• Title/Summary/Keyword: trusted CA

Search Result 6, Processing Time 0.016 seconds

A New Certificate Path Processing Scheme employed the Trusted CA for improving an efficiency on the Computational Aspect (연산적 측면의 효율성을 향상시키는 신뢰 CA를 이용한 새로운 인증 경로 처리 기법)

  • 최연희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9C
    • /
    • pp.908-922
    • /
    • 2003
  • The Public Key Infrastructure (PKI) trends to delegate the certificate path processing to the Delegated Path Discovery (DPD) Server and Delegated Path Validation (DPV) server recently. The most critical factor for the selection of the delegated server is to allow the server to be equipped with a high reliability through a low cost, and simple implementation. In this paper, we propose a new certificate path processing scheme employed the trusted CA as the DPD/DPV server by adding the capability of the Validation Authority (VA) to the trusted CA. Since our proposed scheme uses the existing trusted CA as validation server, we can achieve a high trust through a simple implementation for the processing. Besides, we propose an additional scheme for reducing an overhead on the trusted CA. it is obtained by delegating digital signature verification to CAs on the path and by skipping the repeated path processing. As the result, our proposed validation scheme can be performed efficiently with high speed and low computational overhead.

A Study on Aadjustment of the Patterns, and the Correlation between the Diagnostic Tool for Climacteric and Postmenopausal Syndrome Pattern Identification (CaPSP) and Korean Medicine Doctors' Diagnosis (갱년기장애 및 폐경기 후 증후군 변증진단 도구의 변증분류 조정과 진단의 간의 진단일치도 연구)

  • Lee, In-Seon;Kim, Jong-Won;Jeon, Soo-Hyung;Chi, Gyoo-Yong;Kang, Chang-Wan
    • The Journal of Korean Obstetrics and Gynecology
    • /
    • v.34 no.1
    • /
    • pp.1-14
    • /
    • 2021
  • Objectives: We studied for the adjustment of the patterns of 'The Diagnostic Tool for Climacteric and Postmenopausal Syndrome Pattern Identification (hereinafter CaPSPI)' (studyI) and the correlation between CaPSPI and Korean medicine doctors' diagnosis which was carried out without knowing the results of CaPSPI (studyII). Methods: The studyI followed the previous study method in 2018 (2018-3). The studyII was conducted from June 1, 2019 to July 10, 2020 with ◯◯ University Korean Medicine Hospital IRB's approval (2019-4). Doctors' diagnosis was conducted face-to-face with the subjects. Doctors' diagnosis was carried out based on the Kupperman's questionnaire, 'Diagnosis System of Oriental Medicine (hereinafter DSOM)' and four examinations (四診) records. The diagnosis was marked with 0 for 'no', 1 for 'somewhat', 2 for 'yes' and 3 for 'very yes'. The correlation between CaPSPI and the mean of doctors diagnostic scores were investigated statistically. Results: The studyI showed that heart-heat (心火) pattern was added. The Factor loading coefficient for heart-heat was 0.551 to 0.789, and the Cronbach's coefficient was 0.896. The studyII showed that the diagnosis (Kappa statistic) of two doctors showed statistically significant concordance (all eight patterns), with correlation of them were 0.3 or higher. And the correlation between the CaPSPI score and the mean of doctors' diagnostic score showed a statistically significant correlation, with liver qi depression (肝鬱) being the highest at 0.552 and dual deficiency of the heart-spleen (心脾兩虛) being the lowest at 0.301. Conclusions: Since the diagnosis results of CaPSPI showed a significant correlation with the diagnosis of Korean traditional medicine experts, it was believed that the CaPSPI results can be trusted and used for clinical purposes.

A Study on the Trust Building of Trusted Third Parties in e-Trade (제3자 신뢰기관의 전자무역 신뢰구축에 관한 연구)

  • Cho, Won-Gil;Shin, Seung-Man
    • International Commerce and Information Review
    • /
    • v.6 no.3
    • /
    • pp.159-180
    • /
    • 2004
  • This paper focus on building online trust in electronic commerce between partner that have never traded with each other before, the so-called first trade situation. For this, this paper proposes the model to build trust for conduction first trade transaction in e-trade(so-ca1led Trust Matrix Model : TMM). The TMM is based on the idea that for business to business electronic trade a balance has to be found between anonymous procedural trust, i.e. procedural solutions for trust building, and personal trust based on positive past experiences within for first trade situation, because of the lack of experience in these situations. The procedural trust solutions are related in the notion of institution-based trust, because the trust in the procedural solutions depends on the trust one has in the institutions that issued or enforces the procedure. The TMM can be used as a tool to analyze and develope trust-building services to help organizations conduct first -trade electronic trade.

  • PDF

A Proposal for the Direction of Stablecoin Regulation in Korea: Focusing on the Terra-Luna Crash (국내 스테이블코인 규제 방향 제안: 테라-루나 사태를 중심으로)

  • Hyun Ji, Choi;Seung Ah, Lee;Hee Dong, Yang
    • Journal of Information Technology Services
    • /
    • v.21 no.6
    • /
    • pp.127-145
    • /
    • 2022
  • Luna Coin, which ranked eighth in the global market capitalization and established itself as a super-large stablecoin, plunged overnight, shocking the market. Therefore, this study proposed the direction of Korea's stablecoin regulation, focusing on the Terra-Luna situation, starting with the question of whether the stable coin's value, 'stability', can be trusted. The whole story of the Terra-Luna incident was examined in depth and the problems were pointed out, and the direction of domestic stable coin regulation was described based on overseas cases. In the absence of any legal guidelines for stablecoin at the moment, we hope that this study will provide a minimum stabilizer in the virtual asset market and help protect investors.

An Improved Protocol for the Secure Mobile IPv6 Binding Updates (안전한 모바일 IPv6 바인딩 갱신을 위한 개선된 프로토콜)

  • You, Il-Sun;Won, You-Seuk;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.605-612
    • /
    • 2004
  • In MIPv6, unauthenticated binding updates expose the involved MN and CN to various security attacks. Thus, protecting the binding update process becomes of paramount importance in the MIPv6, and several secure binding update protocols have been proposed. In this paper, we pro-pose a novel protocol for the secure binding updates in MIPv6, which can resolve the drawbacks of the Deng-Zhou-Bao's protocol [2], by adopt-ing Aura's CGA scheme with two hashes [9]. Aura's scheme enables our protocol to achieve stronger security than other CGA-based protocols without a trusted CA, resulting in less cost of verifying the HA's public key than the Deng-Zhou-Bao's protocol. Through the comparison of our protocol with other protocols such as the Deng-Zhou-Bao's protocol, CAM-DH and SUCV, we show that our protocol can provide better performance and manageability in addition to stronger security than other approaches.

A Study on Trusted Routing Scheme for Secure Path and Secure Data Transmission in MANET (MANET에서 보안 경로와 안전한 데이터 전송을 위한 신뢰 기반 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.43-51
    • /
    • 2017
  • Recently, MANET has been used in many fields as the range of applications increases. However, the dynamic topology that MANET has makes it difficult to route and provides the cause of exposure to security vulnerabilities. Therefore, the security features that can be robust to many attacks must have been applied in the routing technique provided in the MANET. In this paper, we propose a secure routing method that secure route is established by reliability evaluation of nodes and secure data communication has applied through key exchange mechanism. The proposed technique used hierarchical structure for efficiency of reliability evaluation of nodes. The reliability of nodes is performed by trust management node and reliability of nodes managed periodically is broadcasted. And the key exchange for secure data transmission is dene without CA as the certificate issuing organization. This allows fast key exchange and the integrity of data transmission improved. The proposed technique improves the security of the data transmission because a secure route to the destination node is established by the reliability evaluation and the data transmission is performed after the key between the source node and the destination node is exchanged through the established route.