• Title/Summary/Keyword: Transaction of Information

Search Result 1,743, Processing Time 0.031 seconds

A study of the transaction certification model in the e-commerce (전자 상거래에서 거래 인증 모델 연구)

  • Lee, Chang-Yeol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.81-88
    • /
    • 2007
  • In on-line transaction, the transparency is the key factor for the taxation and customer's rights. Using the cash register concept of the off-line transaction, we studied on-line transaction register model for the e-commerce transparency. Although on-line transaction register may be used under the related e-commerce laws, in this paper, we only considered the mechanism of the register. The register issues the digital receipt, and then the receipt can be verified the validation by the models developed in this paper.

Optimal Savepoint in a Loosely-Coupled Resilient Database System (느슨히 결합된 데이타베이스 시스템에서 최적의 저장점 유도)

  • Choe, Jae-Hwa;Kim, Seong-Eon
    • Asia pacific journal of information systems
    • /
    • v.6 no.1
    • /
    • pp.21-38
    • /
    • 1996
  • This paper investigates the performance improvement opportunities through a resiliency mechanism in the distributed primary/backup database system. Recognizing that a distributed transaction executes at several servers during its lifetime, we propose a resiliency mechanism which allows continuous transaction processing in distributed database server systems in the presence of a server failure. In order to perform continuous transaction processing despite failures, every state change of a transaction processing can be saved in the backup server. Obviously, this pessimistic synchronization may give more burdens than benefits to the system. Thus, the tracking needs not be done synchronously with the transaction progress. Instead, the state of all transaction processing in a system is saved periodically. This activity is referred to as a savepoint. Then, the question is how often the savepoint has to be done. We derive the optimal savepoint to identify the optimization parameters for the resilient transaction processing system.

  • PDF

Research on Covert Communication Technology Based on Matrix Decomposition of Digital Currency Transaction Amount

  • Lejun Zhang;Bo Zhang;Ran Guo;Zhujun Wang;Guopeng Wang;Jing Qiu;Shen Su;Yuan Liu;Guangxia Xu;Zhihong Tian;Sergey Gataullin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.1020-1041
    • /
    • 2024
  • With the development of covert communication technologies, the number of covert communication technologies using blockchain as a carrier is increasing. However, using the transaction amount of digital currency as a carrier for covert communication has problems such as low embedding rate, large consumption of transaction amount, and easy detection. In this paper, firstly, by experimentally analyzing the distribution of bitcoin transaction amounts, we determine the most suitable range of amounts for matrix decomposition. Secondly, we design a novel matrix decomposition method that can successfully decompose a large amount matrix into two small amount matrices and utilize the elements in the small amount matrices for covert communication. Finally, we analyze the feasibility of the novel matrix decomposition method in this scheme in detail from four aspects, and verify it by experimental comparison, which proves that our scheme not only improves the embedding rate and reduces the consumption of transaction amount, but also has a certain degree of resistance to detection.

Study on Modernized Real Estate Transaction System based on Spatial Information (공간정보기반 부동산거래선진화시스템 구축방안)

  • Cho, Chun Man;Chung, Moon Sub
    • Spatial Information Research
    • /
    • v.21 no.6
    • /
    • pp.69-80
    • /
    • 2013
  • Our country has made every efforts to develop Real Estate Transaction culture with emphasis on Licensed Realtors by introducing Real Estate Transaction Law in 1983. Also, MOLIT(Ministry of Land, Infrastructure and Transport) designated several organizations including KAR(Korea Association of Realtors) as Real Estate Transaction Information Network Licensees for data credibility enhancement and transaction transparency. Nevertheless, the level of law abiding spirit and transaction culture are still similar to those of the old 'Bokdeokbang' era. The under-developed transaction behaviors prevent the social capital of people's credibility on Licensed Realtors from advancing, and results in the outcomes of unnecessary social cost. That is, very low credibility on the data on Sales Items in the market and the fear of speculative real estate price uprise and market distortions are continuing on. In this context, the purpose of this study is to propose the model of GIS-based Modernized Real Estate Transaction System and its execution policies to support credible Real Estate Information to the general public for efficient transactions in the market. Accordingly, the study aims at contributing to the modernization of Real Estate Transactions, fostering competitiveness of Realtors in the Real Estate Market.

Performance of Transaction Processing Schemes in Mobile Database Systems (이동 데이터베이스체계에서 거래처리 기법의 성능)

  • 최용구
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.2
    • /
    • pp.70-79
    • /
    • 1999
  • In mobile database system, transactions processing schemes address in ones using a static coordinator and coordinator migration. This apply coordinator migration mechanism which perform the transaction in new database server when posed to be the transaction service handoff. That apply static coordinator mechanism which perform the transaction in database server to begin the transaction when posed to be the transaction service handoff. In this paper, a scheme-independent simulation model has been developed in order to support comparative performance studies of mobile transaction processing schemes. And this paper describes the model in detail and presents simulation results which were obtained for what it believe to be the performance evaluation of the mobile transaction processing schemes. Finally, the mobile transaction processing schemes will improve system performance by minimizing the transmission of message for processing the transactions in mobile database system.

  • PDF

A Study on Improvement of Effectiveness Using Anomaly Analysis rule modification in Electronic Finance Trading (전자금융거래의 이상징후 탐지 규칙 개선을 통한 효과성 향상에 관한 연구)

  • Choi, Eui-soon;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.615-625
    • /
    • 2015
  • This paper proposes new methods and examples for improving fraud detection rules based on banking customer's transaction behaviors focused on anomaly detection method. This study investigates real example that FDS(Fraud Detection System) regards fraudulent transaction as legitimate transaction and figures out fraudulent types and transaction patterns. To understanding the cases that FDS regard legitimate transaction as fraudulent transaction, it investigates all transactions that requied additional authentications or outbound call. We infered additional facts to refine detection rules in progress of outbound calling and applied to existing detection rules to improve. The main results of this study is the following: (a) Type I error is decreased (b) Type II errors are also decreased. The major contribution of this paper is the improvement of effectiveness in detecting fraudulent transaction using transaction behaviors and providing a continuous method that elevate fraud detection rules.

Design of serializability Algorithm for Concurrency Control of Multi Transaction in Database (데이터베이스에서 다중 트랜잭션의 동시성 제어를 위한 직렬성 알고리즘 설계)

  • 김홍진;오상엽;김영선
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.1-7
    • /
    • 2001
  • The database development is in need or transaction management composed of operations about data, efficiency database management and security of information data in necessity of as well as the new thinking about data security. When users approach data, transaction concurrency is controlled by the users security authentication and security level of data. So, existing secure algorithm occurred the problems which don't satisfy serializability of high level transaction which is delayed high level transaction repeatedly by the low level transaction, because existing secure algorithm is focused on the part which removes the security channel. Therefore this proposed algorithm which prevents waste of resource from the high level transaction reexecution and delay by stopping serializability offense problem by the increase of efficiency of concurrency control.

Applications of Transaction Log Analysis for the Web Searching Field (웹 검색 분야에서의 로그 분석 방법론의 활용도)

  • Park, So-Yeon;Lee, Joon-Ho
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.1
    • /
    • pp.231-242
    • /
    • 2007
  • Transaction logs capture the interactions between online information retrieval systems and the users. Given the nature of the Web and Web users, transaction logs appear to be a reasonable and relevant method to collect and investigate information searching behaviors from a large number of Web users. Based on a series of research studies that analyzed Naver transaction logs, this study examines how transaction log analysis can be applied and contributed to the field of web searching and suggests future implications for the web searching field. It is expected that this study could contribute to the development and implementation of more effective Web search systems and services.

A Study on the U.S. Cases about the Transaction of Software (소프트웨어 거래의 UCC 제2편의 적용에 관한 연구 - 미국의 판례를 중심으로 -)

  • Kim, Jae-Seong
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.18
    • /
    • pp.7-25
    • /
    • 2002
  • Owing to a tremendous progress of information technology we have faced a great change of a society. This change has happened to almost all of a society. As a result intangible goods are also included as a major concern in international trade. We may say U.S. is one of the countries transaction of software is the most flourishing. I have tried to classified the cases of software transaction in U.S. into five groups. As a result I have known the UCC had been applied to the almost transaction of standard software. However UCC had not been applied to custom software and data processing. In these days UCITA which is very similar to a previous proposal UCC 2B has been presented. This is a contract law that would apply to computer software, multimedia products, and databases. It has been designed to create a uniform commercial contract law for those products. Now therefore we should make observation of a tendency about transaction of software in U.S. The reason is that we pay attention to the symbol and dormant power of U.S. in international trade.

  • PDF

Cryptographically-Generated Virtual Credit Card Number for Secure Card-Not-Present Transactions

  • Park, Chan-Ho;Park, Chang-Seop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1864-1876
    • /
    • 2016
  • Card-Not-Present (CNP) transactions taking place remotely over the Internet are becoming more prevalent. Cardholder authentication should be provided to prevent the CNP fraud resulting from the theft of stored credit card numbers. To address the security problems associated with CNP transactions, the use of a virtual card number derived from the transaction details for the payment has been proposed, instead of the real card number. Since all of the virtual card number schemes proposed so far are based on a password shared between the cardholder and card issuer, transaction disputes due to the malicious behavior of one of the parties involved in the transaction cannot be resolved. In this paper, a new virtual card number scheme is proposed, which is associated with the cardholder's public key for signature verification. It provides strong cardholder authentication and non-repudiation of the transaction without deploying a public-key infrastructure, so that the transaction dispute can be easily resolved. The proposed scheme is analyzed in terms of its security and usability, and compared with the previously proposed schemes.