• Title/Summary/Keyword: security and integrity

Search Result 714, Processing Time 0.026 seconds

A study of the methodology for the long-term preservation of electronic records : focus on the preservation concept (전자기록물의 장기보존을 위한 방안 연구 : 개념을 중심으로)

  • Nam, Sung-Un;Yoon, Dai-Hyun
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.1 no.2
    • /
    • pp.101-119
    • /
    • 2001
  • In this paper we explain the definition and component of electronic records, and reestablish the principle of the preservation. Also we discuss the conceptual approaches and requirements for long-term preservation in an electronic environment. The preservation in digital environment is to protect itself of record identity with the reliability and authenticity, and to ensure the accessibility of records. It needs to be periodical migration along with digital environment change for the long-term preservation of the electronic records. and to select software independent standard format. to ensure the integrity of electronic records along with this preservation strategy, process and relative information required for digital preservation are to record in the form of metadata. The preservation system is separated into four functional entities ; registration process, preservation process, access process, main record management system. Also, this article is conceptually to introduce the selection criteria of storage media, the security provision for the archive collections and the disaster recovery which apply to the digital archives.

Secure routing security algorithm S-ZRP used Zone Routing Protocol in MANET (MANET환경에서 Zone Routing Protocol을 이용한 안전한 경로설정 보안 알고리즘 S-ZRP)

  • Seo Dae-Youl;Kim Jin-Chul;Kim Kyoung-Mok;Oh Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.4 s.346
    • /
    • pp.13-21
    • /
    • 2006
  • An mobile ad hoc network(MANET) is a collection of wireless computers (nodes), communicating among themselves over multi-hop paths, without the help of any infrastructure such as base stations or access points. Prior research in MANET has generally studied the routing problem in a non-adversarial setting, assuming a trusted environment. In this paper, we design and evaluate the Secure Zone Routing Protocol(T-ZRP), a secure ad hoc network routing protocol is based on the design of the hash chain. In order to support use with nodes of limited CPU processing capability, and to guard against Denial-of-Service attacks in which an attacker attempts to cause other nodes to consume excess network bandwidth or processing time, we use efficient one-way hash functions and don't use asymmetric cryptographic operations in the protocol. Proposed algorithm can safely send to data through authentication mechanism and integrity about routing establishment.

A System Implementation for Issuing and Verifying the Electronic Receipt for M-Commerce (무선 전자상거래를 위 한 전자영수증 발급 및 검증 기법 구현)

  • Park, Keun-Hong;Cho, Seong-Je
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.559-566
    • /
    • 2003
  • As cell phone and PDA have been in common use recently, there is a growing tendency to utilize the mobile terminals for M-Commerce. The information security and the receipt of e-trade are very important to support reliable digital transactions in wireless environment as in wired environment. Even though some work such as WML digital signature and WPKI has been studied for M-Commerce, there are several problems on the aspects of the functional limitation of the mobile terminals and the unsecure data transformation of WAP gateway. In this study we have designed and implemented a prototype system of issuing and verifying the electronic receipt that guarantees authentication, data integrity and non-repudiation for secure mobile e-commerce. Moreover, we have enhanced the system performance by letting the trusted independent server verify and manage the electronic receipt.

Reassessment on the CMI Rules for Electronic Bills of Lading (전자선화증권(電子船貨證券)에 관한 CMI 규칙(規則)의 재조명(再照明))

  • Choi, Myung-Kook
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.54
    • /
    • pp.235-260
    • /
    • 2012
  • The CMI Rules for Electronic Bills of Lading were based on sound principles that are now reflected in the provisions of the Rotterdam Rules, which provide for the use of electronic equivalents to bills of lading. Services involving bills of lading which exist in electronic form for at least part of their lives, and which use encryption to guarantee integrity and security of these electronic records, are already being offered by a number of carriers, among them APL. The relative success of APL's system demonstrates that the use of a system which embodies the basic ideas and processes underlying the CMI Rules could easily become a practical reality in the near future. The basic principles in the CMI Rules and the Rotterdam Rules adopt a minimum requirements approach and does not flesh out the details of procedures for the use of electronic bills. This is an improvement, as it allows adaptability to future technological developments. Successful electronic bill of lading systems can only be developed in response to customer demand, and carriers are in the best position to gauge this and design systems to cater for it. APL has demonstrated this by creating a system which is tailor-made to its customers' requirements. The CMI Rules were correct in their assumption that electronic bill of lading services should be provided by carriers. They also seem to have anticipated that the switch to the electronic medium would not be sudden and complete, but would require a gradual phasing out of paper documents over a long period of time.

  • PDF

A Study of Using the Car's Black Box to generate Real-time Forensic Data (자동차의 블랙박스를 이용한 실시간 포렌식 자료 생성 연구)

  • Park, Dea-Woo;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.253-260
    • /
    • 2008
  • This paper is based on the ubiquitous network of telematics technology, equipped with a black box to the car by a unique address given to IPv6. The driver's black box at startup and operation of certification, and the car's driving record handling video signals in real-time sensor signals handling to analyze the records. Through the recorded data is encrypted transmission, and the Ubiquitous network of base stations, roadside sensors through seamless mobility and location tracking data to be generated. This is a file of Transportation Traffic Operations Center as a unique address IPv6 records stored in the database. The car is equipped with a black box used on the road go to Criminal cases, the code automotive black boxes recovered from the addresses and IPv6, traffic records stored in a database to compare the data integrity verification and authentication via secure. This material liability in the courtroom and the judge Forensic data are evidence of the recognition as a highly secure. convenient and knowledge in the information society will contribute to human life.

  • PDF

Application of blockchain in the food industry (식품 산업에서의 블록체인의 응용)

  • Kim, Sangoh
    • Food Science and Industry
    • /
    • v.54 no.3
    • /
    • pp.132-144
    • /
    • 2021
  • Along with the rise in the value of cryptocurrency, the interest of the blockchain is very high. However, most people do not understand cryptocurrency and blockchain very well. In addition, due to this lack of understanding of the technology, ideas about how blockchain technology can be applied in the food industry may not come up. Therefore, this content describes the advantages of blockchain technology in terms of security, starting with the understanding and operation method of cryptocurrency and blockchain technology, and briefly describes the development of a blockchain system. And simple examples of how this blockchain technology can be applied to other industries are summarized, and examples used in the food industry are summarized. Finally, it was insisted that using such a blockchain technology can provide safe food to consumers.

Integrated Authentication and Key Management Method among Heterogeneous Wireless Mobile Networks (이기종 무선 이동망간 통합 인증 및 키관리 기법)

  • Park Hyung-Soo;Lee Hyung-Woo;Lee Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.50-59
    • /
    • 2006
  • The new communication paradigm is rapidly shifted from wireless mobile networks to an All-IP(Internet Protocol) network, led by service industry leaders and communication manufacturers. In this paradigm, providing authentication and session keys of a subscriber becomes one of the critical tasks because of IP open accessibility among heterogeneous networks. In this paper, we introduce authentication process procedure of heterogeneous wireless mobile networks and develop so-called IMAS(Integrated Mobile Authentication Server) which can securely inter-work among all mobile networks and support the legacy networks with backward compatibility. Especially, in designing IMAS, mobile authentication inter-working mechanism, key management technique, and other issues to be overcome are presented. We analyze and evaluate the performance of authentication algorithm which creates session key. A simulation environment of IMAS is established, and a performance(TPS; Transaction Per Second) result is analyzed and evaluated. It turned out that IMAS works among heterogeneous wireless mobile networks without compensating efficiency and functionalities of the legacy networks and decrease the entropy of data redundancy and data inconsistency among networks because of the integrity of the distributed Data Base(DB).

Formation of a Person's Value Attitude to the Worldview Using Information Technologies

  • Yakymenko, Svitlana;Drobin, Andrii;Fatych, Mariia;Dira, Nadiia;Terenko, Olena;Zakharevych, Mykola;Chychuk, Antonina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.183-190
    • /
    • 2022
  • The article analyzes the features of the formation of a person's value attitude to the worldview by means of information technologies. The present considers it necessary to form a person's value attitude to the perception of the world by means of information technologies. The explosive development of information and telecommunications technologies has become a determining factor in the development of modern society, which is called the information or Global Information Society. It is not yet fully formed, and we are all participants in the development of the Global Information Society. The article considers the basics of a harmonious worldview of a person, which is the basis for the formation of outlook ideas, views, knowledge, beliefs about the surrounding world, which determine the place and role and motivate actions in relation to the surrounding reality through the prism of value orientations. Worldview is considered as an integrity of relatively stable schemes, behaviors, feelings, thinking, vision of the surrounding world, inherent in an individual child, ethno-cultural and socio-cultural groups. The concept of "worldview" as a component of the multi-level structure of the individual's outlook is defined. The features that characterize a person's perception of the world are revealed. The main educational value of information technologies in the formation of a person's value attitude to the perception of the world is highlighted, which consists in the fact that they allow you to create an immeasurable brighter multi-sensory interactive learning environment with almost unlimited potential opportunities that fall at the disposal of both the teacher and the student. The trend of forming a person's value attitude to the perception of the world is clearly developing in the direction of mixed learning as a process that creates a comfortable information educational environment, communication systems that provide all the necessary educational information. The approach to student development by means of the educational environment and the formation, while in the person of a value attitude to the perception of the world by means of Information Technologies, has many pedagogical advantages, which is considered in the article.

Study on Mechanism of Preventing Application Piracy on the Android Platform (안드로이드 어플리케이션 위변조 방지를 위한 방안 연구)

  • Lee, Kwang-Hyoung;Kim, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6849-6855
    • /
    • 2014
  • Recently, with the increasing use of smart phones, security issues, such as safety and reliability of the use of the Android application has become a topic to provide services in various forms. An Android application is performed using several important files in the form of an apk file. On the other hand, they may be subject to unauthorized use, such as the loss of rights and privileges due to the insertion of malicious source code of these apk files. This paper examines the Android environment to study ways to define the threats related to the unauthorized use of the application source code, and based on the results of the analysis, to prevent unauthorized use of the application source code. In this paper, a system is provided using a third body to prevent and detect applications that have been counterfeited or forged illegally and installed on Android devices. The application provides services to existing systems that are configured with only the service server that provides users and applications general, This paper proposes the use of a trusted third party for user registration and to verify the integrity of the application, add an institution, and provide a safe application.

Biometric and Identity Reference Protection (개인식별정보와 바이오인식정보의 보호기법)

  • Shin, Yang-Nyuo;Kwan, Man-Jun;Lee, Yong-Jun;Park, Jin-Il;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.160-167
    • /
    • 2009
  • This paper describes how to protect the personal information of a biometric reference provider wherein biometric reference and personally identifiable information are bounded in a biometric system. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person is usually adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular individual when combining with the other information. As a result, secure protection methods are required for generating, storing, and transmitting biometric information. Considering these issues, this paper proposes a method for ensuring confidentiality and integrity in storing and transferring personally identifiable information that is used in conjunction with biometric information, by extending the related X9.84 standard. This paper also outlines the usefulness of the proposition by defining a standard format represented by ASN.1, and implementing it.