• Title/Summary/Keyword: confidentiality

Search Result 694, Processing Time 0.028 seconds

The Design and Implementation of Secure XML Messaging System (안전한 XML 메시징 시스템 설계 및 구현)

  • 이영교;안경림
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.9
    • /
    • pp.1233-1238
    • /
    • 2001
  • Security is very important at EC(Electronic Commerce) Environments. The reason is that exchanged data(that is user private information(accounts, card-no, password), transaction items, etc) is various and is very sensitive. In this paper, we propose the Secure-XML Messaging System(S-XMS) which is implemented to support Message Level Security, Encryption and Digital Signature. And we implement Message Confidentiality Service, User Authentication & Message Integrity Service and Non-Repudiation Service among the various Security Services.

  • PDF

A Legal study on the Internet Electronic Commerce Contract (인터넷 전자상거래계약(電子商去來契約)에 관한 법적(法的) 고찰(考察))

  • Han, Sung-Il
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.14
    • /
    • pp.397-426
    • /
    • 2000
  • Since the internet is open to public in 1990, electronic commerce(EC) user has increase rapidly. Now EC is considered not only as communication method but also as new economical activities. EC is a kind of new commerce model which uses electronic means. And EC has global characteristics so that many country's legislation which regulates it differently makes an obstacle to vital of EC. The purpose of this study is to examine legal problems of internet electronic commerce. First, there are some legal problems whether electronic document has same legal function like traditional documents. Second, electronic signature must has authenticity, integrity, non-repudiation, writing and confidentiality in order to use looks like common signature. Finally, electronic contract is concluded on principle of mutual agreement. It is apparent that the concept of arrival is applied to the date and place in conclusion of electronic contract.

  • PDF

Security Attacks and Challenges of VANETs : A Literature Survey

  • Quyoom, Abdul;Mir, Aftab Ahmad;Sarwar, Abid
    • Journal of Multimedia Information System
    • /
    • v.7 no.1
    • /
    • pp.45-54
    • /
    • 2020
  • This paper presented a brief introduction along with various wireless standards which provide an interactive way of interaction among the vehicles and provides effective communication in VANET. Security issues such as confidentiality, authenticity, integrity, availability and non-repudiation, which aims to secure communication between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). A detailed discussion and analysis of various possible attacks based on security services are also presented that address security and privacy concern in VANETs. Finally a general analysis of possible challenges is mentioned. This paper can serve as a source and reference in building the new technique for VANETs.

A Characteristic Analysis of High Pressure and High Temperature 3-way Ball Valve (고온.고압용 3-way 볼밸브의 특성해석)

  • Lee, Joon-Ho
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.11 no.4
    • /
    • pp.180-184
    • /
    • 2012
  • 3-way ball valves have been mostly used for high temperature/high pressure valves using in petrochemical carriers and oil tankers, which requires high quality products with confidentiality and durability. As a larger disaster may be generated by leakage of oil or gas from valves, thus the present research applied a numerical analysis method with thermal-structural coupled field analysis and the performance test. The Max stress by parts was confirmed through thermal-structural coupled field analysis and develop the 3-way ball valve design, which is safe on operating condition. And its performance was verified by carrying out pressure test, leakage test and durability test for the manufactured 3-way ball valves with satisfying it's regulations.

An Analysis on Online Social Network Security

  • Rathore, Shailendra;Singh, Saurabh;Moon, Seo Yeon;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.196-198
    • /
    • 2016
  • Online social networking sites such as MySpace, Facebook, Twitter are becoming very preeminent, and the quantities of their users are escalating very quickly. Due to the significant escalation of security vulnerabilities in social networks, user's confidentiality, authenticity, and privacy have been affected too. In this paper, a short study of online social network attacks is presented in order to identify the problems and impact of the attacks on World Wide Web (WWW).

The Implementation of A XML/PKI based Digital Tax Invoice System (XML/PKI기반의 전자세금계산서 시스템 구현)

  • Kim, Jin-Cheol;Oh, Young-Whan
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.85-98
    • /
    • 2004
  • As the e-Commerce based on the XML technology is getting bigger, user authentication, integrity, non-repudiation and confidentiality has become important for security. Since the XML technology is widely used for exchanging information among the Internet e-business systems, the security of XML documents is essentially required and XML digital signature should be supported. To support the digital signature of XML documents, W3C proposed the XML-Signature specification as an international standard that describes five transform algorithms. In this paper, we design and implement a XML/PKI based digital tax invoice system. Our system supports the five transforming algorithms defined in the XML-Signature specification and exchanges digital tax invoices among enterprises securely. We design and implement the flexible and efficient system consists of reusable components using CBD(Component Based Development).

Study of Standard Technology for Web Service Message Security (웹 서비스 메시지 보안을 위한 표준 기술 연구)

  • Cha, Suk-Il;Kim, Hyun-Hee;Lee, Hyung-Suk;Shin, Dong-Kyoo
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2002.11a
    • /
    • pp.374-378
    • /
    • 2002
  • 웹을 이용한 서비스는 위와 같은 여러 장점을 가지고 있지만 각종 데이터 및 문서가 웹 상에 존재하므로 가상공간에서의 문서의 처리가 위조나 변경이 가능하다. 이러한 웹 상에서의 전송 시 발생할 수 있는 수많은 역기능들을 줄일 수 있는 가장 강력한 방법은 암호 응용 기술을 전자상거래 시스템 구축에 사용함으로써, 기밀성(confidentiality), 무결성(integrity), 인증(authentication) 등의 보안 서비스를 제공하는 것이다. 이에 본 논문에서는 현재 진행중인 표준화 단체의 동향을 파악하고 WS-Security 명세서를 통해 웹 서비스 보안의 전반적인 기술을 분석한다.

  • PDF

A Key Recovery Protocol for Cryptographic Communication on Public Key Infrastructure (공개키 기반 구조의 암호 통신을 위한 키 복구 프로토콜)

  • 전은아;유형준;이강수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.294-296
    • /
    • 1999
  • 인터넷의 사용 증가와 더불어 보안의 중요성이 증가되면서, 인터넷을 통한 전자상거래에서의 안전성 및 신뢰성 확보를 위한 기술의 필요성이 커지게 되었다. 두 사용자간의 안전한 문서의 전송과 상호 인증을 보장은 국가 기관이나 산업계, 또는 개인이 인터넷을 이용한 안전한 통신을 가능하게 한다. 정보보호 기술의 중요 요소로 부각되고 있는 공개키 기반 구조(PKI: Public Key Infrastructure)는 인증(authentication), 기밀성(confidentiality), 무결성((integrity), 부인봉쇄(non-repudiation)등의 보안의 기본요소를 제공하고 있다. 공개키 기반 구조에서의 공개키/개인키쌍은 상대방에 대한 신뢰와 자신의 정보 보호를 위한 사용되는 도구이며, 이 키를 잃어 버릴 경우 암호 및 인증 서비스를 제공받을 수 없게 된다. 이를 위한 대비책으로 키 복구 기술(key recovery agent)이 필요하게 되었다. 우리는 본 연구를 통해서 키 복구 기술을 적용한 키 복구 시스템을 개발하였으며, 이를 통해서 키 복구 시스템의 프로토콜을 제안하고 검증하였다.

  • PDF

A Study on An Architecture of the Security improved Document DRM for preventing Information Leakage in Military Information System Environment (국방 정보시스템 환경에서 정보유출 방지를 위한 보안성이 강화된 문서 DRM 설계에 관한 연구)

  • Eom, Jung Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.41-49
    • /
    • 2011
  • We designed a security improved document DRM for protecting document based military information which is transmitted in the military information system environment. The user should be could not access document which not related to his/her role and duty, and must view the only document appropriate for his/her role and security level according to the security level of document. We improved the security of document DRM by adding to the access control module in DRM server. Our system allows operation mode authorizations for the document, considering the user's role & security level and the security level of document. And it prevents indiscriminate access to the document and damage the confidentiality and integrity of information.

A Study on Improving the Security Vulnerabilities of Modbus-Based SCADA Control Systems (Modbus 기반 SCADA 제어 시스템의 보안 취약성 향상에 관한 연구)

  • Cagalaban, Giovanni A.;Kim, Seok-Soo;Ha, Kyung-Jae
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.421-424
    • /
    • 2009
  • SCADA control systems and protocols are developed based on reliability, availability, and speed but with no or little attention paid to security. Specifically in Modbus protocol, there are inherent security vulnerabilities in their design. The lack of common security mechanisms in the protocol such as authentication, confidentiality and integrity must be addressed. In this paper, security vulnerabilities of Modbus-based SCADA controls systems will be studied. An in-depth analysis of the message frame formats being sent between master and slave will be discussed to expose the security vulnerabilities. This will enable SCADA users to find ways to fix the security flaws of the protocol and design mitigation strategies to reduce the impact of the possible attacks. Security mechanisms are recommended to further enhance the security of SCADA control systems.

  • PDF