• Title/Summary/Keyword: 인증프로그램

Search Result 490, Processing Time 0.027 seconds

A Study on Course-Embedded Assessment for Program Outcomes of Information Security Program for Engineering Education Accreditation (공학교육인증을 위한 정보보호학 프로그램의 교과 기반 학습성과 평가에 관한 연구)

  • Jeong, Weonil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.7
    • /
    • pp.183-191
    • /
    • 2018
  • This paper evaluates the achievement of program outcomes using course-embedded assessment for information security programs. In the case study concerning the development of course-embedded assessment used in this paper, we evaluate program outcomes using various evaluation tools including the course evaluation data. In addition, we consider the evaluation rubric and evaluation procedure for course-embedded program outcomes, set performance criteria, select the probe course with high contribution to the program outcomes according to curriculum flowchart, set course objectives for the probe course, and explain the rubric for each assessment tool to measure achievement level. Subsequently, we perform course-embedded program outcomes assessment, based on tests and projectevaluation tool for each program objectives, and present the achievement levels based analysis results. These results prove the effectiveness of the proposed course-embedded assessment for program outcomes.

Terrestrial DTV Broadcasting Program Protection based on Program Protection Information(PPI) (PPI에 기반한 지상파 방송프로그램 보호 기술)

  • Choo, Hyon-Gon;Lee, Joo-Yong;Nam, Je-Ho
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.11a
    • /
    • pp.161-164
    • /
    • 2009
  • 지상파DTV 방송프로그램의 온라인 상의 불법적인 배포가 활발하게 일어남에 따라서, 지상파DTV 방송프로그램에 대한 보호를 위한 여러 가지 조치가 시도되고 있다. 국내에서는 TTA를 중심으로 ATSC의 RC 기술자를 기반으로 한 방송프로그램 보호 기술 규격이 제정되었으며, 이를 기반으로 한 수신기에서의 방송프로그램 보호에 대한 표준화가 진행 중이다. 본 논문에서는 방송프로그램 보호신호(Program Protection Information: PPI)에 기반한 지상파 방송프로그램 보호 방법에 대해서 소개한다. 제안하는 방법에서는 방송프로그램에 함께 포함된 PPI 정보의 재배포 조건에 따라, 방송프로그램을 암호화되어 저장한다. 사용자의 홈도메인을 기반으로 사적복제를 지원하기 위해, 해당 방송프로그램을 복호화 하기 위한 인증 정보는 도메인 정보를 기반으로 방송프로그램과 같이 패키징 된다. 본 논문에서 제안한 지상파 방송프로그램 보호방법은 방송프로그램을 보호할 뿐 아니라, 사용자의 사적이용을 지원하기 위한 홈도메인 기반의 제한적인 배포 기능을 제공한다.

  • PDF

Operation Plan of the Certification System for the Construction Information Standard -From the Construction CALS Standard- (건설사업정보 표준 인증을 위한 운영방안 마련 -건설CALS 표준의 관점에서-)

  • Moon, Jin-Seok;Won, Ji-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.459-470
    • /
    • 2012
  • Information technical dependence degree is coming to be high from constructive information-oriented field. The size and complexity of constructive information are increasing and consequently, the standard for a construction information resource management becomes important. Currently the certification about construction information standard is being enforced part system and information-oriented level etc. from domestic. So we have a plan which will propel the diffusion strategy for the practical application of constructive information standard with introduction of the certification system about construction information standard. For a certification system preparation, we studied a feature and definition about construction information standard and analyzed domestic and foreign case. From that, we accomplished a classification and an analysis about construction information standard becomes the object of certification. And then, we selected the object of the certification through deriving necessities of certification about each construction information standard and considering the priority at the time of introduction. Finally we suggested an certification institutional operation plan about the object which is selected. Held a consultation meeting about the fact where the professional knowledge or technique is demanded and established secured directivity about authentication institutional operation plan and professionalism.

A Study of Strategic Approach for Course and Program Outcomes Assessment (교과목 및 프로그램 학습성과 평가의 전략적 접근)

  • Kim, Cheong-Sig
    • Journal of Engineering Education Research
    • /
    • v.10 no.2
    • /
    • pp.73-86
    • /
    • 2007
  • The purpose of this study is to suggest directions to improve engineering education and the assessment system of our country. For this object, the present situation of engineering education and assessment system in Korea have been reviewed and next, for those of study, the research papers and publications about the environment of college education are analyzed. Finally, an improved assessment system is suggested. It has already passed out for 6 years since execute the accreditation for engineering education in our country now, but essential point for step in accreditation for engineering education is how the evaluator can make the outcomes of studying. This is not a new terminology that is deformed according to special quality of college of engineering which prefer out-come based of study than process based of study to mean accomplishment in engineering education. The evaluation that estimate program is a skill, but an assessment method is not the meaning of individual student accomplishment also, it is the measure of validity estimation that should be estimate ability of students who complete program by proper authority. However, a new evaluation strategy that assess student outcome by person who consider the objectivity and validity, reliability should be develop for decision making of ABEEK. It is an original, private discussion for assessment strategy about the method for student learning outcomes assessment.

Risk Analysis on Various Contextual Situations and Progressive Authentication Method based on Contextual-Situation-based Risk Degree on Android Devices (안드로이드 단말에서의 상황별 위험도 분석 및 상황별 위험도 기반 지속인증 기법)

  • Kim, Jihwan;Kim, SeungHyun;Kim, Soo-Hyung;Lee, Younho
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1154-1164
    • /
    • 2016
  • To prevent the use of one's smartphone by another user, the authentication checks the owner in several ways. However, whenever the owner does use his/her smartphone, this authentication requires an unnecessary action, and sometimes he/she finally decides not to use an authentication method. This can cause a fatal problem in the smartphone's security. We propose a sustainable android platform-based authentication mode to solve this security issue and to facilitate secure authentication. In the proposed model, a smartphone identifies the current situation and then performs the authentication. In order to define the risk of the situation, we conducted a survey and analyzed the survey results by age, location, behavior, etc. Finally, a demonstration program was implemented to show the relationship between risk and security authentication methods.

A Comparative Study on National and International Hospital Accreditation Systems Focusing on Korea, the U.S., and Australia (의료기관인증제도의 국내외 비교 연구 -한국, 미국 및 호주 중심으로-)

  • You, Sun-Ju;Kim, Myo-Gyeong;Kim, Yoo-Mi;Choi, Yun-Kyoung
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.27-38
    • /
    • 2017
  • The purpose of this study was to ascertain new policies fo the development of the Korean Hospital Accreditation Program (HAP) by comparing and reviewing the domestic HAP of Korea, the U. S. and Australia as well as the International Accreditation Program of the International Society for Health Care Quality. The results of this study are as follows. First, it is necessary to improve the standards of the HAP such as 'patient and community centered standards' and 'staffing related standards'. Second, it is necessary to strengthen patient safety through the HAP. Third, the linkage among the HAP, clinical indicators and patient experience evaluation should be strengthened. Fourth, the competencies of surveyors should be improved. Fifth, the HAP of small and medium hospitals also needs to be vitalized. Sixth, it is necessary to improve the disclosure of the healthcare quality evaluation results. The findings of this study can be used as a basis to improve the Korean HAP.

An Effective One-Time Password Algorithm Using Time (시간을 이용한 효율적인 일회용 패스워드 알고리즘)

  • Park, Jung-Gil;Jang, Tae-Ju;Park, Bong-Ju;Ryu, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.8C no.4
    • /
    • pp.373-378
    • /
    • 2001
  • 사용자 고유번호와 패스워드 기반의 사용자 인증 메커니즘을 수행하는 네트워크 시스템 환경에서는 스니퍼 프로그램 등을 이용하여 불법 도청함으로써 쉽게 사용자 패스워드를 알아낼 수 있다. 이러한 불법적인 도청에 의한 패스워드 노출 문제를 해결하는 방법으로 일회용 패스워드, challenge-response 인증 방식이 유용하게 사용되며, 클라이언트/서버 환경에서는 별도 동기가 필요 없는 시간을 이용한 일회용 패스워드 방식이 특히 유용하게 사용될 수 있다. 그러나 시간을 이용한 일회용 패스워드 방식에서는 시간편차에 의한 인증 실패가 발생할 수 있다. 이 논문에서는 시간편차에 의한 인증이 실패할 가능이 있는 기간을 표시하는 1-비트 정보를 이용하여, 시간편차에 의한 실패가 발생하지 않는 효율적인 일회용 패스워드 알고리즘을 제안한다. 제안된 알고리즘은 기존의 시간을 이용한 일회용 패스워드 시스템에 프로토콜의 변경 없이 쉽게 구현이 가능하다.

  • PDF

Development of Engineering Education System in UOUC for ABEEK Accreditation (울산대학교 공과대학의 공학인증제도 도입과 향후 발전 방향에 관한 조사 연구)

  • Park Soon-Kyu;Kang Hee-Jun
    • Journal of Engineering Education Research
    • /
    • v.7 no.1
    • /
    • pp.15-29
    • /
    • 2004
  • University of Ulsan has prepared the Accreditation Program since 1999 and most of the engineering educational programs in College of Engineering have been accredited by ABEEK. This paper provides summarized description of the accreditation system development for engineering education in UOU and also discusses, what is to be considered in order to achieve the continuous improvement of education systems under the Accreditation Program.

Design of Mobile Agent Authentication and Domain Management Scheme in Home Network Environment (홈 네트워크 환경에서의 이동 에이전트 인증 기법 및 도메인 관리 기법 설계)

  • Kim, Jae-Gon;Kim, Gu Su;Eom, Young Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1197-1200
    • /
    • 2004
  • 홈 네트워크 환경은 댁내의 가전 기기들을 원격 접속 및 원격 제어가 가능하도록 연결한 네트워크 환경이다. 이동 에이전트는 네트워크 상에서 스스로 이동하면서 사용자 또는 다른 개체 대신 행동 할 수 있는 프로그램으로서 홈 네트워크 환경에서 원격 상호작용과 네트워크 부하를 줄이고 서비스를 제공할 수 있다. 이를 위해서는 서비스를 요청한 개체 및 서비스 주체에 대한 인증과정이 필요하다. 본 논문에서는 홈 네트워크 환경에서의 이동 에이전트 인증을 위한 다음 세 가지의 사항을 고려한다. 첫 째, 홈 네트워크 디바이스의 제한적인 성능, 둘 째, 홈 네트워크 디바이스의 이동성, 셋 째, 이동 에이전트의 코드 및 상태 정보 이동성. 이들에 대한 고려를 통하여 홈 네트워크 환경에 적합한 도메인 관리 기법과 인증기법을 설계한다.

  • PDF