• Title/Summary/Keyword: certificate systems

Search Result 180, Processing Time 0.028 seconds

The Study on Jacket pattern in Craftsman Women's Wear Pattern Examination (양장기능사실기시험의 재킷 패턴 연구)

  • Park, Mi-Kyeoung;Song, Jung-A
    • Fashion & Textile Research Journal
    • /
    • v.12 no.6
    • /
    • pp.781-788
    • /
    • 2010
  • To work in the fashion industry which has entered the digital age, and in specialization and high-industrialization age, one needs to attain various skills required for the qualifications of a fashion specialist. For these, qualification certificate systems are enacted to nurture specialized technical personnel, and among these, a jacket pattern is selected from the practical examination of Western-style dress skill prepared for nurturing specialist who can design, cut, and sew women's clothing, to be compared and analyzed against the existing printed practical textbooks, technical books of making clothes which used as college textbooks, and local documents of theoretical study documents. The methodology of the research is to select 8 samples for the study, analyze the identity with the design, and then cut applying the identical dimensions and compare the measurements, and make the clothes using each cutting methods, and inspect to find the consistency with the design and made statistical analysis. As a result, we designed and made research patterns, and suggested a jacket pattern design to patterns simply that suits the design fast.

Design and Implementation of a Micropayment Protocol in Electronic Commerce Environments (소액 지불 전자상거래 환경을 위한 프로토콜의 설계 및 구현)

  • 손병록;박기현;유상진
    • Korean Management Science Review
    • /
    • v.18 no.1
    • /
    • pp.69-78
    • /
    • 2001
  • An electronic micropayment system, one of electronic payment systems, is suitable especially when a small amount of money is to be paid frequently in order to purchase on-line goods (i.e. database search, software distribution, electronic news service, etc). In addition, since the amount of payment is small, possible damages caused by system failures are lower than other payment system. In this paper, a micropayment protocol in electronic commerce environments on the Internet is proposed, based on the PayWord system. And a micropayment electronic commerce system which executes the protocol proposed is implemented. Unlike the PayWord system, however, the micropayment protocol proposed in this paper is designed in such a way that a merchant does not need to request a payment at the end of every business day since a customer cannot purchase goods beyond length of hash chains, which is specified on a certificate. In addition, the system is able to check the validity as well as the duplicate spending of hash chains. The electronic micropayment system with the proposed protocol is consists of Customers, Merchants, and Brokers. Customers are implemented on Windows NT 4.0 using VC++. Merchants are implemented on Solaris 2.5.1 and gcc 2.8.0 using Netscape Web Server and CGI Methods. HP UX 10.20 is used for Brokers.

  • PDF

Design and Implementation of Secure Vehicle Communication Protocols for WAVE Communication Systems (WAVE 통신 시스템을 위한 차량 보안 통신 프로토콜의 설계 및 구현)

  • Park, Seung-Peom;Ahn, Jae-Won;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.841-847
    • /
    • 2015
  • The WAVE(Wireless Access in Vehicular Environments) communication system supports wireless communication environments between vehicles. As the utilization of wireless communication has been increased, attack methods have been varied. There is a high risk on packet manipulations conducted by third party. In this paper, we have designed a secure communication protocol between CA and vehicles. Our designed protocol uses a ECIES(Elliptic Curve Integrated Encryption Scheme) for vehicle authentication and AES(Advanced Encryption Standard) algorithm for protecting packet integrity and confidentiality.

A Study On Forward Secure Mediated RSA Digital Signature (전방향 안전성을 갖는 RSA 전자서명 기법에 대한 연구)

  • Kim, Dae-Youb;Ju, Hak-Soo
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.123-128
    • /
    • 2007
  • Many service systems use Public Key Infrastructure (PKI) to protect the service. But there arc problems with the use of PKI. One of the problems is that some services would require a function instantaneously to check public kel certificate, but PKI does not satisfy such request. To solve the problem, Bouch et al. first proposed the concept of mediated RSA (mRSA). Then Gene Tsudik proposed 'weak' forward secure mRSA. In this paper, we analyze the weakness of these schemes and find the source of the vulnerabilitv. And we propose a new mRSA that is strong forward secure.

An Example of ISO 9001 Quality Management System based on BPM (BPM을 기반으로 한 ISO 9001 품질경영시스템 구축)

  • Kim Sang-Kuk;Shin Sung-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.4
    • /
    • pp.38-45
    • /
    • 2006
  • Most organizations adopt a process-based approach to manage their operations and now business process management(BPM) is a well-established concept. Because ISO 9001:2000 has been influenced by BPR and it also emphasizes process based, BPM can get together with ISO 9001:2000. Korea Institute of Science and Technology Information has taken ISO 9001:2000 certificate in November 11, 2003 and has implemented quality management systems based on BPM. We call it KQMS(KISTI Quality Management System). KQMS based on BPMS is a new example in field of ISO quality management and is expected to support process management well.

  • PDF

A Study on Network Security Modeling using Single Sign-On (Single Sign-On을 적용한 네트워크 보안 모델링)

  • 서희석;김희완
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.49-56
    • /
    • 2004
  • With the growing usage of the networks, the users in the Internet uses some kinds of web server. They confused that each web server uses the different user ID and passwords. To solve these problems, SSO (Single Sign-On) solution is introduced. We presents the modeling methods which are efficiently constructed the network management models. We constructed the intrusion detection systems and firewalls using the SSO. This architecture is efficient to manage the network usage and control. SSO solution designed on the small scale Intranet. CA server in the 550 that depends on PKI (Public Key Infrastructure) is used to issue the certificates. SHTTP based on SSL (Secure Socket Layer) is used to protect the data between certificate server and the intranet users.

  • PDF

Hash-Chain based Micropayment without Disclosing Privacy Information (사생활 정보가 노출되지 않는 해쉬체인 기반 소액지불시스템)

  • Jeong Yoon-Su;Baek Seung-Ho;Hwang Yoon-Cheol;Lee Sang-Ho
    • The KIPS Transactions:PartD
    • /
    • v.12D no.3 s.99
    • /
    • pp.499-506
    • /
    • 2005
  • A hash chain is a structure organized by hash function with high speed in computation. Systems using the hash chain are using extensively in various cryptography applications such as one-time passwords, server-supported signatures and micropayments. However, the most hash chain based on the system using pre-paid method provides anonymity but has the problem to increase payment cost. In this paper, we propose a new hash chain based on the micropayment system to keep user anonymity safe through blind signature in the withdrawal process of the root value without disclosing privacy information, and to improve efficiency by using secret key instead of public key in the system without the role of certificate.

Weighted Voting Game and Stochastic Learning Based Certificate Revocation for the Mobile Ad-hoc Network (이동 애드 혹 네트워크 환경에서 가중투표게임과 확률러닝을 이용한 악의적인 노드의 인증서 폐지 기법)

  • Kim, Min Jung;Kim, Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.7
    • /
    • pp.315-320
    • /
    • 2017
  • In this paper, I design a new scheme that is immune to malicious attack based on the weighted voting game. By using stochastic learning, the proposed scheme can revoke the certification of malicious node. Through the revocation process, the proposed scheme can effectively adapt the dynamic Mobile Ad hoc network situation. Simulation results clearly indicate that the developed scheme has better performance than other existing schemes under widely diverse network environments.

Analysis of Roles and Responsibilities of Housing Welfare Professionals in Fields (주거복지 현장의 전문인력 직무내용과 특성 분석)

  • Choi, Byungsook;Kwon, Oh Jung;Yang, Sehwa;Eun, Nan Soon
    • Journal of the Korean housing association
    • /
    • v.26 no.1
    • /
    • pp.129-137
    • /
    • 2015
  • The study aimed to analyze roles and responsibilities of housing welfare professionals in fields in order to provide directions of the Housing Welfare Professional Certificate program operated by the Korean Housing Association. In October 2013, a series of interviews were performed to five housing welfare professionals in local governments, public enterprises and private organizations in order to explore field cases. Additionally, administrative works related to housing welfare were explored based on information from local government websites. It was found that roles and responsibilities of housing welfare professionals included a wide range of works such as provisions and management of public rental housing, housing counseling, investment and analysis of residential environment, exploring resources, education, and improvement of poor-condition housing and urban environment. In order for more efficient and effective provisions of housing welfare services, it was suggested to improve housing welfare service delivery systems and to make clear definition of job ranges, and knowledges and experiences required to be housing welfare professionals.

A Study on The Vulnerabilities and Problems of Security Program (보안 프로그램의 취약성 및 문제점에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.77-84
    • /
    • 2012
  • Recent Security Programs are widely used to improve the security of Client Systems in the Web authentication. Security Program is provide the function of the Keyboard Security and Certificate Management, Vaccines, Firewall. in particular, This Security Program has been used Financial Institutions and Government Agencies, and some private corporate Home Page. and ActiveX is used to install the Security Program. but Security Programs caused by several security vulnerabilities and problems as they appear, are threat to the stability of the Client System. Therefore, This paper will be analyzed through Case Studies and Experiments to the Vulnerabilities and Problems of Security Program and This Is expected to be utilized to further improve the performance of the Security Program and the building of a new Certification Scheme for material in the future.