• Title/Summary/Keyword: 다중인증

Search Result 303, Processing Time 0.026 seconds

Efficient Snapshot Replacement Technique in Multi-Level Spatial DBMS with Snapshot (스냅샷을 가지는 다중 레벨 공간 DBMS에서의 효율적인 스냅샷 교체 기법)

  • Oh Eun-Seoug;Eo Sang-Hun;Kim Ho-Seok;Bae Hae-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.196-198
    • /
    • 2005
  • 오늘날 우리가 사용할 수 있는 정보의 양은 실로 막대하면서도 지속적으로 늘어가고 있는 추세이며, 동시에 데이터들의 신속한 처리에 대한 관심이 늘고 있다. 특히 GIS에서 사용되는 대용량 데이터나 빠른 처리 속도가 요구되는 인증 시스템 데이터와 같은 다양한 종류의 데이터 특성을 고려하여 효율적인 관리를 하는 데이터베이스 관리 시스템을 필요로 하고 있다. 스냅샷 데이터를 갖는 다중 레벨 공간 DBMS는 대용량, 또는 빠른 트랜잭션 처리 속도가 필요한 데이터들을 효율적으로 관리하는 데이터베이스 관리 시스템으로서, 대용량 데이터는 디스크 데이터베이스에서 그리고 빠른 트랜잭션 처리를 요구하는 데이터들은 스냅샷의 형태로 메모리 데이터베이스에서 관리한다. 메모리 데이터베이스에 저장되는 스냅샷은 상대적으로 더욱 중요한 스냅샷들이 집중적으로 생성되거나 스냅샷이 가진 특성이 변화될 경우, 메모리 데이터베이스 내에서의 저장 가치를 잃을 수가 있다. 따라서 메모리 데이터베이스에 불필요한 스냅샷들이 축적되는 문제를 해결하고 메모리의 이용성과 성능을 보존하기 위해서 효율적으로 스냅샷들을 교체하는 기법이 필요하다. 본 논문에서는 다중 레벨 공간 DBMS에서 질의 패턴을 이용한 효율적인 스냅샷 교체 기법을 제안한다. 제안된 기법은 메모리 데이터베이스 내에서 스냅샷에 대한 교체요청이 있을 경우, 메모리 데이터베이스 및 메모리 관리 시스템의 상창을 분석하여 주어진 상황에 대응하는 스냅샷 교체 기법을 수행한다.

  • PDF

Multi-Certification of Agent System Using XML (XML 전자서명을 이용한 다중인증 멀티 에이전트시스템)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2005
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence about an age of information demand is focused on a learner and remote education based on information technology WBI(Web Based Instruction) is a formation that remotly educate a learner using web, possible mutual reaction between instructor and learner, submit various studying material, has a good point to overcome spatial restriction. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. In this paper, we propose multi-Certification of agent system using XML digital signature to satisfy security requirement.

  • PDF

A Study on the Barrier-Free Space through IPA Method for the Elderly in Multi-family Housing (IPA 분석기법을 통한 공동주택의 무장애공간 인증기준 적합성 분석연구)

  • Kim, Ju-Whan;Kim, Won-Pil
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.1
    • /
    • pp.187-194
    • /
    • 2020
  • When a human being grew older, followed by visually and perceptually impaired, and dementia, it jeopardizes safety and life unless supportive design is secured for a living environment. This supportive space is based on universal design concept which offers safe-oriented, and simple use by incorporating gender and physical/mental limitation. The study of purppose was to examine the appropriateness of barrier-free standard for seniors' living in apartment through IPA. Chi-square analysis found that satisfaction with BF space is lowered as aging is continued and for female group. Regression analysis indicated that sink was the prime predictor in satisfaction, and stair/elevator was the most important variable. IPA concluded that sink, bath, shower/locker and alert/egress were prime BF indexes to be improved among 14 elements, implying careful design in sanitation area for seniors.

과학기술위성3호 시험인증모델 제작 및 시험

  • Park, Jong-O;Lee, Seong-Se;Lee, Seung-Heon;Son, Jun-Won;Lee, Seung-U;Sin, Gu-Hwan;Seo, Jeong-Gi;Park, Hong-Yeong;Lee, Dae-Hui;Lee, Jun-Ho
    • Bulletin of the Korean Space Science Society
    • /
    • 2009.10a
    • /
    • pp.28.3-28.3
    • /
    • 2009
  • 과학기술위성 3호는 2007년 6월에 사업착수를 시작하여, 동년 8월 시스템요구사항검토회의(SRR)를 통해 임무 요구사항을 도출하였고, 동년 12월에 시스템기본설계검토회의(SDR)과 2008년 9월 시스템예비설계검토회의(PDR)를 개최하여 시험인증모델(EQM, Engineering& Qualification Model) 제작을 시작하여, 납품을 완료하고 ETB(Engineering Test Bed)상에서 유닛의 기능 시험 및 접속시험, 그리고 환경시험을 수행을 완료하였다. 또한 열구조모델 (STM, Structure and Thermal Model)도 제작을 완료하고 발사환경시험과 열평형 환경시험을 완료하였다. 이와같이 시험인증모델 및 열구조모델에 대한 지상에서의 시험과 검증이 완료된 시험결과를 바탕으로 2009년 9월 상세설계를 완료하고 비행모델 제작에 착수할 예정이다. 이 논문에서는 과학기술위성 3호의 시험인증모델에 대한 시험의 목적, 종류 그리고 검증에 대한 결과 그리고 향후 계획에 대해 발표하고자 한다. 참고로 과학기술위성 3호는 주탑재체인 다목적적외선영상시스템(MIRIS)은 우리 은하계의 근적외선 관측, 우주 배경복사 관측 및 지구 지표면의 적외선 영상 획득을 임무로 하고 있고, 부탑재체인 초소형 영상 분광기(COMIS)는 한반도 지역의 다중 스펙트럼 영상을 획득함으로써 대기관측 및 환경감시의 임무를 가지고 있다.

  • PDF

A Design of User Authentication Protocol using Biometric in Mobile-cloud Environments (모바일 클라우드 환경에서 생체인식을 이용한 사용자 인증 프로토콜 설계)

  • Kim, Hyung-Uk;Kim, Bumryong;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.32-39
    • /
    • 2017
  • Recently, usage of mobile cloud services has been increasing. In particular, beyond the constraints of a single cloud computing service, studies on the multi-cloud have been actively pursued. A user must authenticate multiple cloud service providers to use additional cloud services in a multi-cloud. In previous studies, an authentication method using single sign-on (SSO) was not available in all cloud services. Cloud services will not be available when the SSO server is not available due to malicious attacks, because all authentication is done via the SSO server. Additionally, using a broker, there is a vulnerability that can expose authentication information for the service provider to a user who did not sign up. In this paper, we propose a secure user authentication protocol using biometric authentication that does not expose user information when using additional cloud services. The proposed protocol can use a single biometric authentication for multi-cloud services without storing authentication information in each cloud service. In terms of key stability (to ensure stability through the key agreement process and the key area), by disabling various attack methods, such as man-in-the-middle attacks and replay attacks, we provide secure mobile cloud services.

Perception related to the Healthcare Accreditation Effects on Turnover Intention and Job Stress of employees' Quality Improvement Department (QI부서근무자들의 의료기관인증제관련 인식이 직무스트레스 및 이직의도에 미치는 영향)

  • Heo, Young-Hi;Park, Jung-Ae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.659-669
    • /
    • 2016
  • The purpose of this study was to examine, among quality improvement (QI) department employees, the effects of perception of the healthcare accreditation on job stress and to identify factors affecting turnover intention. Research data was collected between 1 June and 15 June 2016. The sample included QI department employees who had participated in a healthcare accreditation survey. The collected data were analyzed to obtain frequency, percentage, mean and standard deviation results, which were assessed by using Student's t-test, ANOVA, and multiple regression analysis. The scores for QI employees' perceptions of the healthcare accreditation, job stress, and turnover intention were 3.35, 3.66, and 3.32 of the perception by general characteristics. There were significant differences between scores according to gender, age, QI department section, position, and job satisfaction. In addition, job stress and turnover intention scores showed significant differences according to position, age, QI department section, and job satisfaction. A positive correlation was observed between healthcare perception and job stress, while turnover intention was negatively correlated with healthcare perception. The results indicate that the perception of healthcare accreditation positively affects job stress; in contrast, it decreases the number of people intending to change departments. Among the sample of lower level workers, the younger age workers who were employed for more than 10 years expressed lower satisfaction with their job, which indicates that they are affected by their notion of healthcare accreditation more than by other factors. Thus, in order to lessen work stress and employees' thoughts of leaving the department, the QI department should be encouraged to lessen job stress and provide various supports to the employees.

A Study on Batch Auditing with Identification of Corrupted Cloud Storage in Multi-Cloud Environments (손상 클라우드 식별 가능한 다중 클라우드 일괄 감사 기법에 관한 연구)

  • Shin, Sooyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.75-82
    • /
    • 2015
  • Recently, many public auditing schemes have been proposed to support public auditability that enables a third party auditor to verify the integrity of data stored in the remote cloud server. To improve the performance of the auditor, several public auditing schemes support batch auditing which allows the auditor to handle simultaneously multiple auditing delegations from different users. However, when even one data is corrupted, the batch auditing will fail and individual and repeated auditing processes will be required. It is difficult to identify the corrupted data from the proof in which distinct data blocks and authenticators of distinct users are intricately aggregated. In this paper, we extend a public auditing scheme of Wang et al. to support batch auditing for multi-cloud and multi-user. We propose an identification scheme of the corrupted cloud when the data of a single cloud is corrupted in the batch auditing of multi-cloud and multi-user.

Multiple Access Capability of Digital IoT Doorlock System for Smart Building (스마트빌딩용 디지털 IoT 도어락 시스템의 다중접속 능력)

  • Lee, Sun-Yui;Sun, Young-Ghyu;Sim, Issac;Hwang, Yu-Min;Yoon, Sung-Hoon;Cha, Jae-Sang;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.99-105
    • /
    • 2018
  • This paper proposes multiple access method for smart doorlock system using VLC(Visible Light Communication) with color grid modulation method. The proposed method is to connect multiple visible light signals using color grid modulation method in order to recognize and authenticate multiple users accessing doorlock. In order to enable visible light multiple access with existing infrastructure, the symbol energy interval of signal should be maximized. Thus, performance of system in VLC channel is measured by modulating symbols based on the proposed method. We confirm the actual channel test results of the modulated signal to implement doorlock system that recognizes the number of multiple access users.

Multipurpose Watermarking Scheme Based on Contourlet Transform (컨투어렛 변환 기반의 다중 워터마킹 기법)

  • Kim, Ji-Hoon;Lee, Suk-Hwan;Park, Seung-Seob;Kim, Ji-Hong;Oh, Sei-Woong;Seo, Yong-Su;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.929-940
    • /
    • 2009
  • This paper presents multipurpose watermarking scheme in coutourlet transform domain for copyright protection, authentication and transform detection. Since contourlet transform can detect more multi direction edge and smooth contour than wavelet transform, the proposed scheme embeds multi watermarks in contourlet domain based on 4-level Laplacian pyramid and 2-level directional filter bank. In the first stage of the robust watermarking scheme for copyright protection, we generates the sequence of circle patterns according to watermark bits and projects these patterns into the average of magnitude coefficients of high frequency directional subbands. Then the watermark bit is embedded into variance distribution of the projected magnitude coefficients. In the second stage that is the semi-fragile watermarking scheme for authentication and transform detection, we embed the binary watermark image in the low frequency subband of higher level by using adaptive quantization modulation scheme. From the evaluation experiment using Checkmark 2.1, we verified that the proposed scheme is superior to the conventional scheme in a view of the robustness and the invisibility.

  • PDF

An Improvement of Image Encryption using Binary Phase Computer Generated Hologram and Multi XOR Operations (이진위상 컴퓨터형성홀로그램과 다중 XOR 연산을 이용한 영상 암호화의 개선)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2008
  • In this paper, we proposed an improvement technique of image encryption using binary phase computer generated hologram(BPCGH) and multi exclusive-OR(XOR) operations. For the encryption process, a BPCGH that reconstructs the original image is designed, using an iterative algorithm, and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. Then the encrypted image is divided into several slide images using XOR operations. So, the performance of encryption for the image is improved. For the decryption process, we cascade the encrypted slide images and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the original image is recovered by an inverse Fourier transformation of the phase information. If the slide images are changed, we can get various decrypted BPCGH images. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the slide images, so it can be used in the differentiated authorization system.

  • PDF