• Title/Summary/Keyword: third party application

Search Result 107, Processing Time 0.021 seconds

RFID Authentication System with ID Synchronization (ID 동기화를 가지는 RFID 인증 시스템)

  • Park Jang-Su;Lee Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.615-623
    • /
    • 2006
  • It has been estimated that 'RFID' technology would be playing an important role in the incoming ubiquitous environment. For this reason, many studies on 'RFID' have been conducted and its application has been on the increase in various fields such as finance, medicine, transportation and culture as well as in logistics distribution. However, the communication between Tag and Reader in RFID system has been conducted by wireless communication of radio frequency so that the information on identification could be eavesdropped by the third party maliciously. Such eavesdropped information could be also used as basic information in attacking others; in this regard, it could impair the privacy of its users and the users have avoided using 'RFID.' To solve theses problems, many studies are being performed to different output of tags by renewing ID. However, protocols have been devised without considering an ID Synchronization in the ID renewal process between database and tag in the existing studies. In this regard, this study has suggested a RFID Authentication Protocol while considering the ID Synchronization.

  • PDF

A Study on the Analysis and Solutions of the Blockchain Security Issues (블록체인 보안 이슈에 대한 분석과 해결 방안에 대한 연구)

  • Noh, Siwan;Rhee, Kyung-Hyune
    • Journal of Internet Computing and Services
    • /
    • v.20 no.4
    • /
    • pp.1-11
    • /
    • 2019
  • A Blockchain-based access control technology is one of the various use cases of blockchain and is used in many areas to transparently transfer and manage ownership of data between users without the trusted third party. The characteristics of transparency, Irreversibility, and decentralization provided by the public blockchain help to offer new benefits that existing access control technologies did not offer. However, various security issues facing the current blockchain are raising the issue of the safety of the technology. Therefore, in this paper, we analyze an overview of the blockchain-based access control technology and solutions of the security challenges faced. Moreover, we further present solutions that are not affected by the blockchain trilemma and models of access control technology based on them.

Non-Interactive Oblivious Transfer Protocol based on EIGamal in WAP (WAP에서 사용 가능한 ElGamal 기반의 비대화형 불확정 전송 프로토콜)

  • 정경숙;홍석미;정태충
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.11-18
    • /
    • 2003
  • As the Internet moves to mobile environment, one of the most serious problems for the security is to required a new security Protocol with safety and efficiency. To solve the problem. we Propose a new Protocol that reduces the communication franc and solves the problem associated with the private security keys supplied by the trusted third party. The protocol is a non-Interactive oblivious transfer protocol, based on the EIGamal public-key algorithm. Due to its Non-Interactive oblivious transfer protocol, it can effectively reduce communication traffic in server-client environment. And it is also possible to increase the efficiency of protocol through the mechanism that authentication probability becomes lower utilizing a challenge selection bit. The protocol complexity becomes higher because it utilizes double exponentiation. This means that the protocol is difficult rather than the existing discrete logarithm or factorization in prime factors. Therefore this can raise the stability of protocol.

The Study of technique to find and prove vulnerabilities in ActiveX Control (ActiveX Control 취약점 검사 및 검증 기법 연구)

  • Sohn, Ki-Wook;Kim, Su-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.3-12
    • /
    • 2005
  • To provide visitors with the various services, Many web sites distribute many ActiveX controls to them because ActiveX controls can overcome limits of HTML documents and script languages. However, PC can become dangerous if it has unsecure ActiveX controls, because they can be executed in HTML documents. Nevertheless, many web sites provide visitors with ActiveX controls whose security are not verified. Therefore, the verification is needed by third party to remove vulnerabilities in ActiveX controls. In this paper, we introduce the process and the technique to fad vulnerabilities. The existing proof codes are not valid because ActiveX controls are different from normal application and domestic environments are different from foreign environments. In this paper, we introduce the technique to prove vulnerabilities in ActiveX control.

Securing Objectivity of Qualitative Assessment Results using Ordered Probit Model (순서형 프로빗 모델을 활용한 정성적 평가 결과의 객관성 확보방안)

  • Jeong, Minkyu;Kang, Yuncheol;Kim, Namchul;Chung, Kwanghun
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.81-94
    • /
    • 2022
  • In the service sectors, the qualitative evaluation method in the form of a survey is widely used as a major assessment tool to evaluate the quality of service. However, the results obtained from a survey can involve the subjective judgment of the respondent. In this study, we propose a method to secure objectivity by excluding subjectivity that may be included in the qualitative evaluation results. In particular, we deal with a situation where the same type of qualitative evaluation tool is used repeatedly by several service providers. To this end, by utilizing both the Ordered Probit model and third-party evaluation results, we determine whether subjectivity is involved in the results. After correcting subjectivity, the final results are obtained through statistical analysis. The application analyzed in this study is the medical service area. With the actual evaluation results supplied by the service providers, we explain how objectivity can be secured from the assessment data by applying our proposed approach.

Collaborative Modeling of Medical Image Segmentation Based on Blockchain Network

  • Yang Luo;Jing Peng;Hong Su;Tao Wu;Xi Wu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.958-979
    • /
    • 2023
  • Due to laws, regulations, privacy, etc., between 70-90 percent of providers do not share medical data, forming a "data island". It is essential to collaborate across multiple institutions without sharing patient data. Most existing methods adopt distributed learning and centralized federal architecture to solve this problem, but there are problems of resource heterogeneity and data heterogeneity in the practical application process. This paper proposes a collaborative deep learning modelling method based on the blockchain network. The training process uses encryption parameters to replace the original remote source data transmission to protect privacy. Hyperledger Fabric blockchain is adopted to realize that the parties are not restricted by the third-party authoritative verification end. To a certain extent, the distrust and single point of failure caused by the centralized system are avoided. The aggregation algorithm uses the FedProx algorithm to solve the problem of device heterogeneity and data heterogeneity. The experiments show that the maximum improvement of segmentation accuracy in the collaborative training mode proposed in this paper is 11.179% compared to local training. In the sequential training mode, the average accuracy improvement is greater than 7%. In the parallel training mode, the average accuracy improvement is greater than 8%. The experimental results show that the model proposed in this paper can solve the current problem of centralized modelling of multicenter data. In particular, it provides ideas to solve privacy protection and break "data silos", and protects all data.

Conclusion of Conventions on Compensation for Damage Caused by Aircraft in Flight to Third Parties (항공운항 시 제3자 피해 배상 관련 협약 채택 -그 혁신적 내용과 배경 고찰-)

  • Park, Won-Hwa
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.1
    • /
    • pp.35-58
    • /
    • 2009
  • A treaty that governs the compensation on damage caused by aircraft to the third parties on surface was first adopted in Rome in 1933, but without support from the international aviation community it was replaced by another convention adopted again in Rome in 1952. Despite the increase of the compensation amount and some improvements to the old version, the Rome Convention 1952 with 49 State parties as of today is not considered universally accepted. Neither is the Montreal Protocol 1978 amending the Rome Convention 1952, with only 12 State parties excluding major aviation powers like USA, Japan, UK, and Germany. Consequently, it is mostly the local laws that apply to the compensation case of surface damage caused by the aircraft, contrary to the intention of those countries and people who involved themselves in the drafting of the early conventions on surface damage. The terrorist attacks 9/11 proved that even the strongest power in the world like the USA cannot with ease bear all the damages done to the third parties by the terrorist acts involving aircraft. Accordingly as a matter of urgency, the International Civil Aviation Organization(ICAO) picked up the matter and have it considered among member States for a few years through its Legal Committee before proposing for adoption as a new treaty in the Diplomatic Conference held in Montreal, Canada 20 April to 2 May 2009. Accordingly, two treaties based on the drafts of the Legal Committee were adopted in Montreal by consensus, one on the compensation for general risk damage caused by aircraft, the other one on compensation for damage from acts of unlawful interference involving aircraft. Both Conventions improved the old Convention/Protocol in many aspects. Deleting 'surface' in defining the damage to the third parties in the title and contents of the Conventions is the first improvement because the third party damage is not necessarily limited to surface on the soil and sea of the Earth. Thus Mid-air collision is now the new scope of application. Increasing compensation limit in big gallop is another improvement, so is the inclusion of the mental injury accompanied by bodily injury as the damage to be compensated. In fact, jurisprudence in recent years for cases of passengers in aircraft accident holds aircraft operators to be liable to such mental injuries. However, "Terror Convention" involving unlawful interference of aircraft has some unique provisions of innovation and others. While establishing the International Civil Aviation Compensation Fund to supplement, when necessary, the damages that exceed the limit to be covered by aircraft operators through insurance taking is an innovation, leaving the fate of the Convention to a State Party, implying in fact the USA, is harming its universality. Furthermore, taking into account the fact that the damage incurred by the terrorist acts, where ever it takes place targeting whichever sector or industry, are the domain of the State responsibility, imposing the burden of compensation resulting from terrorist acts in the air industry on the aircraft operators and passengers/shippers is a source of serious concern for the prospect of the Convention. This is more so when the risks of terrorist acts normally aimed at a few countries because of current international political situation are spread out to many innocent countries without quid pro quo.

  • PDF

Logistics Cost Analysis on Electronic Commerce(EC) by Delivery Type (전자상거래에서의 상품운송 유형에 따른 물류비 분석)

  • 배명환;오세창
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.1
    • /
    • pp.17-28
    • /
    • 2001
  • The purpose of this study is to analyze logistics cost of transportation systems on EC(electronic commerce) between company and consumer. Transportation system in logistics is classified by three types on EC. The first type is the direct delivery from supply factory to consumers(type I). The second type is the delivery through distribution center in each area by owner logistics company (type II). The third type is the commission of delivery to the third party logistics company(type III). The logistics of EC has various service characteristics such as dealing with small quantity, various goods, and high frequency. This study assumes that all day's order is delivered on a next day. The logistics cost function is calculated according to the number of orders, delivery distance, transport quantify. and allocated freight trucks for daily order of the subject zone. The logistics cost changes according to the daily order characteristics. Therefore it is simulated to analyze the logistics cost change that considers the type of transportation's order characteristics. As a result of analysis, if the number of order is less than 10 and the quantify of each order is less than 10kg, type III has an advantage over the others And if the number of order is more than 10 and the quantity of each order is more than 10kg, type I has an advantage in the same zone and type II has an advantage in the other zones. This study is limited on the actual application because this study doesn't consider logistics infra of supply company and transport service time. If further study that considers these factors is implemented, it can estimate more accurate logistics cost on EC and propose an efficient freight transport alternatives to the company. This study attributes to estimate the logistics cost change over the frequency of daily order, the quantify of supply goods, and the transport distance on EC.

  • PDF

A Study on the Application of the New York Convention in the Recognition and Enforcement of ISDS Arbitral Awards (투자협정중재에 의한 중재판정의 승인·집행에 대한 뉴욕협약 적용에 관한 고찰)

  • Kang, Soo Mi
    • Journal of Arbitration Studies
    • /
    • v.29 no.1
    • /
    • pp.31-52
    • /
    • 2019
  • As international transactions have grown more numerous, situations of disputes related to the transactions are getting more complicated and more diverse. Cost-effective remedies to settle the disputes through traditional methods such as adjudications of a court will be insufficient. There fore, nations are attempting to more efficiently solve investor-state disputes through arbitration under organizations such as the ICSID Convention, the ICSID Additionary Facility Rules, and the UNCITRAL Arbitration Rules by including the provisions on investor-state dispute settlement at the conclusion of an investment agreement. In case of an arbitration under the ICSID Convention, ICSID directly exercises the supervisorial function on arbitral proceedings, and there is no room for the intervention of national courts. In time of the arbitration where the ICSID Convention does not apply, however, the courts have to facilitate the arbitral proceedings. When the recognition and enforcement of an arbitral award under the ICSID Convention are guaranteed by the Convention, it should be considered that the New York Convention does not apply to them under the Convention Article 7 (1) fore-end. In exceptional cases in which an arbitral award under the ICSID Convention cannot be recognized or enforced by the Convention, the New York Convention applies to the recognition and enforcement because the award is not a domestic award of the country in which the recognition or enforcement is sought. It is up to an interpretation of the New York Convention whether the New York Convention applies to ISDS arbitral awards not based on the ICSID Convention or not. Although an act of the host country is about sovereign activities, a host country and the country an investor is in concurring to the investment agreement with the ISDS provisions is considered a surrender of sovereignty immunity, and it will not suffice to exclude the investment disputes from the scope of application of the New York Convention. If the party to the investment agreement has declared commercial reservation at its accession into the New York Convention, it should be viewed that the Convention applies to the recognition and enforcement of the ISDS awards to settle the disputes over an investitive act, inasmuch as the act will be considered as a commercial transaction. When the recognition and enforcement of an arbitral award on investment disputes about a nation's sovereign act have been sought in Korea and Korea has been designated the place of the investment agreement arbitration as a third country, it should be reviewed whether the disputes receive arbitrability under the Korean Arbitration Act or not.

A Study on the Domestic Small Package Express Service′s Competitive Power Improvement Plan at EC Times (전자상거래 시대 국내 택배업의 경쟁력 향상 방안에 관한 연구)

  • 박영태;정종식
    • Proceedings of the Korean DIstribution Association Conference
    • /
    • 2002.05a
    • /
    • pp.31-59
    • /
    • 2002
  • Recently there are many changes of logistics environment Such as integrated logistics information system, the rapid growth of the domestic and international small package express service and third party logistics with Electronic Commerce. At this time it is very important to deliver to customers the goods sold through EC speedy, accurately and safely. That is to say, the role of small package express service is very important at EC times. The bottlenecks of small package express service in the circumstances of EC are the weakness of EC operating company and small package express service provider the shortage of distribution centre and cargo terminal, the shortage of skilled man with related small package express service etc. So, I suggested that for activation of EC it is necessary to strengthen the strategic alliances, introduce GPS and use the third party logistics positively in the side of small package express service provider. And it is necessary to prepare for the settlements of traffic problems, support the introduction of integrated logistics service, logistics information system, deregulate restriction such as weight limit of vehicles in the side of the government. And to government support throughout extending nation's SOC, deregulation, support to small package express service terminal, permit to stopping & parking in downtown, abolishing a no passing zone, permit to being employed foreigner. Also this service involves ensuring that the product will arrive when wanted, and in an undamaged condition.

  • PDF