• Title/Summary/Keyword: Used Transaction

Search Result 684, Processing Time 0.023 seconds

A Scheme Reconfiguration of Whitelisting and Hyperledger Fabric for Cryptocurrency Integrity Transactions (암호화폐 무결성 거래를 위한 Whitelisting과 Hyperledger Fabric 재구성 기법)

  • Su-An Jang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.7-12
    • /
    • 2024
  • To trade cryptocurrency, traders require a personal cryptocurrency wallet. Cryptocurrency itself using blockchain technology is guaranteed excellent security and reliability, so the threat of blockchain hacking is almost impossible, but the exchange environment used by traders for transactions is most subject to hacking threats. Even if transactions are made safely through blockchain during the transaction process, if the trader's wallet information itself is hacked, security cannot be secured in these processes. Exchange hacking is mainly done by stealing a trader's wallet information, giving the hacker access to the victim's wallet assets. In this paper, to prevent this, we would like to reconstruct the existing Hyperledger Fabric structure and propose a system that verifies the identity integrity of traders during the transaction process using whitelisting. The advantage is that through this process, damage to cryptocurrency assets caused by hackers can be prevented and recognized. In addition, we aim to point out and correct problems in the transaction process that may occur if the victim's wallet information is stolen from the existing Hyperledger Fabric.

An Analysis on the Spatio-temporal Heterogeneity of Real Transaction Price of Apartment in Seoul Using the Geostatistical Methods (공간통계기법을 이용한 서울시 아파트 실거래가 변인의 시공간적 이질성 분석)

  • Kim, Jung Hee
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.24 no.4
    • /
    • pp.75-81
    • /
    • 2016
  • This study focused on exploring real transaction price of apartment and spatial and temporal heterogeneity of the variables that influence real transaction price of apartment from the spatial and temporal perspective. As independent variables that are considered to influence real transaction price of apartment, transport, local characteristics, educational conditions, population, and economic characteristics were taken into account. Accordingly, the influence of independent variables and spatial distribution pattern were analyzed from the global and local aspects. The spatial and temporal changing patterns of real transaction price of apartment which is a dependent variable were analyzed. First, to establish an analysis model, OLS analysis and GWR analysis were conducted, and thereby more efficient and proper model was selected. Secondly, to find spatial and temporal heterogeneity of independent variables with the use of the selected GWR model, Local $R^2$ was used for local analysis. Thirdly, to look into spatial distribution of independent variables, kriging analysis was carried out. Therefore, based on the results, it is considered that it is possible to carry out more microscopic housing submarket analysis and lay the foundation for establishing a policy on real property.

Classification and Practical Consequences of Malicious Additional Conditions from Letter of Credit (신용장 악의적 부가조건의 유형과 실무상 유의점)

  • KIM, Hee-Kyung;PARK, Kwang-So
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.76
    • /
    • pp.103-123
    • /
    • 2017
  • If additional condition in letter of credit is used in malicious way, it affects the international trade transaction in jeopardy. Therefore, it's significant to identify whether additional conditions are malicious or ordinary in the transaction with letter of credit. In normal cases, thanks to lots of useful features as an international payment method, such as security of payment, legal protection, and versatility, a letter of credit is widely used in international trade. However, even with these advantageous features, a letter of credit is complicate and costly to use, compared to other payment methods. Furthermore, due to its principle of independence from underlying contract, a use of letter of credit creates another type of concern for proper handling and needs significant caution upon field use. At some points, malicious additional conditions are used for buyer's advantage in deal making and fraud instance in worst situation. In addition, some countries request malicious conditions against sellers as a non-tariff barrier. Therefore it's extremely important to recognize whether malicious additional condition exists in letter of credit and, if so, how to deal with it. This study delivers the information to distinguish and categorize the malicious conditions in various cases and to figure out how to deal with them for safer trade with less risk.

  • PDF

Cold Flow Simulation of $SF_{6}$ Puffer Circuit Breaker

  • Bae, Chae-Yoon;Jung, Hyun-Kyo;Shin, Sang-In;Park, Oh-Hyun
    • KIEE International Transaction on Electrical Machinery and Energy Conversion Systems
    • /
    • v.11B no.4
    • /
    • pp.121-128
    • /
    • 2001
  • Numerical schemes for the simulation of the cold gas flow in the SF6 puffer type circuit breaker is presented. The governing equation is axisymmetric compressible Euler Equation and FVM is used to analyze the behavior of flow. The upwind scheme is used to avoid numerical instability and MUSCL is used to obtain high order accuracy. For the efficient calculation, AF-ADI scheme is used. The simulation result shows good agreement with the experimental data.

  • PDF

Clustering Normal User Behavior for Anomaly Intrusion Detection (비정상행위 탐지를 위한 사용자 정상행위 클러스터링 기법)

  • Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.857-866
    • /
    • 2003
  • For detecting an intrusion based on the anomaly of a user's activities, previous works are concentrated on statistical techniques in order to analyze an audit data set. However. since they mainly analyze the average behavior of a user's activities, some anomalies can be detected inaccurately. In this paper, a new clustering algorithm for modeling the normal pattern of a user's activities is proposed. Since clustering can identify an arbitrary number of dense ranges in an analysis domain, it can eliminate the inaccuracy caused by statistical analysis. Also, clustering can be used to model common knowledge occurring frequently in a set of transactions. Consequently, the common activities of a user can be found more accurately. The common knowledge is represented by the occurrence frequency of similar data objects by the unit of a transaction as veil as the common repetitive ratio of similar data objects in each transaction. Furthermore, the proposed method also addresses how to maintain identified common knowledge as a concise profile. As a result, the profile can be used to detect any anomalous behavior In an online transaction.

A Study of Information Security Maturity Measurement Methodology for Banking System based on Cyber -based Transaction Processing Architecture Diagnosis (사이버거래 처리 구조 진단을 기반으로 한 뱅킹시스템 정보보호 성숙도 측정방법론 연구)

  • Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.121-128
    • /
    • 2014
  • SSE-CMM for security engineering, engineering, assurance, risk is divided into three elements of the process maturity assessment model and the level of information security presented. Maturity measurement of privacy, vulnerability diagnosis and risk analysis methodologies is used in practical field for present a comprehensive conclusion. The common cyber services are internet banking, mobile banking, telephone banking and the like. Transaction structure, a kind of cyber-banking system, information security maturity of the existing measurement methodologies for research purposes, vulnerability diagnosis and risk analysis methodologies to be used in practical field present a comprehensive conclusion. To ensure safety and convenience for the user, convenient to deal with cyber environment is the key to the activation of cyber trading. Particularly by measuring the maturity of cyber banking system to ensure the safety of the practice field much effects are expected as a result.

The Role of Control Transparency and Outcome Feedback on Security Protection in Online Banking (계좌 이용 과정과 결과의 투명성이 온라인 뱅킹 이용자의 보안 인식에 미치는 영향)

  • Lee, Un-Kon;Choi, Ji Eun;Lee, Ho Geun
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.75-97
    • /
    • 2012
  • Fostering trusting belief in financial transactions is a challenging task in Internet banking services. Authenticated Certificate had been regarded as an effective method to guarantee the trusting belief for online transactions. However, previous research claimed that this method has some loopholes for such abusers as hackers, who intend to attack the financial accounts of innocent transactors in Internet. Two types of methods have been suggested as alternatives for securing user identification and activity in online financial services. Control transparency uses information over the transaction process to verify and to control the transactions. Outcome feedback, which refers to the specific information about exchange outcomes, provides information over final transaction results. By using these two methods, financial service providers can send signals to involved parties about the robustness of their security mechanisms. These two methods-control transparency and outcome feedback-have been widely used in the IS field to enhance the quality of IS services. In this research, we intend to verify that these two methods can also be used to reduce risks and to increase the security protections in online banking services. The purpose of this paper is to empirically test the effects of the control transparency and the outcome feedback on the risk perceptions in Internet banking services. Our assumption is that these two methods-control transparency and outcome feedback-can reduce perceived risks involved with online financial transactions, while increasing perceived trust over financial service providers. These changes in user attitudes can increase the level of user satisfactions, which may lead to the increased user loyalty as well as users' willingness to pay for the financial transactions. Previous research in IS suggested that the increased level of transparency on the process and the result of transactions can enhance the information quality and decision quality of IS users. Transparency helps IS users to acquire the information needed to control the transaction counterpart and thus to complete transaction successfully. It is also argued that transparency can reduce the perceived transaction risks in IS usage. Many IS researchers also argued that the trust can be generated by the institutional mechanisms. Trusting belief refers to the truster's belief for the trustee to have attributes for being beneficial to the truster. Institution-based trust plays an important role to enhance the probability of achieving a successful outcome. When a transactor regards the conditions crucial for the transaction success, he or she considers the condition providers as trustful, and thus eventually trust the others involved with such condition providers. In this process, transparency helps the transactor complete the transaction successfully. Through the investigation of these studies, we expect that the control transparency and outcome feedback can reduce the risk perception on transaction and enhance the trust with the service provider. Based on a theoretical framework of transparency and institution-based trust, we propose and test a research model by evaluating research hypotheses. We have conducted a laboratory experiment in order to validate our research model. Since the transparency artifact(control transparency and outcome feedback) is not yet adopted in online banking services, the general survey method could not be employed to verify our research model. We collected data from 138 experiment subjects who had experiences with online banking services. PLS is used to analyze the experiment data. The measurement model confirms that our data set has appropriate convergent and discriminant validity. The results of testing the structural model indicate that control transparency significantly enhances the trust and significantly reduces the risk perception of online banking users. The result also suggested that the outcome feedback significantly enhances the trust of users. We have found that the reduced risk and the increased trust level significantly improve the level of service satisfaction. The increased satisfaction finally leads to the increased loyalty and willingness to pay for the financial services.

  • PDF

Multi-Agent based Negotiation Support Systems for Order based Manufacturers

  • Choi Hyung Rim;Kim Hyun Soo;Park Young Jae;Park Byung Joo;Park Yong Sung
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2003.05a
    • /
    • pp.1-20
    • /
    • 2003
  • In this research, we developed a Multi-Agent based Negotiation Support System to be able to increase the competitive power of a company in dynamic environment and correspond to various orders of customers by diffusion of electronic commerce. The system uses the agent technology that is being embossed as new paradigm in dynamic environment and flexible system framework. The multi-agent technology is used to solve these problem through cooperation of agent. The system consists of six sub agents: mediator, manufacturability analysis agent, process planning agent, scheduling agent, selection agent, negotiation-strategy building agent. In this paper, the proposed Multi-Agent based Negotiation Support System takes aim at the automation of transaction process from ordering to manufacturing plan through the automation of negotiation that is the most important in order-taking transaction.

  • PDF

Relationship between Equity and e-Satisfaction

  • Kim, Kyung-Hoon;Kim, Dong-Yul
    • Journal of Global Scholars of Marketing Science
    • /
    • v.7
    • /
    • pp.167-179
    • /
    • 2001
  • In Internet age, traditional transaction concepts are being examined in new perspectives. Electronic commerce, as a new transaction paradigm, is being paid attention to reexamine traditional marketing theories. In this study, equity is adapted to electronic commerce. We add Navigational Equity to existing equity concept: Payment and Service (Huppertz et al 1978). The research model of this study consisted of three major constructs such as equity, normative comparison of equity and consumer satisfaction in electronic commerce. Additionally, the environments of Internet navigation, which include system quality, easy for use, social pressure, playful aspects, and security check, etc. were analyzed. The propositions were drawn from the research model of this study. These propositions will be used to generate hypotheses constructing simultaneous equation model. More empirical study of future is expected.

  • PDF

연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계

  • Lee, Gyeong-Jeon;Jeong, Mu-Jeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.226-233
    • /
    • 2005
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. So when you try to define it with simple words, it gets even more confusing. Payment. however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. In the end, the key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, Strong Personal Device, and peer-based if information transactions. We also propose U-SDT Protocol integrating critical technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF