• Title/Summary/Keyword: Super computer security

Search Result 17, Processing Time 0.025 seconds

Implementation of anti-screen capture modules for privacy protection (개인 정보 보호를 위한 화면 캡쳐 방지 모듈 구현)

  • Lee, Jong-Hyeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.91-96
    • /
    • 2014
  • According to the spread of computers and the development of the information society, people are focused on privacy information. As the development of its associated policy and technology, it has been tried various attempts to protect their personal information. In this paper, we proposed anti-screen capture modules to protect personal information or a company's confidential information for agencies and departments that keeps top security. As a result, we can prevent an illegal use or a stealing of another person's information in a public agency or personal computer. Also modules can stop exposures of top security data and personal information during they communicate with others in their institution's sever system.

A Study on How to Build a Zero Trust Security Model (제로 트러스트 보안모델 구축 방안에 대한 연구)

  • Jin Yong Lee;Byoung Hoon Choi;Namhyun Koh;Samhyun Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.189-196
    • /
    • 2023
  • Today, in the era of the 4th industrial revolution based on the paradigm of hyper-connectivity, super-intelligence, and superconvergence, the remote work environment is becoming central based on technologies such as mobile, cloud, and big data. This remote work environment has been accelerated by the demand for non-face-to-face due to COVID-19. Since the remote work environment can perform various tasks by accessing services and resources anytime and anywhere, it has increased work efficiency, but has caused a problem of incapacitating the traditional boundary-based network security model by making the internal and external boundaries ambiguous. In this paper, we propse a method to improve the limitations of the traditional boundary-oriented security strategy by building a security model centered on core components and their relationships based on the zero trust idea that all actions that occur in the network beyond the concept of the boundary are not trusted.

EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market

  • Li, Hongwei;Yang, Yi;Wen, Mi;Luo, Hongwei;Lu, Rongxing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3937-3954
    • /
    • 2014
  • With the increasing electricity consumption and the wide application of renewable energy sources, energy auction attracts a lot of attention due to its economic benefits. Many schemes have been proposed to support energy auction in smart grid. However, few of them can achieve range query, ranked search and personalized search. In this paper, we propose an efficient multi-keyword range query (EMRQ) scheme, which can support range query, ranked search and personalized search simultaneously. Based on the homomorphic Paillier cryptosystem, we use two super-increasing sequences to aggregate multidimensional keywords. The first one is used to aggregate one buyer's or seller's multidimensional keywords to an aggregated number. The second one is used to create a summary number by aggregating the aggregated numbers of all sellers. As a result, the comparison between the keywords of all sellers and those of one buyer can be achieved with only one calculation. Security analysis demonstrates that EMRQ can achieve confidentiality of keywords, authentication, data integrity and query privacy. Extensive experiments show that EMRQ is more efficient compared with the scheme in [3] in terms of computation and communication overhead.

Baggage Recognition in Occluded Environment using Boosting Technique

  • Khanam, Tahmina;Deb, Kaushik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5436-5458
    • /
    • 2017
  • Automatic Video Surveillance System (AVSS) has become important to computer vision researchers as crime has increased in the twenty-first century. As a new branch of AVSS, baggage detection has a wide area of security applications. Some of them are, detecting baggage in baggage restricted super shop, detecting unclaimed baggage in public space etc. However, in this paper, a detection & classification framework of baggage is proposed. Initially, background subtraction is performed instead of sliding window approach to speed up the system and HSI model is used to deal with different illumination conditions. Then, a model is introduced to overcome shadow effect. Then, occlusion of objects is detected using proposed mirroring algorithm to track individual objects. Extraction of rotational signal descriptor (SP-RSD-HOG) with support plane from Region of Interest (ROI) add rotation invariance nature in HOG. Finally, dynamic human body parameter setting approach enables the system to detect & classify single or multiple pieces of carried baggage even if some portions of human are absent. In baggage detection, a strong classifier is generated by boosting similarity measure based multi layer Support Vector Machine (SVM)s into HOG based SVM. This boosting technique has been used to deal with various texture patterns of baggage. Experimental results have discovered the system satisfactorily accurate and faster comparative to other alternatives.

A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology (인터넷 쿠키로 인한 프라이버시 침해와 잊혀질 권리에 관한 연구)

  • Choi, Younsung;Kwon, Oh-Geol;Won, Dongho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.77-85
    • /
    • 2016
  • Internet cookie technology is designed for solving unreliable problem of HTTP's inherent property and notifying user's previous activity to web site's server, so it is useful to provide suitable service for individual user. However, the cookie techniques are becoming more sophisticated such as the third cookie and super cookie. And its included information is applied for advertisement and target marketing strategy, so the problem occurs that user's personal information is collected excessively. However, our law does not recognize the internet cookie as personal information so user cannot know where own internet cookie is stored and applicable. Therefore, in this paper, we explain the internet cookie technology, the privacy invasion and right to be forgotten for solving problem due to the internet cookie. And we analysis the relationship between the information of internet cookie and personal information, and then present the improvement requirement on the law and technology to use internet cookie securely and conveniently.

A Study on IPTV Video Quality by Routing Protocols in Wireless LAN (무선 LAN 환경에서 경로 배정 프로토콜에 따른 IPTV 영상 서비스 품질에 관한 연구)

  • Jung, Jae-hoon;Park, Seung-seob
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.572-575
    • /
    • 2009
  • With the advent of integration environment of broadcasting and communication, IPTV has been widely used. It provides services such as information, movie contents and broadcasting through TV using super-high speed networks. Developments of Wireless LAN and IP network technology create various and fusional services such as IPTV, VoIP that are based on IP network. The development of Wireless LAN is very important in IPTV network field which requires the best quality of service on the security, QoS and bandwidth. In this Paper, We configure the experimental network in its RIP and OSPF environment to test the Video Quality of IPTV in Wireless LAN. We measure and evaluate broadcasting quality by using PSNR to show the corelation of Routing Protocols in Wireless LAN in which how they affect to the IPTV real-time Video Quality.

  • PDF

An Analysis on the Evolutionary Characteristics of Ubiquitous City through Evolutionary Map of Ubiquitous City (유시티 진화 지도를 통한 유시티 진화 특성 분석)

  • JO, Sung-Soo;LEE, Sang-Ho;LEEM, Youn-Taik
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.75-91
    • /
    • 2015
  • This study aims to analyse the U-City characteristics through the U-City historical mapping. The U-City characteristics were analysed by building the U-City historical map in terms of STIM model which consists of service, technology, infrastructure and management. The data for analysis is the National Informatization White Paper published by the NIA (National Information Society Agency) from 2002 to 2013. As a result, first, the U-City service were evolved from administration informatization, enterprise informatization, administration/living informatization and administration/space/private informatization through the intelligence facilities and space. Second, the U-City technology were changed through wire network, sensor/network, processing/super-highway network, convergence of network/security. Third, the U-City infrastructure have had evolutionary process such as wire computer network, wire/wireless network, intellectualization facility and intelligent facility space. Forth, the U-City management were carried out with making the unit network/infrastructure management, information connection/operating management and information integration/participation management. Therefore, the history of U-City has been making rapid development in government computerization, computer oriented society, information city and ubiquitous city.