• Title/Summary/Keyword: 안전인증

Search Result 2,790, Processing Time 0.034 seconds

해상교통관제(Vessel Traffic Service) 시뮬레이터를 이용한 교육 현황 분석 및 개선방안에 관한 연구

  • Gang, Nam-Seon;Sin, Il-Sik;Sim, Sang-Mok;Kim, Nam-Hun;Song, Hyeon-Ung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2012.06a
    • /
    • pp.146-147
    • /
    • 2012
  • 급변하는 항만의 교통특성과 이용자들의 정보서비스 욕구에 발맞추어 해상교통관제 운영기법이 변화하고 있으며 차세대 다기능 해상교통정보시스템과 같은 새로운 기술이 개발되는 등 해상교통물류체제의 혁신이 이루어지고 있다. 이에 따라 세계 각국은 해상교통관제구역을 항행하는 선박의 질서유지 및 안전사고 예방과 사고 발생 시 신속한 대응조치를 위하여 해상교통관제사의 인력양성 및 인력관리에 많은 노력을 기울이고 있다. 국내에서도 선진해양교통행정을 위하여 분산된 해상교통관제 기능일 일원화 되어감에 따라 새로운 해상교통관리 체제의 효율적인 운영을 위하여 해상교통관제사들의 지속적인 훈련의 필요성이 대두되고 있지만 교육제도의 인지, 여건, 장비보급의 부족, 다양한 상황에 대한 교육시나리오의 부족으로 인하여 시뮬레이터를 이용한 교육이 효율적으로 이루어지지 못하는 문제점이 발생하고 있다. 본 연구에서는 해상교통관제사들의 교육을 위한 국내 외 규정을 분석하고 교육현황 및 해상교통관제사들의 요구사항을 파악하여 해상교통관제시뮬레이터를 이용한 교육의 개선방안을 제시하고자 한다.

  • PDF

Implementing the ESES for Secure Electronic Commerce Platform (안전한 전자상거래 플랫폼 개발을 위한 ESES의 구현)

  • Lee, Joo-Young;Kim, Ju-Han;Lee, Jae-Seung;Moon, Ki-Young
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.551-556
    • /
    • 2001
  • The ESES system has been developed to supply a digital signature function, an encryption function, and a library of cryptographic primitives and algorithm for securing an XML document and the existing non-XML documents that are exchanged in the electronic commerce. In this paper, we will introduce the overview of ESES system and explain how the ESES processes to offer security services Finally we\`ll conclude our talk by presenting the summary and further works.

  • PDF

Test on the Security and Performance on the Basis of the Access Control Policy Implemented by Secure OS (안전한 운영체제 접근제어 정책에 대한 보안성 및 성능 시험)

  • Kim, Jeong-Nyeo;Sohn, Sung-Won;Lee, Chelo-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.5
    • /
    • pp.773-780
    • /
    • 2003
  • SecuROS(Secure & Reliable Operating System) prevents and blocks possible system cracking by implementing additional security functions in FreeBSD 4.3 operating system (OS) kernel, including access control, user authentication, audit trail, encryption file system and trusted channel. This paper describes access control technique, which is one of core technologies of SecuROS, introduces the implementations of DAC, MAC and RBAC, all of which are corresponding access control policies, and show security and results of performance measurement on the basis of application of access control policies. Finally, security and performance between conventional OS environment and environment adopting access control policy is described.

An Enhancement of Simple Authenticated Key Agreement Protocol (개선된 '간단한 인증키 동의 (Simple Authenticated Key Agreement)'프로토콜)

  • Kim Young-Sin;Kim Yoon-Jeong;Hwang Jun
    • Journal of Internet Computing and Services
    • /
    • v.4 no.6
    • /
    • pp.95-102
    • /
    • 2003
  • The Diffle-Hellman Key Exchange scheme can produce a common session key between the two communicators, but its problem is that it makes a man-in-the middle attack possible. To solve problems like these, several protocols have been put forward, and the Simple Authenticated Key Agreement (SAKA) Protocol is among them. This protocol has been suggested by Seo-Sweeney, Tseng, and Ku-Wang, respectively, In this paper, we will put forward a new protocol that has been improved from all the original protocols mentioned above, but is still safe and quick to use, While the existing protocol divides the common session key production stage and the verification stage, the protocol suggested in this paper takes care of both of those stages simultaneously, therefore improving the processing performance.

  • PDF

WWW based on Missing-Child Prevention System Construction using Fingerprint (WWW 기반 지문을 이용한 미아방지시스템 구축)

  • 송영옥;김성영;조용환
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.2
    • /
    • pp.64-72
    • /
    • 2002
  • In this paper, the aims are to develop convenient and safe system-solutions, looking for missing-child, which is one of the increasing social problems, on the basis of World Wide Web. Finger-print cognition has been researching from long time before, as well as Bio-cognition technology, which is adapted for private-cognition in the field of human-cognition. By the fingerprint cognition, which discern finger print, which is generally used in Bio-cognition and is characterized each by using image-processing, missing-child protection system on the basis of Word Wide Web is designed and implemented in this paper. Additionally, indicates plans for revitalization method of this system.

  • PDF

An Mobile-OTP(One Time Password) Key and Simulation using Fingerprint Features (지문 특징을 이용한 모바일 일회용 암호키 및 시뮬레이션)

  • Cha, Byung-Rae;Kim, Yong-Il
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.4
    • /
    • pp.532-543
    • /
    • 2009
  • As the applications within Internet and Ubiquitous becoming more extensive, the security issues of those applications are appearing to be the most important concern. Therefore, every part of the system should be thoroughly designed and mutually coordinated in order to support overall security of the system. In this paper, we propose new technique which uses the fingerprint features in order to generate Mobile One Time Passwords(OTPs). Fingerprint is considered to be one of the powerful personal authentication factors and it can be used for generating variable passwords for one time use. Also we performed a simulation of homomorphic graph variable of fingerprint feature point using dendrogram and distribution of fingerprint feature points for proposed password generation method.

  • PDF

Design on Security Protocols Reflecting Collaboration in Workflow Management Systems (협업 기반 워크플로우 관리시스템의 보안 프로토콜 설계)

  • Choi, Myeong-Gil;Lee, Dong-Ho;Hwang, Won-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1271-1278
    • /
    • 2008
  • As the collaboration of WFMS(workflow management systems) in enterprises increases, security protocols could be considered a critical factor affecting secure operation of WMFS. The security protocol of WFMS could not reflect the nature of collaboration in WFMS, resulting to collaboration of WFMS on Internet causing the operation problems of WFMS. This study suggests collaboration based security protocols based on the collaboration of WFMS on Internet. To reflect the nature of collaboration in WFMS, this study analyzes security requirements for WFMS. Based on security requirements, this study suggests a security architecture and security protocols for WFMS using security agents.

Availability Verification of Integration OTP Framework using Biometrics Information (바이오매트릭스 정보를 이용한 모바일 기반의 통합 OTP 프레임워크의 유효성 검증)

  • Cha, Byung-Rae;Kim, Nam-Ho;Kim, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.39-53
    • /
    • 2011
  • As the applications within Mobile devices becoming more extensive, the mobile communication security issues of these applications and researches are appearing to be the most important concern. In this paper, we propose new integration OTP framework technique which uses the fingerprint and voice features of biometrics in order to generate Mobile One Time Passwords (OTPs) Token. The fingerprint and voice are considered to be one of the powerful personal authentication factors of biometrics and it can be used for generating variable passwords based on mobile environments for one time use. However, we performed a simulation of homomorphic variability of fingerprint and voice feature points using dendrogram and distribution of fingerprint and voice feature points for proposed password generation method, and verified validation of availability.

Analysis on the 3GPP MBMS Security Mechanism (3GPP MBMS 보안 메커니즘 분석)

  • Park, Youn-Kyoung;Lim, Sun-Hee;Song, Dong-Ho;Jung, Young-Jun;Yi, Ok-Yeon;Lim, Jong-In
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.62-65
    • /
    • 2007
  • 3GPP(3rd Generation Partnership Project) 주도의 유럽형 3세대 이동통신인 UMTS 시스템에서 제공하는 멀티미디어 방송 서비스(Multimedia Broadcast/Multicast Service)는 무선 네트워크상에서 동일한 정보를 하나의 링크를 통해 다수의 사용자에게 제공하는 point-to-multipoint 서비스이다. 콘텐츠가 무료로 제공되면 임의의 사용자들이 콘텐츠가 제공되는 채널에 액세스할 수 있다. 그러나 채널 액세스가 가입(subscription)기반이면, 가입하지 않은 사용자들은 콘텐츠를 이용할 수 없어야 한다. 이를 위해 사용자를 인증하고 안전한 방법으로 콘텐츠를 전송할 수 있는 보안 서비스가 필요하다. 본 논문은 MBMS의 전반적인 개요를 설명하여 앞으로 논의될 내용인 MBMS 보안구조에 대한 배경지식을 제공한다. 또한 브로드캐스트와 멀티캐스트 모드 각각에 대한 MBMS 구조를 설명하고, 멀티캐스트 모드에서의 보안 기능과 키관리 기법, 콘텐츠 보호 기술에 대해 상세히 분석한다.

  • PDF

A Study on Recall Systems of Motor Vehicle by Statistical Analysis of Defects Investigation (자동차 제작결함조사 통계 분석을 통한 리콜제도 연구)

  • Song, Ji-hyun;Kwon, Hae-boung;Lee, Kwang-bum;Kim, Hee-june
    • Journal of Auto-vehicle Safety Association
    • /
    • v.7 no.4
    • /
    • pp.20-25
    • /
    • 2015
  • The basic point of a vehicle recall is to remove vehicle defects as soon as possible and thus prevent possible road traffic accidents caused by the defects beforehand. Therefore, the core of vehicle recall under the self-certification system consists of a timely response and fast remedy of defects. The present study aimed to deduce a plan for improvement of the system necessary for the fast remedy of defects through a phased analysis of defect investigation procedure based on defect investigation statistical data. There will be a need to make the TSB(Technical Service Bulletin) or service campaign data submission of a manufacturer compulsory for the collection of broad defect information in the stage of information analysis and to impose a higher penalty when the manufacturer violates the data submission in the investigation stage. In addition, it is considered that an active service campaign should be induced and a punishment for late recall will be needed for consumer protection.