• Title/Summary/Keyword: aAuthentication

Search Result 3,431, Processing Time 0.028 seconds

Identification of specific SNP molecular marker from Cudrania tricuspidata using DNA sequences of chloroplast TrnL-F region (구지뽕 나무의 엽록체 TrnL-F 영역 염기서열 분석을 통한 특이적 SNP 분자마커의 확인)

  • Lee, Soo Jin;Shin, Yong-Wook;Kim, Yun-Hee;Lee, Shin-Woo
    • Journal of Plant Biotechnology
    • /
    • v.44 no.2
    • /
    • pp.135-141
    • /
    • 2017
  • Cudrania tricuspidata Bureau is a widely used medicinal perennial woody plant. For conservation and germplasm utilization of the plant, it is imperative to obtaining information regarding the genetic diversity of the plant populations. Although C. tricuspidata is an important medicinal plant registered in South Korea, no molecular markers are currently available to distinguish Korean-specific ecotypes from other ecotypes of different countries. In this study, we developed single nucleotide polymorphism (SNP) markers derived from chloroplast genomic sequences to identify distinct Korean-specific ecotypes of C. tricuspidata via the amplification refractory mutation system (ARMS)-PCR analyses. Molecular authentication of twelve C. tricuspidata ecotypes from different regions was performed, using DNA sequences in the trnL-F chloroplast intergenic region. The SNP markers developed in this study are useful for rapidly identifying specific C. tricuspidata ecotypes from different regions.

Establishing Security Level Standards and Case Studies for Safe Electronic Financial Transactions (안전한 전자금융거래를 위한 보안등급 기준마련 및 사례연구)

  • Jang, Kil-Young;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.729-741
    • /
    • 2018
  • On June 24, 2015, the Financial Services Commission (Financial Services Commission) completely abolished the security review process, and said that it would substitute self-security review obligations with self-security reviews. Security officials at financial institutions conduct security reviews based on CIA security grade when they conduct security reviews for secure electronic financial transactions. However, the recent security review for Internet and mobile electronic financial transactions has carried out a security review, either by checking separate processes or by referring to new technologies and data related to security. This paper proposes the CIAAP security gradesl with the addition of certification and privacy protection indicators to the CIA based security grades, especially through the security review of electronic financial transactions.

Legal Issues and Policy Implications of Electronic Commerce Chapters of the Korea·China FTA (한·중 FTA 전자상거래 협정의 주요쟁점과 활용과제)

  • Kwon, Soon-Koog
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.9-17
    • /
    • 2015
  • China is the largest e-commerce market in the world. The Chinese online retail market is almost 40% larger than the US, and together these markets account for more than 55% of worldwide e-commerce. The Korea China FTA is likely to facilitate e-commerce activity between the two countries, as well as trade in the goods and services that enable e-commerce. Korean consumer goods can enjoy the benefits of the FTA because it has a competitive advantage in the Chinese market in terms of technology and quality. The purpose of this study is to examine legal issues of e-commerce chapters of the Korea China FTA and policy implications. Results of the study show that several implications based on the export vitalization of cross-border e-commerce of Korean products are offered. The Korean government needs to do the following: prepare for the subsequent negotiation of the e-commerce agreement, prepare for the classification issue of electronic transmissions, require mutual recognition of electronic authentication and electronic signatures, prepare for e-commerce dispute settlement mechanism and establish of strategies for the export vitalization of e-commerce.

Steganographic Model based on Low bit Encoding for VoIP (VoIP 환경을 위한 Low bit Encoding 스테가노그라픽 모델)

  • Kim, Young-Mi
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.141-150
    • /
    • 2007
  • This paper proposes new Steganographic model for VoIP that has very effective method using low bit encoding. Most of Steganographic models using Low bit Encoding have two disadvantages; one is that the existence of hidden secret message can be easily detected by auditory, the other is that the capacity of stego data is low. To solve these problems, this method embed more than one bit in inaudible range, so this method can improve the capacity of the hidden message in cover data. The embedding bit position is determined by using a pseudo random number generator which has seed with remaining message length, so it is hard to detect the stego data produced by the proposed method. This proposed model is able to use not only to communicate wave file with hidden message in VoIP environment but also to hide vary information which is user basic information, authentication system, etc.

  • PDF

A New Key Management Mechanism and Performance Improvement for Conditional Access System (제한수신시스템을 위한 키 관리 메카니즘과 성능향상 방안)

  • 조현숙;이상호
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.75-87
    • /
    • 2001
  • The Conditional Access System is the complete system for ensuring that broadcasting services are only accessible to those who are entitled to receive them. Four major parts to this system are scrambling, descrambling, authentication and encryption. For the proper operation, which means hard-to- break and uninterrupted service, secure key management and efficient delivery mechanism are very important design factors to this system. Performance analysis is another important factor to this system that is used in massive subscriber environment. In this thesis, one of the secure and efficient key management mechanisms is proposed. For the secrecy of this mechanism, hierarchical stacking of keys and key generation matrix are proposed. For the proof of efficient delivery of those keys, simulation results and performance analysis. which is based on queuing analysis, are presented. Lastly, optimal key generation and delivery period, maximal and minimal key deliver time, and communication capacity for data collection are presented for various subscriber volume.

  • PDF

An Analysis of Supply and Demand of Construction Professional Engineers (건설분야의 기술사 인력수급 현황 및 분석)

  • Kim Sun-Kuk;Cho Yong-Hoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.6 no.3 s.25
    • /
    • pp.178-187
    • /
    • 2005
  • In order to respond the opening of technology market by the agreement with WTO, the mutual authentication of professional engineers (PEs) by nh, and the promotion and encouragement of education in technology, the preparation of robustic regulation and regal system to secure the authority of PEs and to enhance their quality is required. And a scheme to train PEs with the advanced country level of quality and secure the practical use of PE's expertise should be developed to cope with current issues after the survey of supply and demand for PEs. In this paper, the problem of supply and demand of construction PEs is surveyed under the current regal system and the idea to regulate the supply and demand with the improvement of the regal system is suggested. The result of this research is used for building the supply and demand system of quality PEs and the efficient training and practical arrangement system. Furthermore, the result would be used for the fundamental data to establish the government policy about PEs.

Design and Implementation of Double-Key based Light Weight Security Protocol in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 더블키를 이용한 경량 보안 프로토콜 설계 및 구현)

  • Zhung, Yon-Il;Lee, Sung-Young
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.239-254
    • /
    • 2007
  • Ubiquitous computing supports environment to freely connect to network without restrictions of place and time. This environment enables easy access and sharing of information, but because of easy unauthorized accesses, specified security policy is needed. Especially, ubiquitous sensor network devices use limited power and are small in size, so, many restrictions on policies are bound to happen. This paper proposes double-key based light weight security protocol, independent to specific sensor OS, platform and routing protocol in ubiquitous sensor network. The proposed protocol supports safe symmetric key distribution, and allows security manager to change and manage security levels and keys. This had a strong merit by which small process can make large security measures. In the performance evaluation, the proposed light weight security protocol using double-key in ubiquitous sensor network allows relatively efficient low power security policy. It will be efficient to ubiquitous sensor network, such as smart of ace and smart home.

A Study on the License Management Model for Secure Contents Distribution in Ubiquitous Environment (유비쿼터스 환경의 안전한 콘텐츠 유통을 위한 라이센스 관리 모델 연구)

  • Jang, Ui-Jin;Lim, Hyung-Min;Shin, Yong-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.550-558
    • /
    • 2009
  • In ubiquitous environment, more small, lightweight, cheap and movable device is used than one device used in wired network environment. Multimedia service which is anytime, anywhere, is provided by device. However, it does not ensure the fair use of multimedia contents and causes damage to the contents providers because of illegal copy and distribution and indiscriminate use of digital contents. For solving this problems, DRM is applied to wired network but it has the problems does not protect stored license and manage license completely because of depending on simple protection such as device authentication and cryptographic algorithm. This paper proposes the license management model using digital forensic and DRM that prevents contents and licenses from distributing illegally and also enables the creation of evidence for legal countermeasure and the protection of license in whole life cycle.

  • PDF

Spyware detection system related to wiretapping based on android power consumption and network traffics (안드로이드 소비 전력 및 네트워크 트래픽을 기반으로 한 도청 관련 스파이웨어 탐지 시스템)

  • Park, Bum-joon;Lee, Ook;Cho, Sung-phil;Choi, Jung-woon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.829-838
    • /
    • 2015
  • As the number of smartphone users have increased, many kinds of malwares have emerged. Unlike existing malwares, spyware can be installed normally after user authentication and agreement according to security policy. For this reason, it is not easy to catch spywares involving harmful functionalities to users by using existing malware detection system. Therefore, our paper focuses on study about detecting mainly wiretapping spywares among them by developing a new wiretapping detection model and application. Specifically, this study conducts to find out power consumption on each application and modular and network consumption to detect voice wiretapping so Open Source Project Power Tutor is used to do this. The risk assessment of wiretapping is measured by gathered all power consumption data from Open Source Project Power Tutor. In addition, developed application in our study can detect at-risk wiretapping spyware through collecting and analyzing data. After we install the application to the smartphone, we collect needed data and measure it.

Development of Low Latency Secure Communication Device for Legacy SCADA (저지연 Legacy SCADA 보안 통신장치 개발)

  • Choi, Moon-Suk;Kim, Chung-Hyo;Lim, You-Seok;Ju, Seong-Ho;Lim, Yong-Hun;Jeon, Kyung-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.339-346
    • /
    • 2013
  • As the need for security of SCADA systems is increasing, significant progress has been made in research on security of control protocol. However, very few security solutions were adapted to legacy SCADA system. The reasons for non-adoption are latency, cost and key management problem. We propose a low latency, economic security Solution to solve these issues. The proposed solution performs security function in data link layer and has minimum overhead to minimize latency. Furthermore, we try to solve the key management problem by providing systematic security keys and key distribution method.