• Title/Summary/Keyword: secure transaction

Search Result 166, Processing Time 0.023 seconds

The Effects of Authenticity Perception on Used Trading App Service Satisfaction

  • Sangyeon Song;Jeonghoon Lee
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.6
    • /
    • pp.43-62
    • /
    • 2022
  • As the used trading market grows centered on online platforms, it is evolving from practical consumption to pursuing various forms of consumption value. Consumers purchase rare products, enjoy the transaction itself with consumers with the same preference, and investment or eco-friendly value consumption is also increasing. In this regard, the transaction of the second-hand transaction app service must have sincerity in order to respond to various consumption values. In addition, it is necessary to study what components the second-hand trading app service should aim for to secure authenticity and how the usefulness and ease of second-hand trading apps affect the relationship. The research used a questionnaire method to test hypotheses and surveyed 215 consumers in their 20s, 30s, and 40s who had purchased used clothing online within a year. Among them, 200 responses, excluding outliers, were statistically analyzed using SPSS 21.0 and AMOS 22.0 as confirmatory factor analysis and structural equation models. This study aims to determine the effect of the authenticity of the online used trading app service on the satisfaction of the used trading app service. To this end, based on the previous research results, the following research hypotheses were established and verified statistically. First, the authenticity of the online used trading app service will significantly impact the satisfaction of the used trading app service. Second, the usefulness of the used trading app service will have a moderating effect on the effect of the authenticity of the used trading app service on the satisfaction of the used trading app service. Third, the ease of the used trading app service will have a moderating effect on the authenticity of the used trading app service on the satisfaction of the used trading app service. As a result of the study, the authenticity of the used trading app service significantly affected the satisfaction of the used trading app service. Appeared to be The results of this study will help understand used transaction app services where consumption of used products occurs from the viewpoint of product circular use behavior and can be used as a strategic plan to promote the use of used transaction apps in the future.

Real-Time Transaction Scheduling Method without Timing Covert Channel (시간 비밀 채널을 제거하는 실시간 트랜잭션 스케줄링 기법)

  • 조숙경;김종훈;정현민;정미영;배영호;배해영
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.1053-1068
    • /
    • 2003
  • In this paper, we propose a new scheduling method without timing covert channel of real-time transaction for secure database systems that implement mandatory access control. Our scheduling method use the wait queue based on security level to remove timing covert channel. And it use priority queue that consider transaction type, deadline, and weight. Therefore, the proposed scheduling method prevents timing covert channel because it is kept noninterference between transactions with different security level, and maximizes the sum of the weight of transactions that satisfy its deadline. The simulation results, is a comparison of traditional methods, show that our scheduling method is improved to 30%.

  • PDF

A New Reputation System for Reducing the Liars in P2P (P2P에서 Liar 감소를 위한 새로운 평판 시스템)

  • Shin, Jung-Hwa;Rhee, Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.13A no.7 s.104
    • /
    • pp.599-606
    • /
    • 2006
  • As the P2P service does not have any administration authorities that are able to manage the behavior of participants and control the malicious users, malicious user can give harm to legitimate users for the benefit of themselves. To perform the secure transaction with new members who did not have past experiences on transaction, service users can differentiate malicious users and legitimate users by referring to the reputation information that provided by users having past experience. However, users can intentionally give false evaluation to other users on Performed transaction. We call these users as 'liar'. In this Paper, we propose a new reputation system for liar reduction to guarantee an accuracy on reputation information.

A Two-way Donation Locking Protocol for Concurrency Control in Multilevel Secure Database (다단계 보안 데이터베이스에서 동시성 제어를 위한 양방향 기부 잠금 규약)

  • 김희완;이혜경;김응모
    • The KIPS Transactions:PartD
    • /
    • v.8D no.1
    • /
    • pp.24-31
    • /
    • 2001
  • In this paper, we present an advanced transaction scheduling protocol to improve the degree of concurrency and satisfy the security requirements for multilevel secure database. We adapted two-phase locking protocol, namely traditional syntax-oriented serializability notions, to multilevel secure database. Altruistic locking, as an advanced protocol, has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of altruism has also been deployed for extended altruistic locking OffiLl. This is in a way that scope of data to be early released is enlarged to include even data initially not intended to be donated. We also adapted XAL to multilevel secure database and we first of all investigated limitations inherent in both altruistic schemes from the perspective of alleviating starvation occasions for transactions in particular of short-lived nature for multilevel secure database. Our protocol is based on extended altruistic locking for multilevel secure database (XAL/MLS), but a new method, namely two-way donation locking for multilevel secure database (2DL!/-MLS), is additionally used in order to satisfy security requirements and concurrency. The efficiency of the proposed protocol was verified by experimental results.

  • PDF

연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계

  • Lee, Gyeong-Jeon;Jeong, Mu-Jeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.226-233
    • /
    • 2005
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. So when you try to define it with simple words, it gets even more confusing. Payment. however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. In the end, the key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, Strong Personal Device, and peer-based if information transactions. We also propose U-SDT Protocol integrating critical technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

A Distributed Altruistic Locking Scheme For Multilevel Secure Database in Wireless Mobile Network Environments (무선 이동 네트워크 환경에서 다단계 보안 데이터베이스를 위한 분산 이타적 잠금 기법)

  • Kim, Hee-Wan;Park, Dong-Soon;Rhee, Hae-Kyung;Kim, Ung-Mo
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.235-242
    • /
    • 2002
  • We propose an advanced transaction scheduling protocol for concurrency control of multilevel secure databases in wireless mobile network environment. Wireless communication is characterized by frequent spurious disconnections. So short-lived transaction must quickly access database without any delay by long-lived one. We adapted two-phase locking protocol, namely traditional syntax-oriented serializability notions, to multilevel secure databases in wireless mobile network environment. Altruistic locking, as an advanced protocol, has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of a1truism has also been deployed for extended a1truistic locking. This is in a way that scope of data to he early released is enlarged to include even data initially not intended to be donated. Our protocol is based on extended altruistic locking, but a new method, namely bi-directional donation locking for multilevel secure databases (MLBiDL), is additionally used in order to satisfy security requirements and concurrency. We showed the Simulation experiments that MLBiDL outperforms the other locking protocols in terms of the degree of throughput and average waiting time.

Hardware Implementation of Korea Standard Hash Function HAS-160 (한국표준 해쉬함수 HAS-160의 하드웨어 구현)

  • 서영호;김종현;김왕현;김동욱
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.587-589
    • /
    • 2000
  • 이 논문은 한국정보통신기술협회에 의해 1998년 11월에 제정된 HAS-160 해쉬 함수를 하드웨어로 구현하였다. SET(Secure Electronic Transaction) 혹은 SSL(Secure Socket Layer)등의 암호 프로토콜에서 하나의 구성 요소를 이루기 위해 설계되었고 초기값을 원래의 알고리즘에서 주어진 값이 아닌 사용자 혹은 프로토콜이 요구하는 값으로 입력할 수 있게 하였다. 전체적으로 회로는 VHDL top-down 설계 방법을 따랐고 IEEE 표준 라이브러리만을 사용하여 범용성을 가진다. 그리고 블록들은 내부적으로 행위적 수준(behavior level)에서 설계되었고 설계된 각각의 블록들은 구조적 수준(structure-level)에서 연결되었다. 설계된 회로는 125MHz의 클럭 주파수와 26Mbps의 성능으로 동작하며 ALTERA FLEX10K EPF10K200칩에서 6018(60%)개의 셀을 차지한다.

  • PDF

Global Recovery Management Protocol for Heterogeneous System in Security Environments (보안환경에서 이질형 시스템의 전역 복구 관리 프로토콜)

  • Jeong, Hyun Cheol
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.51-59
    • /
    • 2009
  • Many failures are due to incorrectly programmed transactions and data entry errors. System failure causes the loss or corruption of the contents of volatile storage. Although global processing protects data values to detect direct or indirect information effluence, security environments are very important in the recovery management of heterogeneous systems. Although transaction can't control system fault, the restart for the system can cause information effluence by low bandwith. From various faults, it is not easy to maintain the consistency and security of data. This paper proposes recovery management protocols to assure global multilevel secure one-copy quasi-serializability in security environments of heterogeneous systems with replicated data and proves its correctness. The proposed secure protocols guarantee the reliability and security of system when the system fault is happened.

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.