• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.033 seconds

Comparative Study of Safety Regulations: Focused on the Applied Frameworks of ensuring product safety in Korea and Japan (안전기준 비교분석연구: 한국과 일본의 제품안전 확보체계를 중심으로)

  • Kim, Jung-Gon;Kim, Tae-Hwan
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.1
    • /
    • pp.116-122
    • /
    • 2014
  • Recently, Korea has enacted the Framework Act on Product Safety to allow comprehensive control of product safety accidents. This is a government policy aiming to ensure product safety and customer protection by strengthening the obligation of producers. However, the framework has not yet been completed in Korea. Therefore, this paper deals with improvement assignments and directions by comparing the frameworks of applied in Korea and Japan for ensuring such production safety.

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

Design and Implementation of Batch Security Policy Management System (일괄 보안정책 관리 시스템의 설계 및 구현)

  • Kim Yi-Gon;Shin Young-Sun;Yu Sung-Hun;An So-Jin;Park Jin-Sub
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.262-264
    • /
    • 2006
  • 오늘날 빠른 정보화로 인한 역기능의 발생으로 인하여 침입탐지, 침입차단 및 방지 시스템들의 다양한 보안 솔루션을 도입하여 사용하고 있다. 하지만 제로 데이 공격과 같이 빠르게 확산될 경우 보안 장비에 빠르게 정책을 적용해야 하지만 보안 장비마다 각기 다른 접근 및 제어 형식으로 인하여 빠르게 대처하고 있지 못하다. 본 논문에서는 이러한 문제점을 보완하기 위해 한번의 정책 주입으로 대규모 네트워크에 설치되어 있는 보안 장비 및 네트워크 장비에 보안정책을 주입 시킬 수 있는 일괄 보안정책 관리 시스템에 대한 설계 및 구현에 대하여 논하고자 한다.

  • PDF

Device Authentication Protocol for Smart Grid Systems Using Homomorphic Hash

  • Kim, Young-Sam;Heo, Joon
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.606-613
    • /
    • 2012
  • In a smart grid environment, data for the usage and control of power are transmitted over an Internet protocol (IP)-based network. This data contains very sensitive information about the user or energy service provider (ESP); hence, measures must be taken to prevent data manipulation. Mutual authentication between devices, which can prevent impersonation attacks by verifying the counterpart's identity, is a necessary process for secure communication. However, it is difficult to apply existing signature-based authentication in a smart grid system because smart meters, a component of such systems, are resource-constrained devices. In this paper, we consider a smart meter and propose an efficient mutual authentication protocol. The proposed protocol uses a matrix-based homomorphic hash that can decrease the amount of computations in a smart meter. To prove this, we analyze the protocol's security and performance.

A Study on Detecting Glasses in Facial Image

  • Jung, Sung-Gi;Paik, Doo-Won;Choi, Hyung-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.21-28
    • /
    • 2015
  • In this paper, we propose a method of glasses detection in facial image. we develop a detection method of glasses with a weighted sum of the results that detected by facial element detection and glasses frame candidate region. Component of the face detection method detects the glasses, by defining the detection probability of the glasses according to the detection of a face component. Method using the candidate region of the glasses frame detects the glasses, by defining feature of the glasses frame in the candidate region. finally, The results of the combined weight of both methods are obtained. The proposed method in this paper is expected to increase security system's recognition on facial accessories by raising detection performance of glasses or sunglasses for using ATM.

A Security System using a Movement Pattern drawn with Fingers (손가락으로 그린 움직임 패턴을 이용한 보안 시스템)

  • Han, Juchan;Jeon, Minseong;Cheoi, Kyungjoo
    • Annual Conference of KIPS
    • /
    • 2016.04a
    • /
    • pp.730-732
    • /
    • 2016
  • 본 논문에서는 보다 보안을 높이기 위해서 인가된 사용자의 암호를 번호로 구성하지 않고, 사용자만이 알고 있는 간단하면서도 독특한 손가락의 움직임 패턴으로 구성하고, 이를 적용한 보안 시스템을 제안하였다. 제안하는 시스템은 등록단계에서 립모션 컨트롤러(Leap Motion Controller)를 사용하여 손가락의 보안패턴을 입력받았으며, OpenGL과 OpenCV를 사용하여 구현하였다. 실험 결과 제안하는 시스템은 잘못된 보안 패턴을 정확히 걸러내었으며, 정인식률도 91.4%로 만족할 만한 성능을 보여주었다.

System and Method For Security Using ONE-TIME Execution Code (일회용 실행 코드를 이용한 보안 시스템 및 보안방법)

  • Lee, Se-Hoon;Jeon, Sang-Pyo;Shin, Young-Jin;Park, Jeon-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.55-58
    • /
    • 2010
  • 본 논문에서는 기존 C/S 환경에서 이용되는 보안 방법에 대해 새로운 방식으로 접근하고 이를 통하여 전통적인 C/S 환경의 정보시스템에서 클라이언트를 위조하거나 변조하는 등 해킹시도 및 해킹 여부를 판별하여 안전한 클라이언트 시스템이 작동중임을 판별할 수 있도록 한다.

  • PDF

Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment (네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

A study on DDoS Attack, Detecting and Defence in ubiquitous system (유비쿼터스환경에서의 DDoS의 공격과 탐지, 방어시스템에 관한 연구)

  • Jung, Chang-Duk;Cha, Joo-Won;Hwang, Sun-Il
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.544-548
    • /
    • 2009
  • The underlying success of logistics depends on the flow of data and information for effective management. Over the last 30 years, we have seen the power of microprocessors double about every 18months. This continuing trend means that computers will become considerably smaller, cheaper, and more abundant; indeed, they are becoming ubiquitous and are even finding their way into everyday objects, resulting in the creation of smart things. In the long term, ubiquitous technologies will take on great economic significance. Industrial products will become smart because of their integrated information processing capacity, or take on an electronic identity that can be queried remotely, or be equipped with sensors for detecting their environment, enabling the development of innovative products and totally new services. The global marketplace runs on logistics, security, speed, agility and flexibility..In this paper we report that pairing these traditional logistics functions with RFID technology can be a huge value-driver for companies. This winning combination yields increased logistics management effectiveness and more efficient visibility into the supply chain management.

  • PDF

Design and Implementation of Security Authentication Module for LAN-WISS (LAN-WISS(Web Infoshop Service System)을 위한 보안 인증 모듈 설계 및 구현)

  • 백영미;이종훈;안경환;이현우;한기준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.526-528
    • /
    • 2000
  • 본 논문은 웹 인포샵 서비스를 인터넷 전용선 사용자에게도 제공하기 위해 반드시 필요한 보안 인증 모듈을 설계 및 구현하였다. 보안 인증 모듈은 사용자의 요청 처리와 사용자의 인증 절차 및 암호화 기능을 수행하는 인증 에이전트와 사용자 정보를 암호화하여 전송하고 인증 에이전트로부터 수신한 응답을 처리하는 클라이언트로 구성된다. 이 때 사용된 암호화 알고리즘은 공개 키 암호법인 RSA 알고리즘으로 사용자의 인증치를 보안 공격으로부터 보호한다. 유닉스 상에서 동작하는 인증 에이전트는 C와 JAVA로 구현했고 클라이언트는 JAVA와 JAVA APPLET으로 구현하였다. 현재 구분한 보안 인증 모듈과 웹 인포샵 서비스 시스템을 통합중이고 향후에는 과금 관리 기능, 시스템 관리 기능 등과 같은 부가 기능을 추가하여 최적화된 LAN-WISS를 완성할 계획이다.

  • PDF