• Title/Summary/Keyword: 통제 네트워크

Search Result 450, Processing Time 0.028 seconds

A Design of Mutual Authentication One Time Password Mechanism for Confidentiality (기밀성을 제공하는 상호 인증 일회용 패스워드 메커니즘 설계)

  • Park, Hee-Un;Lee, Im-Yeong
    • Annual Conference of KIPS
    • /
    • 2000.04a
    • /
    • pp.1101-1105
    • /
    • 2000
  • 컴퓨터 및 네트워크의 급속한 발전은 우리의 생활 전반에 다양성과 편리성을 제공하고 있다. 그러나 이러한 발전 속에서 자신의 정보를 보호하고 정당한 사용자의 접근을 보장하기 위해 접근 통제가 필수적으로 요구되고 있다. 그러나 단순한 접근 통제는 상호 인증 및 기밀성 제공에 있어 한계가 있다. 본 고에서는 기존 방식들의 특징 및 문제점들을 고찰하고, 이들이 고려하지 안았던 상호 인증 및 기밀성을 제공하는 새로운 일회용 패스워드 방식을 제안한다.

  • PDF

Influence of Personal Characteristics and Background Characteristics on Entrepreneurship and Perceived Business Performance in Entrepreneurs as Independent Business Owners of Network Marketing (네트워크 마케팅 독립사업자 창업가의 개인 특성, 배경 특성이 기업가정신과 인지된 경영성과에 미치는 영향)

  • Yoon, Hae Sook;Song, In Bang;Kim, Yeon Jong
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.13 no.4
    • /
    • pp.233-244
    • /
    • 2018
  • The purpose of this study was to improve awareness of network marketing business in South Korea, which takes a quite negative view of network marketing, to raise awareness of "starting up a business" as independent business owners, to assist them in building their own subjecthood in network business and entrepreneurial identity, and ultimately to give some suggestions on how to improve their self-directed entrepreneurial competency and the quality of their business management. To make an empirical analysis of 121 independent business owners of Korean native network marketing, the personal and background variables of the entrepreneurs were selected as independent variables, and entrepreneurship was selected as a mediator variable. The selected dependent variables were financial and non-financial business performances. A multiple regression analysis was conducted by inputting the variables. The findings of the study were as follows: It produced an effect of more financial performance when the innovation of the independent business owners of network marketing was better, and this innovation was possible to have only when they improved in entrepreneurial efficacy and locus of control. In contrast, only authenticity had an effect on boosting non-financial business performance among the factors of entrepreneurship. To have authenticity, it's necessary to strengthen achievement needs and awareness of locus of control among the personal characteristics of the independent business owners of network marketing. Among the factors of entrepreneurship, there was better authenticity when their personal networks were broader among their background characteristics. In addition, self-efficacy that was one of personal characteristics made a direct contribution to the enhancement of non-financial performance. As a result, independent business owners of network marketing are required to hold a strong belief in their own business, to be active in business activities and to have a high efficacy as spontaneous principal agents, and they also are required to have more adventurous, planned, active and propulsive achievement needs that enable them to attain the goals of their business and keep moving forward. Besides, they should foster their locus-of-control competency that is to control, endure and be responsible for a variety of phenomena or incidents that they face, and there will be better financial performance or non-financial performance only when they demonstrate their self-belief and confidence and when they have faith in and conviction about themselves. For independent business owners of network marketing, a consumer-centered thinking that entails authenticity and trustworthiness and touches the hearts of customers is a more effective marketing strategy than an egocentric thinking as sellers when they approach customers. And they are expected to make progress in terms of the quality of business management when their business attachment or enthusiasm is great enough to match their own efficacy with entrepreneurial identity or strike a balance between them.

분산시스템 OS의 향방

  • Korean Associaton of Information & Telecommunication
    • 정보화사회
    • /
    • s.77
    • /
    • pp.32-35
    • /
    • 1994
  • 고속 컴퓨터 네트워크 기술이 발전됨에 따라 물리적으로 분산된 컴퓨터 시스템들도 하나의 컴퓨터 시스템 처럼 통제가 가능하게 되었다. 이를 가능케하는 분산시스템이 갖추어야 할 조건, 구현상의 문제점 그리고 해결책에 대해 살펴본다.

  • PDF

Analysis of the Effects that Information is Networked for Future Warfare (미래전에서 정보의 네트워크화에 의한 효과 분석)

  • Yoo, Jae-Young;Lee, Myung-Noh;Jo, Yong-Gun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2150-2156
    • /
    • 2010
  • We focus on the network itself and its ability to enable efficient and effective information flow. All networks are complex to a greater degree, including military command and control systems operating in a network-centric environment. It requires to understand the nature of complexity, what its effects are, and how to quantify them. In this paper, we present the beneficial effects of information accessibility and network-based redundancy into a single metric.

Development of Operation System for Network of Multiple UAVs (복수 무인기 네트워크 통합 운영 시스템 개발)

  • Kim, Sung-Hwan;Cho, Sang-Ook;Kim, Sung-Su;Ryoo, Chang-Kyung;Choi, Kee-Young
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.11
    • /
    • pp.1042-1051
    • /
    • 2011
  • In this paper, a total operating environment equipped with onboard wireless communication systems and ground-based mission control systems is proposed for simultaneous operation of multiple UAVs. A variety of operating structures are studied and classified systematically based on types and usages of the components. For each operating system, the strength, weakness and reliability aspects are investigated. Based on these results, a proper operating system configuration is determined and components are developed for mission formation flight. Proposed system can make a formation flight of various UAVs, execute complex missions decentralizing mission to several UAVs and cooperate several missions.

Improved Single Packet Authentication and Network Access Control Security Management in Software Defined Perimeter (소프트웨어 정의 경계의 단일 패킷 인증 및 네트워크 접근통제 보안관리 개선)

  • Jung, Jin-kyo;Lee, Sang-ku;Kim, Young-Min
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.407-415
    • /
    • 2019
  • As the IT environment changes with cloud computing and smart work, the existing perimeter security model is showing its limitations and Software Defined Perimeter is being discussed as an alternative. However, SDP Spec 1.0 does not specify the device registration procedure, policy distribution process and authentication key generation and sharing process.In this paper, we propose a method to solve the problem of SDP access control by improving the operation procedure of Single Packet Authentication. This paper suggests that the proposed method can implement a consistent and automated integrated access control policy compared to the existing access control methods.

Improve security of Wireless Mesh Networks (Wireless Mesh Networks의 보안 강화)

  • Park, Jin-Ho;Cho, Jae-Ik;Im, Eul-Gyu;Kim, Jung-Sik;Choi, Kyoung-Ho;Jang, Hyun-Jun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.629-632
    • /
    • 2006
  • 기존의 무선 네트워크에 비해 빠르고 저렴하며 설치가 편리한 무선 메쉬 네트워크를 인터넷망 구성에 도입하려고 하는 것이 최근의 경향이다. 무선 메쉬 네트워크는 이종망간의 네트워크를 통합함으로 수많은 클라이언트들을 통제해야하며 기존의 IPv4 주소는 10년 내에 고갈이 됨으로, IPv6 주소 환경에 적합하게 연구 개발하여야 한다. 그러나 아직 무선 메쉬 네트워크는 개발 중인 기술로써 보완해야할 보안상의 문제점들이 발견되고 있다. 본 논문에서는 무선 메쉬 네트워크에 MIPv6를 어떻게 도입할지를 언급하고 MIPv6 도입 시에 발생하게 되는 보안상의 문제점을 SEND(SEcure Neighbor Discovery)와 MCGAs를 이용하여 해결하는 방법을 소개한다.

  • PDF

SDN 개발 사례 : 고성능 SDN 제어기 MuL

  • Heo, Chan;Park, Seong-Yong
    • Information and Communications Magazine
    • /
    • v.30 no.3
    • /
    • pp.29-35
    • /
    • 2013
  • 네트워크 장비의 제어평면과 전송평면을 분리하고 전체 네트워크의 제어평면을 하나의 중앙 제어기에 통합하는 네트워크 아키텍처인 소프트웨어 정의 네트워킹 (Software Defined Networking)는 네트워크 산업과 학계에서 많은 관심을 받고 있다. 개별적으로 동작하는 기존 네트워크 장비와 달리 모든 제어평면의 기능이 하나의 중앙 제어기에 집중되기 때문에 제어기의 성능, 안정성, 유연성은 해당 제어기가 통제하는 네트워크 전체에 지대한 영향을 미치게 된다. 또 SDN의 제어계층과 전달계층 사이에 표준통신 인터페이스로 확고한 자리를 잡은 OpenFlow는 세계 유수의 글로벌ICT들이 참여하여 SDN열풍의 중심에 위치해있다. 본고 에서는 SDN의 개념에 대해 살펴보고, OpenFlow의 소개와 동작을 설명할 것이다. 또한 국내에서 최초로 개발된 새로운 OpenFlow 제어기인 MuL 제어기 플랫폼을 소개하고 다른 제어기들과의 비교분석을 통해 어떤 차별점을 갖는지 알아보고자 한다.

A Study for Vulnerabilities of Security in Mobile Ad Hoc Networks (이동 Ad Hoc 네트워크에서의 보안 취약점에 대한 연구)

  • Sim, Hak-Sub;Kim, Tai-Yun
    • Annual Conference of KIPS
    • /
    • 2002.11b
    • /
    • pp.1623-1626
    • /
    • 2002
  • 무선 통신은 제한된 대역과 단말 기능에 있어서의 제약으로 유선 환경에서 제공받는 서비스를 수용하는데 문제가 된다. 이러한 문제의 해소 방안으로 무선 접속 기능을 향상하기 위한 근거리 사설 무선망인 ad hoc 네트워크가 치관 주목을 받고 있다. ad hoc 네트워크는 말은 장점들이 있으나 그에 따른 문제점들 또한 많다. ad hoc 네트워크의 특징으로 인하여 기존치 인프라 네트워크에 적용되던 메커니즘들이 적용되기가 어렵다. 특히 두선 연결에 따른 보안 취약점과 중앙 통제를 위한 고정된 제어장치가 없어 인증과 키 관리가 문제가 되고 있다. 따라서 본 논문에서는 ad hoc 네트워크 환경의 특징으로 인하여 발생하는 문제점들과 보안상의 취약점들을 살펴본다.

  • PDF

The Study of Developing an Index for Evaluating the Security of the Network (네트워크 보안성평가 지표개발에 관한 연구)

  • 박동석;안성진;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.17-33
    • /
    • 2002
  • The major goal of this study is to develop an index that can evaluate the quality of the appropriate network in a series of projections that analyze, design, and then build a network. The existing software engineering and/or the methods of developing a system are limited. The process of defining the requirements in building a network, designing the system, and building the network focuses on arranging the methods of building a network. Based upon this, we tried to develop a necessary index to evaluate the security of a network.

  • PDF