• Title/Summary/Keyword: 기술적 요구사항

Search Result 2,209, Processing Time 0.034 seconds

A Methodology for CC-based Security Requirements Analysis and Specification by using Misuse Case Model (Misuse Case 모델을 이용한 CC기반의 보안요구사항 분식 및 명제 방법론)

  • 최상수;장세진;최명길;이강수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.85-100
    • /
    • 2004
  • All information system is information security system that enforced security function. To improve qualify of information security system, suity requirement analysis and specification must be Performed by consistently and typically at early requirement analysis step. In this paper, we propose a security requirements analysis and specification model and process by using Misuse Case Model that extends UML's Use Case Model. And, we propose a cost-effective security product selection algorithm that security product is sufficient of all constructed security functional requirements. It may raise quality of information security system that developed through proposed model and process.

NCW를 위한 Military-BcN 요구사항과 아키텍처

  • Lee, Sun-Seok;Kim, Yeong-Seon;Gang, Seong-Yeol
    • Information and Communications Magazine
    • /
    • v.26 no.3
    • /
    • pp.52-59
    • /
    • 2009
  • 본 고에서는 정보통신 기술과 전쟁이론의 결합을 통하여 새롭게 제시되고 있는 네트워크중심전(Network-centric warfare)의 기본철학을 지원하는데 있어서 필수적으로 요구되는 도구의 통합과 정보의 통합을 효과적으로 추진하기 위하여 통신 네트워크의 요구사항을 도출하고, 이를 만족시키기 위하여 BcN(광대역통합망) 아키텍처를 기반으로 Military-BcN 아키텍처의 기본 설계 방향에 제시한다.

Aids to Navigation Service Scenarios for Next Generation VTS through Requirements Analysis of Domestic VTS Operator (국내 해상교통관제센터의 요구사항 분석을 통한 차세대 VTS의 항행지원 서비스 시나리오)

  • Kim, Juyoung;Choi, JoongYong;Na, Jung-Chan;Jo, Hyun-Suk;Lee, Byung-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.440-451
    • /
    • 2013
  • Recently, researches of technology and standardization for maritime safety are proceeding internationally. In particular, some technologies and strategies for e-Navigation have been developed and the necessity of development of next generation VTS (Vessel Traffic Service) has been raised in Korea. In order to construct user oriented VTS system for domestic environment, VTS operators are asked for their requirements related to developing VTS and the opinions should be reflected in the VTS. So in this paper, we collect the requirements from fifteen VTS centers in the country and we also analyze them. Furthermore, we propose an ASM (Application Specific Messages) service, which was not supported by current VTS, and we verify the proposed ASM through AIS (Automatic Identification System) system and simulation terminal for maritime safety.

Collaborative Work Applications Development Environment based on Hierarchical Coordination Model using Mobile Agent (이동 에이전트를 이용한 계층적 조정 모델 기반 협력 작업 응용 개발 환경)

  • Kim Young-Min;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.285-294
    • /
    • 2006
  • The requirements of Computer Supported Cooperative Work supporting efficient cooperative or collaborative works between multi-users have been increasing in distributed environments. The various technical sections such as group communication technology and distributed processing technology should be provided in Cooperative Work. The replicated development of Cooperative Work applications of a number of common requirements increases development costs enormously and duplicated investment parts. Therefore, systematical development environments are required to develop these common requirements and applications efficiently in Cooperative Work applications development. In this study, we propose the hierarchical role-based coordination model that improves the coordination model of legacy mobile agent to be appropriate in Cooperative Work applications, and design the development environment for Cooperative Work applications based on mobile agent. The proposed hierarchical role-based coordination model provides multi-layered group concepts of mobile agent, and enables implementation of efficient coordination policy per group. Additionally, it supports efficient Cooperative Work application development by role assignment per group unit.

  • PDF

Use Case Oriented Requirements Engineering for improving the previous ViRE's Process (기존 ViRE 프로세스 개선을 위한 Use Case 지향 요구공학)

  • Park, Bokyung;Moon, Soyoung;Kim, Kidu;Kim, Boyeon;Kim, R. Youngchul
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.1497-1499
    • /
    • 2012
  • 전통적인 소프트웨어 개발에서는 초기 요구사항을 정확히 판단하고 분석하는 것이 중요하다. 이를 위해 B.Boehm은 가치혁신 요구공학을 제안하지만, 이는 기존의 개발 방법 기반이다. 본 논문에서는 가치 혁신 요구공학 개선을 위해, 유스케이스 기반의 요구공학 방법을 제시와, 요구사항과 유스케이스의 우선순위 도출 방법을 제안한다. 이를 위해 어려운 시스템 요소(하드웨어와 소프트웨어)를 기본 단위인 유스케이스 요소와, 유스케이스 점수(Use Case Point) 개념을 적용하여 유스케이스 중요도를 도출한다. 그 기본 단위 내의 분석을 통해 쉽게 요구사항 추출 및 우선순위화를 한다. 이는 테스트 단계에서 우선순위화된 테스트 케이스를 적용이 가능한다고 본다.

친환경 몰드 기술 개요

  • Lee, Byeong-Uk
    • Journal of the KSME
    • /
    • v.51 no.4
    • /
    • pp.32-36
    • /
    • 2011
  • 친환경적 기술 개발은 시대적인 요청 사항으로 매우 중요한 의미를 가진다. 이 글에서는 국내 사출성형 관련 산업이 선진국형 산업으로 도약하기 위해 충족해야 하는 기술적인 요구조건뿐만 아니라 친환경적 요구조건에 대해 정의와 평가 범위에 대해 살펴보고 이와 관련된 대표적인 신기술들의 목적과 특징을 간략하게 소개한다.

  • PDF

A Study on Improving Graphic Rendering Engine for Visualization of Ship Handling Simulation (선박 운항 시뮬레이션 가시화를 위한 그래픽 렌더링 엔진 기술의 개선 방향)

  • Hwang, Ho-Jin;Mun, Du-Hwan
    • Journal of Navigation and Port Research
    • /
    • v.34 no.3
    • /
    • pp.153-160
    • /
    • 2010
  • Simulation visualization technology is an important constituent through which users directly interact with simulators. Simulator users have a needs for more fast, realistic and intuitive visualization. Though hardware-related performances such as computing power and visual equipment have been grown, the limits have existed in graphics rendering engines generally used in marine simulator up to now. This paper has focused on the review of graphic rendering engines available for simulation visualization. We had deduced system requirements for visualization of ship handling simulation, had surveyed graphic rendering engines as commercial and open source, and analyzed strengths and weakness of them. The feasibility study for simulation visualization of tug-barge transportation with an open source graphics rendering engine(OGRE3D) has been demonstrated.

A Study on the Extension of Cadastral Registration Objects - Focused on the Registration of Obligations and Restrictions - (지적공부 등록사항 확장 방향성에 관한 연구 - 의무 및 제한사항 등록을 중심으로 -)

  • Kim, Young-Hag;Park, Jong-Cheul;Oh, Bu-Hwan
    • Journal of Cadastre & Land InformatiX
    • /
    • v.45 no.2
    • /
    • pp.15-26
    • /
    • 2015
  • Since the creation of modern cadastral system in 1910's the cadastral system has been modified to comply with a new technical development and diverse requirements. However, the discussion on the directions for extension of cadastral records has been rarely addressed. In this paper it is proposed that the direction of extension cadastral records from the current a right focused perspective to an obligation and restrictions perspective based on the FIG Commission 7's Cadastre 2014 which is a future vision of cadastral system development. As the extension directions, a legal and technical perspective and functional extension for a role for land information publicity platform has been presented. Considering the extension directions an environment and disaster management field has been reviewed for an applicable fields.

Security Frameworks for Industrial Technology Leakage Prevention (산업기술 유출 방지를 위한 보안 프레임워크 연구)

  • YangKyu Lim;WonHyung Park;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.33-41
    • /
    • 2023
  • In recent years, advanced persistent threat (APT) attack organizations have exploited various vulnerabilities and attack techniques to target companies and institutions with national core technologies, distributing ransomware and demanding payment, stealing nationally important industrial secrets and distributing them on the black market (dark web), selling them to third countries, or using them to close the technology gap, requiring national-level security preparations. In this paper, we analyze the attack methods of attack organizations such as Kimsuky and Lazarus that caused industrial secrets leakage damage through APT attacks in Korea using the MITRE ATT&CK framework, and derive 26 cybersecurity-related administrative, physical, and technical security requirements that a company's security system should be equipped with. We also proposed a security framework and system configuration plan to utilize the security requirements in actual field. The security requirements presented in this paper provide practical methods and frameworks for security system developers and operators to utilize in security work to prevent leakage of corporate industrial secrets. In the future, it is necessary to analyze the advanced and intelligent attacks of various APT attack groups based on this paper and further research on related security measures.

OCL Based Specification and Verification of Structural Constraints for UML Analysis Models (UML 분석 모델의 구조적 제약사항에 대한 OCL 기반의 명세 및 검증)

  • Chae, Heung-Seok;Yeom, Keun-Hyuk
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.2
    • /
    • pp.186-200
    • /
    • 2006
  • Analysis model focuses only on functional requirements and postpones nonfunctional requirements and implementation specific issues until subsequent design activities are undertaken. Based on the analysis models, the design activities are performed by refining and clarifying the analysis models. Thus, the quality of analysis models has a vast impact on the design models. Therefore, much effort should be taken to build correct analysis model. In this paper, we propose a set of structural constraints that analysis models of typical object-oriented development methods should satisfy. Three kinds of constraints are proposed: class related constraints, relation related constraints, and usage related constraints. For each constraint, formal definition and description with OCL are provided. In addition, through a case study with two medium-sired industrial systems, we demonstrated that the proposed approach can help to identify and correct serious deficiencies in object-oriented analysis models.