• Title/Summary/Keyword: secure design

Search Result 1,838, Processing Time 0.023 seconds

Design of Management System for Secure EDI Subsystem (SEDI의 정보보호 서비스 모듈 관리 시스템 설계)

  • 강지원;권태경;송주석;강창구
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.238-247
    • /
    • 1996
  • 본 논문에서는 ITU-T X.800 권고안의 요구 기능을 중심으로 SEDI(Secure EDI) 시스템의 정보보호 서비스 모듈들을 관리하기 위한 시스템 구조를 설계하였다. 관리자인 ESM(EDI Security Management) 모듈과 관리 대행자인 SMA(Security Management Agent) 모듈을 새롭게 설계하였다. 특히, ESM과 SMA 간의 관리 정보의 교환때문에 전체적인 성능 저하가 발생하지 않도록 SMA에 필터링 기능을 제안하였다.

  • PDF

The Design and Implementation for the Secure Protocol of MHS (MHS의 정보보호 프로토콜 설계 및 구현 연구)

  • 이형수;정선이;정진욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.8
    • /
    • pp.1117-1127
    • /
    • 1993
  • 전자우편서비스가 확대됨에 따라 정보 보호 문제가 중요한 현안으로 대두될 것이다. 이러한 필요성에 따라, MHS(Message Handling System) 시스템의 정보보호(Information Security) 서비스에 관련된 표준화(X.400 series)와 보안 서비스에 관련된 키 관리 메카니즘 표준화(X.509)출 분석하려다. 본 연구에서는 여러가지 보안서비스 중, 안전한 메시지 전송을 위해 1차적으로 메시지 비밀보장, 메시지 무결성, 발신처 인증 서비스를 위 한 SMP(Secure Message Protocol ) 프로토콜을 설계하여 UNIX BSD 4.3 시스템환경에서 구현하였다.

  • PDF

Design on Secure IPv6 Tunnel Broker (Secure IPv6 Tunnel Broker 설계)

  • 장인동;이승윤;박기식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.935-937
    • /
    • 2003
  • 차세대인터넷망에서 사용될 IPv6 프로토콜은 이미 실용화 단계에 와 있다. 하지만 기존 프로토콜인 IPv4망을 버리지 못하고 있는 것이 현재 실정이고, 이에 기존의 IPv4망과 차세대 프로토콜인 IPv6망간의 변환기술은 현 시점에서 가장 중요하다고 할 수 있다. 여러가지 변환기술 중 IPv6 터널브로커 방법은 사용자에게 웹 방식의 친숙한 인터페이스를 제공하며, 본 논문은 IPv6 터널 브로커시스템에 보안기능을 추가하여 보다 안전한 서비스를 제공하기 위한 방법을 제시한다.

  • PDF

Analytical Study on the Amount of Transverse Steel in Square Reinforced Concrete Columns. (장방형 철근 콘크리트 기둥의 띠철근량에 관한 해석적 연구)

  • 이리형;김성수;이용택;김승훈
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1996.10a
    • /
    • pp.453-458
    • /
    • 1996
  • In reinforced concrete structure, it is very important to secure ductile performance of column because the columns become brittle failure and cause the collapse of an entire structure and the damage of human life. This study is intending to seek the quantity of transverse steels in square reinforced concrete columns which is derived from moment-curvature analysis of cross section about various arrangements of transverse steel and the ratio of axial force and to propose the design method to secure the sufficient ductile behavior subjected to complex loading.

  • PDF

Design of Secure Internet Phone using Smart Card (스마트카드를 이용한 안전한 인터넷 전화 설계)

  • 박진호;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.59-68
    • /
    • 2002
  • The smart card including memory and processor is able to simple process such as privilege unauthorized access and used to Authentication System for security. In this paper, we propose using the smart card in the key exchange phase when secure Internet phones conversation, so certainly guarantee to mutual authentication and secret communication.

  • PDF

Feasibility study of an earth-retaining structure using in-situ soil with dual sheet piles

  • An, Joon-Sang;Yoon, Yeo-Won;Song, Ki-Il
    • Geomechanics and Engineering
    • /
    • v.16 no.3
    • /
    • pp.321-329
    • /
    • 2018
  • Classic braced walls use struts and wales to minimize ground movements induced by deep excavation. However, the installation of struts and wales is a time-consuming process and confines the work space. To secure a work space around the retaining structure, an anchoring system works in conjunction with a braced wall. However, anchoring cannot perform well when the shear strength of soil is low. In such a case, innovative retaining systems are required in excavation. This study proposes an innovative earth-retaining wall that uses in situ soil confined in dual sheet piles as a structural component. A numerical study was conducted to evaluate the stability of the proposed structure in cohesionless dry soil and establish a design chart. The displacement and factor of safety of the structural member were monitored and evaluated. According to the results, an increase in the clearance distance increases the depth of safe excavation. For a conservative design to secure the stability of the earth-retaining structure in cohesionless dry soil, the clearance distance should exceed 2 m, and the embedded depth should exceed 40% of the wall height. The results suggest that the proposed method can be used for 14 m of excavation without any internal support structure. The design chart can be used for the preliminary design of an earth-retaining structure using in situ soil with dual steel sheet piles in cohesionless dry soil.

Some Design Approaches for Practical Use of Small Urban Spaces

  • Kim, Do-Kyong;Hong, Hyung-Soon;Suh, Joo-Hwan
    • Journal of the Korean Institute of Landscape Architecture International Edition
    • /
    • no.1
    • /
    • pp.192-201
    • /
    • 2001
  • Today, the availabity of usable pieces of land in urbanized areas is very limited. Specifically, it is very difficult to secure a piece of land to be used as a park for the public, mainly due to the high price of land in cities. However, the City of Seoul has carried out three action plans to secure land deemed for insufficient parks and to vitalize these small piece of land in downtown areas such as following: 1. Ssamzie-park(Korean version of a 'vest pocket park') Development Plan in 1990 through 1991. 2. Modernization Plan for Children's Parks since 1994. 3. Maeul-madang (Korean version of 'community garden')Development Plan since 1996. The purpose of this study was to present some design approaches for practical use of small urban spaces by articulating the concepts of Modernization Plan for Children's Park and Maeul-madang Development Plan of the winning entries and by describing how the concepts were actualized in reality.

  • PDF

Provably Secure Length-Saving Public-Key Encryption Scheme under the Computational Diffie-Hellman Assumption

  • Baek, Joon-Sang;Lee, Byoung-Cheon;Kim, Kwang-Jo
    • ETRI Journal
    • /
    • v.22 no.4
    • /
    • pp.25-31
    • /
    • 2000
  • Design of secure and efficient public-key encryption schemes under weaker computational assumptions has been regarded as an important and challenging task. As far as ElGamal-type encryption schemes are concerned, some variants of the original ElGamal encryption scheme based on weaker computational assumption have been proposed: Although security of the ElGamal variant of Fujisaki-Okamoto public -key encryption scheme and Cramer and Shoup's encryption scheme is based on the Decisional Diffie-Hellman Assumption (DDH-A), security of the recent Pointcheval's ElGamal encryption variant is based on the Computational Diffie-Hellman Assumption (CDH-A), which is known to be weaker than DDH-A. In this paper, we propose new ElGamal encryption variants whose security is based on CDH-A and the Elliptic Curve Computational Diffie-Hellman Assumption (EC-CDH-A). Also, we show that the proposed variants are secure against the adaptive chosen-ciphertext attack in the random oracle model. An important feature of the proposed variants is length-efficiency which provides shorter ciphertexts than those of other schemes.

  • PDF

The Design and Implementation of Secure-ReXpis System with Internet Environment (인터넷 환경 하에서의 Secure-ReXpis 시스템 설계 및 구현)

  • 안경림;박상필;백혜경;임병찬;박준홍;고대식
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.3
    • /
    • pp.101-113
    • /
    • 2001
  • Security is very important in EC(Electronic Commerce) environment because exchanged information(that is transaction details, private data, charges data(card-no, accounts), etc) is various and is very sensitive. So, In this paper, we propose Secure-ReXpis(Reliable St excellent Xh3 Processing Infrastructure) System that transfer message and support Message Level Security(Encryption/Decryption and Digital Signature). And we implement Message Confidentiality Service, User Authentication & Message Integrity Service and Non-Repudiation Service among the various Security Services. This system support XML message format and EDI message, WEB Data and Private Format Data, etc.

  • PDF

Implementation of Secure POS SYSTEM (안전한 POS System의 구현)

  • 박동규;황유동
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.70-77
    • /
    • 2001
  • This paper focuses on the design and implementation of the secure POS SYSTEM We propose a secure POS SYSTEM with RSA, MD5, Triple-DES for security and with RBAC model for access control. The client authentication is implemented before the data transferred be4ween client and server in proposed POS SYSTEM. We apply security algorithms with it, so that it can maintain confidentiality and integrity In addition. we apply RBAC model for access control of data. We verified the proposed system's stability by applying the proposed system to real works.