Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 17C, Issue 6 - Dec 2010
Volume 17C, Issue 5 - Oct 2010
Volume 17C, Issue 4 - Aug 2010
Volume 17C, Issue 3 - Jun 2010
Volume 17C, Issue 2 - Apr 2010
Volume 17C, Issue 1 - Feb 2010
Selecting the target year
A Framework for Data Recovery and Analysis from Digital Forensics Point of View
Kim, Jin-Kook ; Park, Jung-Heum ; Lee, Sang-Jin ;
The KIPS Transactions:PartC, volume 17C, issue 5, 2010, Pages 391~398
DOI : 10.3745/KIPSTC.2010.17C.5.391
Most of digital forensics tools focus on file analysis of allocated area on storage. So, there is a lack of recovery methods for deleted files by suspects or previously used files. To efficiently analyze deleted files, digital forensic tools depend on data recovery tools. These process not appropriate for quick and efficient responses the incident or integrity preservation. This paper suggests the framework for data recovery and analysis tools from digital forensics point of view and presents implementation results.
Distributed Data Management based on t-(v,k,1) Combinatorial Design
Song, You-Jin ; Park, Kwang-Yong ; Kang, Yeon-Jung ;
The KIPS Transactions:PartC, volume 17C, issue 5, 2010, Pages 399~406
DOI : 10.3745/KIPSTC.2010.17C.5.399
Many problems are arisen due to the weakness in the security and invasion to privacy by malicious attacker or internal users while various data services are available in ubiquitous network environment. The matter of controlling security for various contents and large capacity of data has appeared as an important issue to solve this problem. The allocation methods of Ito, Saito and Nishizeki based on traditional polynomial require all shares to restore the secret information shared. On the contrary, the secret information can be restored if the shares beyond the threshold value is collected. In addition, it has the effect of distributed DBMS operation which distributes and restores the data, especially the flexibility in realization by using parameters t,v,k in combinatorial design which has regularity in DB server and share selection. This paper discuss the construction of new share allocation method and data distribution/storage management with the application of matrix structure of t-(v,k,1) design for allocating share when using secret sharing in management scheme to solve the matter of allocating share.
A Study on Evaluation Scheme for Exchangeable CAS (XCAS)
Hwang, Yu-Na ; Jeong, Han-Jae ; Won, Dong-Ho ; Kim, Seung-Joo ;
The KIPS Transactions:PartC, volume 17C, issue 5, 2010, Pages 407~414
DOI : 10.3745/KIPSTC.2010.17C.5.407
A condition access system (CAS) refers to a hardware-based system that allows only authenticated users to have access to contents. The CAS has many disadvantages found in that in the replacement of multiple service operator (MSO) a set-top box should be also changed and the smart-card often causes malfunction. To deal with the problems, exchangeable CAS (XCAS) was developed in 2009. However the standards or evaluation schemes for XCAS are absent. Existing evaluation schemes are not appropriate for evaluating XCAS due to the evaluation standard, the evaluation cost and efficiencies. Therefore, a specific scheme that can evaluate the security and suitability of exchangeable conditional access systems has been requested. In this paper, we propose an appropriate evaluation scheme for XCAS. The evaluation scheme includes an evaluation purpose and four components to evaluate the evaluation target, the evaluation process, the evaluation subject, and the evaluation cost involved.
Access Control Method and Key Management Method for H.264/SVC
Cho, Tae-Nam ; Yong, Seung-Lim ;
The KIPS Transactions:PartC, volume 17C, issue 5, 2010, Pages 415~426
DOI : 10.3745/KIPSTC.2010.17C.5.415
CAS is an access control system by which only legal users can access contents. IPTV is a spotlighted system that uses CAS. H.264/SVC is a coding standard that provides a scalable coding method by which users who are in various network environments and have various devices can receive the contents. In this method, the contents are coded in a layered structure to make users choose the quality of the receiving contents. Therefore, contents provider should be able to control users to access only appropriate contents according to their subscriptions. The structure of CAS being employed in many applications is not suitable to control access for H.264/SVC. In this paper, we provide an efficient access control method and a key management method for H.264/SVC contents using CAS.
An Efficient Cluster Header Election Scheme Considering Distance from a Sink in Zigbee Environment
Park, Jong-Il ; Lee, Kyun-Hwa ; Lee, Jooh-Hyun ; Shin, Yong-Tae ;
The KIPS Transactions:PartC, volume 17C, issue 5, 2010, Pages 427~432
DOI : 10.3745/KIPSTC.2010.17C.5.427
It is important to efficiently elect the cluster header in Hierarchical Sensor Network, because it largely effects on the life duration of the network. Therefore, a recent research is going forward a research activity with regard to life time extension of the whole network for efficient cluster header election. In this paper, we propose the new Cluster Header Election Scheme in which the cluster is divided into Group considering Distance from a Sink, and a cluster header will be elected by node density of the Group. Also, we evaluate the performance of this scheme, and show that this proposed scheme improves network lifetime in Zigbee environment.
A Disjoint Multi-path Routing Protocol for Efficient Transmission of Collecting Data in Wireless Sensor Network
Han, Dae-Man ; Lim, Jae-Hyun ;
The KIPS Transactions:PartC, volume 17C, issue 5, 2010, Pages 433~440
DOI : 10.3745/KIPSTC.2010.17C.5.433
Energy efficiency, low latency and scalability for wireless sensor networks are important requirements, especially, the wireless sensor network consist of a large number of sensor nodes should be minimized energy consumption of each node to extend network lifetime with limited battery power. An efficient algorithm and energy management technology for minimizing the energy consumption at each sensor node is also required to improve transfer rate. Thus, this paper propose no-overlap multi-pass protocol provides for sensor data transmission in the wireless sensor network environment. The proposed scheme should minimize network overhead through reduced a sensor data translation use to searched multi-path and added the multi-path in routing table. Proposed routing protocol may minimize the energy consumption at each node, thus prolong the lifetime of the sensor network regardless of where the sink node is located outside or inside the received signal strength range. To verify propriety proposed scheme constructs sensor networks adapt to current model using the real data and evaluate consumption of total energy.