• Title/Summary/Keyword: 보안 중요도

Search Result 2,285, Processing Time 0.031 seconds

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

A Study on the MIS curriculum directions and courses based on the MIS identity and IS core competency (MIS 정체성과 IS 핵심 역량 관점의 MIS 교육과정 방향 및 내용에 관한 연구)

  • Chang, Yun-Hee
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.253-270
    • /
    • 2012
  • In a rapidly changing IT and business management environment the demand for competent IS personnels is increasing. However, it is ironic that the number of IT and IS majors has sharply decreased as well as the widespread skepticism of IS identity. This research suggests directions to differentiate MIS to other IT majors, diversify IS core competency and make general improvements in MIS curriculum. The research recommend the courses of IS Strategy and policy, ITA/EA, Global IT Management, Emerging Technologies, DW/DM, BI, IT Service Science, Project Management, IT Consulting and integrated capstone which are few in Kore universities. This research also stress the course of soft skills like business communication, team building, analytic/logical thinking, rational problem solving and so on as a important IS competency. The pedagogy of course is important, so the research recommend the internship, mentoring programme, lecturers in industry according to industrial - educational cooperation.

A Study on the Open Platform Architecture for the Integrated Utilization of Spatial Information and Statistics (공간정보와 통계정보의 융합 활용을 위한 오픈플랫폼 아키텍처에 관한 연구)

  • Kim, Min-Soo;Yoo, Jeong-Ki
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.2
    • /
    • pp.211-224
    • /
    • 2016
  • Based on the 'Government 3.0', the government opens the public data and encourages the active use in the private sector. Recently, the spatial and statistical information that is one of the public data is being widely used in the various web business as a high value-added information. In this study, we propose an architecture of high-availability, high-reliability and high-performance open platform which can provide a variety of services such as searching, analysis, data mining, and thematic mapping. In particular, we present two different system architectures for the government and the public services, by reflecting the importance of the information security and the respective utilization in the private and public sectors. We also compared a variety of server architecture configurations such as a clustered server configuration, a cloud-based virtual server configuration, and a CDN server configuration, in order to design a cost- and performance-effective spatial-statistical information open platform.

Scrambling Technology using Scalable Encryption in SVC (SVC에서 스케일러블 암호화를 이용한 스크램블링 기술)

  • Kwon, Goo-Rak
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.575-581
    • /
    • 2010
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and not fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. The SVC offers temporal, spatial, and SNR scalability to varying network bandwidth and different application needs. Meanwhile, for many multimedia services, security is an important component to restrict unauthorized content access and distribution. This suggests the need for new cryptography system implementations that can operate at SVC. In this paper, we propose a new scrambling encryption for reserving the characteristic of scalability in MPEG4-SVC. In the base layer, the proposed algorithm is applied and performed the selective scambling. And it encrypts various MVS and intra-mode scrambling in the enhancement layer. In the decryption, it decrypts each encrypted layers by using another encrypted keys. Throughout the experimental results, the proposed algorithms have low complexity in encryption and the robustness of communication errors.

A1lowing Anonymity in Fair Threshold Decryption (익명성을 제공하는 공평한 그룹 복호화 기법)

  • Kim, Jin-Il;Seo, Jung-Joo;Hong, Jeong-Dae;Park, Kun-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.6
    • /
    • pp.348-353
    • /
    • 2010
  • A threshold decryption scheme is a multi-party public key cryptosystem that allows any sufficiently large subset of participants to decrypt a ciphertext, but disallows the decryption otherwise. When performing a threshold decryption, a third party is often involved to guarantee fairness among the participants. To maintain the security of the protocol as high as possible, it is desirable to lower the level of trust and the amount of information given to the third party. In this paper, we present a threshold decryption scheme which allows the anonymity of the participants as well as the fairness by employing a semi-trusted third party (STTP) which follows the protocol properly with the exception that it keeps a record of all its intermediate computations. Our solution preserves the security and fairness of the previous scheme and reveals no information about the identities of the participants and the plaintext even though an attacker is allowed to access the storage of the STTP.

Morale enhancing determination model of information security (정보보호 사기진작 결정모델 연구)

  • Kim, Kyongwon;Lim, Jong In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.889-903
    • /
    • 2015
  • As the number of recent information security incident occurrence increases, more and more workload and liability pressure are given to info-security professionals, which results in decrease of morale level of working groups in the field. In order to solve this problem, Korean government is providing various action plans to improve the morale level of info-security professionals, and also requiring financial companies to submit its own action plan of increasing morale of info-security professionals to Financial Service Agency. For this study, based on the previous studies and relevant professionals' interviews, we selected 16 critical morale increase variables, and performed survey for empirical analysis. As a result, 3 features; role, system, and relationship were presented as the main factor of morale increasement of info-security professionals. This study also suggests a decision making method of utilizing the developed morale measurement model for individual organizations.

Design of Securer Electronic payment system based on ECC algorithm (타원 곡선 암호를 이용한 안전한 메일 기반 전자지불시스템 설계)

  • 김성일;최문석;신병철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.817-820
    • /
    • 2003
  • With a great improvement of computers and Network communication skills, we can exchange information quickly. There have been many researches on the subject how to guarantee the information security by security mechanism and cryptography schemes. Nowadays, many people in this area show their interest in money transfer systems between accounts, which can provide a secure mechanism in which people can send money to the legitimate party or person safe. However, we have teamed many ways to distort messages and repudiate the malicious activity in mail systems based on SSL mechanism. It is very likely that important information which must be kept in secret is laid exposed to un_authorized user. Accordingly, to provide stronger security service, researches on electronic payment system which tan guarantee the security characteristics such as confidentiality, integrity, user authentication, Non-repudiation, are strongly needed. In this paper, we analize the characteristics of the previous researches in this field, and also propose a securer electronic payment system based on ECC algorithm.

  • PDF

An Induction plan of Electronic Evaluation Sytem for Government R&D Program (국책과제 전자평가시스템 도입방안)

  • 송학현;최세하;조재영;김윤호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.7
    • /
    • pp.1020-1025
    • /
    • 2002
  • Government R&D Programs' success and failures depend on the choice of the excellent project from diverse proposal. Therefore project evaluation process should be transparency, objectivity and confidence. Institute of Information Technology and Assessment(IITA) working for the Ministry of Information and Communication(MIC). IITA management the informatization fund and government R & D program. IITA have execute choice of R & D project and assessment proposals and reformed the system of evaluation. This advanced evaluation system made in the end of the 90's and adapted it to the college basic R & D program in 1999. Advanced evaluation system is electronic and remote system. This advantage is very shift and correct to process. So the system save the task and money from 46% to 78%. But it is some Problem, security and technical experts for the choice of the Government R & D project in remote evaluation system.

P2P DRM Algorithm for the protection of contents copyright (콘텐츠 저작권 보호를 위한 P2P DRM 알고리즘)

  • Ha Tae-Jin;Kim Jong-Woo;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1783-1789
    • /
    • 2004
  • It is evaluated that there is infinit capability of creating new e business using P2P program. but the research for the method to protect the copyright of digital contents is urgent even for development of the p2p service because the problem of copyright protection for digital contents is not solved. Though this article, it can be induced that reliable contents sharing use to a flow fund by secure settlement architecture, user authentication and contents encryption and then it as the problem of copyright fee is solved, it is able to discontinue which trouble with a creation work for copyright fee and protection it's once again as growth of p2p market, p2p protocal is will be grow into a important protocal of advanced network. In this article, When users send digital contants to each other in internet, we proposed the P2P DRM algorism to offer a security function which using the technology of copyright management to use a AES Algorithm based on PKI.

A Design of a Personnel Control System Using RF Tag in Port Facilities (RF 태그를 활용한 항만 내 인원관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2581-2585
    • /
    • 2010
  • In the field of network sense for the Ubiquitous environment, the technology of RFID is a significant part. Due to the real time processing of information and the property of network, RFID has been used in service field such as distribution, administrative control of physical distribution, remote measuring device, and security. instead of currently used bar-code. The management system of port facilities using the current RFID technology has the effects of reducing working hours and improvement in data processing, but it is not proper for human resource allocation since it is dominantly worked for physical resources. In this paper, we designed and implemented personnel control system using RFID of 2.4GHz in port facilities which presents a monitoring system for safety operation and increase of efficiency using RFID in order to overcome the limitations and problems of current port operation management techniques.