• Title/Summary/Keyword: 한국정보인증

Search Result 5,267, Processing Time 0.034 seconds

Quantitatively Managed Leveling for Capability Maturity Model Integration Implementation (정량적 소프트웨어 능력성숙도모델 도입전략 및 사례)

  • Kim, Hanyoung;Lee, Wookey;Lee, James J.H.;Lee, Rich C.K.
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.3
    • /
    • pp.335-346
    • /
    • 2013
  • With the overwhelming development of information technologies, the need for software development that can deal with diversified and complex business processes has increased dramatically. As a result, companies prefer softwares that can handle far more complex processing ability and also it should be stable as well as easier to maintain. These ambivalent requirements keep the software development organizations from assessing the quantitative abilities, so that under the support of the U.S. Department of Defense the Capability Maturity Model (CMM) and Capability Maturity Model Integration (CMMI) have been developed. The CMMI upper levels for the software development companies will be evaluated to be excellent and authenticated, which drives the companies to get and maintain high levels of maturity. In this paper, a case study for a domestic software company has been exploited how to achieve CMMI level 4 and what kind of factors have been played an effective role. These issues at the domestic and international software and maintenance program, can influence the trustworthiness and marketing effects for the global market. In this paper, the company's actual case study will give clues to find out the important factors for the development and maintenance of software companies maturity levels.

Comparison and Analysis of Educational Programs of Korean and American Medical Library Associations to Improve the Role of Medical Librarians for User Services: Focusing on MLA and KMLA (의학사서의 이용자 서비스 향상을 위한 국내외 의학도서관협회 교육프로그램 비교 및 분석 - MLA 및 KMLA를 중심으로 -)

  • Hey-Young Rhee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.2
    • /
    • pp.59-92
    • /
    • 2023
  • The purpose of this study is to suggest ways to improve medical librarians' educational programs to improve domestic medical library user services. To this end, the role of medical librarians was investigated, and the education areas were itemized, and then the MLA in the US and the KMLA in Korea were compared and analyzed. As a result, the improvement points for medical librarian education programs in Korea are: First, expansion of certification programs that select various types of education programs, education areas, education contents, and specialized fields, collaboration programs with related institutions, and education programs that advocate the value of KMLA are required. Second, there is a need for various educational programs in the current educational areas, such as 'research support service' and 'education/education design/consultation'. In particular, it is necessary to provide 'consumer health information service' and 'disaster information service' for which there is no education at all. In addition, it is necessary to precede the establishment of regulations on the domestic medical librarian education curriculum for the education of various 'information services in the field related to medicine'. Third, it is necessary to provide online education contents for librarians who have difficulty participating in face-to-face education.

Design and Implementation of Medical Information System using QR Code (QR 코드를 이용한 의료정보 시스템 설계 및 구현)

  • Lee, Sung-Gwon;Jeong, Chang-Won;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.109-115
    • /
    • 2015
  • The new medical device technologies for bio-signal information and medical information which developed in various forms have been increasing. Information gathering techniques and the increasing of the bio-signal information device are being used as the main information of the medical service in everyday life. Hence, there is increasing in utilization of the various bio-signals, but it has a problem that does not account for security reasons. Furthermore, the medical image information and bio-signal of the patient in medical field is generated by the individual device, that make the situation cannot be managed and integrated. In order to solve that problem, in this paper we integrated the QR code signal associated with the medial image information including the finding of the doctor and the bio-signal information. bio-signal. System implementation environment for medical imaging devices and bio-signal acquisition was configured through bio-signal measurement, smart device and PC. For the ROI extraction of bio-signal and the receiving of image information that transfer from the medical equipment or bio-signal measurement, .NET Framework was used to operate the QR server module on Window Server 2008 operating system. The main function of the QR server module is to parse the DICOM file generated from the medical imaging device and extract the identified ROI information to store and manage in the database. Additionally, EMR, patient health information such as OCS, extracted ROI information needed for basic information and emergency situation is managed by QR code. QR code and ROI management and the bio-signal information file also store and manage depending on the size of receiving the bio-singnal information case with a PID (patient identification) to be used by the bio-signal device. If the receiving of information is not less than the maximum size to be converted into a QR code, the QR code and the URL information can access the bio-signal information through the server. Likewise, .Net Framework is installed to provide the information in the form of the QR code, so the client can check and find the relevant information through PC and android-based smart device. Finally, the existing medical imaging information, bio-signal information and the health information of the patient are integrated over the result of executing the application service in order to provide a medical information service which is suitable in medical field.

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

Protecting Fingerprint Data for Remote Applications (원격응용에 적합한 지문 정보 보호)

  • Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Lee, Han-Sung;Yang, Jong-Won;Choi, Eun-Wha;Seo, Chang-Ho;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.63-71
    • /
    • 2006
  • In this paper, we propose a secure solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the sensor holder or the server. To protect possible attacks launched at the untrusted client, our solution makes the fingerprint sensor validate the result computed by the client for the feature extraction. However, the validation should be simple so that the resource-constrained fingerprint sensor can validate it in real-time. To solve this problem, we separate the feature extraction into binarization and minutiae extraction, and assign the time-consuming binarization to the client. After receiving the result of binarization from the client, the sensor conducts a simple validation to check the result, performs the minutiae extraction with the received binary image from the client, and then sends the extracted minutiae to the server. Based on the experimental results, the proposed solution for fingerprint verification can be performed on the sensor-client-server model securely and in real-time with the aid of an untrusted client.

A Study on DID-based Vehicle Component Data Collection Model for EV Life Cycle Assessment (전기차 전과정평가를 위한 DID 기반 차량부품 데이터수집 모델 연구)

  • Jun-Woo Kwon;Soojin Lee;Jane Kim;Seung-Hyun Seo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.10
    • /
    • pp.309-318
    • /
    • 2023
  • Recently, each country has been moving to introduce an LCA (Life Cycle Assessment) to regulate greenhouse gas emissions. The LCA is a mean of measuring and evaluating greenhouse gas emissions generated over the entire life cycle of a vehicle. Reliable data for each electric vehicle component is needed to increase the reliability of the LCA results. To this end, studies on life cycle evaluation models using blockchain technology have been conducted. However, in the existing model, key product information is exposed to other participants. And each time parts data information is updated, it must be recorded in the blockchain ledger in the form of a transaction, which is inefficient. In this paper, we proposed a DID(Decentralized Identity)-based data collection model for LCA to collect vehicle component data and verify its validity effectively. The proposed model increases the reliability of the LCA by ensuring the validity and integrity of the collected data and verifying the source of the data. The proposed model guarantees the validity and integrity of collected data. As only user authentication information is shared on the blockchain ledger, the model prevents indiscriminate exposure of data and efficiently verifies and updates the source of data.

The Impact of Service Quality Signals on the Success of Online Food Delivery Services on O2O Platforms (O2O 플랫폼 내 서비스 품질 신호가 온라인 음식 배달 서비스 성공에 미치는 영향)

  • Mingi Song;Seunghun Lee;Gunwoong Lee
    • Information Systems Review
    • /
    • v.24 no.3
    • /
    • pp.43-68
    • /
    • 2022
  • With the growing demand for online food delivery (OFD) services via Online to Offline (O2O) platforms, it is required for academic researchers to identify the success factors of OFD businesses. In line with this, this research examines the impact of the core service attributes of a restaurant (hygiene, interactivity, trust,and popularity) on business success in the OFD platform context from the perspective of information asymmetry. Furthermore, the moderating effects of hygiene factor between the core service attributes and the success of restaurants are evaluated. We utilize 1,146 restaurants registered on the largest OFD platform in Korea. The results of this study demonstrate that hygiene (certification), trust (franchise), popularity (favorite) factors have positive impacts on the success of OFD businesses. Moreover, we find that franchise restaurants with high response rates to customer reviews and inquiries achieve higher sales when they have hygiene certifications than those without the certification do. The key findings bear significant contributions to prior literature by empirically substantiating the pivotal role of service quality signals in fostering restaurant success on the OFD platforms. In addition, this study provides business implications for restaurants in O2O platform.

A Study on the development of Test Report Information Service(TRIS) by User survey analysis (사용자 설문분석을 통한 군수품 시험성적서 정보서비스 고도화 방안에 대한 연구)

  • Park, Dongsoo;Lee, Donghun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.405-414
    • /
    • 2017
  • In this study, a survey for a satisfaction evaluation of the Test Report Information Service (TRIS) was conducted. A survey questionnaire on modified Information System Success Model(ISSM) of Delone and Mclean was carried out by 183 users in three groups, such as munition quality assurance agency, munition corporation, and test institute. As a survey result, training on the TRIS was in strong demand in all three groups. An understanding and proficiency of the overall system were different from the work process of each user group. In addition, the munition quality assurance agency needs to enhance the system function with its characteristics. Test institute has necessity of the linkage method with the TRIS depending on the authentication system. User groups are different in the operational method of TRIS between the contractor and cooperation. Accordingly, cooperation needs to be educated continually. This study can help in the construction of a Military Quality Integration Information System to secure the reliability of munitions.

A Mobility Service for the Transportation Vulnerable Based on MyData (마이데이터 기반 교통약자 이동지원서비스 모델)

  • Choi, Hee Seok;Lee, Seok Hyoung;Park, Moon Soo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.1
    • /
    • pp.31-40
    • /
    • 2023
  • Various policies and services are being implemented in Korea and other countries, such as the expansion of convenience facilities for mobility support, the provision of special means of transportation, and the establishment of public transportation route plans and fare policies based on data and AI-based movement pattern analysis to ensure the mobility rights of the weak in transportation. However, A research is still needed to improve service convenience in order to more conveniently use the desired means of transportation in a necessary situation from the viewpoint of the transportation vulnerable. This study examines the policies and services for the promotion of mobility for the transportation disadvantaged, and presents a MyData-based service model for mobility support for the transportation disadvantaged. In the proposed service model, the transportation-disabled person can freely choose and use the means of transportation according to individual circumstances, and receive the same transportation welfare voucher benefits provided by the state or government. The proposed service model defines the MyData platform that supports the safe collection and use of personal data, the authentication of traffic welfare recipients based on MyData, and the payment function for fee settlement after using the service as key components. In this research, the service satisfaction from the user's point of view was investigated by implementing the proposed service model and providing a demonstration service for the transportation vulnerable in Daejeon.