• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.041 seconds

Its Application and Realization of Self-Recognition Algorithm Based on Biological Immune System (생체 면역계를 이용한 자기 인식 알고리즘의 구현과 응용)

  • Sun, Sang-Joon;Seo, Dong-Il;Kim, Dae-Su;Sim, Kwee-Bo
    • Proceedings of the KIEE Conference
    • /
    • 2001.11c
    • /
    • pp.161-164
    • /
    • 2001
  • 생명체의 면역계는 외부에서 침입해 세포나 장기에 피해를 주는 물질인 항원을 스스로 자기세포와 구분해 인식하고 제거하는 기능을 가지고 있다. 이러한 면역계의 특징 중의 하나는 항원과 구별되는 자기 세포의 확실한 인식을 가지고 구분하는 자기/비자기(self/non-self) 인식방법이다. 이러한 기능을 가장 잘 보여주는 면역 T세포 중의 하나인 세포독성 T세포(T-cytotoxic Cell)는 자기세포를 인식하는 부분과 항원으로 인식하는 부분으로 구성되어 항원에 의해 감염된 자기세포를 찾아 제거하는 역할을 한다. 본 논문에서는 생명체의 면역계에서 중요한 역할을 하는 세포독성 T세포의 생성중의 자기인식 과정의 하나인 Positive Selection을 모델링하여 자기-인식 알고리즘 구현하였다. 구현한 알고리즘을 자기 공간의 국소변경과 블록변경에 대한 자기인식률을 통해 알고리즘의 유효성을 검증하며 응용 시스템으로 지문 인식에 적용하였다.

  • PDF

Efficient Authentication and Management System for PLC-based AMR (전력선통신기반 원격검침시스템을 위한 효율적인 기기인증 및 관리체계)

  • Ju, Seong-Ho;Choi, Moon-Seok;Lim, Yong-Hoon;Choi, Jong-Hyup
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.353-354
    • /
    • 2008
  • Security weakness in PLC network can be made up for by authentication and management scheme of PLC modules introduced in this paper. Each PLC module must pass the authentication procedure to work normally in PLC network as soon as being installed in the spot. Based on this scheme, all PLC devices are registered, certified, and managed automatically in central control center - AMR server, authentication server, NMS server, and DB server.

  • PDF

VoIP Service Implementation over IEEE 802.16e Broadband Wireless Access System (휴대인터넷망을 이용한 VoIP 서비스 구현)

  • Kim, Yun-Sik;Jung, Mi-Young;Jung, Hyun-Meen;Lee, Sung-Choon
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.359-360
    • /
    • 2008
  • As broadband wireless access systems are widely accepted, VoIP service over the wireless network is being requested. Because previous VoIP implementations are designed to provide service over wired network, they does not consider security problem sufficiently that is one of the most vulnerable aspects of wireless communication. Therefore, this paper describes how to implement secure VoIP service over wireless network with minimum overhead.

  • PDF

Moving Object Edge Extraction from Sequence Image Based on the Structured Edge Matching (구조화된 에지정합을 통한 영상 열에서의 이동물체 에지검출)

  • 안기옥;채옥삼
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.425-428
    • /
    • 2003
  • Recently, the IDS(Intrusion Detection System) using a video camera is an important part of the home security systems which start gaining popularity. However, the video intruder detection has not been widely used in the home surveillance systems due to its unreliable performance in the environment with abrupt illumination change. In this paper, we propose an effective moving edge extraction algorithm from a sequence image. The proposed algorithm extracts edge segments from current image and eliminates the background edge segments by matching them with reference edge list, which is updated at every frame, to find the moving edge segments. The test results show that it can detect the contour of moving object in the noisy environment with abrupt illumination change.

  • PDF

The Technology Trend of Common Criteria for Information Security System (정보보호시스템 공통평가기준 기술동향)

  • Kim, K.S.;Nam, T.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.17 no.5 s.77
    • /
    • pp.89-101
    • /
    • 2002
  • 이제 공통평가기준(CC)의 도입은 거를 수 없는 대세로 자리 잡고 있으며, 국내에서도 CC를 도입하기 위해 인증기관과 평가기관들이 도입을 위한 준비를 서두르고 있으나 개발자 입장에서는 아직 미흡한 실정이다. 따라서, 본 고에서는 CC를 고려하여 정보보호시스템을 개발하고자 하는 연구기관 및 업체에서 개발전략을 수립하는 데 도움이 될 수 있는 CC 관련 기술동향을 살펴보았다. 먼저, 기존 정보보호시스템 평가기준인 TCSEC과 ITSEC에 대해 간략히 살펴본 후, 국제간에 상호 인증을 받을 수 있는 정보보호시스템 공통평가기준에 대해 CC 출현 배경, CC 표준 규격, PP와 ST 개발동향, CC의 최근 표준화동향 관점에서 살펴본다. 그리고, 연구개발을 추진하는 개발자 입장에서 연구개발체계에 CC를 어떻게 적용할 것인가에 대한 방안을 제시한다. 이를 위해 먼저, CC 관련 주요 이슈에 대해 ICCC’2002를 통해 알게 된 내용을 위주로 살펴보고, 연구개발체계에 CC 도입시 개발자들이 고려해야 할 개발 보증 증거물들에 대해 살펴본다.

A Study on the Optimum Design using Finite Element Analysis and Automatic Design of Lachet Wheel (라체트 휠의 자동설계와 유한요소해석을 이용한 최적화에 관한 연구)

  • 박진형;이승수;김민주;김태호;전언찬
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2001.04a
    • /
    • pp.3-8
    • /
    • 2001
  • This study is an investigation for the ADS optimum design by using FEA. We write out program which express ADS perfectly and reduce the required time for correcting of model to the minimum in solution and manufacture result. We complete algorithm which can plan optimum forming of model by feedback error information in CAE. Then we correct model by feedback date obtaining in solution process, repeat course following stress solution again and do modeling rachet wheel for optimum forming. That is our aim. In rachet wheel, greatest equivalence stress originates in key groove corner and KS standard is proved the design for security.

  • PDF

A Study on the Selection of Optimum Auto-design Data using FEA (유한요소해석을 이용한 최적자동설계 데이터 선정에 관한 연구)

  • 박진형;이승수;김민주;김순경;전언찬
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.406-409
    • /
    • 2001
  • This study is an investigation for the ADS optimum design by using FEA. We write out program which express ADS perfectly and reduce the required time for correcting of model to the minimum in solution and manufacture result. We complete algorithm which can plan optimum forming of model by feedback error information in CAE. Then we correct model by feedback date obtaining in solution process, repeat course following stress solution again and do modeling rachet wheel for optimum forming. That is our aim. In rachet wheel, greatest equivalence stress originates in key groove corner and KS standard is proved the design for security.

  • PDF

ON EFFICIENT TWO-FLOW ZERO-KNOWLEDGE IDENTIFICATION AND SIGNATURE

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • v.29 no.3_4
    • /
    • pp.869-877
    • /
    • 2011
  • In this paper, we propose an efficient two-flow zero-knowledge blind identification protocol on the elliptic curve cryptographic (ECC) system. A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. But our protocol is secure under such attacks because of using the hash function. In particular, it is fast because we don't use the pairing operation and consists of only two message flows. It does not rely on any underlying signature or encryption scheme. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.

A Study on the Verification Using Finite Element Analysis and Automatic Design of Ratchet Wheel (래칫 휠의 자동설계와 유한요소해석을 이용한 검증에 관한 연구)

  • 김민주;이승수;전언찬
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.11 no.3
    • /
    • pp.45-50
    • /
    • 2002
  • This study is an investigation far the Am optimum design using FEA. We write out program which express ADS perfectly and reduce the required time far correcting of model to the minion in solution md manufacture result. We complete algorithm which can plan optimum forming of model by feedback error information in CAE. Then we contract model by feedbback date obtaining in solution process, repeat course following stress solution again iud do modeling rachet wheel for optimum forming. That is our aim. In cachet wheel, greatest equivalence strss originates in key groove comer and KS standard is proved the design far security.

Study on the Application of IT and Smart Sensors to the High-Speed EMU (동력분산형 고속전철에 IT 및 스마트센서의 적용에 관한 연구)

  • Chang, Duk-Jin;Kang, Song-Hee;Song, Dahl-Ho
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1201-1208
    • /
    • 2008
  • Ubiquotuous technology should be adopted in railroad business to provide passenger's security and convenience. In this project, IT and smart sensor technologies are reviewed, benchmarked, designed, and implemented. The target system is the next generation high speed train to be developed and operated in Korea with the maximum speed of 400km/h. Wireless sensor network with smart sensors is implemented around a train car. PC-like IT terminal will be designed and implemented so an individual passenger can use it to do information retrieval through the Internet, personal data processing, the e-learning, shopping on the railroad, and so on. These provision will give comfort, convenience, and safety of a passenger during his/her trip.

  • PDF