• Title/Summary/Keyword: content integrity

Search Result 188, Processing Time 0.024 seconds

Design and Implementation of a Secure E-Mail System using Elliptic Curve Cryptosystem (타원곡선 암호 시스템을 이용한 보안 메일 시스템의 설계 및 구현)

  • Lee, Won-Goo;Kim, Sung-Jun;Lee, Hee-Gyu;Mun, Ki-Young;Lee, Jae-Kwang
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.333-345
    • /
    • 2002
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. It has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mail system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design and implement secure mail system with secure key agreement algorithm, non-repudiation service, and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

A Transformation Technique for Constraints-preserving of XML Data (XML 데이터의 제약조건 보존을 위한 변환 기법)

  • Cho, Jung-Gil;Keum, Young-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.1-9
    • /
    • 2009
  • Many techniques have been proposed to store efficiently and query XML data. One way achieving this goal is using relational database by transforming XML data into relational format. But most researches only transformed content and structure of XML schema. Although they transformed semantic constrainment of XML schema, they did not all of semantics. In this paper, we propose a systematic technique for extracting semantic constrainment from XML schema and storing method when the extracting result is transformed into relational schema without any lost of semantic constrainment. The transforming algorithm is used for extracting and storing semantic constrainment from XML schema and it shows how extracted information is stored according to schema notation. Also it provides semantic knowledges that are needed to be confirmed during the transformation to ensure a correct relation schema. The technique can reduce storage redundancy and can keep up content and structure with integrity constraints.

Detection algorithm of ionospheric delay anomaly based on multi-reference stations for ionospheric scintillation

  • Yoo, Yun-Ja;Cho, Deuk-Jae;Park, Sang-Hyun;Shin, Mi-Young
    • Journal of Navigation and Port Research
    • /
    • v.35 no.9
    • /
    • pp.701-706
    • /
    • 2011
  • Radio waves including GPS signals, various TV communications, and radio broadcasting can be disturbed by a strong solar storm, which may occur due to solar flares and produce an ionospheric delay anomaly in the ionosphere according to the change of total electron content. Electron density irregularities can cause deep signal fading, frequently known as ionospheric scintillation, which can result in the positioning error using GPS signal. This paper proposes a detection algorithm for the ionosphere delay anomaly during a solar storm by using multi-reference stations. Different TEC grid which has irregular electron density was applied above one reference station. Then the ionospheric delay in zenith direction applied different TEC will show comparatively large ionospheric zenith delay due to the electron irregularity. The ionospheric slant delay applied an elevation angle at reference station was analyzed to detect the ionospheric delay anomaly that can result in positioning error. A simulation test was implemented and a proposed detection algorithm using data logged by four reference stations was applied to detect the ionospheric delay anomaly compared to a criterion.

Design of Access Control Model for Secure EDI Service (안전한 EDI 서비스를 위한 접근제어 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Journal of Digital Contents Society
    • /
    • v.1 no.1
    • /
    • pp.23-37
    • /
    • 2000
  • EDI is basically the concept of computer-to-computer exchange of messages relating to various types of activities or business areas, such as banking, trade, medicine, publishing, etc. Therefore, security, reliability and special functionality will be implicit requirements of EDI systems. We will design access control model to content security of these requirements. Access controls in information systems are responsible for ensuring that all direct access to the entities occur exclusively according to the access modes and rules fixed by security policies. On this paper, security policies for access control model are presented from the viewpoints of identity-based, rule-based, role-based policy. We give a design of access control model for secure EDI service based on the derived access control rules and operations to enforce the defined security policies. The proposed access control model provides integrity, confidentiality and a flow control of EDI messages.

  • PDF

Nutrition and Brain Development (영양과 두뇌발달)

  • Leekim, Yang-Cha
    • Journal of Nutrition and Health
    • /
    • v.10 no.2
    • /
    • pp.5-11
    • /
    • 1977
  • The mature human braun contains over 10 billion nerve cells (neurons), whose functions are directly related to the acquisition, transfer, processing, analysis, and utilization of all the information. There are also billions of glial cells, which serve primarily to support and to maintain the integrity of the neuron network and to synthesize an essential fatty strucfure, myelin. In the human brain DNA content therefore cell number rises rapidly until birth and then more slowly until $5{\sim}6$ months of age, when it reaches a maximum. While glial cells may be replaced, the more important nerve cell neurons can never be replaced once they are formed. Humans are born with their full complement of neurons and every neuron is as old as each individual. Thus prenatal malnutrition can seriously affect a person's entire life by severely inhibiting the production of neurons before birth.It has been demonstrated that in humans severe malnutrition during the fetal period and in infancy is associated with intellectual impairment. Severely malnourished children have brains smaller than average size and have been found to have $15{\sim}20%$ fewer brain cells than wellnourished childen. There is growing body of literature pointing to malnutrition as a cause of abnormal behavior as evidence that suggests these abnormalities may produce chromosomal damage that may persist forever. Although cognitive development in children is affected by multiple environmental factors, nutrition certainly deaerves more attention than it has received.

  • PDF

Wavelet Based Intelligence image Watermarking Using Machine Vision of LabVIEW (LabVIEW의 Machine Vision을 이용한 웨이블릿 기반 지능형 이미지 Watermarking)

  • 송윤재;강두영;김형권;안태천
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.521-524
    • /
    • 2004
  • Recently, acgis of authentication and crcator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repealed through the entire image and adapted to the content of the image. Achieved by an underlying process of transforming the digital image to the frequency domain by wavelet transform, which has three (vertical, horizontal, diagonal) directions and Multi-resolution features, and then choosing frequency area inferior to the human perceptibility and significant for invisible and robust watermark. We realize wavelet based image watermarking using Machine Vision of LabVIEW.

  • PDF

Community Health Program Planning and Local Public Health System : The MAPP Model (지역사회보건기획과 지역보건체계 강화: MAPP 모형의 사례)

  • Kwak, Min-Son;Yoo, Seung-Hyun
    • Korean Journal of Health Education and Promotion
    • /
    • v.27 no.3
    • /
    • pp.59-66
    • /
    • 2010
  • Objectives: This paper aims to describe a public health planning model, Mobilizing for Action through Planning and Partnership(MAPP), and to discuss its application in Korea with a specific focus on the Local Public Health System (LPHS) component of MAPP. Methods: Literature content review was performed on research papers on MAPP development and application, MAPP handbook and guides, the guidelines for the 5th Phase Community Health Plan, and a research report on public health center evaluation system. Results: MAPP has been applied to public health planning (the 5th Phase Community Health Plan) and a performance evaluation system for public health center in Korea. The current application is limited to the early stages of the MAPP. Limited or partial application affects the integrity of the model. Follow-through should be strengthened especially for evaluation planning. Conclusion: Systems thinking approaches should be considered for the development of LPHS and strengthening logical and practical linkage between planning and evaluation of community health planning.

Wavelet Watermarking of Digital Image Date (디지털 이미지 데이터의 웨이브릿 워터마킹)

  • Lee Jeong-Gi;Hue Jin;Lee Gwang;Lee Ho-Yeong;Lee Joon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.490-494
    • /
    • 2005
  • Multispectral image is wavelet trans formed and classified into one of three classes considering reference characteristics of the subband with the lowest resolution. Recently, aegis of authentitation and creator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repeated through the entire image and adapted to the content of the image.

  • PDF

Evaluation of Creep Behaviors of Alloy 690 Steam Generator Tubing Material (Alloy 690 증기발생기 전열관 재료의 크리프 거동 평가)

  • Kim, Jong Min;Kim, Woo Gon;Kim, Min Chul
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.15 no.2
    • /
    • pp.64-70
    • /
    • 2019
  • In recent years, attention has been paid to the integrity of steam generator (SG) tubes due to severe accident and beyond design basis accident conditions. In these transient conditions, steam generator tubes may be damaged by high temperature and pressure, which might result in a risk of fission products being released to the environment due to the failure. Alloy 690 which has increased the Cr content has been replaced for the SG tube due to its high corrosion resistance against stress corrosion cracking (SCC). However, there is lack of research on the high temperature creep rupture and life prediction model of Alloy 690. In this study, creep test was performed to estimate the high temperature creep rupture life of Alloy 690 using tube specimens. Based on manufacturer's creep data and creep test results performed in this study, creep life prediction was carried out using the Larson-Miller (LM) Parameter, Orr-Sherby-Dorn (OSD) parameter, Manson-Haford (MH) parameter, and Wilshire's approach. And a hyperbolic sine (sinh) function to determine master curves in LM, OSD and MH parameter methods was used for improving the creep life estimation of Alloy 690 material.

Integrity Metadata Based of Multi CMSs System Providing Protection Copyright of Web Contents (웹 콘텐츠 저작권 보호를 제공하는 통합 메타데이터 기반의 다중 CMS 시스템)

  • Cho, Young-Bok;Li, Yong-Zhen;Sun, Ning;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6C
    • /
    • pp.520-528
    • /
    • 2008
  • At present Content Management Systems (CMS) with various and diverse web contents have been in wide applications. But, for CMS of each enterprise has its own metadata which is very different from others, it causes the serious problem of web contents repetition. Also, it's a difficult technology to support protecting copyright of web contents which are in separated CMSs. Therefore, in this paper, we solved the problem of contents repetition through metadata integration between mutually heterogeneous CMSs. We also propose the technology of web contents authentication code for avoiding contents repetition and applying digital rights protection by supporting safe ship in vast quantity of contents.