Earticle

현재 위치 Home

보안공학연구논문지 [Journal of Security Engineering]

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(JSE) [보안공학연구지원센터]
  • pISSN
    1738-7531
  • 간기
    계간
  • 수록기간
    2005 ~ 2017
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.6 No.1 (6건)
No

보안성 평가 분야

1

A Study on CC (Common Criteria) Evaluation Criteria for Side Channel Analysis

Young-Hwan, Bang, Kab-Seung, Kou, Gang-Soo Lee

보안공학연구지원센터(JSE) 보안공학연구논문지 Vol.6 No.1 2009.02 pp.1-10

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In cryptography, a side channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms (compare cryptanalysis). For example, timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information which can be exploited to break the system. Many side channel attacks require considerable technical knowledge of the internal operation of the system on which the cryptography is implemented. In this paper, we suggest safety evaluation scheme regarding side channel analysis could apply in smart card product evaluation.

보안 통신

2

Virtualmeeting rooms and home environments

Farkhod Alisherov, Tai-hoon Kim Professor, Min-kyu Choi

보안공학연구지원센터(JSE) 보안공학연구논문지 Vol.6 No.1 2009.02 pp.11-24

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

From detecting rather straightforward events as entering a room, being in the proximity of a certain object or identifying a person in the room, to the interpretation of events in which more persons are involved is a rather big step. However, in ambient intelligence research small steps in this direction are taken. This paper was focused on visualizing activities in one virtual room. It can connect a single meeting participant travelling around or sitting in his or her own office environment to a smart meeting room located somewhere else. Ideas available in previous research have been extended in this paper, making use of research results that have become available in research projects on ambient intelligent and on multi-party interaction.

3

IEEE 802.22 WRAN에 초점을 맞춘 인지무선네트워크 보안프레임워크에 대한 고찰

김현성, 이성운

보안공학연구지원센터(JSE) 보안공학연구논문지 Vol.6 No.1 2009.02 pp.25-38

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

하나나 그 이상의 기술들이 하나의 장치에 결합되는 융합(Convergence)은 최근 들어 IT 분야에 활발히 진행되고 있다. 하지만 융합을 통해 개별적으로 제공되던 기존 서비스에 새로 개발된 기술들이 결합됨으로서 기존에는 존재하지 않았던 새로운 보안 문제들을 야기할 수 있다. 본 논문은 현재 표준화가 진행 중인 IEEE 802.22 상의 인지무선(Cognitive radio)에 초점을 맞춘 기술융합을 위한 새로운 보안 프레임워크에 대한 고찰을 제시하는데 그 목적이 있다. 인지무선은 제한된 무선자원의 사용을 최대화하면서 무선네트워크의 늘어가는 서비스와 응용들을 수용하기 위한 최근 많은 관심을 받고 있는 기술이다. 본 논문을 통하여 보안연구자들이 인지무선 기술에 대한 현재 이슈들을 이해하고 기존의 표준들이 표준화 과정에서 겪었던 표준화가 발표되고 난 후 보안프레임워크의 결함이 발견되는 반복되는 표준화 과정의 문제들을 사전에 예방할 수 있는데 도움이 될 것으로 기대한다.

Convergence is increasingly prevalent in the IT world which generally refers to the combination of two or more different technologies in a single device. However, the very process of convergence is likely to expose significant security issues due to the merging of what have been separate services and technologies and also as a result of the introduction of new technologies. This paper is mainly focused on investigating the security framework for the convergence, especially on the cognitive radio (CR) networks over IEEE 802.22, which is still at the stage of being developed. CR is a recent concept for maximizing the utilization of the limited radio bandwidth while accommodating the increasing amount of services and applications in the wireless networks. We expect that the paper could help the security researchers to understand the current issues on the CR and furthermore they could forbidden the repeated problems in the standardization processes, which were found the lack of security in the security framework after publishing the standard.

4

FLV 스트리밍 서버의 개발에 관한 연구

권구혁, 주복규

보안공학연구지원센터(JSE) 보안공학연구논문지 Vol.6 No.1 2009.02 pp.39-46

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

동영상 전송방식 중 스트리밍 방식은 파일을 다운로드 받는 동시에 재생이 가능하고 또한 다운로드가 진행되지 않은 구간에 대해서도 임의 재생이 가능한 기술을 말한다. 기존 다운로드 방식의 동영상 전송기술은 영상의 후반부를 보기 위해서 앞부분부터 순차적으로 모두 봐야하거나, 다운로드가 완료되기를 기다려야 하는 불편함이 있었다. 본 연구는 이런 불편함 및 네트워크 오버헤드를 줄여 줄 수 있는 동영상 스트리밍 시스템을 제안하고, 현재 광범위하게 사용 중인 HTTP 프로토콜을 기반으로 하는 FLV 포맷 영상의 스트리밍 서버 시스템을 구축 하였다.

Among video data transmission techniques, streaming method is very useful technique that allows playing video data while down loading and allows random replaying of those parts that is not downloaded yet. Previous transmission methods are inconvenient that in order to view later part of video, we either has to view all preceding parts of video or wait until all data are downloaded. to In this paper, we propose video streaming system that eleminate those inconvenience and reducing network overhead. We also describe the desing and development of server system based on HTTP protocol that is most widely used.

보안 관리

5

Guideline‐based Process Management Environment

Jeong-Ah Kim

보안공학연구지원센터(JSE) 보안공학연구논문지 Vol.6 No.1 2009.02 pp.47-56

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As the knowledge‐based society has been constructed, the size of work process grows bigger and the amount of the information that has to be analyzed increases. So the necessity of the process management and improvement has been required highly. This study suggests the process management method to support a company’ survival strategy to get the competitive power in difficult situation to predict future business environment. The suggested process management method applies ontology for formalizing and sharing the several generalized process management concept. In ontology, several techniques from Six Sigma and PSP are defined for process definition, execution and measurement. With ontology, we provide formal knowledge base for both process management environment and human stakeholders. Also, we can easily improve our environment by extending our process ontology to adapt new management methods.

생체 인식

6

Infrared Imaging of Hand Vein Patterns for Biometric Purposes

Shrotri A., Rethrekar S.C, Patil M.H., Debnath Bhattacharyya, Tai-hoon Kim

보안공학연구지원센터(JSE) 보안공학연구논문지 Vol.6 No.1 2009.02 pp.57-66

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Hand vein patterns are unique and universal. Vein pattern is used as biometric feature in recent years. But, it is not very much popular biometric system as compared to other systems like fingerprint, iris etc, because of the higher cost. For conventional algorithm, it is necessary to use high quality images, which demand high‐priced collection devices. There are two approaches for vein authentication, these are hand dorsa and hand ventral .Currently we are working on hand dorsa vein patterns. Here we are putting forward the new approach for low cost hand dorsa vein pattern acquisition using low cost device and proposing a algorithm to extract features from these low quality images.

 
페이지 저장