• Title/Summary/Keyword: authentication system

Search Result 1,671, Processing Time 0.034 seconds

Influence Factors of Innovation Resistance of Cloud Computing Service: Focus on Small and Medium Enterprises (클라우드 컴퓨팅 서비스의 혁신저항 영향요인: 중소기업을 대상으로)

  • Lee, Sanghoon;Choi, Jeong Min
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.105-115
    • /
    • 2020
  • The purpose of this study is to investigate the factors influencing the innovation resistance of cloud computing services and to suggest policy alternatives to increase the use of domestic cloud computing services. For this, a survey was conducted on 178 SMEs that introduced cloud computing services with government support. As a result, technostress, CEO informatization leadership and organizational structure concentration had a significant influence on innovation resistance. Therefore, in the future, first, it is necessary to provide user-centered cloud computing services in the direction of reducing technostress. Second, it is necessary to apply cloud computing services through a deeper understanding of the organizational characteristics of each small and medium enterprise. Third, there is a need for advanced security authentication and a compensation system. In order to promote the use of cloud computing services, an environment in which users can safely use should be prepared first.

Development of molecular markers for the differentiation of Angelica gigas Jiri line by using ARMS-PCR analysis (세발당귀(Angelica gigas Jiri)의 판별을 위한 ARMS-PCR용 분자표지 개발)

  • Lee, Shin-Woo;Lee, Soo Jin;Han, Eun-Hee;Shin, Yong-Wook;Kim, Yun-Hee
    • Journal of Plant Biotechnology
    • /
    • v.48 no.1
    • /
    • pp.26-33
    • /
    • 2021
  • Angelica is a widely used medicinal and perennial plant. Information on the genetic diversity of Angelica populations is essential for their conservation and germ plasmic utilization. Although Angelica is an important medicinal plant species registered in South Korea, no molecular markers are currently available to distinguish it from other similar species from different countries. This developed single nucleotide polymorphism (SNP) markers derived from nuclear ribosomal DNA internal transcribed spacer regions genomic sequences to identify distinct Korean-specific Angelica species via amplification refractory mutation system (ARMS)-PCR curve analyses. We performed molecular authentication of different kinds of Korean-specific Angelica species such as A. gigas Nakai and A. gigas Jiri using DNA sequences in the ITS intergenic region. The SNP markers developed in this study are useful for rapidly identifying specific Angelica species from different countr.

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.

Single Sign On between Grid Portal and Web applications on MGrid (MGrid에서 그리드 포털과 웹 어플리케이션의 통합인증)

  • Heo, Dae-Young;Hwang, Dae-Bok;Hwang, Sun-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.1-8
    • /
    • 2009
  • Grid services offer SSO(single sign-on) mechanism using GSI(grid security infrastructure) based on X.509. However. portal applications in web environment use ID and password model for single sign-on. Grid portals means a system which provides grid services by integrating portlet contents on single web interface. In existing research such as GAMA and PURSE, SSO for a whole grid portal is figured out in the way that user is authenticated by ID and password in front and call grid service via GSI at back-end. Other types of web applications outside of portlet framework cannot unfortunately access grid service in SSO way in the existing researches, because the SSO mechanism is developed for portlet framework only. In this paper, we suggest a SSO mechanism based on ID and password model, which forwards authentication information and a GSI token for grid access among portlets and grid-enabled web applications. This mechanism is applied to MGrid for SSO, which consists of applications of java web start, applet, servlet, and etc. as also as portlets.

Software Development Process for Project Complexity and Size (프로젝트 난이도와 규모에 따른 소프트웨어 개발 프로세스)

  • Yoon, Seok-Min;Kim, In-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.33-40
    • /
    • 2009
  • In this thesis, for the assessment of software development process for project complexity and project size : one of digital watermarking algorithm is selected and examined. Digital watermarking provides a solution to illegal copying of digital contents and has many other useful applications, including web broadcast monitoring, transaction tracking, authentication, copy control and device control. This thesis focused on the method for customizing software development path, considering the project environments and characteristics. The selection standard of software development path is composed of process items, based on the ISO/IEC 15721 Information Technology Guide for ISO/IEC 12207 (Software Life Cycle Process) and ISO/IEC 15504 Information technology - Process assessment. To evaluate the algorithm, a system for selecting development path, which reflected algorithm, was examined.

Study on Zero Trust Architecture for File Security (데이터 보안을 위한 제로 트러스트 아키텍처에 대한 연구)

  • Han, Sung-Hwa;Han, Joo-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.443-444
    • /
    • 2021
  • Security threats to information services are increasingly being developed, and the frequency and damage caused by security threats are also increasing. In particular, security threats occurring inside the organization are increasing significantly, and the size of the damage is also large. A zero trust model has been proposed as a way to improve such a security environment. In the zero trust model, a subject who has access to information resources is regarded as a malicious attacker. Subjects can access information resources after verification through identification and authentication processes. However, the initially proposed zero trust model basically focuses on the network and does not consider the security environment for systems or data. In this study, we proposed a zero trust-based access control mechanism that extends the existing zero trust model to the file system. As a result of the study, it was confirmed that the proposed file access control mechanism can be applied to implement the zero trust model.

  • PDF

Research on User-Centric Inter-Organizational Collaboration (UCICOIn) framework (사용자 제어 기반 다중 도메인 접근 제어에 대한 연구)

  • Sunghyuck Hong
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.37-43
    • /
    • 2023
  • In today's business landscape, collaboration and interoperability are crucial for organizational success and profitability. However, integrating operations across multiple organizations is challenging due to differing roles and policies in Identity and Access Management (IAM). User-centric identity (UCI) adopts a personalized approach to digital identity management, centering on the end-user for authentication and access control. It provides a decentralized system that ensures secure and customized access for each user. UCI aims to address complex security challenges by aligning access privileges with individual user requirements. This research delves into UCI's ability to streamline resource access amidst conflicting IAM roles and protocols across various organizations. The study presents a UCI-based multi-domain access control (MDAC) framework, which encompasses an ontology, a unified method for articulating access roles and policies across domains, and software services melding with UCI infrastructure. The goal is to enhance organizational resource management and decision-making by offering clear guidelines on access roles and policy management across diverse domains, ultimately boosting companies' return on investment.

A Study on the Efficiency of Cafeteria Management Systems (구내식당 관리 시스템의 효율성에 관한 연구)

  • Shin-Hyeong Choi;Choon-Soo Lee
    • Journal of Advanced Technology Convergence
    • /
    • v.3 no.2
    • /
    • pp.9-15
    • /
    • 2024
  • Due to the high inflation rate of dining out, along with changes in group meals or cafeteria services, office workers are increasingly using workplace cafeterias to reduce their meal expenses even slightly. With the recent development of ICT technology, various fields are realizing that not only are smartphones becoming more popular, but they are also becoming an integration of the latest technologies. In this paper, we analyze the current status of cafeterias with a large number of customers and propose ways to improve problems or difficulties. Since most people always carry their smartphones for urgent communication or work tasks, we aim to develop a cafeteria management system that utilizes the NFC function of smartphones. By presenting the process from customer entry to menu selection, it will enable more efficient use of the cafeteria.

A Study on Decision Making for Blockchain-based IT Platform Selection for Security Token (블록체인 기반의 토큰 증권 IT 플랫폼 선택을 위한 의사결정 연구)

  • Soo-oh Yang;Byung Wan Suh
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.37-48
    • /
    • 2023
  • Since the announcement of the Financial Services Commission's 'Token Securities Issuance and Distribution System Improvement Plan' in February 2023, financial institutions, securities firms, and blockchain companies have been actively considering implementing IT platforms, but they are facing difficulties in selecting IT platforms for token securities because related legal regulations have not yet been clearly established. As a result, the need for rational and systematic criteria for the selection of blockchain-based token securities IT platforms has emerged, and this study explores and evaluates the key factors of token securities IT platform selection. Four factors were identified as the top-level factors, including 'maturity of the platform', 'operation and management of the platform', 'cost of introducing and maintaining the platform', and 'regulatory compliance for token securities', and 17 factors were identified as sub-level factors, including 'diversity', 'user authentication management', 'Adoption Costs', and 'financial regulations'. Among the 17 sub-factors, 'government financial regulation' and 'personal information protection' are selected as important factors, and the results of this study can help related organizations and financial companies make strategic decisions by providing systematic decision-making criteria for selecting token securities IT platforms.

  • PDF

금융사고 실태 조사

  • Lee, Sang-Kyung
    • Journal of the Korea society of information convergence
    • /
    • v.7 no.1
    • /
    • pp.25-46
    • /
    • 2014
  • After examining the current situations of financial frauds and the reasons for their occurrence in the financial institutions through examples of financial frauds in domestic and abroad, this study presents ways to prevent such financial scams. The preventive measures consist of activities before and after the occurrence of financial frauds and during normal financial operations. The activities are as follows: 1. Preventive activity should be strengthened before the occurrence of financial frauds. That is, first, the enforcement of consistent internal control is needed. Second, in order to block the probability of financial frauds involved with employees, ethics education and a reward program for inside tippers need to be run. Third, financial institutions need to apply for comprehensive insurance policy to minimize the lost in case. 2. Preventive activity should be strengthened during normal financial operations. First, self authentication system for customers needs to be introduced. Second, dealings of day, week, and month need to be thoroughly checked and the system of audit needs to be expanded. Third, message service for the information on financial frauds and their preventive measures needs to be expanded. Fourth, public notification system against examples of financial frauds needs to be expanded. 3. Preventive activity after the occurrence of financial frauds should be strengthened. First, awareness for preventive measures such as imposing penalty on the manager needs to be enhanced. Second, strict restrictions on financial frauders such as a criminal charge needs to be strengthened. Third, there should be legal devices and resolutions in order to retrieve all the money deceived by financial frauds.

  • PDF