http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Communication Security solution for internet SCADA
Rosslin John Robles,Kum-Taek Seo,Tai-hoon Kim 한국정보기술학회 2010 Proceedings of KIIT Conference Vol.2010 No.-
Traditional SCADA is connected only in a limited private network because SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect SCADA systems through the internet. Because of this, many issues regarding security surfaced. To answer the security issues, a web SCADA security solution using crossed-crypto-scheme is proposed.
Reverse DNS lookup in MIPv6 Environment
Rosslin John Robles,Eun-suk Cho,Tai-hoon Kim 한국정보기술학회 2010 Proceedings of KIIT Conference Vol.2010 No.-
Mobile IPv6 (MIPv6) is a protocol developed as a subset of Internet Protocol version 6 (IPv6) to support mobile connections. MIPv6 allows a mobile node to transparently maintain connections while moving from one subnet to another. Each device is identified by its home address although it may be connecting to through another network. When connecting through a foreign network, a mobile device sends its location information to a home agent. which intercepts packets, intended for the device and tunnels them to the current location. If a node is a web server, and another node will try to access it, it is very easy if it knows the IP address of the web server. As practiced, we use the domain name when searching for websites other than the IP address. This paper suggests an IP lookup in Mobile IPv6 environment. This method utilizes the DNS lookup.
A Guide to Software Engineering for Security
Rosslin John Robles,Min Kyu Choi,Sang-soo Yeo,Tai-hoon Kim 한국멀티미디어학회 2008 한국멀티미디어학회 학술발표논문집 Vol.2008 No.1
There is no such software system that doesn’ t need to be secure. Most software systems are faces threats from potential adversaries, from simple client application system to complex telecommunication and power systems, to commodity software with copy protection mechanisms. Software Engineers must be aware of these threats. They should also engineer systems that are capable of defending against these threats while still delivering value to customers. We present in this paper our view on the research issues concerning the interactions between security and software engineering.
Securing Child Information Access Control in Ubiquitous Healthcare Systems
Rosslin John Robbles,김경중 보안공학연구지원센터 2011 보안공학연구논문지 Vol.8 No.1
In developed and developing countries, Ubiquitous Healthcare technology is gaining much attention. Many new projects are based on Ubiquitous Healthcare. It has provided a lotof answers to the current problems of the medical as well as the computing area. However, Security in Information Access for the patients especially children can be easily accessed. In this paper, we consider security issues due to increasing access sharing of patient information resources in the networked environment. A new efficient access control in order to provide various security characteristics, such as authentication, confidentiality, integrity and non-repudiation for ubiquitous systems is proposed.
Importance of Supervisory Control and Data Acquisition Security in Critical Infrastructure
Rosslin John Robles,Min-kyu Choi,Tai-hoon Kim 한국정보기술학회 2009 한국정보기술학회논문지 Vol.7 No.4
Critical Infrastructures are so crucial to the society and community that a disruption of it can cause great damage. Many of these identified Critical Infrastructures are controlled by control systems like SCADA or Supervisory Control and Data Acquisition. Because of this, SCADA becomes a target of terrorists and other threats. In this paper, we discuss the relationship of Critical Infrastructure and SCADA, the threats and vulnerabilities and provides steps to minimize these threats and vulnerabilities. We also discuss the security function of SCADA systems and other control systems to sectors which were considered Critical Infrastructure. This paper is the modified and extended version of the paper, the function of SCADA in critical infrastructure, presented at KIIT(Korean Institute of Information Technology) summer conference in 2009 and selected as a best paper.
A Study on Intrusion Confinement for Internal Network
Rosslin John Robbles,김태훈,이승 보안공학연구지원센터 2008 보안공학연구논문지 Vol.5 No.1
Security has emerged as the biggest threat to information systems. System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. As a result, serious damage can be caused either because many intrusions are never detected or because the average detection latency is too long. In this paper, we define Intrusion Confinement thru isolation to address such security issue, its importance and finally present an isolation protocol.