• Title/Summary/Keyword: confidentiality

Search Result 698, Processing Time 0.023 seconds

A Study on Safe Identification Card Using Fingerprint Recognition and Encrypted QR (지문인식기술과 암호화된 QR코드를 이용한 안전한 신분증 연구)

  • Song, Chung-Geon;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.317-323
    • /
    • 2014
  • The registration cards that are currently used to identify the people of Korea may cause secondary damage once stolen because they contain very specifically expressed fingerprint information. In order to solve this problem, in ID is required that can utilize the state-owned fingerprint DB, while while maintaining confidentiality of the identification information and satisfying the cost as well. At this point accordingly, a secure form of ID, which uses the encrypted QR code and fingerprint information, is proposed.

A Study on Simulation-Based Worm Damage Assessment on ATCIS (시뮬레이션 기반 육군전술지휘정보체계 웜 피해평가에 관한 연구)

  • Kim, Ki-Hwan;Kim, Wan-Ju;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.43-50
    • /
    • 2008
  • The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. But, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.

Sutdy of transaction protection by certificate and OTP (공인인증서와 OTP를 이용한 트렌젝션 보호에 관한 연구)

  • Kim, Nack-Hyun;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.618-620
    • /
    • 2010
  • We are using a certificate, OTP(One Time Password), Security Card etc. for safety on E-commerce. However, These are not perfectly protect Confidentiality, integrity, user authentication, and nonrepudiation. In this paper, we are proposed authentication scheme by certificate and OTP.

  • PDF

A Study for Feature Selection in the Intrusion Detection System (침입탐지시스템에서의 특징 선택에 대한 연구)

  • Han, Myung-Mook
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.87-95
    • /
    • 2006
  • An intrusion can be defined as any set of actors that attempt to compromise the integrity, confidentiality and availability of computer resource and destroy the security policy of computer system. The Intrusion Detection System that detects the intrusion consists of data collection, data reduction, analysis and detection, and report and response. It is important for feature selection to detect the intrusion efficiently after collecting the large set of data of Intrusion Detection System. In this paper, the feature selection method using Genetic Algorithm and Decision Tree is proposed. Also the method is verified by the simulation with KDD data.

  • PDF

RFID Technology in Health Environment Opportunities and Challenges for Modern Cancer Care

  • Safdari, Reza;Maserat, Elham;Maserat, Elnaz
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.12
    • /
    • pp.6533-6537
    • /
    • 2012
  • Cancers are significant contributors to the mortality and health care expenditures. Cancer can be reduced and monitored by new information technology. Radio frequency identification or RFID is a wireless identification technology. The use of this technology can be employed for identifying and tracking clinical staff, patients, supplies, medications and equipments. RFID can trace and manage chemotherapy drugs. There are different types of RFID. Implantable RFID allowing a chip to be embedded under the skin and that store the cancer patient's identifier. These are concerns about applications of RFID. Privacy, security and legal issues are key problems. This paper describes capabilities, benefits and confidentiality aspects in radio frequency identification systems and solutions for overcoming challenges.

Analysis of the Dependability of Voting and Group Management In the Intrusion Tolerant Technology (침입감내기술에서의 Voting 및 그룹관리 신뢰성 분석)

  • 이태진;김형종;이강신
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.1-6
    • /
    • 2004
  • Intrusion tolerant technology is the technology to guarantee the Quality of service for certain amount time from the attacks which cannot be defended by the previous information security technologies. It increases the availability and confidentiality of the system by minimizing the damage from the attacks. And the fundamental components of the intrusion tolerant technology are voting and GMP(Group Management Protocol). In this paper, we present a new scheme to analyze the voting dependability and corrupt member detection dependability, which is very critical in GMP. Based on this scheme, we can make a new security policy and the methodology of analyzing the dependability itself also can be applicable to the other field.

  • PDF

A Reliable Secure Storage Cloud and Data Migration Based on Erasure Code

  • Mugisha, Emmy;Zhang, Gongxuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.436-453
    • /
    • 2018
  • Storage cloud scheme, pushing data to the storage cloud poses much attention regarding data confidentiality. With encryption concept, data accessibility is limited because of encrypted data. To secure storage system with high access power is complicated due to dispersed storage environment. In this paper, we propose a hardware-based security scheme such that a secure dispersed storage system using erasure code is articulated. We designed a hardware-based security scheme with data encoding operations and migration capabilities. Using TPM (Trusted Platform Module), the data integrity and security is evaluated and achieved.

A Field Investigation of Defect Type for Development of Maintenance Manual of Han-ok (한옥 유지관리매뉴얼 개발을 위한 결함 유형 현장 조사)

  • Lee, Jong Shin;Choi, Gwang Sik;Yang, Jeong Moo
    • Journal of the Korea Furniture Society
    • /
    • v.24 no.3
    • /
    • pp.302-308
    • /
    • 2013
  • To collection of field data for development of maintenance manual of Han-ok, we investigated defects which occurred in members of Han-ok by field investigation. The noticeable defects were wood cracks, gaps that developed between wood pillar and wall or wood window frame and tenon joints. The most common biological defect was blue stain which was created in log. The mold generation was observed on exterior wood and wall which get wet by precipitation. The gaps between members of Han-ok pointed out as defect that is urgently improved by residents of Han-ok. The reason is mainly due to poor of insulation in winter by bad confidentiality. The maintenance work of defect such as gap was conducted personally. As a result, the repair parts were ugly for unfamiliar repair work.

  • PDF

Development of Miniature Quad SAW Filter Bank based on PCB Substrate

  • Lee, Young-Jin;Kim, Chang-Il;Paik, Jong-Hoo
    • Transactions on Electrical and Electronic Materials
    • /
    • v.9 no.1
    • /
    • pp.33-37
    • /
    • 2008
  • This paper describes the development of a new $5.0{\times}3.2mm$ SAW filter bank which is consist of 12 L, C matching components and 4 SAW bare chips on PCB substrate with CSP technology. We improved the manufacturing cost by removing the ceramic package through direct flip bonding of $LiTaO_3$ SAW bare chip on PCB board after mounting L, C passive element on PCB board. After that we realized the hermitic sealing by laminating the epoxy film. To confirm the confidentiality and durability of the above method, we have obtained the optimum flip bonding & film laminating condition, and figured out material property and structure to secure the durability & moisture proof of PCB board. The newly developed super mini $5.0{\times}3.2mm$ filter bank shows the superior features than those of existing products in confidence, electrical, mechanical characters.

Factors Influencing Barriers to addressing Patients' Sexual Health among Clinical Nurse (임상간호사의 성건강 간호 장애감에 영향을 미치는 요인)

  • Kim, Jung-Hee
    • Korean Journal of Adult Nursing
    • /
    • v.22 no.2
    • /
    • pp.113-120
    • /
    • 2010
  • Purpose: The purpose of this study is to examine the factors influencing the barriers faced by Korean nurses in addressing the patients' sexual health. Methods: The subjects in this study were nurses working at hospitals in Seoul and Jeonju. The data for this study were collected between November 2008 and December 2008. The subjects were assured of anonymity and confidentiality. Results: The barriers to addressing the patients' sexual health were moderate in the subjects. The nurses had moderate sexual knowledge and communication skills. In a stepwise regression analysis, the areas of work, communication skills, participation in sexual health training, and experience in Obstetrics and Gynecology accounted for 18.3% of the variance of the barrier for addressing the patients' sexual health. Conclusion: These findings emphasize the need for the development of a patient-centered sexual health-related curriculum for nurses, which has been briefly discussed in Korea. An educational program that improves the nurses' communication skills will be effective in reducing the barriers to addressing the patients' sexual health and will help the nurses become sexual health specialists.