• Title/Summary/Keyword: trusty

Search Result 18, Processing Time 0.021 seconds

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management

  • Lim, H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4720-4738
    • /
    • 2015
  • Proper management on user-driven virtual circuits (VCs) is essential for seamless operation of virtual networks. The Network Provisioning System (NPS) is useful software for creating user-driven VCs automatically and must take fault management into account for physical layer impairments on user-driven VCs. This paper addresses a user-driven and trusty protection management in an NPS with an open standard Network Service Interface (NSI), as a contribution to show how to implement the user-driven and trusty protection management required for user-driven VCs. In particular, it provides a RESTful web service Interface for Configuration and Event management (RICE) that enable management of a distinguished data and control plane VC status between Network Service Agents (NSAs) in the event of a node or link fault and repair in a domain. This capability represents a contribution to show how network and protection events in a domain can be monitored between NSAs (NPSs with the NSI) in multiple domains. The implemented NPS controls and manages both the primary and backup VC with disjoint path in a user-driven manner. A demonstration to verify RICE API's capability is addressed for the trusty protection in the dynamic VC network.

Inter-Domain Verifiable Self-certified public keys (상이한 도메인에서 검증 가능한 자체 인증 공개키)

  • 정영석;한종수;오수현;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.71-84
    • /
    • 2003
  • Self-certified public keys need not be accompanied with a separate certificate to be authenticated by other users because the public keys are computed by both the authority and the user. At this point, verifiable self-certified public keys are proposed that can determine which is wrong signatures or public keys if public keys are used in signature scheme and then verification of signatures does not succeed. To verify these public keys, key generation center's public key trusted by users is required. If all users trust same key generation center, public keys can be verified simply. But among users in different domains, rusty relationship between two key generation centers must be accomplished. In this paper we propose inter-domain verifiable self-certified public keys that can be verified without certificate between users under key generation centers whose trusty relationship is accomplished. Also we present the execution of signature and key distribution between users under key generation centers use different public key parameters.

The Accuracy Analysis of 3D Image Generation by Digital Photogrammetry (수치사진측량 기반 3차원영상생성 정확도 분석)

  • 강준묵;엄대용;임영빈
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2003.10a
    • /
    • pp.157-162
    • /
    • 2003
  • The 3D Image which embodies real object to 3D space of computer enables various geometrical analysis as well as visualization of complex 3D shape by giving sense for the real and cubic effect that can not be offered in 2D image. Human gives real object to same physical properties in 3D space imagination world of computer, and it is expected that this enables offering of various information by user strengthening interface between human-computer to observe object in real condition. In this study, formal style routine of 3D image creation applying digital photogrammetry was designed for more practical, highly trusty 3D image creation, and the system was emboded using object-oriented technique which strengthen user interface. Also, the discontinuity information about rock slope using 3D image is acquired that is orientation, persistence, spacing and aperture etc.

  • PDF

Design of P-ESD(Protection-ESD) System for Copyright Trusty Management (저작권 위탁 관리를 위한 P-ESD(Protection-ESD) 시스템 설계)

  • Park, Bok-Nyong;Kim, Jeong-Beom;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.875-878
    • /
    • 2002
  • 전자 상거래의 발전과 더불어 디지털화된 모든 컨텐츠는 인터넷을 통해 배포되어 이용되고 있다. 소프트웨어도 예외는 아니어서 기존에 오프라인을 통해 유통되던 소프트웨어들이 ESD(Electronic software Distribution)를 통해 온라인으로 유통되고 있다. 그러나 기존의 ESD 모델들은 소프트웨어의 불법복제문제를 해결하지 못하고 저작권보호에 미흡하다는 단점이 있다. 이에 본 논문에서는 ESD에 DRM기술을 사용하여 소프트웨어의 불법사용방지와 다양한 사용권한 제어가 가능한 P-ESD(Protection-ESD) 메커니즘을 제안한다. 제안한 모델은 불법사용을 방지하여 소프트웨어 저작권을 보호하고 다양한 지불방법을 제공한다.

  • PDF

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud

  • Zhu, Taipeng;Zou, Xianxia;Pan, Jiuhui
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.573-589
    • /
    • 2017
  • Cloud computing is an attractive solution that can provide low cost storage and powerful processing capabilities for government agencies or enterprises of small and medium size. Yet the confidentiality of information should be considered by any organization migrating to cloud, which makes the research on relational database system based on encryption schemes to preserve the integrity and confidentiality of data in cloud be an interesting subject. So far there have been various solutions for realizing SQL queries on encrypted data in cloud without decryption in advance, where generally homomorphic encryption algorithm is applied to support queries with aggregate functions or numerical computation. But the existing homomorphic encryption algorithms cannot encrypt floating-point numbers. So in this paper, we present a mechanism to enable the trusted party to encrypt the floating-points by homomorphic encryption algorithm and partial trusty server to perform summation on their ciphertexts without revealing the data itself. In the first step, we encode floating-point numbers to hide the decimal points and the positive or negative signs. Then, the codes of floating-point numbers are encrypted by homomorphic encryption algorithm and stored as sequences in cloud. Finally, we use the data structure of DoubleListTree to implement the aggregate function of SUM and later do some extra processes to accomplish the summation.

Study on Correlation-based Feature Selection in an Automatic Quality Inspection System using Support Vector Machine (SVM) (SVM 기반 자동 품질검사 시스템에서 상관분석 기반 데이터 선정 연구)

  • Song, Donghwan;Oh, Yeong Gwang;Kim, Namhun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.42 no.6
    • /
    • pp.370-376
    • /
    • 2016
  • Manufacturing data analysis and its applications are getting a huge popularity in various industries. In spite of the fast advancement in the big data analysis technology, however, the manufacturing quality data monitored from the automated inspection system sometimes is not reliable enough due to the complex patterns of product quality. In this study, thus, we aim to define the level of trusty of an automated quality inspection system and improve the reliability of the quality inspection data. By correlation analysis and feature selection, this paper presents a method of improving the inspection accuracy and efficiency in an SVM-based automatic product quality inspection system using thermal image data in an auto part manufacturing case. The proposed method is implemented in the sealer dispensing process of the automobile manufacturing and verified by the analysis of the optimal feature selection from the quality analysis results.

Comparison study for train crews and pilots operation system between EWS of UK and KORAIL of Korea (영국 화물철도운영자(EWS)와 코레일(한국철도공사) 교번근무제도 비교연구)

  • Chae, Il-Kwon;Hwang, Sun-Kyoung;Park, Chan-Hong;Jeon, Young-Seok
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.1871-1877
    • /
    • 2009
  • KORAIL has been established by 1st January 2005. From organization change to KORAIL(Korea railroad Corporation), labour union and company management team has been argument for their train crews and drivers operation system. For example, train crew and driver working conditions; working hours per week, off day and duty day time, over night time working payment, current position payment, preparation time, company own lodge operation and so on. I assure that this comparison study for train crew and driver operation between KORAIL and EWS will helps to improve other korean railway companies management efficiency. In conclusion, EWS has 4$\sim$6 times more efficient employee for active operation than KORAIL per 1 freight brock-train operation. EWS has very resonable train crews and driver operation system, and self-control regulation for employee and management team with trusty. This thesis propose that korean railway companies and their own labour unions need joint research and benchmarking other oversea railway companies as like EWS.

  • PDF

Developed Optimizing File Delete Detection Model (최적화된 디지털 증거 파일삭제 탐지 모델)

  • Kim, Yong-Ho;Yoo, Jae-Hyung;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.111-118
    • /
    • 2008
  • Computer forensics have been used for verify a crime when industry secret information or cyber crime occurred. However, these methods are simple analysis which cannot find the problem of deleted files. Therefore these cannot be a trusty evidence in a law court. We studied with focus on connectivity principle because it has never tried yet. In this paper, we developed optimizing detection model through systemized analysis between user-delete method and operating system-delete method. Detection model has 3 cases; Firstly, case of deleted by a user, secondly, case of deleted by application. Thirdly case of deleted by operating system. Detection model guarantees optimized performance because it is used in actual field.

  • PDF

A Identity Escrow mechanism supporting key recovery (키 복구를 지원하는 향상된 신원위탁 메커니즘)

  • 이용호;이임영;김주한;문기영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.119-128
    • /
    • 2002
  • In case certification between user and service provider is achieved, problem that user's identity is revealed is occurring by social issue, so it was presented identity escrow scheme to solve these problem. In identity escrow scheme, the issuer who have correct user's identity transmits securely anonymity authentication information to user, and user achieves authentication phase with service provider keeping oneself anonymity using this. In this paper, we present requirement for security and trusty of identity escrow scheme and propose new mechanism that can security this. Also, propose method that service provider can deliver securely contents to user and propose mechanism that improve that support ky recovery at encryption communication that using secret key that it was generated by key agreement between users.

Fuzzy Inference-based Replication Scheme for Result Verification in Desktop Grids (데스크톱 그리드에서 결과 검증을 위한 퍼지 추론 기반 복제 기법)

  • Gil, Joon-Min;Kim, Hong-Soo;Jung, Soon Young
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.4
    • /
    • pp.65-75
    • /
    • 2009
  • The result verification is necessary to support a guarantee for the correctness of the task results be executed by any unspecified resources in desktop grid environments. Typically, voting-based and trust-based result verification schemes have been used in the environments. However, these suffer from two potential problems: waste of resources due to redundant replicas of each task and increase in turnaround time due to the inability to deal with a dynamic changeable execution environment. To overcome these problems, we propose a fuzzy inference-based replication scheme which can adaptively determine the number of replicas per task by using both trusty degree and result return probability of resources. Therefore our proposal can reduce waste of resources by determining the number of replicas meeting with a dynamic execution environment of desktop grids, not to mention an enhancement of turnaround time for entire asks. Simulation results show that our scheme is superior to other ones in terms of turnaround time, the waste of resources, and the number of re-replications per task.

  • PDF