• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.031 seconds

Benefits and problems in implementation for integrated medical information system

  • Park Chang-Seo;Kim Kee-Deog;Park Hyok;Jeong Ho-Gul
    • Imaging Science in Dentistry
    • /
    • v.35 no.4
    • /
    • pp.185-190
    • /
    • 2005
  • Purpose: Once the decision has been made to adopt an integrated medical information system (IMIS), there are a number of issues to overcome. Users need to be aware of the impact the change will make on end users and be prepared to address issues that arise before they become problems. The purpose of this study is to investigate the benefits and unexpected problems encountered in the implementation of IMIS and to determine a useful framework for IMIS. Materials and Methods: The Yonsei University Dental Hospital is steadily constructing an IMIS. The vendor's PACS software, Piview STAR, supports transactions between workstations that are approved to integrating the healthcare enterprise (IHE) with security function. It is necessary to develop an excellent framework that is good for the patient, healthcare provider and information system vendors, in an expert, efficient, and cost-effective manner. Results : The problems encountered with IMIS implementation were high initial investments, delay of EMR enforcement, underdevelopment of digital radiographic appliances and software and insufficient educational training for users. Conclusions: The clinical environments of dental IMIS is some different from the medical situation. The best way to overcome these differences is to establish a gold standard of dental IMIS integration, which estimates the cost payback. The IHE and its technical framework are good for the patient, the health care provider and all information systems vendors.

  • PDF

A Study on Development of Attack System on the 2.4 GHz AES Wireless Keyboard (2.4 GHz AES 무선 키보드 공격 시스템 구축에 관한 연구)

  • Lee, Ji-Woo;Sim, Bo-Yeon;Park, Aesun;Han, Dong-Guk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.233-240
    • /
    • 2017
  • Due to a recent rise in use of a wireless keyboard and mouse, attacks which take user's input information or control user's computer remotely exploiting the physical vulnerability in the wireless communication have been reported. Especially, MouseJack, announced by Bastille Network, attacks 2.4 GHz wireless keyboards and mice through exploiting vulnerability of each manufacturer's receiver. Unlike other attacks that have been revealed, this allows to attack AES wireless keyboards. Nonetheless, there is only a brief overview of the attack but no detailed information on this attacking method. Therefore, in this paper we will analyze the Microsoft 2.4 GHz wireless mouse packet and propose a way to set the packet configuration for HID packet injection simulating a wireless mouse. We also develop a system with 2.4 GHz AES wireless keyboard HID packet injection using the proposed packet and demonstrate via experiment that HID packet injection is possible through the system we built.

Approximate 3D Localization Mechanism in Wireless Sensor Network (무선 센서 네트워크 환경에서 3차원 근사 위치추적 기법)

  • Shim, Jaeseok;Lim, Yujin;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.9
    • /
    • pp.614-619
    • /
    • 2014
  • In WSN (Wireless Sensor Networks) based surveillance system, it needs to know the occurrence of events or objects and their locations, because the data have no meaning without location information. Using traditional 2D localization mechanisms provide good accuracy where altitude is fixed. But the mapping the position estimated by 2D localization to the real world can cause an error. Even though 3D localization mechanisms provide better accuracy than 2D localization, they need four reference nodes at least and high processing overhead. In our surveillance system, it is needed to estimate the height of the detected object in order to determine if the object is human. In this paper, we propose a height estimation mechanism which does not require many reference nodes and high complexity. Finally, we verify the performance of our proposed mechanism through various experiments.

Implementation of Role Based Access Control Model for U-healthcare (유비쿼터스 헬스케어를 위한 역할 기반 접근제어 모델의 구현)

  • Lee, You-Ri;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.6
    • /
    • pp.1256-1264
    • /
    • 2009
  • When unapproved users access to healthcare system and use medical information for other malicious purposes, it could severely threaten important information related to patients' life, because in ubiquitous environment healthcare service makes patient's various examination results, medical records or most information of a patient into data. Therefore, to solve these problems, we design RBAC(Role Based Access Control) for U-healthcare that can access control with location, time and context-awareness information like status information of user and protect patient's privacy. With implementation of the proposed model, we verify effectiveness of the access control model for healthcare in ubiquitous environment.

A Recovery Method of External Symbol Information in Statically-Linked ELF Files (정적 링크된 ELF 파일에서의 외부 심볼 정보 복구 기법)

  • Kim, Jung-In
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.2
    • /
    • pp.161-170
    • /
    • 2010
  • ELF, an abbreviation for Executable and Linkable Format, is the basic file format for shared libraries and executable files used in the Linux system, whereas 'Linker' copies the symbol information of static shared libraries into the symbol table in the target file generated by way of static linking. At this time, the symbol table keeps various pieces of debugging-related information including function names provided by the shared libraries, and it can be deleted to avoid debugging for security reasons by utilizing the fact that it does not directly affect the program execution. This paper proposes a method for restoring the symbol information of static shared libraries from the ELF object file in which the symbol table is deleted, and confirms that the symbol information is restored by conducting practical experiments.

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption

  • Hu, Shengzhou;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5100-5119
    • /
    • 2018
  • Most of existing privacy-preserving multi-authorities attribute-based encryption schemes (PP-MA-ABE) only considers the privacy of the user identity (ID). However, in many occasions information leakage is caused by the disclosing of his/her some sensitive attributes. In this paper, we propose a collusion-resisting ciphertext-policy PP-MA-ABE (CRPP-MACP-ABE) scheme with hiding both user's ID and attributes in the cloud storage system. We present a method to depict anonymous users and introduce a managerial role denoted by IDM for the management of user's anonymous identity certificate ($AID_{Cred}$). The scheme uses $AID_{Cred}$ to realize privacy-preserving of the user, namely, by verifying which attribute authorities (AAs) obtain the blinded public attribute keys, pseudonyms involved in the $AID_{Cred}$ and then distributes corresponding private keys for the user. We use different pseudonyms of the user to resist the collusion attack launched by viciousAAs. In addition, we utilize IDM to cooperate with multiple authorities in producing consistent private key for the user to avoid the collusion attack launched by vicious users. The proposed CRPP-MACP-ABE scheme is proved secure. Some computation and communication costs in our scheme are finished in preparation phase (i.e. user registration). Compared with the existing schemes, our scheme is more efficient.

A Study on the DDoS Defense Algorithm using CFC based on Attack Pattern Analysis of TCP/IP Layers (TCP/IP Layer별 공격패턴 분석에 기반한 CFC를 이용한 DDoS 방어 알고리즘 연구)

  • Seo, Woo Seok;Park, Dea Woo;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.117-130
    • /
    • 2010
  • Paper is on defense for so-called internet crisis, the attack of DDoS (Distributed Denial of Service) which was targeted to the central government ministries, financial sector, and portal sites of chief counties including Korea on June 7th, 2009 as its start. By conducting attack with various DDoS attacking methods in the lab environment and dividing networks targeted by the attack by layers, this paper records and analyzes the chief information for attack, destination information of packets, defense policy setting, and the flow of packet attack with the subjects of the networks separated. This study suggests CFC system using multiple firewalls applying defense policy corresponding to the target layer for ultimate attack and tests it according to the result of analyzing the attack packet information and its amount, log analysis, access recording port, and MAC and IT information, etc. by layers. This article is meaningful in that it analyzes the attack by layers, establishes firewall policy for protecting each layer, and secures accurate mechanism for detect and defense.

A Cost-Effective Pigsty Monitoring System Based on a Video Sensor

  • Chung, Yongwha;Kim, Haelyeon;Lee, Hansung;Park, Daihee;Jeon, Taewoong;Chang, Hong-Hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1481-1498
    • /
    • 2014
  • Automated activity monitoring has become important in many applications. In particular, automated monitoring is an important issue in large-scale management of group-housed livestock because it can save a significant part of farm workers' time or minimize the damage caused by livestock problems. In this paper, we propose an automated solution for measuring the daily-life activities of pigs by using video data in order to manage the group-housed pigs. Especially, we focus on the circadian rhythm of group-housed pigs under windowless and 24-hour light-on conditions. Also, we derive a cost-effective solution within the acceptable range of quality for the activity monitoring application. From the experimental results with the video monitoring data obtained from two pig farms, we believe our method based on circadian rhythm can be applied for detecting management problems of group-housed pigs in a cost-effective way.

Development of Real-Time Tracking System Through Information Sharing Between Cameras (카메라 간 정보 공유를 통한 실시간 차량 추적 시스템 개발)

  • Kim, Seon-Hyeong;Kim, Sang-Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.6
    • /
    • pp.137-142
    • /
    • 2020
  • As research on security systems using IoT (Internet of Things) devices increases, the need for research to track the location of specific objects is increasing. The goal is to detect the movement of objects in real-time and to predict the radius of movement in short time. Many studies have been done to clearly recognize and detect moving objects. However, it does not require the sharing of information between cameras that recognize objects. In this paper, using the device information of the camera and the video information taken from the camera, the movement radius of the object is predicted and information is shared about the camera within the radius to provide the movement path of the object.

Use of the Moving Average of the Current Weather Data for the Solar Power Generation Amount Prediction (현재 기상 정보의 이동 평균을 사용한 태양광 발전량 예측)

  • Lee, Hyunjin
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1530-1537
    • /
    • 2016
  • Recently, solar power generation shows the significant growth in the renewable energy field. Using the short-term prediction, it is possible to control the electric power demand and the power generation plan of the auxiliary device. However, a short-term prediction can be used when you know the weather forecast. If it is not possible to use the weather forecast information because of disconnection of network at the island and the mountains or for security reasons, the accuracy of prediction is not good. Therefore, in this paper, we proposed a system capable of short-term prediction of solar power generation amount by using only the weather information that has been collected by oneself. We used temperature, humidity and insolation as weather information. We have applied a moving average to each information because they had a characteristic of time series. It was composed of min, max and average of each information, differences of mutual information and gradient of it. An artificial neural network, SVM and RBF Network model was used for the prediction algorithm and they were combined by Ensemble method. The results of this suggest that using a moving average during pre-processing and ensemble prediction models will maximize prediction accuracy.