• Title/Summary/Keyword: Web Authentication

Search Result 195, Processing Time 0.021 seconds

Software Development Process for Project Complexity and Size (프로젝트 난이도와 규모에 따른 소프트웨어 개발 프로세스)

  • Yoon, Seok-Min;Kim, In-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.33-40
    • /
    • 2009
  • In this thesis, for the assessment of software development process for project complexity and project size : one of digital watermarking algorithm is selected and examined. Digital watermarking provides a solution to illegal copying of digital contents and has many other useful applications, including web broadcast monitoring, transaction tracking, authentication, copy control and device control. This thesis focused on the method for customizing software development path, considering the project environments and characteristics. The selection standard of software development path is composed of process items, based on the ISO/IEC 15721 Information Technology Guide for ISO/IEC 12207 (Software Life Cycle Process) and ISO/IEC 15504 Information technology - Process assessment. To evaluate the algorithm, a system for selecting development path, which reflected algorithm, was examined.

Design of an Integrated Monitoring System for Constructional Structures Based on Mobile Cloud in Traditional Towns with Local Heritage

  • Min, Byung-Won;Oh, Sang-Hoon;Oh, Yong-Sun;Okazaki, Yasuhisa;Yoo, Jae-Soo;Park, Sun-Gyu;Noh, Hwang-Woo
    • International Journal of Contents
    • /
    • v.11 no.2
    • /
    • pp.37-49
    • /
    • 2015
  • Sensors, equipment, ICT facilities and their corresponding software have a relatively short lifetime relative to that of constructional structure, so these devices have to be continuously fixed or exchanged during maintenance and management. Furthermore, software or analysis tools should be periodically upgraded according to advances in ICT and analysis technology. Conventional monitoring systems have serious problems in that it is difficult for site engineers to modify or upgrade hardware and analysis algorithms. Moreover, we depend on the original system developer when we want to modify or upgrade inner program structures. In this paper, we propose a novel design for integrated maintenance and management of a monitoring system by applying the mobile cloud concept. The system is intended for use in disaster prevention of constructional structures, including bridges, tunnels, and in traditional buildings in a local heritage village, we analyze the status of these structures over a long term or a short-term period as well as in disaster situations. Data are collected over a mobile cloud and future expectations are analyzed according to probabilistic and statistical techniques. We implement our integrated monitoring system to solve the existing problems mentioned above. The final goal of this study is to design and implement a monitoring system for more than 10,000 structures spread within Korea. Furthermore, we can specifically apply the monitoring system presented here to a bridge made from timber in Asan Oeam Village and a traditional house in Andong Hahoe Village to monitor for possible disasters. The entire system design and implementation can be developed on the LinkSaaS platform and the monitoring services can also be implemented on the platform. We prove that the proposed system has good performance by performing a TTA authentication test, web accommodation test, and operation test using emulated data.

A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information (동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델)

  • Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.23-36
    • /
    • 2005
  • The main obstacle hindering the wide deployment of identity-based cryptosystem is that the entity responsible for creating the private key has too much power. As a result, private keys are no longer private. One obvious solution to this problem is to apply the threshold technique. However, this increases the authentication computation, and communication cost during the key issuing phase. In this paper, we propose a new effi ient model for issuing multiple private keys in identity-based encryption schemes based on the Weil pairing that also alleviates the key escrow problem. In our system, the private key of a user is divided into two components, KGK (Key Description Key) and KUD(Key Usage Desscriptor), which are issued separately by different parties. The KGK is issued in a threshold manner by KIC (Key Issuing Center), whereas the KW is issued by a single authority called KUM (Key Usage Manager). Changing KW results in a different private key. As a result, a user can efficiently obtain a new private key by interacting with KUM. We can also adapt Gentry's time-slot based private key revocation approach to our scheme more efficiently than others. We also show the security of the system and its efficiency by analyzing the existing systems.

Revisiting the e-Government Maturity Model: Significance, Limitations, and Suggestions (전자정부 성숙도 모델의 재검토: 모델의 의의와 한계, 실증분석을 통한 제언)

  • SUNG, WOOKJOON
    • Informatization Policy
    • /
    • v.30 no.3
    • /
    • pp.3-28
    • /
    • 2023
  • This study aims to analyze the usage behavior of e-government service users based on the e-government maturity model and provide suggestions for advancement of the e-government services. The changes in Korea's e-government services were analyzed as follows; 1) Proportion of use of e-government services in Korean public services, 2) E-government service types/stages use, 3) Service use by platform 4) User response to e-government service 5) Users' requests for future e-government service usage methods. For the analysis, this study used data from Korea's 2012-2020 e-government usage behavior survey data. As a result of the analysis, first, the proportion of e-government service has been continuously increasing, and second, the use of the e-participation stage is relatively low compared to the presenting information, interaction, and transaction stages. Third, by platform, e-government service has been expanded to various access platforms such as mobile, kiosk, and SNS centering on the web. Fourth, users' satisfaction with e-government service is very high. However, to vitalize e-government services, users requested improvements such as providing one-stop integrated services and simplifying authentication procedures. Based on the analysis results, this study 1) reflects the user's point of view in the maturity model of e-government, 2) considers access to various platforms according to the development of digital technology, 3) improves the e-government maturity model through data-based analysis such as user usage behavior suggested the need.

A User Profile-based Filtering Method for Information Search in Smart TV Environment (스마트 TV 환경에서 정보 검색을 위한 사용자 프로파일 기반 필터링 방법)

  • Sean, Visal;Oh, Kyeong-Jin;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.97-117
    • /
    • 2012
  • Nowadays, Internet users tend to do a variety of actions at the same time such as web browsing, social networking and multimedia consumption. While watching a video, once a user is interested in any product, the user has to do information searches to get to know more about the product. With a conventional approach, user has to search it separately with search engines like Bing or Google, which might be inconvenient and time-consuming. For this reason, a video annotation platform has been developed in order to provide users more convenient and more interactive ways with video content. In the future of smart TV environment, users can follow annotated information, for example, a link to a vendor to buy the product of interest. It is even better to enable users to search for information by directly discussing with friends. Users can effectively get useful and relevant information about the product from friends who share common interests or might have experienced it before, which is more reliable than the results from search engines. Social networking services provide an appropriate environment for people to share products so that they can show new things to their friends and to share their personal experiences on any specific product. Meanwhile, they can also absorb the most relevant information about the product that they are interested in by either comments or discussion amongst friends. However, within a very huge graph of friends, determining the most appropriate persons to ask for information about a specific product has still a limitation within the existing conventional approach. Once users want to share or discuss a product, they simply share it to all friends as new feeds. This means a newly posted article is blindly spread to all friends without considering their background interests or knowledge. In this way, the number of responses back will be huge. Users cannot easily absorb the relevant and useful responses from friends, since they are from various fields of interest and knowledge. In order to overcome this limitation, we propose a method to filter a user's friends for information search, which leverages semantic video annotation and social networking services. Our method filters and brings out who can give user useful information about a specific product. By examining the existing Facebook information regarding users and their social graph, we construct a user profile of product interest. With user's permission and authentication, user's particular activities are enriched with the domain-specific ontology such as GoodRelations and BestBuy Data sources. Besides, we assume that the object in the video is already annotated using Linked Data. Thus, the detail information of the product that user would like to ask for more information is retrieved via product URI. Our system calculates the similarities among them in order to identify the most suitable friends for seeking information about the mentioned product. The system filters a user's friends according to their score which tells the order of whom can highly likely give the user useful information about a specific product of interest. We have conducted an experiment with a group of respondents in order to verify and evaluate our system. First, the user profile accuracy evaluation is conducted to demonstrate how much our system constructed user profile of product interest represents user's interest correctly. Then, the evaluation on filtering method is made by inspecting the ranked results with human judgment. The results show that our method works effectively and efficiently in filtering. Our system fulfills user needs by supporting user to select appropriate friends for seeking useful information about a specific product that user is curious about. As a result, it helps to influence and convince user in purchase decisions.