• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.033 seconds

A Fair Certified Electronic Mail Protocol that Enhances Guarantee of Reception (수신 보장성이 향상된 공평한 배달 증명 전자 메일 프로토콜)

  • 박용수;조유근
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.86-94
    • /
    • 2003
  • Certified e-mail system guarantees that recipient will get mail content if and only if mall originator receives a receipt. Unlike previous schemes, Optimistic protocols recently published generate a receipt when it meets the condition that the mail content can be accessed by recliner at any time. So originator cannot assure the delivery of e-mail although he can get a receipt. In this paper, we show some flaws in optimistic protocols and propose improved schemes using delivery deadline. Modified protocols guarantee proof-of-receipt and eliminate the problem mentioned above. Furthermore, proposed modification technique can be applicable to most optimistic protocols and is efficient in the sense that modified schemes do not increase the number of messages.

Electrical and Electromagnetic Characteristics of Xe Plasma Flat Lamp by Electrode Structure (Xe 플라즈마 평판형 광원의 전극 구조에 따른 전기.자기적 특성)

  • Choi, Yong-Sung;Moon, Jong-Dae;Lee, Kyung-Sup;Lee, Sang-Heon
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2006.05a
    • /
    • pp.82-85
    • /
    • 2006
  • As a display becomes large recently, Acquisition of high luminance and Luminance uniformity is becoming difficult in the existing CCFL or EEFL backlight system. So, study for a performance enhancement has enforced. but lamp development of flat type is asked for high luminance and a luminance uniformity security in of LCD and area anger trend ultimately. In this paper, we changed a tip shape of an electrode for production by the most suitable LCD backlight surface light source, and confirmed discharge characteristic along discharge gas pressure and voltage, and confirmed electric field distribution and discharge energy characteristic through a Maxwell 2D simulation. Therefore the discharge firing voltage characteristic showed a low characteristic than a rectangular type and round type in case of electrode which used tip of a triangle type, and displayed a discharge electric current as a same voltage was low.

  • PDF

A Study on Land Action Plan for Stabilization of the North Korea after Reunification (통일 이후 북한주민 안정화를 위한 토지처리 방안에 관한 연구)

  • Kim, Jae-Bok;Hong, Soon-Heon
    • Journal of Cadastre & Land InformatiX
    • /
    • v.45 no.1
    • /
    • pp.59-74
    • /
    • 2015
  • This study proposes a land action plan for stabilization of the North Korea in fundamental guarantees of life, social security and social system in order to minimize the social disruption and economic losses by identifying the administrative and operational status of the land in North Korea. Land action plan for North Korea is that the state holds the whole land ownership for a certain period through re-nationalization of the land by not admitting the former owner's ownership and distributes the land to the currently occupying personal and set the land use permission and later land ownership will be introduced and land use permit will be gradually privatized.

A Study on the Efficient RFID Tag Identification considering Performance Information of Individual Nodes in a Grid Environment (그리드 환경에서 노드별 성능정보를 고려한 효율적인 RFID 태그 판별에 관한 연구)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.797-802
    • /
    • 2011
  • RFID is recognized to technically occupy important position in ubiquitous computing environment and expected to create new markets in a variety of fields from now on. In order to generalize RFID system, it is required to solve the problem of privacy invasion and expedite lots of tags We suggest efficient RFID Tag Identification to identify tags quickly on the satisfaction with 3 security requirements of privacy protection in this paper. This methods are transferred to Grid environment through parallel analysis of Hash-Chain, and we measure performance of each nodes under the Grid environment. Then, We'll suggest SP-Division Algorithm to identify tags with each nodes and implement it in a Grid environment.

Lightweight Home Network Middleware Security Mechanism supporting Mobility Management (이동성 관리를 지원하는 경량 홈 네트워크 미들웨어 보안 기술)

  • Koh Kwang-Man;Hyun Ho-Jae;Hong Ju-Hee;Han Sun-Young
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.375-382
    • /
    • 2006
  • As various kinds of embedded systems (or devices) become widely available, research on home network middleware which can access and control embedded home appliances are actively being progressed. However, there is a significant problem in applying the home network technology to embedded systems because of their limited storage space and low computing power. In this paper, we present a lightweight middleware for home network on embedded systems. Also, we propose a mechanism for mobility management which adopts the anycast technology.

결함주입기법을 이용한 차량용 고신뢰성 임베디드 시스템의 안전성 검증방안

  • Lee, Dong-U;Ryu, Dae-Hyun;Na, Jong-Hwa
    • Review of KIISC
    • /
    • v.24 no.2
    • /
    • pp.50-55
    • /
    • 2014
  • 자동차 전장제품 활용의 급속한 증가에 대응하기 위하여 자동차 분야에서는 ISO 26262 안전설계절차를 도입하여 차량용 임베디드 시스템의 안전성을 확보하려고 노력하고 있다. ISO 26262는 자동차에서 발생 가능한 비정상상태(abnormal state)를 식별하고 그의 영향을 분석하며 전체 시스템의 안전을 검증하는 것을 목표로 하고 있다. 다양한 종류의 부품이 연동되는 복잡한 시스템의 안전 검증은 결함수목법과 고장모드영향분석법을 활용하는 위험분석법이 보편적으로 사용된다. 결함주입시험은 이러한 위험분석의 기반도구로서 안전성을 향상시키기 위하여 사용된 고장감내 기능의 동작여부 및 그에 따른 시스템의 안전성을 검증하는 목적으로 사용된다. 본 논문에서는 차량용 고신뢰성 임베디드 시스템에서 사용되는 고장감내 메카니즘들의 기능과 안전을 검증하는 방법과 사례를 소개한다. 최근의 복잡한 차량용 임베디드 시스템의 개발은 상위수준의 모델을 개발하여 지정된 위험 및 고장을 초래하는 결함을 시스템에 주입하고 그의 결과를 분석하여 안전을 검증하는 것이 일반적인 방법이다. 개발 목표 차량의 임베디드 시스템 모델을 개발하고, 식별된 결함의 결함모델을 준비한 뒤, 시스템 모델 기반 결함주입 도구를 이용하여 결함주입을 수행하는 시험방법과 그 결과에 대하여 논의한다. 하드웨어는 SystemC 하드웨어 설계언어를 이용하여 개발하고, 소프트웨어를 컴파일하여 실행화일을 확보하여 시험대상인 결함모델을 개발하고 이를 대상으로 결함주입시험에 대해 설명한다.

A study of the implementation of an OTA Provisioning System in WiBro (와이브로에서의 OTA Provisioning 시스템 구축 방안에 관한 연구)

  • Sohn, Young-Seol;Ok, Chang-Seok
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.355-359
    • /
    • 2008
  • 와이브로(WiBro), 3G 무선인터넷(HSDPA), 3G LTE 등과 같은 와이어리스 브로드밴드(Wireless Broand) 기술이 점차 성숙됨에 따라 이들 망을 활용한 다양한 무선인터넷 서비스를 제공하려는 사업자들이 증가하고 있다. 기존의 WLAN, 2G/3G 회선망에서의 제한된 이동성 및 네트워크 전송 속도를 개선한 와이어리스 브로드밴드 서비스 시장은 국내에서도 2006년부터 WiBro 및 HSDPA가 사용됨에 따라 사업자간의 경쟁도 본격화되고 있다. 이러한 환경 속에서 사업자들은 신속하고 편리한 서비스 개통과 스마트폰, USB모뎀, 노트북, UMPC, PMP등 다양한 단말들의 펌웨어 업그레이드, A/S 처리 방안에 대해 고심을 하고 있으며, 이들 문제점은 막대한 비용과 고객 민원을 야기시키는 요인이기도 하다. 따라서 경제적인 관리비용으로 동적인 서비스/펌웨어 업그레이드 및 A/S에 대한 고객 만족도를 높이기 위한 단말 원격 관리 필요성이 절실히 요구된다. WiBro 단말의 안전하고 효율적으로 관리하기 위해서는 단말과 기지국사이의 무선구간에 대한 보안(security)을 강화시켜 줄 수 있으면서 이동성(mobility)을 고려한 OMA DM프로토콜을 이용하는 것이 적합하다. 또한, WiBro에서 가입자 인증을 채택하고 있는 UICC의 관리를 위해서 3GPP에서 정의하는 SMS/MMS기반의 또는 BIP(Bear Independent Protocol)기반의 OTA기술을 병행하여 사용하여야 한다. 본 논문에서는 Wi-MAX단말 관리를 위한 OTA Provisioning 규격으로 OMA DM과 TR069이 WiMAX 단말을 위하여 어떻게 적용하도록 규정하고 있는지를 살펴본다. 특히, WiBro 가입자 인증뿐만 아니라 폰북, DRM, 금융서비스 등 다양한 부가 서비스를 위하여 사용되는 UICC의 원격관리를 위한 관리 요소들을 정의, 설계하고 이를 바탕으로 구현된 KTUICC OTA Provisioning시스템을 소개한다.

  • PDF

A Study on the Effect of Format String on Secure Programming in C Language (C언어에서 포맷 스트링이 프로그램 보안에 미치는 영향)

  • Lee, Hyung-Bong;Cha, Hong-Jun;Choi, Hyung-Jin
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.693-702
    • /
    • 2001
  • One of the major characteristics of C language is that it allows us to use pointer type variables to access any area of virtual address space. So, we can read/write/execute from/to virtual memory area not controlled delicately by operating system. We can access such memory area by using format string and it can be a vulnerability of C language from the point of secure programming. In this paper, we analyze in detail the process of security attack based on format string and then exploit a new virus style attack which is stepwise and durable with some actual scenarios to warn the severity of it, and grope for some preliminary responding actions.

  • PDF

Implementation of Digital Laser Welding Cell for Car Side Panel Assembly (차체 사이드 패널 조립을 위한 디지털 레이저용접 셀 구현)

  • Park Hong Seok;Choi Hung Won;Kang Mu Jin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.22 no.5 s.170
    • /
    • pp.113-120
    • /
    • 2005
  • Because of the turbulent markets and the increasing demand on product quality, the application of new technology to practice is increasingly important. In case of automotive industries, they take interest in laser welding to solve these problems because laser welding has many advantages such as good accessibility, welding quality, fast welding speed and so on. To apply this technology to welding of car body, the data of laser welding are collected through lots of the experiment according to the material, geometry and layer number of welding points. Based on the experiment results and the information of product, i.e. the car side panel, the clustering of stitches for laser welding was carried out and the optimal equipments are selected through the comparison between the requirements of welding and the potential of equipments. Using these results, laser welding cell for the car side panel are configured with the concept of the digital manufacturing, which ensures maximum planning security with visualization and simulation. Finally, the optimal laser welding cell is chosen by the evaluation of alternative cells with assessment criteria.

The Relationship Between Financial Literacy and Public Awareness on Combating the Threat of Cybercrime in Malaysia

  • ISA, Mohd Yaziz Bin Mohd;IBRAHIM, Wan Nora Binti Wan;MOHAMED, Zulkifflee
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.12
    • /
    • pp.1-10
    • /
    • 2021
  • Purpose: Cyber criminals have affected various markets and the banking system has encountered various kinds of cyberattacks. The purpose of this study is to analyze cybercrime that is an emerging threat and investigate the significant contribution of financial literacy and public awareness on cybercrimes. To understand the security issues and the need for corrective steps, the techniques and strategies used by cyber fraudsters in obtaining unauthorized access and use the financial information for purpose of fraud need to be understood. Research design, data and methodology: A sample of 123 banks employees from 12 commercial banks in Malaysia was surveyed. This study differs from previous studies as it surveyed the employees' awareness, and this approach fills in the gap in existing literature. Results: The financial literacy and public awareness have positive impact on organizational performance effectiveness to combat threat of cybercrime. Some recommendations are also proposed from research findings, for banking industry and government regulations. Conclusion: The present study focuses on banking sector so its findings cannot be generalized to other sectors. Linking these topics has created a new study in combating threat of cybercrimes generally, and specifically in Malaysia. The present study enhances the understanding of customers' role to combat the impact of cybercrimes on performances of banking industry.