• Title/Summary/Keyword: 정보보안 3요소

Search Result 220, Processing Time 0.038 seconds

The Effects of Service Factors of Electronic Catalogue Systems on User Satisfaction (전자카탈로그 시스템의 서비스 요인이 사용자만족에 미치는 영향)

  • Ko, Il-Sang;Choi, Su-Jeong;Kim, Jeong-Hee
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.3
    • /
    • pp.107-131
    • /
    • 2007
  • Due to an increase of the importance of E-catalogue on electronic commerce, E-catalogue systems have been prevailing for their production and efficient management around Web environment. In this study, we categorize service factors off-catalogue systems into three aspects contents-providing, user participation, and system management, and we measure their impacts on user satisfaction. The results of the study show that richness, design, trust, interaction, function of transaction management, system extensibility, system stability, and security have been found out to be significant factors to affect user satisfaction.

  • PDF

The Design and Implementation of an Elevator 3D Model Simulator Framework based on Unreal Engine (언리얼엔진 기반 승강기 3D모델 시뮬레이터 프레임워크 설계 및 구현)

  • Woon-Yong Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.67-74
    • /
    • 2023
  • An elevator is a mechanical and electronic device composed of about 20,000 various parts, and is systematically operated with a close relationship with each other. By intuitively understanding this complex elevator structure and efficiently recognizing the operating model, it will be possible to increase the understanding of the elevator system and the efficiency of maintenance. The existing elevator management system is a process of collecting and understanding information based on data generated from elevators, and has a structure that lacks efficiency in expressing and managing real-world information during elevator maintenance. Therefore, this paper proposes a simulator framework that can operate efficiently based on the actual elevator model. By constructing the recognition of specific objects through a 3D-based service model and visualizing the operation process, it will be possible to enhance the understanding of the structure and operation required for elevator operation. To this end, the core components of the elevator system are identified, the relationship between them and the operating method are visualized, and a simulator is implemented. Based on this, it will be possible to provide a realistic information management and operating environment in virtual space and real platform.

Three-dimensional QR Code Using Integral Imaging (집적 영상을 활용한 3차원 QR code)

  • Kim, Youngjun;Cho, Ki-Ok;Han, Jaeseung;Cho, Myungjin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2363-2369
    • /
    • 2016
  • In this paper, we propose three-dimensional (3D) quick-response (QR) code generation technique using passive 3D integral imaging and computational integral imaging reconstruction technique. In our proposed method, we divide 2D QR code into 4 planes with different reconstruction depths and then we generate 3D QR code using synthetic aperture integral imaging and computational reconstruction. In this 3D QR code generation process, we use integral imaging which is one of 3D imaging technologies. Finally, 3D QR code can be scanned by reconstructing and merging 3D QR codes at 4 different planes with computational reconstruction. Therefore, the security level for QR code scanning may be enhanced when QR code is scanned. To show that our proposed method can improve the security level for QR code scanning, in this paper, we carry out the optical experiments and computational reconstruction. In addition, we show that 3D QR code can be scanned when reconstruction depths are known.

A Multi-connection TCP scheme supporting Idle mode in Heterogeneous mobile networks (이종 모바일 네트워크 환경에서 휴지 모드 지원 다중 연결 TCP 기법)

  • Kang, Hyeong Kyu;Lee, Sungwon;Hong, Choong Seon
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1070-1073
    • /
    • 2010
  • 모바일 기기의 통신에 있어 가장 중요한 요소는 이동성 지원이다. 이에 따라 3G 와 같은 이동통신을 지원하는 기술이 출현하게 되었고 이를 통해 이동 중에도 데이터 통신이 가능하게 되었다. 하지만 이동통신은 많은 에너지 소비와 높은 통신 비용문제 등으로 대용량 전송에 적합하지 않은 문제점이 있다. 이에 반해 Wi-Fi 와 같은 Wireless 네트워크는 이동성을 지원하지 않는 대신 허가 받지 않은 주파수 대역을 이용하여(예: Wi-Fi 의 2.4GHz, 5GHz) 높은 대역폭을 제공할 뿐만 아니라 전력을 적게 사용하는 장점이 있다. 본 논문에서는 3G 와 Wi-Fi 을 동시 다중 연결을 통해 서로의 장점을 극대화하고 단점을 보안한 기법을 제시하고 시뮬레이션을 통해 이를 검증 한다.

이동통신망 기반의 사물통신 서비스 현황 및 이슈

  • Kim, U-Yong
    • Information and Communications Magazine
    • /
    • v.27 no.7
    • /
    • pp.16-20
    • /
    • 2010
  • 이동통신망을 활용하여 사물과 사물간의 연결(Connectivity)을 제공하는 사물통신 서비스를 M2M이라 하며, 이는 인구수의 제약을 넘어서는 신규 가입자시장이다. M2M은 원격측정, 감시, 제어, 관제 등의 기능을 제공하며, 사물과 현장의 정보를 수집하는 센싱부와 이를 전달하는 광역통신망 및 수집정보의 가공, 처리, 통제하는 서버시스템의 3요소로 구성된다. 이를 위해서 기기, 센서, 통신모듈, 통신 및 IT등 다양한 전문Player의 협업을 필요로 하는 Value Chain을 가지고 있다. M2M 시장은 고정물, 이동물, 차량 및 대인시장으로 구분할 수 있으며, 전력, 수도 등 검침, 보안방범, 재난재해관리, 환경감시, 차량관제, 대인 위치추적 등 다양한 분야에서 적용되고 있다. 국내 M2M 시장은 지난 10년간 지속적인 성장을 계속하고 있으나 급속성장 및 활성화를 위하여는 소규모 세분시장의 한계를 극복하고 규모의 경제를 달성할 수 있는 방안의 모색, Value Chain내 다양한 Player간 Win-Win 협업체계의 강화, 높은 QoS에 의한 서비스 안정성 및 도입운영의 용이성 제고, 초기도입 비용장벽의 완화 등이 필요한 것으로 분석된다. 향후 높은 성장 잠재력을 가지고 있는 M2M 시장은 참여자들의 창의적인 대상시장 발굴과 가치의 제공을 통하여 상생 발전의 선순환을 도모할 필요가 있다.

Application of Block Design for an Efficient Conference Key Distribution System (효율적인 회의용 키분배 시스템을 위한 Block Design의 응용)

  • Lee, Tae-Hun;Jeong, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.3
    • /
    • pp.271-276
    • /
    • 2001
  • 회의용 키분배 시스템은 회의용 키를 생성하여 키를 회의에 참석하고 있는 사람에게만 전달하여 서로간에 안전하게 통신하도록 한다. 본 논문에서는 Block Design의 한 분류인 symmetric balanced incomplete block design(SBIBD)를 적용한 효율적인 회의용 키분배시스템을 제안한다. 회의용 키를 생성하고 개인식별 정보를 근거로 하여 인증을 수행하는 통신 프로토콜이 설계된다. 제안된 프로토콜은 회의용 키를 생성하는 메시지의 복잡도를 최소화시키는데, SBIBD의 특별한 분류에서는 참석자의 수 v에 따라 메시지 복잡도는 O(v√v)가 된다. 보안시스템의 구현에서 중요한 요소인 프로토콜의 안전성은 factoring과 discrete logarithm을 계산할 정도로 난해하여 충분히 보장됨을 증명할 수 있다.

  • PDF

A Study on Mobile IPv6 AAA Handover Optimizing Scheme in IEEE 802.11 Wireless LAN (IEEE 802.11 무선랜 기반의 Mobile IPv6 AAA 환경에서 핸드오버 최적화 방안 연구)

  • Jin, Bongjae;Huh, Eui-Nam;Mun, Youngsong
    • Annual Conference of KIPS
    • /
    • 2004.05a
    • /
    • pp.1201-1204
    • /
    • 2004
  • Mobile IPv6는 IP기반 3계층에서 하부 기술에 독립적으로 이동성을 제공하여 차세대 망에서 글로벌 로밍을 쉽게 지원 할 수 있다. 그러나 핸드오프 과정 중에 각 계층마다 생기는 지연은 피할 수 없는 부분 요소 이다. 본 연구에서는 2계층의 IEEE 802.11 기술을 기반으로 하는 Mobile IPv6 환경에서 이동 인터넷 사용자들에게 끊김 없는 서비스의 제공, 핸드오프 지연의 최소화, 신뢰성 있는 보안성의 제공을 위하여 Mobile IPv6를 위한 핸드오프와 AAA서비스 인증 절차의 성능 향상 방안을 제시하였다.

  • PDF

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

An Access Control Model for Privacy Protection using Purpose Classification (사용목적 분류를 통한 프라이버시 보호를 위한 접근제어 모델)

  • Na Seok-Hyun;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.39-52
    • /
    • 2006
  • Recently purpose is used by an crucial part to security management when collecting data about privacy. The W3C(World Wide Web Consortium) describes a standard spec to control personal data that is provided by data providers who visit the web site. But they don't say anymore about security management about personal data in transit after data collection. Recently several researches, such as Hippocratic Databases, Purpose Based Access Control and Hippocratic in Databases, are dealing with security management using purpose concept and access control mechanism after data collection a W3C's standard spec about data collection mechanism but they couldn't suggest an efficient mechanism for privacy protection about personal data because they couldn't represent purpose expression and management of purposes sufficiently. In this paper we suggest a mechanism to improve the purpose expression. And then we suggest an accesscontrol mechanism that is under least privilege principle using the purpose classification for privacy protection. We classify purpose into Along purpose structure, Inheritance purpose structure and Stream purpose structure. We suggest different mechanisms to deal with then We use the role hierarchy structure of RBAC(Role-Based Access Control) for flexibility about access control and suggest mechanisms that provide the least privilege for processing the task in case that is satisfying using several features of purpose to get least privilege of a task that is a nit of business process.