elderly home as the way to solve the elderly problems and some of corporations including profit-organizations are ready to participate the construction of the elderly home. They force the change of the current social security law because it is impossible to carry out the plans uncer the law. At this point, the conditions of the elderly home in Japan which is geographically close to Korea and has facillicated the elderly home business were examined at the consumer perspectives. The purpose of this study were to consider the possible problems in the elderly home and to prevent from happening another elderly problems in the future.

  • PDF

Building protection system and Understanding information protection through simulation hacking (정보보호시스템 구축 및 모의해킹을 통한 정보보호이해)

  • Jung, Sang-Mi;Kim, Chang-Hyeon;Noh, Hyeon-Woo;Choi, Jin-Woo;Jung, Yu-Jin;Moon, Eui-Seong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.211-213
    • /
    • 2017
  • 최근 보안적 이슈에 따른 피해가 지속적으로 늘어남에 따라 사람들이 보안에 관심이 많아 지기 시작했다. 모의해킹 분야의 경우 기존에 문제 풀이 웹 사이트들이 존재하지만 회원 가입 단계로부터 입문자들이 시작하기에는 높은 진입장벽이 존재한다. 본 연구에서는 방 탈출 게임의 컨셉을 모의해킹에 적용하여 모의해킹 문제를 게임을 푸는 방식으로 접근하여 입문자들도 쉽게 모의해킹 분야를 시작할 수 있도록 하였다. 웹 서버는 오픈소스 웹 방화벽인 ModSecurity와 Spring Security로 서버보안을 강화하였다.

Education in Cyberspace: University as Universality

  • Shapoval, Oksana;Kotlyaria, Svitlana;Medvedieva, Alla;Lishafai, Oleksandr;Barabash, Oleh;Oleksyuk, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.333-337
    • /
    • 2021
  • The article reveals the essence of cyber socialization influencing the process of education and development. The general and potential possibilities of cyber socialization in the process of using the cyberspace of the Internet environment are presented. The sudden transition to distance learning in the spring of 2020 put the pedagogical community in the face of problems related to the content, organizational and methodological basis of the educational process. During the training in distance mode, a rich experience was gained in the use of information and communication technologies. The article discusses the techniques and methods of teaching using the capabilities of information and communication and digital technologies.

React-based login system design using Spring Boot Security and JWT (스프링 부트 Security와 JWT를 통한 React 기반 로그인 시스템 설계)

  • Youngchan Lee;Minsung Kim;Hyunwoo You;MinJae Kim;Hong Min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.45-46
    • /
    • 2024
  • 스프링 부트는 개발 및 실행 환경 설정이 간편하기 때문에 백엔드 개발에 활용되는 프레임워크이고 React는 프론트엔드 개발에 활용되는 프레임워크이다. 본 논문에서는 스프링 부트와 React를 사용하는 웹 응용에서 로그인 시스템 구축 시 JWT를 활용하는 방법과 구조에 관해 설명하였다.

A Review on the Legal rights and obligation from the legal status of registered security guard (청원경찰의 법적 지위에 따른 권한과 의무)

  • Han, seung;Kim, yong geun
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.251-278
    • /
    • 2015
  • Registered security guards carry out police duties as civilian police who are in charge of security service, and so they have a two-fold status: a civilian in terms of a social standing and a policeman in the way that they execute the authority of security. The problem caused by this legal position is that their legal rights and obligation can be unclear in the task-action and working relationship. This paper attempts to study their functions, rights, and legal duties through the interpretation of the related positive law so as to reveal the problems that may spring from this ambiguous status of registered security guards. This endeavor illuminates their legal status specified in the positive law in and around the Act on the police assigned for special guard, observing their functions and the legal duties in the pursuit of their tasks, and ending up pointing out the problems of the positive law. As a result of research work, the most significant problems, even if multifarious, are the avoidance of the state reparation in the responsibility for the illegal behavior in connection with their operation; the unconstitutionality of the disciplinary punishment regulation originated from the entrust with full powers; the imperfection of the rules about the cooperative ties with the police; the possibility of human rights abuse caused by the ban on the labor dispute; the equality problems from the dual pay system; and the inadequacy of the codes about the recruitment qualification and method. This research is intended to help achieve the purpose of the security of national critical facilities through the smooth execute of duties as well as the protection of the guards' rights. Besides, the key focuses posed in this paper are worthy of being developed more accurately through the following researches.

  • PDF

Integrated Social Networking Service Management: Comprehensive Approach for Efficient Multi-Platform Management and Enhanced User Experience (SNS 통합 관리 서비스:다중 플랫폼 효율적인 관리와 사용자 경험 강화를 위한 종합적 접근 방식)

  • Sung Jin Kim;Hyun Chul Kwon;Ji Hyun Park;Jae Min OH;Jin Seok Yang;Yun Ho jung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.251-253
    • /
    • 2023
  • 본 연구는 spring framework와 각 SNS들의 API를 활용한 각 플랫폼들을 한 사이트에 연동하여 사용자들이 손쉽게 관리하기 위하여 진행하였다. SNS 통합 플랫폼에서의 중요한 요소는 사용자들의 SNS 관리 시간을 단축시키는 것인데 이를 위해 플랫폼들의 게시물들을 한 곳에서 게시, 수정, 삭제 그리고 여러 플랫폼에 게시물을 동시에 업로드하는 기능과 게시물들을 필터링하는 기능을 제공하였다. 이를 통해 사용자의 편의성은 올라가며 더 효율적으로 게시물들을 관리하여 시간을 단축시킬 수 있다.

  • PDF

Development of SAML Software for JAVA Web Applications in Korea (국내 자바 웹 응용을 위한 SAML 소프트웨어의 개발)

  • Jo, Jinyong;Chae, Yeonghun;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1160-1172
    • /
    • 2019
  • Federated authentication is a user authentication and authorization infrastructure that spans multiple security domains. Many overseas Web applications have been adopting SAML-based federated authentication. However, in Korea, it is difficult to apply the authentication because of the high market share of a specific Web (application) server, which is hard to use open-source SAML software and the high adoption of Java-based standard framework which is not easy to integrate with SAML library. This paper proposes the SAML4J, which is developed in order to have Web applications easily and safely integrated with the Java-based framework. SAML4J has a developer-friendly advantage of using a session storage independent of the framework and processing Web SSO flows through simple API. We evaluate the functionality, performance, and security of the SAML4J to demonstrate the high feasibility of it.

Analysis on Ubiquitous Home Services in Domestic Future Housing - Comparison with Research Results on Demand of Ubiquitous Home Services - (국내 미래주택관에서 구현하는 유비쿼터스 홈 서비스 현황 분석 - 유비쿼터스 홈 서비스 요구도 관련 연구와 비교를 중심으로 -)

  • Lee, Yong-Min;Kwon, Oh-Jung
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2009.11a
    • /
    • pp.162-167
    • /
    • 2009
  • With the introduction of the ubiquitous technology, the housing culture centers of construction companies have demonstrated future housing image and technology. However, ubiquitous home services are technology oriented items. The purpose of this study was to identify u- services which were realized in domestic future housing and to compare those with services the residents needed greatly refer to researches related to demand for u-service. For this study, field studies were conducted with 3 domestic future housings and precedent studies on demand for u-service were analyzed according to the standard of residents' demand. The results of the study showed that residents prefer u-services for security and control of indoor environment for housework and leisure life. As a result, u-services which residents needed mainly did not correspond with those that were displayed in future housing.

  • PDF