• Title/Summary/Keyword: confidentiality

Search Result 698, Processing Time 0.026 seconds

A Proposal of the Security System for the next Generation Mobile Telecommunication System

  • Park, Young-Ho;Lee, Hoon-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.4
    • /
    • pp.149-153
    • /
    • 1999
  • This paper proposes a new security system for the next generation mobile telecommunication system The system is based on the network domain security of the 3GPP. The system provides confidentiality and integrity services in the RLC layer, the second layer of 3GPP. Our system has merits in that it can provide security services without any modification to the 3GPP protocol and has low transmission voerhead. Security algorithm and mode are controlled by the RRC layer, the third layer of 3GPP.

  • PDF

On the Security Enhancement of the OTAR Protocol and Cryptosystems (무선 키 갱신 프로토콜 OTAR의 암호 시스템 개선 방안)

  • Lee HoonJae;Lee SangGon;Park Jongwook;Yoon JangHong
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.31-43
    • /
    • 2005
  • OTAR system is a highly authentic key management system that has functions with access control. data integrity and data confidentiality, In this paper, we analyze the existing TIA/EIA Over-The-Air-Rekeying key managements protocol. focused to symmetric ciphers. It can be used to understand the technical trend on technologies about TIA/EIA OTAR standardization. This results can be used to evaluate security properties of a remote rekeying, The proposed system contains a highly reliable system synchronization.

  • PDF

NIST SP 800-57 키 관리 가이드라인 분석

  • Lee, Jin-Woo;Kwak, Jin;Yang, Hyung-Kyu;Won, Dong-Ho
    • Review of KIISC
    • /
    • v.14 no.2
    • /
    • pp.57-77
    • /
    • 2004
  • 최근, 인터넷의 보급이 일반화되면서 네트워크를 통해 다양한 전자상거래 서비스가 활성화되고 있다. 이러한 서비스는 전송되는 정보의 기밀성(confidentiality), 인증(authentication), 무결성(integrity), 부인봉쇄(non-repudiation)등의 정보보안 서비스를 제공하기 위해 암호기술이 요구된다. 이러한 암호기술의 안전성은 공개되어 있는 암호 알고리즘에 의존하는 것이 아니라, 암호 알고리즘에 사용된 키에 의해 좌우된다. 또한, 암호통신을 이용하는 개체가 증가함에 따라, 효율적인 키 관리의 필요성도 함께 증가하고 있다. 이에 본 고에서는 키 관리의 전반적인 개요와 효율적이고 안전한 키 관리를 위해 2003년도에 NIST에서 발표된 SP(Special Publication) 800-57 키 관리 가이드라인을 분석한다.

Intention to Use of Personal Cloud Services: Focusing on the Security Factors (보안요인을 중심으로 한 개인용 클라우드 서비스 사용의도)

  • Lee, Jae Seok;Kim, Kyoung-jae
    • Knowledge Management Research
    • /
    • v.18 no.4
    • /
    • pp.237-260
    • /
    • 2017
  • Recently, with the proliferation of smart phones and mobile devices and the increase in the speed of mobile Internet, IT services are increasingly used in smart phones and mobile devices in a different way from the past. That is, a cloud service that downloads and uses data stored in the server in real time is expanding, and as a result, the security due to the continuous Internet connection of the user becomes a problem. In this study, we analyzed the relationship between factors affecting the continuous use of personal cloud service by using technology acceptance model. In addition to the technology acceptance model, confidentiality, privacy, accessibility, innovation, and self-efficacy were extracted from the existing research with emphasis on the characteristics of the cloud service and security factors. Moreover, the difference of intention to use among genders was verified through structural equation modeling with survey data from 262 personal cloud service users.

Secure Steganographic Model for Audio e-Book Streaming Service (오디오 e-Book 스트리밍을 지원하는 스테가노그래피 모델)

  • Lee, Yun-Jung;Lee, Bong-Kyu;Kim, Chul-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5878-5884
    • /
    • 2011
  • We present steganographic service model and algorism that fit feature of streaming audio book service in order to hide information of copyright and certificate of it. Secret information is encrypted with random numger by secret key that client and server share, so that increase confidentiality. We made secret data distributed randomly and evenly, and improved throughput by simplifying additional computations considering streaming environment.

An Enhanced Description Assistant for SOAP Message Exchange in SOA

  • Hung, Pham Phuoc;Byun, Jeong-Yong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.336-339
    • /
    • 2011
  • When SOAP messages carry vital business information, their integrity and confidentiality needs to be preserved. Concerns have been raised due to XML Rewriting attacks on SOAP message which create a foundation for typical faults in SOAP messages and make it vulnerable to use in Web Service environment. We have already provided a solution to tackle this problem on integrity of SOAP messages in earlier works by proposing a system called System Description Assistant. That system was able to identify and fix typical faults in SOAP messages. This paper mainly reflects future directions of our previous researches and enhances previous ones by adding more comprehensive functions to detect and possibly fix faults occurred due to XML rewriting attacks.

A Study on Decommission Cost Estimation Framework with Engineering Approach (공학적 접근을 통한 해체비용 산정 프레임워크에 대한 고찰)

  • Lee, Sun Kee
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.8 no.2
    • /
    • pp.57-67
    • /
    • 2012
  • It is the sensitivity and confidentiality of nuclear power plant decommissioning cost that prevent detailed cost information to be released to the public, which causes some limitation to analyze and reuse the costs. This limitation to access cost information means that the lessons learned from preceding cost estimating may not systematically feed back into following cost estimates. As an alternative, decommissioning cost estimation framework is indispensable to reflecting available experience and knowledge for decommission costs. This study provides the cost estimation framework including data flow and structuralization based on engineering and bottom up approach to enhance decommissioning cost estimation.

Adaptation of Secure Algorithm of Short Messaging Services(SMS) on CDMA Network (CDMA에서 단문 메시지 서비스(SMS)의 보안 적용 알고리즘)

  • Kim Yoon
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.8
    • /
    • pp.30-37
    • /
    • 2006
  • At the present, Short Messaging Transfer Protocol Standard described under TIA/EIA/IS-637-A does not cover the measures for security at all. Sequentially, in case of necessity, it seems to be a better idea that security functions are made up for current short messaging transfer protocol. This paper proposes security mechanisms including algorithms and protocols for Short Messaging Services(SMS) which present not only high levels of confidentiality and integrity but also appropriate level of authentication.

  • PDF

Functional Requirements of Data Repository for DMP Support and CoreTrustSeal Authentication

  • Kim, Sun-Tae
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.1
    • /
    • pp.7-20
    • /
    • 2020
  • For research data to be shared without legal, financial and technical barriers in the Open Science era, data repositories must have the functional requirements asked by DMP and CoreTrustSeal. In order to derive functional requirements for the data repository, this study analyzed the Data Management Plan (DMP) and CoreTrustSeal, the criteria for certification of research data repositories. Deposit, Ethics, License, Discovery, Identification, Reuse, Security, Preservation, Accessibility, Availability, and (Meta) Data Quality, commonly required by DMP and CoreTrustSeal, were derived as functional requirements that should be implemented first in implementing data repositories. Confidentiality, Integrity, Reliability, Archiving, Technical Infrastructure, Documented Storage Procedure, Organizational Infrastructure, (Meta) Data Evaluation, and Policy functions were further derived from CoreTrustSeal. The functional requirements of the data repository derived from this study may be required as a key function when developing the repository. It is also believed that it could be used as a key item to introduce repository functions to researchers for depositing data.

Mutual Authentication Protocol Using a Low Power in the Ubiquitous Computing Environment

  • Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.91-94
    • /
    • 2004
  • Ubiquitous sensor network is to manage and collect information autonomously by communicating user around device. Security requirements in Ubiquitous based on sensor network are as follows: a location of sensor, a restriction of performance by low electric power, communication by broadcasting, etc. We propose new mutual authentication protocol using a low power of sensor node. This protocol solved a low power problem by reducing calculation overload of sensor node using two steps, RM(Register Manager) and AM(Authentication Manager). Many operations performing the sensor node itself have a big overload in low power node. Our protocol reduces the operation number from sensor node. Also it is mutual authentication protocol in Ubiquitous network, which satisfies mutual authentication, session key establishment, user and device authentication, MITM attack, confidentiality, integrity, and is safe the security enemy with solving low electric power problem.

  • PDF