• Title/Summary/Keyword: S/W Development Security

Search Result 66, Processing Time 0.026 seconds

Development Testing/Evaluating Method about Residual Data Protection Technology based on the MFP (디지털 복합기의 잔여정보 완전삭제 기능 시험/평가방법론 개발)

  • Kim, Chan-Il;Lee, Kwang-Woo;Cho, Young-Jun;Kim, Dong-Keun;Sim, Wan-Tae;Kim, Seung-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1449-1452
    • /
    • 2009
  • 현재 기업 및 공공기관에서는 산업기술 유출 방지를 위해 잔여데이터 완전삭제 등 보안기능이 구현된 디지털 복합기를 사용하고 있다. 이에 따라 국제적으로 특히 일본 평가기관들 중심으로 공통평가기준으로 평가 인증 많이 받고 있다. 그러나 국내에서는 MFP에 대한 인식과 평가 노하우(know-how)의 부족하여 평가 인증 방법에 미비한 상태이다, 본 논문에서는 MFP의 핵심 중요 기술인 잔여정보 완전삭제 기능을 공통평가기준으로 평가할 수 있는 국내 시험/평가 방법론을 제시하고자 한다.

Conceptual Design of Intelligent Building Automation System Using Computer-Aided Systems Engineering Approach (시스템공학 접근법을 이용한 지능형 건물 자동화 시스템의 개념설계)

  • 유일상;박영원
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.3 no.2
    • /
    • pp.166-178
    • /
    • 2000
  • As the 21st century signifies an information-oriented society, the computer integration takes place in all walks of human presence. Needs for computer and network-integrated automation present new challenges in military as well as commercial facility systems engineering. Since the first intelligent building appeared in USA in 1984, it gradually became an essential capability for the building industry requirement these days. Intelligent Building System(IBS) is evolving to be very complex because there are many subsystems such as telecommunication(TC), office automation(OA), building automation(BA), security, construction environments, etc. During the planing phase of IBS development, therefore, a disciplined systems engineering must be performed to analyze stake- holder's requirements to build an optimized system while minimizing trial-and-error expenses and risks. This paper presents a conceptual design of BAS applying systems engineering methods. The contribution of this study includes the development of IBS subsystem specification for building automation subsystem, which is a part of IBS, using the methodology of requirement analysis, functional analysis, synthesis, and verification. A computer-aided systems engineering s/w, RDD-100, was used to improve the system design efficiency and to promote the product design knowledge management for reuse in later design programs.

  • PDF

Software Engineering Research Trends Meta Analyzing for Safety Software Development on IoT Environment (IoT 환경에서 안전한 소프트웨어 개발을 위한 소프트웨어공학 메타분석)

  • Kim, Yanghoon;Park, Wonhyung;Kim, Guk-boh
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.11-18
    • /
    • 2015
  • The new environments arrive such as ICT convergence, cloud computing, and big data, etc., how to take advanta ge of the existing software engineering technologies has become an important key. In addition, the importance of re quirement analysis for secure software and design phase has been shown in the IoT environment While the existing studies have focused on the utilization of the technique applied to IoT environment, the studies for enhancing analys is and design, the prerequisite steps for safely appling these techniques to the site, have been insufficient. So, we tr y to organize research trends based on software engineering and analyze their relationship in this paper. In detail, w e classify the research trends of software engineering to perform research trends meta-analysis, and analyze an ann ual development by years. The flow of the major research is identified by analyzing the correlation of the key word s. We propose the strategies for enhancing the utilization of software engineering techniques to develop high-quality software in the IoT environment.

Secure Mobile-in-Vehicle System with CBC-MAC authentication (CBC-MAC 방식을 적용한 보안 모바일기기 제어시스템)

  • Hwang, Jae-Young;Choi, Dong-Wook;Chung, Yeon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2657-2662
    • /
    • 2010
  • Demand on information security in mobile devices based control system grows rapidly with a view to counteracting information hacking and leakage. Among these techniques, encryption and authentication are most common. This paper presents CBC-MAC (Cipher Block Chaining-Message Authentication Code) based mobile devices control system. The system is termed as Secure Mobile in Vehicle (SMIV)We use CBC-MAC that is one of the most efficient authentication modes to protect information against any malicious attacks. By sharing the secret key of CBC-MAC between the transmitter and receiver, it asserts authentic information. The proposed system is verified in such a way that we develop mobile devices control system, apply the CBC-MAC algorithm to the control system and validate the received data. Unlike conventional systems where the development of control mechanism in mobile devices based control systems is main concern, this proposed system offers a secure communication link of the data in mobile devices control system and therefore would be useful to the design and implementation of various mobile devices based control systems.

A Survey on Uniforms and Development of New Design (유니폼 실태조사 및 디자인 개선을 위한 연구(II))

  • 김경인
    • Journal of the Korean Society of Costume
    • /
    • v.33
    • /
    • pp.229-253
    • /
    • 1997
  • Uniform is getting increased importance as one of the symbols which represent the characteristics of company as well as gives good impression to the customers. Uniform shows the kinds of companies and forms of jobs and it makes the people who is putting on the uniform feel the sense of unity a security of one's position and the companion-ship and also it gives him a sense of responsi-bility and elevates the efficiency of tasks. It is required to be designed for a uniformity and it can contribute in the increase of work ef-ficiency and help the company get the good results of the management by inspiring the workers with conceit and belongingnesses. The purpose of this study is as the followings 1) Through the practical survey we analyze workers' staffs' and consumers' preference of uniform design 2) We analyze the fashion trend for 97/98 A./W 3) We present each uniform design for seven different types of company on the basis of 1) (design preference) and 2)(fashion trends).

  • PDF

Development of the Remote Security System using 802.11b WLAN Protocol (802.11b (Wi-Fi) 무선 프로토콜을 이용한 원격 감시 시스템의 개발)

  • Lee, D.H.;Lim, J.W.;No, D.Y.;Oh, S.J.;Ahn, C.B.
    • Proceedings of the KIEE Conference
    • /
    • 2003.07d
    • /
    • pp.2513-2515
    • /
    • 2003
  • 본 논문에서는 Windows CE 기반의 무선 인터넷 서비스를 이용한 감시 시스템을 구현하였다. 원격지 카메라를 이용하여 압축한 데이터를 802.11b (Wi-Fi) 무선 랜망을 사용하여 전송하였다. 그리고, 고속 데이터 버스를 이용하여 전송된 영상 데이터를 웨이블릿 디코더를 이용하여 압축을 풀고 화면에 디스플레이 하였다. Geode GXI프로세서 기반의 Windows CE 서버 시스템을 구현하였고, FPGA를 이용하여 레이블릿 디코더를 제어하여 영상 데이터를 실시간 디스플레이가 가능하도록 하였다. 그리고, Windows CE 기반의 디바이스 드라이버 및 응용 소프트웨어를 작성하였다.

  • PDF

Effect and Issues on the Water Supply Network Management System in Kwangju (광주시 상수도관망관리시스템의 효과 및 문제점에 관한 연구)

  • 오창수
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.16 no.1
    • /
    • pp.103-110
    • /
    • 1998
  • This study deals with the effective management system on the underground facilities by Geographic In-formation System (GIS). For this purpose,"Management System on the Water Supply Network by GIS in Kwangju" was analylized. Following results were obtained in this study. This system could be practically used for the inquiry of water supply and distribution pipes, check valves, pipe equipments and parcel identification numbers. Inquiry of addresses using the parcel identification numbers were effective for the database management system of the water supply facilities. The poits at issue for the performance of this study were the security and education of experts, the security of revenue source, the discord between GIS companies concerned. Establishments of GIS software technologies and database systems, and the settlement between GIS companies were required for the solution of these poits. Development of computer management systems on the water sup-ply network by GIS enabled the replacement of outworn pipes and the leakage inquiry techniques in pipes. in pipes.

  • PDF

Legal System and Regulation Analysis by S/W Development Security (주차시설 현황 조사를 통한 주차 회전율 파악)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.227-228
    • /
    • 2014
  • In this paper, a license plate investigation which is one of parking usage is performed. We survey research that should be given time interval using the camera without the observer. We assigned the investigation time interval to each of to each of the parking car, average parking duration is determined. Parking turnover, the number of vehicles of parking per hour per parking surface, is examined.

  • PDF

Legal System and Regulation Analysis by S/W Development Security (승강기 내에서 폭행의 추출)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.205-207
    • /
    • 2014
  • This paper uses $Color-x^2$ histogram that is composed of merits of color histogram and ones of histogram, in order to efficiently extract violent scenes in elevator. Also, we use a threshold so as to find out key frame, by use of existing $Color-x^2$ histogram. To increase the probability that discerns whether a real violent scene or not, we take advantage of statistical judgments with 20 sample visual images.

  • PDF

Development Plan of R.O.K. Naval forces to prepare Tasks in the Arctic Ocean: Based on Operational Environment(SWOT) Analysis (한국 해군의 북극해 진출과 발전방안에 대한 고찰: 작전환경(SWOT) 분석을 중심으로)

  • Ji, Young
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.311-343
    • /
    • 2020
  • Because of the global warming, the Arctic Ocean is expected to be ice-free by the year 2035. When the Arctic Ocean will be opened, a number of national interests will become more salient as experiencing a shortened sailing distance and decreasing navigation expense, possibility of natural resources transport by sea from Arctic Circle, and indirect-profit making by building a herb port in Asia. To secure the national interests and support the free activities of people in this region, R.O.K government is trying to make advanced policies. In order to carry out the naval tasks in the Arctic Ocean, using the operational characteristics(mobility, flexibility, sustainability, presence of capabilities, projection) is necessary. To this end, ROK Navy should analyze the operational environment (O.E.) by its capability(weakness and strength), opportunity, and threat. R.O.K. Navy should make an effort over the following issues to implement the tasks in the Arctic Ocean: first, Navy needs to map out her own plan (Roadmap) under the direction of government policies and makes crews participate in the education·training programs in home and abroad for future polar experts. Third, to develop the forces and materials for the tasks in cold, far operations area, Navy should use domestic well-experienced shipbuilding skills and techniques of the fourth industrial revolution. Next, improving the combined operations capabilities and military trust with other countries in the Arctic region to cover the large area with lack of forces' number and to resolve the ports of call issues. Lastly, preparation in advance to execute a variety of missions against military and non-traditional threats such as epidemics, HA/DR, SOLAS, in the future operation area is required.

  • PDF