• Title/Summary/Keyword: Protect Management Information System

Search Result 304, Processing Time 0.028 seconds

A Study on Electronic Copyright Management System for Digital Contents (디지털 정보의 전자저작권관리시스템에 관한 연구)

  • Hong, Jae-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.1
    • /
    • pp.171-200
    • /
    • 2001
  • Electronic Copyright Management System is the technical solution to protect copyright and to manage the distribution of digital contents in network environment. This paper examined the theoretical plane of Electronic Copyright Management System and analyzed the characteristics and the protection technologies of some of the commercial systems. And this paper investigated the essential protection technologies and payment systems that is needed to develop and manage the successful system in the future. Finally this study suggested the fundamental function model of Electronic Copyright Management System.

  • PDF

Improvement Directions Of Related Laws System To Protect U-City Infrastructure Facilities (U-City 기반시설보호를 위한 관련 법제도 정비 방향)

  • Kim, Byeong-Sun;Lee, Jae-Suk;Shin, Dong-Bin
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.19 no.1
    • /
    • pp.45-52
    • /
    • 2011
  • This study aims to provide improvement directions of related laws system to protect U-City infrastructure facilities. For this, the study analyzes oversea infrastructure protection systems and domestic U-City laws system. Then, this indicates problems considering U-City infrastructure protection through Industrial-University-Institute experts' survey. Based on this survey, this study proposes improvement guideline of laws system to protect U-City infrastructure facilities, including enactment the Guideline of U-City Infrastructure Protection, obligation of U-City Infrastructure Protection, revision method of related laws system for protecting intelligent facilities, and Management System of U-City Infrastructure Facilities.

Design of document security to maximize knowledge value (지식가치를 극대화하기 위한 다큐먼트 보안 디자인)

  • Jang, Deok-Seong
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.161-170
    • /
    • 2003
  • Knowledge management system building knowledge acquisition, knowledge share, and knowledge maintenance for the member of corporation is expanded throughout whole industry to cope with rapid business environment. Electronic document basing knowledge management system can copy, print, and transfer knowledge to another party, so it is being regarded as a essential infrastructure to share knowledge. However, considering most of information leakage is sprung up by insider of organization, it is considered to provide countermeasure to protect illegal use from information leakage. The purpose of this paper is to establish digital information security system through design of document and manage digital information assets safely through electronic document security system protecting illegal leakage of digital information assets.

  • PDF

Needs Analysis for New National Qualification and Nationally Certified Private Qualification Systems in Software Engineering (소프트웨어 분야 국가기술 및 공인민간자격 신설에 관한 탐색적 요구분석)

  • Kwon, Moon-Ju;Kim, Min-Ha
    • Journal of Information Technology Services
    • /
    • v.8 no.3
    • /
    • pp.51-65
    • /
    • 2009
  • National qualification system for SW engineering is intended to be mechanisms to assure the competence of SW professionals. Qualification system for SW engineering can be categorized as national qualification, nationally certified private qualification, and private qualifications. In this paper, we present a summary report of needs analysis for new national qualification systems, based on the survey from human resource department managers of IT companies in IT service, package SW and embedded SW industry. The survey results show that SW qualification system is appropriate for evaluation and career management, but does not provide up-to-date information concerning the technology assessment and change. Based on the result form needs analysis, we suggest the SW specialist and embedded SW specialist as new licenses in national qualification system. In addition, we also propose SW quality management engineer, systems management engineer, IT Protect management engineer, network management engineer and SW architect engineer, as new nationally certified private qualifications.

Protect Digital Contents and Instant Player using PKI (공개키 기반의 디지털 콘텐츠 및 인스턴트 플레이어 보호방법연구)

  • Ryu, Seok
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.837-842
    • /
    • 2006
  • According to the development of the internet technology, many people can access many kind of digital contents. This approach can infringe the copyright and right owner-ship. Currently many people research the DRM(Digital Rights Management) for protect digital content after digital content downloaded. This paper propose the system that client player witch encrypted using PKI have symmetric key and CCI (copy control information), decrypt digital content witch encrypted when digital content created.

Security Structure for Protection of Emergency Medical Information System (응급의료정보시스템의 보호를 위한 보안 구조)

  • Shin, Sang Yeol;Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.59-65
    • /
    • 2012
  • Emergency medical information center performs role of medical direction about disease consult and pre-hospital emergency handling scheme work to people. Emergency medical information system plays a major role to be decreased mortality and disability of emergency patient by providing information of medical institution especially when emergency patient has appeared. But, various attacks as a hacking have been happened in Emergency medical information system recently. In this paper, we proposed security structure which can protect the system securely by detecting attacks from outside effectively. Intrusion detection was performed using rule based detection technique according to protocol for every packet to detect attack and intrusion was reported to control center if intrusion was detected also. Intrusion detection was performed again using decision tree for packet which intrusion detection was not done. We experimented effectiveness using attacks as TCP-SYN, UDP flooding and ICMP flooding for proposed security structure in this paper.

Development of Station Safety Management System (승강장 안전 관리 시스템 개발)

  • Ku, Ja-Yl
    • 전자공학회논문지 IE
    • /
    • v.44 no.2
    • /
    • pp.41-46
    • /
    • 2007
  • In this paper, we have proposed Station Safety Management System to protect station accident. we establish a sensor part near an underground rail. If a passenger approaches an underground rail, at first, lamp is shining and warning sound is ringing. nevertheless he approaches end of underground rail, At the same time, lamp is shining, warning sound is ringing, this information transfer server and train using wireless LAN. We makes this system using low cost in comparison with another system.

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

Study on Implementation of Rights Information System and its Use-process for Libraries' Digital Rights Management (디지털저작물의 저작권관리를 위한 저작권정보 구축시스템 설계 및 이용프로세스에 관한 연구)

  • Choi, Heung-Sik;Lee, Jeong-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.3 s.57
    • /
    • pp.163-181
    • /
    • 2005
  • In order to adapt the digital rights management community for the standardisation of expressing rights information in the libraries' content for the control of the rights of the digital works, it is necessary to establish rights information, that can build effective system of the distribution structure by the public ownership of the rights information and the interoperability of system. This research developed rights information constructing system in order to protect and enforce their rights over digital assets and embodied utilizing use-process of rights information.

A Study on Efficient Key Management Model for Digital Pay-TV System (디지털 유료 방송시스템에 적합한 키 관리 모델에 관한 연구)

  • Yang Hyung-kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2C
    • /
    • pp.200-207
    • /
    • 2006
  • Recently, with the development of information and communication technology, digital pay-TV technology is paid attention. So the Protection of the provided contents is becoming more important. However, in order to encourage an active based on digital TV, the contents and information sent and received respectively by the broadcaster and the subscriber must be protected. Therefore, in this paper, I analyze the requirements to protect the digital contents, the security and efficiency of the previous digital pay-TV system model. Then I proposed a key management model for digital pay-TV system.