• Title/Summary/Keyword: security goods

Search Result 153, Processing Time 0.026 seconds

Implementing Onetime Password based Access Control System for Secure Sharing Service

  • Kang, Namhi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.1-11
    • /
    • 2021
  • Development of ICT technologies leads exponential growth of various sharing economy over the last couple of years. The intuitive advantage of the sharing economy is efficient utilization of idle goods and services, but there are safety and security concerns. In this paper, we propose a onetime password based access control system to support secure accommodation sharing service and show the implementation results. To provide a secure service to both the provider and the user, the proposed system issues a onetime access password that is valid only during the sharing period reserved by the user, thereafter access returns to the accommodation owner. Especially, our system provides secure user access by merging the two elements of speaker recognition using voice and a one-time password to open and close the door lock. In this paper, we propose a secure system for accommodation sharing services as a use-case, but the proposed system can be applicable to various sharing services utilizing security-sensitive facilities.

The Importance of International Transport and Logistics Infrastructure in the Economic Development of the Country: The Case of the EU for Ukraine

  • Atamanenko, Yuliia;Komchatnykh, Olena;Larysa, Sukhomlyn;Viacheslav, Didkivskyi;Sulym, Borys;Losheniuk, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.198-205
    • /
    • 2021
  • For twenty years, in the EU there has been a trend of a lack of maritime infrastructure and a redundance of the road one, which has a negative impact on the economy. The intermodal transport market structure in the EU has not changed over the past ten years. The stability of transport systems due to the lack of changes in the transport market remains under threat, affecting supply chains and networks through the optimization of warehousing and transportation costs. The research methodology is based on a quantitative assessment of cause-and-effect relations between economic growth and transport and logistics in the EU. A statistical analysis of security indicators, intermodal and modal transport, international trade in goods within the EU and in the world trade in goods, the dynamics of GDP of the EU countries, the level of openness of the EU economy, investment and maintenance costs of different modes of transport and infrastructure has been carried out. The results show that in 2000- 2010 there were positive changes in the transport and logistics infrastructure of the EU, which had a positive effect on trade, openness of the economy of the EU, GDP growth. However, at that time, negative effects of environmental impact and the load on road and rail transport were accumulating. Investment in different modes of transport is limited, and technical maintenance and infrastructure maintenance costs form a significant part of GDP of the EU. A slowdown in economic growth leads to budget constraints and infrastructure financing gap. As a result, the freight and passenger intermodal and modal transport market structure remains virtually unchanged. The load on rail and road transport remains stable, despite the reduced level of transport hazards. Transport productivity has declined over the past ten years. Herewith, the intensification of trade and the openness of the EU economies require constant modernization and innovative renewal. The EU policy in this direction remains normative, uncontrolled, which is reflected in investment differences within the EU and maintenance costs.

Analysis of Critical Success Factors for E-Commerce through Comparative Study among Korea, U.S.A. and Japan (전자상거래의 성공요인: 한.미.일 비교 분석)

  • Sung, Tae-Kyung
    • Asia pacific journal of information systems
    • /
    • v.13 no.4
    • /
    • pp.171-189
    • /
    • 2003
  • The three main purposes of this paper are to (1) identify critical success factors(CSFs) for electronic commerce(EC), (2) investigate the explanatory power of these CSFs on firm performance, and (3) compare differences in evaluating CSFs and explaining impact of CSFs on performance among Korea, Japan, and U.S.A. EC firms. Through a literature review and interviews with managers in EC firms, a list of 16 CSFs consisting of 111 items was compiled. In the second stage, questionnaires were administered to managers of EC companies in Seoul, Korea, Tokyo, Japan, and Texas, U.S.A. Survey results show that CSFs have very significant explanatory power for firm performance in Korea, Japan, and U.S.A. While security, privacy, technical expertise, information about goods/services, and variety of goods/services are the most explanatory CSFs in Korea and Japan, evaluation of EC operations, technical expertise, and ease of use show most explanatory power in U.S.A. In general, respondents in Korean and Japan evaluate CSFs quite differently compared to U.S.A counterparts.

A Study on the Way of Purchasing Cost Reduction through Streamlining Procurement Tasks: Focusing on Rolling Stock and Components (구매 업무 효율화를 통한 구매비용 절감 방안에 관한 연구: 철도차량 및 차량용품을 중심으로)

  • Lee, Sun-Kwan;Shin, Tack-Hyun
    • Journal of the Korean Society for Railway
    • /
    • v.12 no.4
    • /
    • pp.557-564
    • /
    • 2009
  • This study compared KORAIL's procurement tasks with that of other companies. after analyzing the institutional and operational problems in procurement tasks especially in the respect of rolling stock and components which are KORAIL's major purchasing items, this study presented the way of purchasing cost Reduction through improving and streamlining procurement tasks.

Study on Smart TV Forensics (스마트 TV 포렌식에 관한 연구)

  • Kang, Hee-Soo;Park, Min-Su;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.851-860
    • /
    • 2014
  • With an increasing demand of powerful electronic goods, smart TV containing network module with digital TV gets more popular. These change are meaningful from a digital forensics perspective because smart TV store more user's data than digital TV. In this paper, we suggest smart TV forensics as a branch of digital forensics. With smart TV forensics, investigator can trace more wide age group's activities than existing digital forensics analysis.

A Study on the Correlation between the Investigation on the Violation Crime of Intellectual Property Rights and the Goods Inspection in Customs Law (관세법상 지식재산권 침해사범 수사와 물품검사와의 상호관계)

  • Ye, Sangkyun
    • International Commerce and Information Review
    • /
    • v.19 no.3
    • /
    • pp.197-214
    • /
    • 2017
  • It requires professional knowledge and much time to judge intellectual property rights infringement. The duties of customs administration are the balance between the propositon of trade facilitation through rapid clearance and the thesis of social security through exact examination. There is a view that the criminal procedure law control is necessary to the goods inspection of clearnce procedure if it is related to crimianl investigation. However, it seems that the customs law does not consider the goods inspection investigation as the investigation under judicial control, but only the mere administrative investigation. It can be said that the inspection of goods by customs law functioning as a clue of investigation is confined to the ordinary goods inspection, including the screening test. Searching for specific articles by specific informaition should be under the control of criminal procedure law because it constitutes the commencement of criminal investigation in criminal cases. This interpretation could be an opportunity as a harmonious operation between the goods inspection of customs clearance and the search and seizure of criminal procedure.

  • PDF

A Study on the Traffic Patterns of Dangerous Goods Carriers in Busan North and Gamcheon Port (부산 북항·감천항의 위험화물운반선 통항패턴에 관한 연구)

  • Kim, Jong-Kwan;Kim, Se-Won;Lee, Yun-Sok
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.1
    • /
    • pp.9-16
    • /
    • 2017
  • As a preliminary study of enter or leaving traffic patterns of the Korea main port, port Management Information System (Port-MIS) data was used to check the volume of vessels entering and leaving the port of Busan, and three consecutive days from each seasons were selected for study. Selected 12-day General Information Center on Maritime Safety & Security (GICOMS) data was also used to analyze the traffic pattern in the main traffic lane of Busan port for dangerous goods carrier. Also, the distance between dangerous goods carriers and Oryukdo breakwater of east breakwater in the main traffic lane was analyzed. Collision probability was estimated using the cumulative probability distribution function of the normal distribution for the maritime traffic safety audit scheme based on the assumption that a ship's trajectory has a normal distribution for a section of the route. However, in case of entry or leaving thorough the Oryukdo breakwater and entry thorough the east breakwater, ship's sailing trajectories were revealed not to follow a normal distribution via regularity testing using a KS-test and SW-test. Especially in the north port, the tendency of the right side of the ship to pass was remarkable. It is desirable to develop a traffic model suitable for the characteristics of the port rather than to apply general traffic theories, and to apply this model to a maritime traffic safety diagnosis, so further research is needed.

A Design of Security Protocol for Active Warehouse Condition Management System based on Ubiquitous Environment (유비쿼터스 환경에능동형 창고 상태관리를 위한 보안 프로토콜 설계)

  • John, Young-Jun;Choi, Yong-Sik;Shin, Seung-Ho;Park, Sang-Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.6
    • /
    • pp.91-108
    • /
    • 2006
  • RFID/USN is important infrastructure of the ubiquitous society. And so, It is various and practical research is attempted. These two base technology have physical characteristic and complement relationship. Like this relationship is applied Following example that is system research which manages warehouse stocks and conditions. First, We adhere RFID Tag at the Pallet of the warehouse and do identification goods. And then, It grasps the environment state information of stocks with sensor module which has Zigbee wireless communication function. From like this process RFID Tag information and jop-control command of sensor node also it is exposed to air. Therefore, We control sensor node in USN/RFID environment through the mobile device. And system design for the security Apply of the process is main purpose of this paper's. We propose the condition and function of the mobile device to the secondary. And We define the relation of the sensor node with RFID to be arranged to a warehouse. Finally, This paper is designed to find a trade-off of the following viewpoints. First, We offer suitable sensor-control information to a actual manager. Second, We offer RFID tag security approach to control the action of the sensor. Third, It increases the survivability of sensor node form.

Architectural Design Elements for Hazard-Resistant and Reduction House (방재 및 감재주택을 위한 건축 계획 요소의 설정)

  • Kim, Hyeong-Eon
    • KIEAE Journal
    • /
    • v.16 no.6
    • /
    • pp.77-82
    • /
    • 2016
  • Purpose: Almost every research carried out in our country against the natural disaster is focused on the temporary facilities such as temporary housing, emergency shelter and as a result, it is very hard to find out researches on the ordinary houses which installed integrated systems of hazard-resistant against the natural disaster. Method: To conduct this research, categorizing process for design, structural, environmental and installation elements found in the Hazard-Resistant and Reduction House built for sale in Japan was performed. Result: In this study, several design concepts and subordinate items are recommended for hazard-resistant housing. First, design concept of 'Preparedness' which means security and access to the storage storing goods especially food & beverage for the emergencies is needed. The subordinate items consist of security of stocking space, diversified and circular storage system, and safety storage system. Second, design concept of 'Security' which means security of physical safety space and rapid recovery to returning to daily life against natural disaster is needed. The subordinate items consist of many items including not only structure and facilities but also architectural design method. And finally, design concept of 'Maintenance, Support and Return' which means minimizing the physical and psychological damages and support safety and physical conditions of the victims from the impact of the disaster to returning to daily life is needed. The subordinate items consist of high efficiency insulation/airtightness design, microclimate design, combination of photovoltaic system and storage battery, non-power appliance system against the power failure, storing system for drinking water, rainwater storing and utilization system.

A Study on National Control Policy for the Use of Encryption Technologies by an Accused Person (피의자 개인의 암호이용 통제정책에 대한 연구)

  • Baek, Seung-Jo;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.271-288
    • /
    • 2010
  • In this paper, we study the dysfunctions of cryptography as dual-use goods and national domestic encryption control policies like key recovery system and decryption order. And we examine risks of the breach of the peoples' constitutional rights like the right to privacy in these policies and analyze these policies by applying the principle of the ban on the over-restriction. Finally, we propose the direction and requirements of our national domestic encryption control policy that maintains the balance of peoples' constitutional rights and investigatory powers.