• Title/Summary/Keyword: 네트워크 확장

Search Result 2,312, Processing Time 0.026 seconds

Development of 3D Underground Utilities Processing and Partial Update Automation Technology - Focused on 3D Underground Geospatial Map - (3차원 지하시설물 가공 및 부분갱신 자동화 기술개발 - 지하공간통합지도 중심으로 -)

  • LEE, Min-Kyu;CHOI, Sung-Sik;JEON, Heung-Soo;KIM, Sung-Su
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.23 no.4
    • /
    • pp.1-15
    • /
    • 2020
  • As cities expand and underground utilities construction projects increase, there is an urgent need for a technology capable of analyzing the underground utilities network in 3D. Since 2015, 3D Underground Geospatial Map project, that has been integrating 15 types of underground information such as underground utilities, underground structures, and ground information, is in progress in S. Korea. However, the construction of 3D underground facilities is currently based on manual work and the logic for building a 3D model is very complicated. And it takes a lot of time and cost to process millions of large amounts of data per local governments. By presenting a framework on the processing and partial updating of the 3D underground utilities model, this paper aims to establish a plan to quickly build a 3D underground utility model at a minimum cost. The underground utilities processing and partial update automation technologies developed in this study are expected to be immediately applied to the 3D Underground Geospatial Map project.

Improved Security Analysis of Reduced SMS4 Block Cipher (축소된 SMS4 블록 암호에 대한 향상된 안전성 분석)

  • Kim, Tae-Hyun;Kim, Jong-Sung;Hong, Seok-Hie;Sung, Jae-Chul;Lee, Chang-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.3-10
    • /
    • 2009
  • In this paper, we introduce improved differential and linear attacks on the SMS4 block cipher which is used in the Chinese national standard WAPI (WLAN Authentication and Privacy Infrastructure, WLAN - Wireless Local Area Network): First, we introduce how to extend previously known differential attacks on SMS4 from 20 or 21 to 22 out of the full 32 rounds. Second, we improve a previously known linear attack on 22-round reduced SMS4 from $2^{119}$ known plaintexts, $2^{109}$ memory bytes, $2^{117}$ encryptions to $2^{117}$ known plaintexts, $2^{l09}$ memory bytes, $2^{112.24}$ encryptions, by using a new linear approximation.

Single Sing-On System enabling Mutual Authentication in Multi Domain Environments (다중 도메인 환경에서 상호 인증이 가능한 단일 인증 시스템)

  • 손태식;서정택;윤혁중;이철원;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.3-16
    • /
    • 2001
  • With the development of Internet, it is widely spreaded to a Intranet based on Internet technology. Intranet is a private, unique network to share the information of organization such as incorporate, research institute and university. With the increase of Intranet using, Intranet environment is developing into Extranet environment which is connected many Intranet. Currently such Intranet and Extranet environments, above all, it is important to solve security problems which can appear through use of information between domains. Thus, in this paper, we propose SSO(Single Sign-on System) model with authorization management and single sign-on operation, and we extend it to enable mutual authentication through inter-working based on PKI(Public Key Infrastructure) in Extranet environments.

Proposal of a Mutual Authentication and Key Management Scheme based on SRP protocol (SRP 기반의 DCAS 상호인증 및 키 관리 기법의 제안)

  • Choi, Hyun-Woo;Yeo, Don-Gu;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.53-65
    • /
    • 2010
  • Conditional Access System (CAS) is a core security mechanism of IPTV SCP (Service and Content Protection) which enables only authenticated user to be able to watch the broadcasting contents. In the past, it was general that CAS was built in Set-Top Box (STB) as hardware or as a detachable cable card. However, numerous researches in Downloadable CAS (DCAS), where users can download CAS code in their STB through their network, have been recently conducted widely due to the lack of security and scalability problem. In this paper, the security requirements of OpenCable based DCAS which is typical example of downloadable IPTV SCP will be derived, the novel authentication and key management scheme will be proposed by using the Authentication Proxy (AP) which is the core DCAS. Also, the benefits of the proposed system will be evaluated by comparison and analysis with preceding research.

A Study on the API Gateway for human resources management modules extensions in ERP

  • Lee, Ji-Woon;Seo, Hee-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.79-88
    • /
    • 2021
  • In this paper, we propose a API Gateway technique for the expansion of human resource management module, one of the ERP functions. The institution has introduced ERP (Enterprise Resource Planning) based on its efforts to transform all human and physical resources into business competitiveness and its response to the digital knowledge informatization environment, and listed it as multiple success factors. Human resource management is one of the factors that have been dealt with. However, ERP's Human Resources Management Module remains in the role of functional personnel management. How to utilize human resources begins with navigating and recognizing human resources. The proposed API Gateway technique leverages blockchain networks to design and implement APIs for human resource sharing and navigation, including the possibility of extending ERP's human resource management module. Secondly, it was designed and implemented using a smart contract that behaves like an API for preventing information forgery. The proposed method will not only be used as a tool that can actively utilize human resources, but will also be a complete resource for utilizing big data technology.

A Business Cluster of IT Enterprise (IT기업의 비즈니스클러스터)

  • Park, Jae-Sue;Park, Jung-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1558-1564
    • /
    • 2019
  • Corporate business clusters create a borderless business network through value chains and value creation activities. Clusters in the IT sector are crossing regional boundaries because of their rapid technological development and short product life cycle. To investigate this phenomenon, we examined the value activities of IT companies. As a result, the global expansion of the case companies was limited, but they had business clusters that exceeded the regional boundaries. However, because the order of business clusters is not advanced, value activities are focused on productivity rather than innovation. Given the rapidly evolving nature of IT, it is necessary to evolve into a business cluster that can create new value. Companies must design and implement value-creating processes to develop new technologies or enter new markets, which can lead to cluster growth. Companies must design and implement value-creating processes to develop new technologies or enter new markets, which can lead to cluster growth.

Analysis of Problem-Solving Processes through Data-based STEAM Education: Focusing on Atmospheric Circulation and Surface Currents (데이터 기반 STEAM 교육을 통한 문제 해결 과정 분석: 대기대순환과 표층 해류 내용을 중심으로)

  • Hong, Seok Young;Han, Shin;Kim, Hyoungbum
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.13 no.3
    • /
    • pp.330-343
    • /
    • 2020
  • In this study, STEAM program on the subject of 'atmospheric circulation and surface current' was produced based on data and applied to 106 first-year high school students to analyze its effect and problem-solving processes. This program was organized to collect, refine, visualize, and analyze data and to allow communication processes to proceed based on these results. Using this, the concept of circulation in daily life was expanded from a global perspective to identify problems about circulation around the world. As a result of the application of the program, significant changes were identified in knowledge information processing competency. Also, significant changes were made in terms of convergence and creativity, which are sub categories among STEAM core competencies. It also sought to obtain suggestions for data-based STEAM education by analyzing students' responses in the form of a Text network.

Characterization of pH Dependent Properties of mCherry Mutant, I202T (형광 단백질 mCherry-I202T의 pH 감응성 분석)

  • Lee, Sangmin;Chung, Minsub
    • Applied Chemistry for Engineering
    • /
    • v.32 no.1
    • /
    • pp.10-14
    • /
    • 2021
  • mCherry is one of the well-understood red fluorescent proteins which has a similar tertiary structure as GFPs, but pH resistant due to the lack of hydrogen bond network. Whereas mCherry-I202T showed far-red fluorescence and also pH sensitive property because of the additional hydrogen bond formed by substituting Ile of 202 amino acid sequence on mCherry with Thr. In order to verify the pH sensitive characteristic of mCherry-I202T owing to the extension of hydrogen bond, UV-vis spectrum was measured over the range of acidic to basic pH. We also demonstrate further possibilities of applying mCherry-I202T as a pH sensor.

Effect of Media Literacy on the Formation of Smart Divide (미디어 리터러시가 스마트 디바이드 형성에 미치는 영향)

  • Lee, Seungmin
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.2
    • /
    • pp.19-38
    • /
    • 2021
  • This study empirically analyzed the effect of media literacy on the formation of the smart divide, which is a multi-faceted digital divide that occurs in the context of the use of smart devices. As a result, most of the factors of media literacy affect the establishment of social relations and social network through the use of smart devices, which, in turn, leads to the expansion of the range of informational and social activities. In addition, media literacy has a significant effect on the competence to evaluate the value of information acquired through the use of smart devices. Based on these results, there can be social disparity between those who have secured media literacy and those who do not from the perspective of informational and social benefits through the use of smart devices, which can function as a mechanism to generate the smart divide.

A Defense Mechanism Against Attacks on Files by Hiding Files (파일 은닉을 통한 파일 대상 공격 방어 기법)

  • Choi, Jione;Lee, Junghee;Lee, Gyuho;Yu, Jaegwan;Park, Aran
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.2
    • /
    • pp.1-10
    • /
    • 2022
  • Deception technology is an extended concept of honeypot, which detects, prevents or delays attacks by deceiving adversaries. It has been applied to various system components such as network ports, services, processes, system calls and database management systems. We can apply the same concept to attacks on files. A representative example of a file attack is ransomware. Ransomware is a type of malware that encrypts user files and ask for ransom to recover those files. Another example is the wiper attack, which erases all or target files of a system. In this paper we propose a defense mechanism against these kinds of attacks by hiding files. Compared to backup or virtualization techniques, the proposed method incurs less space and performance overheads.