Earticle

Home 검색결과

검색결과

검색결과 좁혀보기

직접입력 - 발행연도는 최대 5개까지 선택할 수 있습니다.

간행물은 최대 5개까지 선택할 수 있습니다.

검색조건
좁혀보기
결과 내 검색
검색 조건 및 좁혀보기 범위가 변경되었습니다. 재검색을 원하시면 아래 검색버튼을 클릭해 주십시오.
검색결과 : 7
No
1

Mobile Ad-hoc Network 상의 분산된 서비스에 대한 신뢰도 평가 기법 설계 및 구현

장종덕, 유황빈, 윤창표

한국융합보안학회 융합보안논문지 제9권 제4호 2009.12 pp.29-34

※ 기관로그인 시 무료 이용이 가능합니다.

이동 애드혹 네트워크 환경에서 신뢰할 수 없는 서비스들로 인해 과도한 트랜잭션이 발생되 고 있다. 본 논문은 이러한 문제점을 극복하기 위한 방안으로, 이동 애드혹 네트워크 내에서 발 생하는 기본적인 트랜잭션 메시지와 추가적인 트랜잭션 메시지에 의미를 부여하여 보다 나은 서비스를 제공하는 노드 선택의 기준이 될 수 있는 신뢰도 평가 기법을 제안한다. 제안한 신뢰 도 기법을 구현하고 시뮬레이션을 통해서 평가된 신뢰도 값을 확인한다.
The many transaction occurs because of service will not be able to trust in mobile Ad-hoc Network. Overcomes like this problem point with the plan for, This paper proposes the trust evaluation mechanism which is the possibility becoming the standard of the node selection which provides a better service by using the transaction message which is basic occurs from within the mobile Ad-hoc network and in the transaction message which is additional. At last, this paper embodies the trust mechanism which proposes, confirms the trust value which is evaluated with NS2 simulator.

4,000원

2

Mobile Ad-hoc Network 상에서 분산된 서비스에 대한 확신 값을 고려한 확장된 신뢰도 평가 기법

장종덕, 윤창표, 유황빈

한국융합보안학회 융합보안논문지 제10권 제2호 2010.06 pp.51-57

※ 기관로그인 시 무료 이용이 가능합니다.

본 논문은 이동 애드혹 네트워크 내에서 발생하는 기본적인 트랜잭션 메시지에 의미를 부여하고 추가적인 트랜잭션 메시지를 정의하며 확신성 요소를 추가하여 보다 나은 서비스를 제공하는 노드 선택의 기준이 될 수 있는 확장된 신뢰도 평가 기법을 제안하고, 이를 시뮬레이션하여 제안한 신뢰 도 평가 기법의 효용성을 보인다.
This paper proposes extended trust evaluation mechanism which is able to become the standard of the node selection which provides a better service by using the basic transaction message which occurs from within the mobile Ad-hoc network and the additional transaction message and add confidence value. Furthermore, throughout the simulation shows the efficiency of the proposed trust evaluation mechanism.

4,000원

3

Towards Reliable Trust Management based on Structural Trust Scopes of Distributed Roles

Gang Yin, Huaimin Wang, Ning Zhou

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.3 No.1 2009.01 pp.77-85

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한됩니다.

Role based trust management uses distributed role hierarchies (DRH) to provide flexible and scalable authorization in multi-domain environments, but DRH are inherently transitive and may easily lead to unexpected or even illegal authorization. In this paper, we propose TS-DRH, a generalized extension of DRH based on a novel trust scope model of distributed roles. TS-DRH introduces the notion of scoped roles with four kinds of structural trust scopes, and uses scoped roles to control the member scopes of senior roles and the permission scopes of junior roles, and thus helps to control the propagation of role memberships and permissions in DRH. This paper also designs rule based semantics and a compliance checking algorithm to compute authorization decisions for TS-DRH.

4

Trust Based Approach to Detect and Prevent Distributed Denial of Service Attacks and Flash Crowds in VoIP Services

N. Jeyanthi, N.Ch.S. N..Iyengar

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.5 No.3 2011.07 pp.59-74

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한됩니다.

Voice-over-IP (VoIP) is being widely used to packetize and relay voice information over existing IP networks. Due to the cheaper costs involved in using VoIP as opposed to traditional PSTN networks it is quickly gaining momentum and has seen widespread use in both personal and business domains. If this technology is to grow and gain over normal phone calls it must fulfill certain conditions that Public Switched Telephone Networks (PSTN) currently provide. Since VoIP uses the same routes used by normal Internet traffic, it is prone to a wide range of security threats, similar to those faced by normal packet data. These include, but are not limited to, Denial of Service (DoS), intruders in the network who either eavesdrop or are able to make free calls, man-in-the-middle attacks, etc. It thus becomes imperative that a protocol be developed that is able to both guard against and take corrective action in the event of the occurrence of any attack. In this paper we propose a protocol that detects and prevents the occurrence of a distributed Denial of Service (DDoS) attack. It also enforces security mechanisms to ensure that an attacker has not gained access to a user's password and thus making illegitimate calls. We develop a trust mechanism that can be used to detect an attacker in the network. The protocol has been rigorously examined through a wide range of experiments and the results have been found to be quite promising.

5

Service Dynamic Trust Evaluation Model based on Bayesian Network in Distributed Computing Environment

Libin Wang, Xiangjun Li, Xinquan Yan, Song Qing, Yuanlu Chen

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.5 2015.05 pp.31-42

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한됩니다.

In recent years, with the rapid development of computer network, distributed computing system has a very vast application prospect and potential utility value, which opens up a wealth of opportunities for different applications. With the characteristics of dynamic, heterogeneity, distribution, openness, voluntariness, uncertainty and deception, how to obtain trustworthy computing resource becomes a key issue in large-scale distributed computing research. Therefore, with considering the complex characters of trust in distributed computing environment, firstly, we construct STE architecture to rank and observe trust, which includes STE Broker, Monitoring and STE Catalogue. Secondly, a more comprehensive dynamic trust evaluation model is constructed based on Bayesian network. Finally, we apply simulation platform to imitate trust evolution process and collect related data, and the proposed method has been serviced in complex simulation system, and the results have indicated that the model is unbiased and effective. The first part is the research status and related problems. The second part is the establishment of an evaluation model. The last part is the experimental analysis and conclusion.

6

A Robust Trust Management Scheme against the Malicious Nodes in Distributed P2P Network

Do-sik An, Byong-lae Ha, Gi-hwan Cho

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.3 2013.05 pp.317-326

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한됩니다.

Trust management evaluates the user trust value of participating nodes in the network based on the past behaviors and satisfaction of sharing resources. However, there also exists security issue even though it has been considered to be safe because malicious user is able to affect the trust management with negative feedback. This paper aims to propose a robust trust management scheme to improve reliability and effectiveness of distributed P2P network by identifying these malicious threats and then limiting the attacker's participation. Especially, our scheme effectively manages for some attacks such as bad mouthing, on-off and sybil. The proposed scheme is expected to effectively protect attacks from malicious peers with improving credibility as well as exactness.

7

현대의 고도화, 자동화된 시스템이 파생한 휴먼에러에 관한 이론적 고찰을 통한 리스크 대응전략 설정

신인재

[Kisti 연계] 한국안전학회 Journal of the Korean Society of Safety Vol.29 No.1 2014 pp.86-92

협약을 통해 무료로 제공되는 자료로, 원문이용 방식은 연계기관의 정책을 따르고 있습니다.

This paper provides an integrated view on human and system interaction in advanced and automated systems, which adopting computerized multi-functional artifacts and complicated organizations, such as nuclear power plants, chemical plants, steel and semi-conduct manufacturing system. As current systems have advanced with various automated equipments but human operators from various organizations are involved in the systems, system safety still remains uncertain. Especially, a human operator plays an important role at the time of critical conditions that can lead to catastrophic accidents. The knowledge on human error helps a risk manager as well as a designer to create and control a more credible system. Several human error theories were reviewed and adopted for forming the integrated perspective: gulf of execution and evaluation; risk homeostasis; the ironies of automation; trust in automation; design affordance; distributed cognition; situation awareness; and plan delegation theory. The integrated perspective embraces human error theories within three levels of human-system interactions such as affordance level, psychological logic level and trust level. This paper argued that risk management process should dealt with human errors by providing (1) reasoning improvement; (2) support to situation awareness of operators; and (3) continuous monitoring on harmonization of human system interaction. This approach may help people to understand risk of human-system interaction failure characteristics and their countermeasures.

원문보기
 
페이지 저장