• Title/Summary/Keyword: 한국정보인증

Search Result 5,260, Processing Time 0.03 seconds

Analysis of Technical Review for Domestic Arcade Game in perspective of Global Standard : Towards Rated M Game (국제표준 측면에서 국내 아케이드 게임에 대한 기술심의 분석 : 청소년이용불가 게임을 중심으로)

  • Song, Seong-Keun;Choi, Hun
    • Cartoon and Animation Studies
    • /
    • s.33
    • /
    • pp.551-578
    • /
    • 2013
  • Since October 2006, number of deliberations of arcade game in Game Rating Board (GRB) annually was more than 1,000 cases except 2007 and 2010. However, these cases excessively handle to deliberate the game rating. Especially, the rating is manually performed thus, hindering the consistency and objectivity of the deliberation. To resolve this problems, we think that the automation of technical deliberation is necessary for arcade game which is needed to have much time for deliberation. The purpose of this study is to identify what the possibility part of automation or what obviously part of automation in the deliberation of game rating. To achieve our research purposes, we conducted in-depth interview with GLI standardization expert in BMM Korea and person in charge for deliberation in game rating board. The interview results show that 12 standardization and 14 automation factors for deliberation in game rating of arcade game. This study will expect bases in game development and promotion in game industry.

Design and evaluation of a dissimilarity-based anomaly detection method for mobile wireless networks (이동 무선망을 위한 비유사도 기반 비정상 행위 탐지 방법의 설계 및 평가)

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.2
    • /
    • pp.387-399
    • /
    • 2009
  • Mobile wireless networks continue to be plagued by theft of identify and intrusion. Both problems can be addressed in two different ways, either by misuse detection or anomaly-based detection. In this paper, we propose a dissimilarity-based anomaly detection method which can effectively identify abnormal behavior such as mobility patterns of mobile wireless networks. In the proposed algorithm, a normal profile is constructed from normal mobility patterns of mobile nodes in mobile wireless networks. From the constructed normal profile, a dissimilarity is computed by a weighted dissimilarity measure. If the value of the weighted dissimilarity measure is greater than the dissimilarity threshold that is a system parameter, an alert message is occurred. The performance of the proposed method is evaluated through a simulation. From the result of the simulation, we know that the proposed method is superior to the performance of other anomaly detection methods using dissimilarity measures.

  • PDF

A study on the evaluation of the support policy for the export of China software using fuzzy-AHP (퍼지-계층분석을 이용한 중국 소프트웨어 수출지원정책 성과평가 연구)

  • Choi, JeongHo;Zhang, YongAn
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.6
    • /
    • pp.1499-1510
    • /
    • 2016
  • This study is the result of a fuzzy-AHP-based evaluation of the support policy for the export of Chinese software, for which nine Class 1 evaluation indexes were established. Following a survey of 10 Chinese software experts, fuzzy AHP was used to assess and evaluate the absolute and relative importance of each index. The evaluation revealed that the support policy had relatively positive effects. More specifically, the analysis showed that several indices - technology development, HR development, marketing reinforcement, fund support, platform establishment, and product support - carried relatively significant importance. Quality management and tax deductions, on the other hand, showed no importance, while the importance of international certification was relatively small. In light of these discoveries, there is a need to train experts, increase software quality, and reconsider software brands.

A meta-analysis survey of the research on domestic e-banking (국내 전자금융 연구동향에 대한 메타분석)

  • Yoo, Soon-Duck;Choi, Kwang-Don
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.175-189
    • /
    • 2015
  • As issues of Fintech(Financial technology) emerge, research on electronic banking is growing and garnering much attention in the market. This study analyzed 184 studies on e-banking over 15 years, from 2000 to 2014. Using meta-analysis, the paper draws attentions to the trends in domestic electronic banking studies. Interest peaked in 2008, when 28 papers were published and 35 theses in Information Security and Cryptology were announced. This research focus emphasizes the impact of e-banking services, technology and infrastructure, and laws and regulations on society. Electronic payment systems are a focal point of research on technology and infrastructure. Research on the e-finance market have influenced studies on the financial progress and other social issues. Benefits of this research include a better understanding of the trends in electronic banking studies and its influence on related fields, as well as help electronic banking-related policies and technology research.

Design and Implementation of Permission Delegation in Role-Based Access Control Model (권한의 위임을 위한 역할-기반 접근 제어 모델의 설계 및 구현)

  • 나상엽
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.1-10
    • /
    • 2003
  • In the distributed-computing environment, applications or users have to share resources and communicate with each other in order to perform their jobs more efficiently. In this case, it is important to keep resources and information integrity from the unexpected use by the unauthorized user. Therefore, there is a steady increase in need for a reasonable way to authentication and access control of distributed-shared resources. In RBAC, there are role hierarchies in which a higher case role can perform permissions of a lower case role. No vise versa. Actually, however, it is necessary for a lower case role to perform a higher case role's permission, which is not allowed to a lower case role basically. In this paper, we will propose a permission delegation method, which is a permission delegation server, and a permission delegation protocols with the secret key system. As the result of a permission delegation, junior roles can perform senior role's permissions or senior role itself on the exceptional condition in a dedicated interval.

  • PDF

Analysis of GEO Satellite Sun Sensor Models and Sun Sensor SW Resource Processing Technology (정지궤도위성 자세제어계 태양센서 운용기술 동향)

  • Park, Keun-Joo;Park, Young-Woong;Yang, Koon-Ho
    • Current Industrial and Technological Trends in Aerospace
    • /
    • v.7 no.2
    • /
    • pp.121-130
    • /
    • 2009
  • In this paper, the attitude and orbit control subsystem technology of new GEO communication and observation satellite using Sun sensors are introduced and analyzed. COMS is new GEO communication and Earth observation satellite based on EUROSTAR 3000 space bus technology. The attitude and orbit control subsystem of COMS adopts a configuration using three BASS and three LIASS Sun sensors to acquire the attitude error information in the specific reference frames. These Sun sensors are used to acquire Sun direction and to control the spacecraft to keep the relative attitude with respect to a reference Sun direction in both transfer and operational orbits. In this paper, the mathematical models of BASS and LIASS are described as well as their operational implementation in the flight software.

  • PDF

A Comparative Study of Influencing Factors on Shopping Satisfaction and Repeat Purchase Intention Between Internet Shopping Mall Types (인터넷 종합쇼핑몰과 전문쇼핑몰의 쇼핑만족 및 재구매의도에 미치는 영향요인 비교연구)

  • Chun, Dal-Young;Kim, Chan-Ho
    • Journal of Global Scholars of Marketing Science
    • /
    • v.13
    • /
    • pp.1-27
    • /
    • 2004
  • This study attempts to investigate the difference between the internet shoppingmall types. The main purpose of this study is to verify the relationships among shoppingmall evaluation criteria, shopping satisfaction, revisit frequency, and repurchase intention across the shoppingmall type. The following results were shown by testing eleven hypotheses using LISREL. First, shoppingmall evaluation criteria such as entertainment, product authentification, economical prices and on-time delivery were significantly related to shopping satisfaction in general merchandise shoppingmall. Second, in specialty shoppingmall, evaluation criteria like informativeness, economical prices and on-time delivery significantly affected shopping satisfaction. Third, as contrasted with the expectation, site design and product assortment did not have significant impact on satisfaction in both internet shoppingmall types. Fourth, shopping satisfaction was significantly related to revist frequency and repeat purchase intention. Finally, some theoretical and managerial implications were discussed.

  • PDF

A Study on Wireless PKI Technology Standard (무선 PKI 기술 표준에 관한 연구)

  • Sung, Yeon-Guk;Kim, Hyun-Chul;Jung, Jin-Wook;Kim, Soon-Chul;Ryu, Won
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.29-38
    • /
    • 2002
  • Everyday demand of wireless internet is increasing. Security problem is certainly resolved for wireless internet activation. Especially problem is only wiretap in mobile communication with voice, but problems, user authentication, data integrity guarantee etc., are resolved in data-services that have commercial transaction over simple data information service such bill, banking. Necessity of wireless PKI that can offer security service likely in wired environment is requested for offering security service in wireless environment. For offering security services, confidentiality, integrity, non-repudiation etc, that of offered in wired environment in wireless environment, first it must construct wireless PKI infrastructure and do service activity. This paper analyze various wireless internet technology for offering safe wireless internet service and wireless PH standards. Performance Result of this paper expect activity of safe wireless PH service and activity of electronic commercial transaction used wireless internet such banking service, bill transaction, online shopping.

  • PDF

The legal issues on the fintech and e-commerce payment (전자상거래 지급결제의 핀테크 활성화를 위한 보안 및 법제도적 과제)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.25-31
    • /
    • 2015
  • While information and communication develop, the Electronic commerce payment system is progressing. Recently, a government established the electronic commerce activation policy which simplified a payment Through this policy, the information which the financial company monopolizes can be fused with the other industry and create the popularization use of the electronic payment service and value added services. But on the other hand, the concern for the security is very high, Accordingly, the finnancial institute take a restriction of the requirements for the participation company according to the financial scale, this policy is led by the private institue, rather making a participation of fin tech venture difficulty. This paper tries to deal with the technical and legal problems for the activation of electronic payment system and fin tech. So I will examine the security matter that follows in grifting the innovation technology onto the existing payment service and propose a desirable way to improve the current legislation.

A Secure Energy-Efficient Routing Scheme Using Distributed Clustering in Wireless Sensor Networks (무선 센서 네트워크에서 분산 클러스터링을 이용한 안전한 에너지 효율적인 라우팅 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.3-9
    • /
    • 2016
  • The wireless sensor networks have become an economically viable monitoring solution for a wide variety of civilian and military applications. The main challenge in wireless sensor networks is the secure transmission of information through the network, which ensures that the network is secure, energy-efficient and able to identify and prevent intrusions in a hostile or unattended environment. In that correspondence, this paper proposes a distributed clustering process that integrates the necessary measures for secure wireless sensors to ensure integrity, authenticity and confidentiality of the aggregated data. We use the notion of pre-distribution of symmetric and asymmetric keys for a secured key management scheme, and then describe the detailed scheme which each sensor node within its cluster makes use of the pre-distribution of cryptographic parameters before deployment. Finally, we present simulation results for the proposed scheme in wireless sensor network.