• Title/Summary/Keyword: validation.

Search Result 8,241, Processing Time 0.04 seconds

A Secure Digital Signature Delegation Scheme using CAs (CA를 이용한 안전한 서명 검증 위임 기법)

  • 최연희;박미옥;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.55-65
    • /
    • 2003
  • To perform the certificate validation processing on the user-side application induces the very considerable overhead because of the complex and time-consuming characteristic of the validation processing. Especially, the verification for digital signature over a certificate can be the major reason of the overhead, since the verification accompanies with the cryptographic calculation over each certificate on the certificate path. In this paper, we propose a new certificate validation scheme can reduce the overhead caused by user-side certificate validation processing and improve the utilization of CAs. As the result, our proposed scheme can not only reduces the overhead for the validation processing by decreasing the cryptographic calculation but also improves the utilization of CAs by employing them to the validation processing.

Method Development and Cross Validation of Analysis of Hydroxylated Polycyclic Aromatic Hydrocarbons (OH-PAHs) in Human Urine (소변 중 다환방향족탄화수소 대사체의 분석법 확립 및 교차분석)

  • Park, Na-Youn;Jeon, Jung-Dae;Koo, Hyeryeong;Kim, Jung Hoan;Lee, Eun-Hee;Lee, Kyungmu;Mun, Cheoljin;Kho, Younglim
    • Journal of Environmental Health Sciences
    • /
    • v.41 no.5
    • /
    • pp.358-367
    • /
    • 2015
  • Objectives: This study was performed to evaluate the analytical method for PAH metabolites in human urine using enzyme hydrolysis and solid-phase extraction coupled with LC-(ESI)-MS/MS technique. Methods: We employed HPLC tandem mass spectrometry techniques with appropriate pre-treatment for analysis of 16 OH-PAHs in human urine. Samples were hydrolysis by ${\beta}$-flucuronidase/Aryl sulfatase, and target compounds were extracted by solid-phase extraction with a strata-x cartridge. Cross-validation was performed between Eulji University and Green Cross laboratories with 200 human urine samples. Results: The accuracies were between 90.3% and 118.8%, and precisions (relative standard deviations) were lower than 10%. The linearity obtained was satisfying for the 16 OH-PAH compounds, with a coefficient of determination ($r^2$) higher than 0.99. The results of cross-validation at the two organizations were compared by ICC (interclass correlation coefficient) values. The cross-validation results were excellent or good for all compounds. Conclusion: An analytical method was validated for low nanogram levels of 16 OH-PAHs in human urine. Also, satisfying results were obtained for method validation such as accuracy, precision and ICC of cross-validation.

The Possibility of Arbitration of Patent In Japan -focusing on Kilby case(Japanese Patent Act Article 104-3)- (일본에서 특허의 유효성에 대한 중재가능성 -킬비 판결(일본 특허법 제104조의3)을 중심으로-)

  • Yun, Sun-Hee
    • Journal of Arbitration Studies
    • /
    • v.21 no.1
    • /
    • pp.57-72
    • /
    • 2011
  • According to Japanese Patent Act, the Japanese Patent Office, administrative organization, was authorized to decide validation of patent. However, Supreme Court of Japan held that a court is able to decide the invalidation of patent in 11th April, 2000, which caused the reform of Japanese Patent Act in June 2004. Reformed Patent Act established the article 104-3 and makes it for a court to decide the patentability where there are grounds for a patent invalidation. Through this amendment to the Patent Act, the legislative system to decide the patent validation has been reorganized and furthermore alleged infringer is allowed to argue against the patent validation by making use of infringement litigation procedure through defenses against patent invalidation as well as invalidation trial procedure for to file a request for a trial for patent invalidation to the Japanese Patent Office. That is to say, the article 104-3 was established in the Japanese Patent Act in the wake of Kilby, and thus a court, which is judicial authority, not administrative disposition agency is also able to decide the patent validation. Thus this article discuss how a court, the authority of which only patent infringement cases fell under, has been authorized to arbitrate cases about the patent validation and the decision of the patent validation in a court.

  • PDF

A New Certificate Path Processing Scheme employed the Trusted CA for improving an efficiency on the Computational Aspect (연산적 측면의 효율성을 향상시키는 신뢰 CA를 이용한 새로운 인증 경로 처리 기법)

  • 최연희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9C
    • /
    • pp.908-922
    • /
    • 2003
  • The Public Key Infrastructure (PKI) trends to delegate the certificate path processing to the Delegated Path Discovery (DPD) Server and Delegated Path Validation (DPV) server recently. The most critical factor for the selection of the delegated server is to allow the server to be equipped with a high reliability through a low cost, and simple implementation. In this paper, we propose a new certificate path processing scheme employed the trusted CA as the DPD/DPV server by adding the capability of the Validation Authority (VA) to the trusted CA. Since our proposed scheme uses the existing trusted CA as validation server, we can achieve a high trust through a simple implementation for the processing. Besides, we propose an additional scheme for reducing an overhead on the trusted CA. it is obtained by delegating digital signature verification to CAs on the path and by skipping the repeated path processing. As the result, our proposed validation scheme can be performed efficiently with high speed and low computational overhead.

Sensitivity Validation Technique for Sequential Kriging Metamodel (순차적 크리깅 메타모델의 민감도 검증법)

  • Huh, Seung-Kyun;Lee, Jin-Min;Lee, Tae-Hee
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.8
    • /
    • pp.873-879
    • /
    • 2012
  • Metamodels have been developed with a variety of design optimization techniques in the field of structural engineering over the last decade because they are efficient, show excellent prediction performance, and provide easy interconnections into design frameworks. To construct a metamodel, a sequential procedure involving steps such as the design of experiments, metamodeling techniques, and validation techniques is performed. Because validation techniques can measure the accuracy of the metamodel, the number of presampled points for an accurate kriging metamodel is decided by the validation technique in the sequential kriging metamodel. Because the interpolation model such as the kriging metamodel based on computer experiments passes through responses at presampled points, additional analyses or reconstructions of the metamodels are required to measure the accuracy of the metamodel if existing validation techniques are applied. In this study, we suggest a sensitivity validation that does not require additional analyses or reconstructions of the metamodels. Fourteen two-dimensional mathematical problems and an engineering problem are illustrated to show the feasibility of the suggested method.

A Real-Time Certificate Status Validation Protocol for Reducing the Computational Time in Client and Server - RCSVP (클라이언트와 서버의 연산시간을 줄여주는 실시간 인증서 상태 검증에 관한 연구)

  • Lee Young-Sook;Cho Seok-Hyang;Won Dong-Ho;Lee Young-Gyo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.95-105
    • /
    • 2005
  • As a research on PKI is being very popular, the study relating to certificate status validation is being grown with aim to reduce an overhead of the protocol and to provide an efficient operation. The OCSP of the standard protocol related to the study enables applications to determine the revocation state of an identified certificate. However, the OCSP server can not service millions of certificate status validation requests from clients in a second on E-commerce because of the computational time for signature and verification. So, we propose the Real-time Certificate Status Validation Protocol(RCSVP) that has smaller computational time than OCSP. RCSVP server reduce the computational time of certificate status validation using hash function and common secret value. Also RCSVP client does not need the computational time of certificate verification to acquire the public key from an identified certificate. Therefore, the proposed protocol enables server to response millions of certificate status validation requests from clients in a second on E-commerce.

  • PDF

Specification Validation Method for Improving KML Interoperability (KML 호환성 개선을 위한 명세서 검증 방안)

  • Kang, Jihun;Kim, Jung Ok;Lee, Jun Seok
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.32 no.4_1
    • /
    • pp.353-361
    • /
    • 2014
  • The study has planned to analyze the most typical specification validation in Korea and the other countries, which shows the well-formed and schema validation, in purpose to enhance users' conveniences. Also, we suggested the validation system to provide the information compatibility regarding to application programs for non-expert. The featured KML specification supported by the VWorld 3D Desktop and the Google Earth. Based on this above estimation, the system has been designed to inform potential problems and the applicability in 3D Desktop and Google Earth for the user. The KML information passed through the proposed validation is simply expressed on the map, so as instructed the information on the program selection and additional details instruct users as a text file. When not being suitable for the proposed program, another program can be considered, and the problems which may be occurred are also announced to increase the compatibility of KML.

An Efficient RDF Query Validation for Access Authorization in Subsumption Inference (포함관계 추론에서 접근 권한에 대한 효율적 RDF 질의 유효성 검증)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.36 no.6
    • /
    • pp.422-433
    • /
    • 2009
  • As an effort to secure Semantic Web, in this paper, we introduce an RDF access authorization model based on an ontology hierarchy and an RDF triple pattern. In addition, we apply the authorization model to RDF query validation for approved access authorizations. A subscribed SPARQL or RQL query, which has RDF triple patterns, can be denied or granted according to the corresponding access authorizations which have an RDF triple pattern. In order to efficiently perform the query validation process, we first analyze some primary authorization conflict conditions under RDF subsumption inference, and then we introduce an efficient query validation algorithm using the conflict conditions and Dewey graph labeling technique. Through experiments, we also show that the proposed validation algorithm provides a reasonable validation time and when data and authorizations increase it has scalability.

Validation Technique of Trace-Driven Simulation Model Using Weighted F-measure (가중 F 척도를 이용한 Trace-Driven 시뮬레이션 모델의 검증 방법)

  • HwangBo, Hoon;Cheon, Hyeon-Jae;Lee, Hong-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.185-195
    • /
    • 2009
  • As most systems get more complicated, system analysis using simulation has been taken notice of. One of the core parts of simulation analysis is validation of a simulation model, and we can identify how well the simulation model represents the real system with this validation process. The difference between input data of two systems has an effect on the comparison between a simulation model and a real system at validation stage, and the result with such difference is not enough to ensure high credibility of the model. Accordingly, in this paper, we construct a model based on Trace-driven simulation which uses identical input data with the real system. On the other hand, to validate a model by each class, not by an unique statistic, we validate the model using a metric transformed from F-measure which estimates performance of a classifier in data mining field. Finally, this procedure enables precise validation process of a model, and it helps modification by offering feedback at the validation phase.

Validation Method of Simulation Model Using Wavelet Transform (웨이블릿 변환을 이용한 시뮬레이션 모델 검증 방법)

  • Shin, Sang-Mi;Kim, Youn-Jin;Lee, Hong-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.127-135
    • /
    • 2010
  • The validation of a simulation model is a key to demonstrate that the simulation model is reliable. However, among various validation methods have been introduced, it is very poor to research the specific techniques for the time series data. Therefore, this paper suggests the methodology to verify the simulation using the time series data by Wavelet Transform, Power Spectrum and Coherence. This method performs 2 steps as followed. Firstly, we get spectrum using the Wavelet transform available for non-periodic signal separation. Secondly, we compare 2 patterns of output data from simulation model and actual system by Coherence Analysis. As a result of comparing it with other validation techniques, the suggested way can judge simulation model accuracy more clearly. By this way, we can make it possible to perform the simulation validation test under various situations using detailed sectional validation method, which has been impossible using a single statistics for the whole model.