• Title/Summary/Keyword: confidentiality

Search Result 694, Processing Time 0.025 seconds

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

A Study on Concept Design of Customized Gripper for Assembly Process of IT Products (IT 제품의 조립 공정 맞춤형 그리퍼 개념 설계에 관한 연구)

  • Kim, Hyeon-Guk;Hwang, Soon-Woong;An, Bo-Young;Heo, Jun-Hyung;Choi, Youn-Sung;Shin, Kyoo-Sik;Han, Chang-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.644-652
    • /
    • 2018
  • This paper describes the conceptual design of a customized gripper for the assembly process of IT products, which has a relatively short and regular product replacement cycle. The grippers that are used in the manufacturing field are mostly composed of one to two degrees of freedom and they can only handle one object, not multiple ones. Cost is also an important factor. If it were possible to develop a gripper suitable for the assembly process quickly and easily, some of the difficulties involved in its automation caused by the frequent changes of product and process could be solved. The assembly process utilized for this research is defined and described as the procedure and method of the process analysis due to the confidentiality of the manufacturer. We used an axiomatic design to derive the functional requirements and design parameters of the gripper used for the tablet PC assembly process. We proposed a design method for the conceptual design of the gripper by determining these parameters. For the feasibility study, a specific process was selected and the progress of the gripper design was described as an example. Although there have been studies on the design guidelines for grippers, their considerations are too general and their degree of freedom is too high. This paper defines the function of the gripper based on the assembly process of the IT products, which allows their production to be streamlined and automated. In this research, we attempted to produce a design that reflects the assembly process, not just one that enables objects to be held.

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.

Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry (전력 SCADA 시스템의 사이버 보안 위험 평가를 위한 정량적 방법론에 관한 연구)

  • Kang, Dong-Joo;Lee, Jong-Joo;Lee, Young;Lee, Im-Sop;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.445-457
    • /
    • 2013
  • This paper is about the study to build a quantitative methodology to assess cyber threats and vulnerabilities on control systems. The SCADA system in power industry is one of the most representative and biggest control systems. The SCADA system was originally a local system but it has been extended to wide area as both ICT and power system technologies evolve. Smart Grid is a concept to integrate energy and IT systems, and therefore the existing cyber threats might be infectious to the power system in the integration process. Power system is operated on a real time basis and this could make the power system more vulnerable to the cyber threats. It is a unique characteristic of power systems different from ICT systems. For example, availability is the most critical factor while confidentiality is the one from the CIA triad of IT security. In this context, it is needed to reflect the different characteristics to assess cyber security risks in power systems. Generally, the risk(R) is defined as the multiplication of threat(T), vulnerability(V), and asset(A). This formula is also used for the quantification of the risk, and a conceptual methodology is proposed for the objective in this study.

Analysis of the Effects of Common Criteria Certification on the Information Security Solutions (CC인증이 정보보호 솔루션의 보안성에 미치는 영향 분석)

  • Hong, Young Ran;Kim, Dongsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.57-68
    • /
    • 2012
  • As the functions and technology of IT security solution has been diversified and complicated, it is necessary to make the functions standardized. The common criteria (CC) evaluation and certification scheme was introduced with this background in 2000. For over 10 years after the introduction of CC evaluation and certification scheme, many security solution vendors have developed functions following the security functional requirement in CC. Most of CC evaluators and developers think that CC has helped to enhance the security of the solution. So, it is a right time to prove the affirmative effects of CC in quantity. In this research, we compare two cases, the security status of the solution before and after the experience of CC evaluation, and analyze the results. We made the questionnaire for the domestic solutions vendors. We show that CC has made positive effects on the security of the solution quantitatively using statistical analysis. This research is meaningful security enhancement of domestic security solutions.

A Study on the System of the Arbitration Act Enforcement Ordinance (중재법시행령(안)의 체계에 관한 고찰)

  • Nam, Seon-Mo
    • Journal of Arbitration Studies
    • /
    • v.24 no.1
    • /
    • pp.3-24
    • /
    • 2014
  • The Arbitration Act of Korea entered into force on December 31, 1999. It was modeled after the UNCITRAL Model Arbitration Law to meet the goal of the internationalization of the arbitration system of South Korea mainly in terms of the System (Alternative Dispute Resolution) Act. In general, a hearing of arbitration is made up of an arbitrator, claimant, and respondent. This is accomplished in a single core. The advantages of arbitration are low cost and confidentiality. In addition, there is the participation of experts and rapidity with a single core agent. However, under the current Arbitration Act, there is no provision expressly relating to the qualifications of arbitrators. This should be accomplished by the arbitration act enforcement ordinance. Following specific details of the 'party' in conjunction with all the provisions of the Arbitration Act, Article 1 should be revised in a timely manner so that "conflict of private law" covers cases in which a dispute between the parties is desirable. In addition, in Article 3 the phrasing of "also dispute 'judicial'" should be revised to over disputes between parties. Furthermore, the provisions of Article 40 are described in the Supplement and so it is preferable to address Supplementary Delete. In addition, this study will analyze ADR in Japan and present a plan to establish a law to resolve disputes outside of court in that country. Therefore, the objective of this study is to assist in the study of legislating fundamental law for alternative dispute resolution. In spite of this, there are many in business and academia who would like to modify the arbitration system in South Korea to improve its function. There is much interest in accomplishing this,so proposals for legislation should continue to be made.In order to accomplish this, the arbitration systems of developed countries such as the United States can be used as a model. It can be seen that despite the idea that the parties involved engage in arbitration autonomously, many elements of the process from the selection of the arbitrator of the arbitral tribunal are specified in legislation and thus it is necessary to develop legislation that will allow arbitration to perform its intended function. Any given arbitral tribunal can be specialized, typically in a case an arbitrator who is an expert in the field is selected. This helps to avoid complaints concerning the results of the arbitration. In the case of international arbitration, however, this provision is often not employed and instead it is necessary to provide a Schedule and Supplement concerning international arbitration. Finally, the promotion of the enactment of the Arbitration Law Enforcement Ordinance must be a top priority in order to ensure proper implementation of the arbitration law.

  • PDF

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.

How is it possible to use the human body material for research without the written consent of the donor? (바이오뱅크 내 동의서 없는 폐기용 인체유래물 자원의 재활용을 위한 정당성 모색)

  • JEONG, Chang Rok;HEO, Eusun
    • The Korean Society of Law and Medicine
    • /
    • v.18 no.1
    • /
    • pp.199-235
    • /
    • 2017
  • A topic of particular interest for biotech researchers are handling of human tissue specimens that may be used for present, or stored for future, research purposes. This article examines the ethical and legal legitimacy of using human materials for research purposes with special attention to the issues of informed consent and confidentiality. The purpose of this paper is moral and for law legitimacy exploring of the utilization of the human material without donator's consent. It is a known fact that future medical care should be exchanged a paradigm by preventive health care through a human meterial research. The developed country have established a biobank for a human meterial research and supported a researcher. Korea is the same, too. When it is done a defect, as for the thing researcher derived from the Korean human meterial research. The written consent of the donator can keep a human meterial research origin thing, but cannot use it now. I will justify morally and for law that researcher can use the human material without written consent. We can change the concept of recycling of human material. It is not mean only burning that recycling of human materials for research.

  • PDF

Requisites for Adopting Electronic Payment Systems in International Trade Transactions (국제무역거래에서의 전자결제시스템 도입에 따른 과제)

  • Kyung, Yeun-Beom
    • The Journal of Information Technology
    • /
    • v.6 no.4
    • /
    • pp.147-162
    • /
    • 2003
  • The technique of information-communication rapidly developed has made it possible for us to do business through Internet. Electronic commerce was increased rapidly by the explosive development of the inter and communication revolution. E-Commerce has created a fundamentally new way of conduction and will change drastically accepted ways of doing business. Normally international trade has been formulated in a way that exporters and importers meet face-to-face and contract and pay by letter of credits. For the global electronic commerce to vitalized, the outstanding matters should encourage the creation of infrastructure of information security and new models in the field of electronic payment systems, electronic commerce agreement for remedy, adapting electronic date interchange in transport documents and negotiability of electronic bills of lading. The payment systems such as electronic fund transfers, tradecard system and electronic letters of credits issued by SWIFT system permit the parties concerned(sellers, buyers ad service providers) to settle payment electronically. Still they are many limitations for complete international electronic transactions. The following measures have to be taken to vitalize electronic trade transactions. It is needed to acquire information security such as authenticity, integrity, non-repudiation and confidentiality. All kinds of documents need to be replaced by electronic date exchange and the legal structure of international convention, national law for electronic payment systems have to be completed. Also a detailed guide of the banking operation and developing rules for electronic letters of credits need to be provided to adopt eUCP rules for the electronic presentation of documents.

  • PDF

A study on the proposed amendment bill of Bioethics and Safety Law (2010): focusing on the meaning of significant contents related to the clinical research ("생명윤리 및 안전에 관한 법률" 전부개정안의 내용과 의의: 임상연구와의 관계를 중심으로)

  • Kim, Eun-Ae
    • The Korean Society of Law and Medicine
    • /
    • v.12 no.1
    • /
    • pp.99-131
    • /
    • 2011
  • To strengthen the protection of human research subjects and human materials, the Korean Ministry of Health and welfare proposed the amendment bill of Bioethics and Safety Law(2010) to the Congress. It includes so many meaningful clauses. According to the bill, the scope that this act shall apply will be expended to the research involving human subjects and human materials. In the bill, there are the principles of this act; the protection of the life, health, and dignity of the human subjects, the obtaining of the adequate informed consent, the protection of the human subject's information confidentiality and the human subject's privacy, the assessment and minimizing of the risks involved and the guarantee of the safety for the human subjects, the preparation of the special protection program for the vulnerable human subjects, and so on. According to the bill, Institutional Bioethics Review Board(the same as Institutional Review Board) will be responsible for the auditing and monitoring on the research that was approved by IBRB, conducting the education program for the researchers, IBRB members and administrative staffs, preparing of the special protection program for the vulnerable human subjects, and forming the guidelines for the researchers as well as the review of the research protocols. And the State and local governments shall take necessary measures to support the expending of the social infrastructure. In addition to, IBRB will have to be assessed and to be gained the accreditation by the Korean Ministry of Health and welfare. So, if Bioethics and Safety Law is amended, it will contribute enormously to enhance the level of the human research subjects protection. Also, if this Law is amended, IBRB will play a major role for the conduct of the ethically, scientifically, and legally proper research. But now, as a matter of fact, the capability of IBRB members and IBRB office members is not enough to charge of this role because some people and some organizations does not know the importance of IBRB exactly. In spite of, IBRB shall be able to this role to protect the human subjects and to develop the level of the research On the international level. Therefore, the State, local governments and the Organization shall back up the administrative and financial terms of the IRB and IRB Office.

  • PDF