• Title/Summary/Keyword: Information security industry

Search Result 963, Processing Time 0.035 seconds

Robust 3D Hashing Algorithm Using Key-dependent Block Surface Coefficient (키 기반 블록 표면 계수를 이용한 강인한 3D 모델 해싱)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.1-14
    • /
    • 2010
  • With the rapid growth of 3D content industry fields, 3D content-based hashing (or hash function) has been required to apply to authentication, trust and retrieval of 3D content. A content hash can be a random variable for compact representation of content. But 3D content-based hashing has been not researched yet, compared with 2D content-based hashing such as image and video. This paper develops a robust 3D content-based hashing based on key-dependent 3D surface feature. The proposed hashing uses the block surface coefficient using shape coordinate of 3D SSD and curvedness for 3D surface feature and generates a binary hash by a permutation key and a random key. Experimental results verified that the proposed hashing has the robustness against geometry and topology attacks and has the uniqueness of hash in each model and key.

A Study of Electronic Transaction Law : Basic Electronic Trasaction Law in Korea and Uniform Electronic Transaction Act (전자상거래법 소고 - 우리나라 전자거래기본법과 미국 통일전자거래법 (Uniform Electronic Transaction Act)을 중심으로 -)

  • Kim, Un-Young
    • Korean Business Review
    • /
    • v.13
    • /
    • pp.207-221
    • /
    • 2000
  • In this era of changing system, we may learn lesson from newly developed Uniform Electronic Transation Act(UETA) in 1999. Korea has its counterpart as the Basic Electronic Transaction Act and Electronic Signature Act made by 1999. While UETA stresses on transaction law between individuals, that of Korean stresses on the role of government in electronic transaction. Both laws have the common definitions as electronic record, electronic signature, however, UETA has its own definitions such as automated transaction, computer program, electronic agent, information, information processing system, and security procedure. Especially, transferable record in section 16 is one of the most unique concept which Korean law does not provide. Korean government is planning to introduce electronic note in the near future, which will make unprecedented reform in Korean financial industry. Since Korean law does not have such a concept as electronic note, revision of the law is expected soon. Korean law has its specialty which puts stress on cyber mall, authentication agency, and consumer protection. In U.S., the interpretation of law by court is important when they have disputes according to common law traditon. Studies on cases on disputes in U.S. is needed most for Korean application.

  • PDF

A Study on the Factors Affecting the Intention to use public Institution staff's Cloud Computing Service (공공기관 조직구성원의 클라우드 컴퓨팅 서비스 이용의도에 영향을 미치는 요인에 관한 연구)

  • Choi, Hyukra;Kim, SeonMyung
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.49-66
    • /
    • 2014
  • In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. However, as more and more information on individuals and companies are placed in the cloud, concerns on just how safe the computing environment is have gradually increased. In this study, it will be explored if key characteristics of cloud computing services would affect the behavioral intention to use public cloud computing services. A conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that perceived risk has statistically significant effect on the privacy concern of users and the privacy concern has a negative influence on the trust. Finally, the trust has a positive effect on the attitude and the attitude has statistically significant effect on use intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

A Study of Gate Control System Using RFID (RFID를 이용한 출입문 제어 시스템 연구)

  • Kang, Sung-Chul;Kim, Hyung-Chan;Doh, Yang-Hoi;Lee, Kwang-Man;Kim, Do-Hyeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1505-1512
    • /
    • 2007
  • The RFID Technology (which is importantly used at the Ubiquitous environment) is attached to all of the units like the ID cards and then information on the units and units' environment is transferred and processed through the radio frequency. so it is the no touched recognition system. RFID Technology's research of the middle ware and wireless interface etc. is currently conducted and variously broaden like the industry of the distribution and logistics. This paper suggests that the gate control system which is based on RFID middle ware is realized to prevent the district and facility for security. The indication of this paper is that algorithm (which is to certificate Users' enterance through RFID EPC code) is proposed and realizes the user certification module, the control module of the gates' opening and closing, the maintenance module of the gate, the display module of coming and going information, test program ect. through RFID technology.

  • PDF

OTP Authentication Protocol using PingPong-128 (PingPong-128을 이용한 OTP 인증 프로토콜)

  • Lee, Jang-Chun;Lee, Hoon-Jae;Lim, Hyo-Taek;Lee, Sang-Gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.661-669
    • /
    • 2008
  • Nowadays, authentication is essential to identify the legal users in a network communication. Usually, there are few wars to achieve authentication over a publicly accessible network system in order to protect certain private data from the unauthorized users, ranging from simple ID/Password to Biometrics System. One of the most active areas in OTP(One Time Password) research today aims at exploiting OTP to provide authentication in the finance and security industry. OTP is usually discarded once it has been used. this prevents huge loophole of traditional authentication system which employs the same ID and Password every time. However this OTP system also has its weaknesses in surviving some attacks. this paper proposes an advanced OTP protocol using PingPong-128 without loop hole of pre-existing OTP.

Research on the type of technology convergence in the medical device industry based on topic modeling and citation analysis (토픽모델링과 인용 분석에 기반한 의료기기 산업의 기술융합 유형 연구)

  • Lee, Seonjae;Lee, Sungjoo;Seol, Hyeonju
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.7
    • /
    • pp.207-220
    • /
    • 2021
  • Industrial convergence is manifested in various forms by various drivers, and understanding and categorizing the direction of convergence according to the factors in which the convergence occurs is an essential requirement for the establishment of a company's customized convergence strategy and the government's corporate support policy. In this study, the type of convergence is analyzed from the perspective of knowledge flow between heterogeneous technologies, and for this purpose, the result of topic modeling of the text information of the patent and the citation information of the corresponding patent allocated for each topic are used. The methodology presented through case studies in the medical device field is verified. Through the proposed methodology, companies can predict the flow of convergence and use it as decision-making data to create new business opportunities. It is expected that the government and research institutions will be usefully used as basic data for policy preparation.

A Study on Food Truck business model utilizing NFC (NFC를 활용한 Food Truck 비즈니스 모델에 관한 연구)

  • Yoon, Youngdoo;Choi, Eunyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.135-137
    • /
    • 2014
  • The expansion of the transportation card, and the popularity of smart phones has been increasing social concern about the NFC technology. Has been focused on the use of e-commerce, most of the NFC, fulfilling the security problems or technical topic for this, but the reality is that the current debate on the new value added contents industry and a nonexistent connection. Leverage NFC for efficient order management system in order to build lunch or dinner by being pushed to ease restrictions on remodeling and renovation projects Food Truck vehicle through a small business support programs in the current government, but increasing interest in the Food Truck I study a model of ordering system for food truch 재소 s-guide system. A lot of the effectiveness of management as appropriate to the use of NFC for small business that operates as a server system is highly Food Truck tendencies tied to one router and server on the intranet without the need of internet connection system. I believe in this study S-Guide system contributes for business success for food truck of small business.

  • PDF

Comparison of Hazard Analysis for Medical Device System (의료기기 시스템의 해저드 분석 기법 비교)

  • Choi, Bo-yoon;Lee, Byong-gul;Han, Hyuk-soo
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.133-145
    • /
    • 2018
  • Medical systems incurred accidents may result in significant damage for human being. Therefore, performing hazard analysis is important for medical system which is to identify hazard for preventing the accidents and minimizing the potential harm. Hazard analysis that is applied medical systems are difficult to apposite selected, because difference of analysis methods and applied development lifecycle is caused by objective of hazard analysis. It is required to select appropriate hazard analysis at concept phase during development lifecycle, owing to basic requirement elicitation to mitigate or prevent hazard based on identified hazard at concept phase. In this paper, hazard analysis methods, PHA and STPA, are compared at concept phase in which both methods have been applied on the medical system. As a result of compared methods, hazard analyst can be selected optimized hazard analysis methods for concept phase of the medical systems.

A Legal Study on The Act Bill for Establishing The Game User Committee

  • Kyen, Seung-Yup
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.3
    • /
    • pp.165-171
    • /
    • 2022
  • In this paper, we suggest the Measures to improve the Act Bill for establishing the Game User Committee. The Act Bill has a lot of problems which are violations of criminal legalism due to unclear terms in administrative punishment and violations of The Human Right enjoying freedom of occupation and guaranting property due to not defining provisisons about The Duty of Confidentiality or The Legal Fiction as Public Officials for Purposes of Applying Penalty Provisions. also the duplicate regulations in the Act Bill disrupt game industry development. we have three results that were derived through analysis of Prior studies and precedents. The First is to define details of special reasons in enforcement ordinance and enforcement regulations. The Second is to define The Duty of Confidentiality or The Legal Fiction as Public Officials for Purposes of Applying Penalty Provisions in the act bill. The Third is to address managing the random reward items in the Game Rating and Administration Committee or is to give game user advance notice about the Comntent Dispute Mediation system.

A Study on the Importance of Measures for Improving PLM System Usage (PLM 시스템 활용도 향상 방안의 중요도에 관한 연구)

  • Yoo, Jong Kwang;Rim, Seong Taek;Min, Dai Hwan
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.239-269
    • /
    • 2022
  • Purpose This paper attempts to identify items for improving the usage of PLM(Product Lifecycle Management) systems and suggests ways to prioritize improvement items on the basis of importance. It also tries to find out differences in the importance of improvement items due to the company size, the industry, the job, or the PLM solution. Design/methodology/approach Through a survey from participants to a PLM System Conference, data were collected from a sample of 181 users who had the previous experience in using a PLM system. In order to figure out the differences in the importance among user groups, the F-test with the Scheffe test as a post-hoc analysis was used in case of equal variances and the Welch test with the Dunnett T3 test was used in case of unequal variances. Findings This study sorted out 25 improvement ideas according to their importance assessed by the PLM system users. The top five ideas are improving data consistency, error minimization, fast system response time, enhancing user recognition, and business process improvement. The support group puts higher importance than the general user group in data consistency, fast system response time, enhancing user recognition, business process improvement, dedicated team for data consistency, continuous support from management, hardware performance upgrade, output linkage to other systems, and shortening problem solving duration. The largest company group attaches significantly higher weights than the smallest company group to data consistency, error minimization, fast system response time, business process improvement, dedicated team for data consistency, security with proper access management, output linkage to other systems, and better user interface.