• Title/Summary/Keyword: S2 서비스

Search Result 4,686, Processing Time 0.034 seconds

Technical Trend and Analysis of Postal Customer Bar Code in Postal Service Environment (우편서비스 환경하에서 우편용 고객 바코드 기술 동향 및 분석)

  • Park, M.S.;Woo, D.C.
    • Electronics and Telecommunications Trends
    • /
    • v.14 no.2 s.56
    • /
    • pp.38-52
    • /
    • 1999
  • 우정업무는 발송인으로부터 우편물을 접수하여 수취인에게 배달하기 위해 소요되는 인력 의존도가 80%인 노동 집약적인 업무이다. 이에 따라, 우편고객에게 고품질의 우편서비스를 제공하기 위한 목적으로 우편물 자동구분 처리시스템을 개발하여 적용하고 있다. 본 고에서는 우편서비스의 질을 향상시키기 위한 노력의 일환으로 고객 바코드의 활용사례를 분석하고, 우편고객에게 부가서비스를 제공하기 위한 방법을 제시한 내용이다.

The Non-Repudiation Service for Secure Message Handling System (Secure MHS를 위한 부인봉쇄 서비스)

  • 차경돈;홍기융;김동규
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1991.11a
    • /
    • pp.155-164
    • /
    • 1991
  • 컴퓨터가 널리 보급되고 정보통신 기술이 발전함에 따라 지리적으로 먼거리에 있는 사람에게 정보를 주고받을 수 있게 되었는데, 안전한 데이타의 송수신은 그 중요성이 더해가고 있다. 이런 시점에서 ISO가 OSI 환경에서 안전성 제공을 위해 IS 7498-2로 발표한 OSI Security Architecture에서는 5가지 안전성 서비스틀 제공하였다. 본 논문에서는 이들 중 이미 발생한 통신 사실을 부인할 수 없도록 하는 부인봉쇄 서비스를 제공할 수 있는 부인봉쇄 서비스 구현 모델을 MHS(Message Handling System)상에 설계하였으며, 구현방안을 제시하였다.

  • PDF

전자 우편 시스템의 보호 방식 분석

  • Hong, Ju-Young;Yoon, Yi-Joong;Kim, Dae-Ho
    • Review of KIISC
    • /
    • v.4 no.2
    • /
    • pp.5-17
    • /
    • 1994
  • 전자 우편 시스템은 컴퓨터와 네트워크를 이용하는 이용자들이 가장 빈번히 사용하고 있는 서비스 중의 하나로서 그 이용률은 매년 급증하고 있으며 이와 더불어 교류되는 정보에 대한 보호 및 안전성에 대한 요구도 제기되고 있다. 본 고에서는 이러한 전자 우편 시스템에 보호 서비스를 제공하기 위한 여러 제안된 방식들중에 X.400 MHS과 Internet의 PEM(Privacy Enhanced Mail),미국의 SDNS MSP(Message Secure Protocol)에 관하여 각각의 보호 서비스 제공 방식과 보호 서비스의 유형, 범위, 특성들을 논의하며 이들 접근 방식간의 관련성과 차이점들을 분석하고자 한다.

  • PDF

cdma2000 1xEV-DO의 시큐리티 고찰

  • 신상욱;류희수;정교일
    • Review of KIISC
    • /
    • v.12 no.6
    • /
    • pp.81-92
    • /
    • 2002
  • cdma2000 1xEV(Evolution)-DO(Data Only)는 기존의 IS-2000 무선 프로토콜과 달리 패킷 데이터 서비스를 위한 전용 프로토콜로, 최대 2.4Mbps의 전송 속도를 제공한다. cdma2000 1xEV-DO는 이전의 프로토콜과 단리 무선 인터페이스 계층 구조에 따로 분리된 시큐리티 계층(security layer)을 가지며, 이 시큐리티 계층에서 패킷 데이터 서비스를 위한 인증과 암호화 서비스를 제공한다. 본 고에서는 패깃 데이터 서비스를 위한 전용 프로토콜인 chma2000 1xEV-DO의 시큐리티 계층의 4가지 프로토콜인 키 교환 프로토콜, 인증 프로토콜, 암호화 프로토롤, 시큐리티 프로토콜을 분석한다.

A study on advanced Kerberos Authentication between Realms based on PKINIT (PKINIT기반의 향상된 Kerberos 인증에 관한 연구)

  • 신광철;정진욱
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.12
    • /
    • pp.1541-1548
    • /
    • 2001
  • In this paper, We propose a new Kerberos certification mechanism that improve certification service based on PKINIT that announce in IETF CAT Working Group. Certification between area connected by chain through PKINIT that use X.509 and DS/DNS mutually for service. In order to provide regional services used private key and public key, X.509 of PKINIT is employed on session part and Kerberos's private key on actual authentication part. New mechanism be reduced communication overload doing to simplify certification formality between Client and remote KDC by KDC's certificate use to get ticket in remote sacred ground and remote KDC's reaffirmation process omitted.

  • PDF

The Effect of Trust Building Degree and Method in E-Commerce on Service Quality (전자상거래에서 신뢰의 구축 정도와 방법이 서비스 품질에 미치는 영향)

  • 서창적;전희준;김영택
    • Journal of Korean Society for Quality Management
    • /
    • v.31 no.2
    • /
    • pp.51-68
    • /
    • 2003
  • This research addresses familiarity and degree of using Internet site and trust building to affect service quality in e-commerce. We assume that the familiarity and frequency of using Internet site affect perceived service quality of customer. Also it assumes that customer's trust building intermediates their relationships. Several hypotheses are set to test these assumptions empirically. Consequently, the results show that familiarity of using Internet site affects customer's perceived service quality significantly except for tangible. Also it is found that degree of customer's trust building intermediates the relationship between familiarity of using Internet site and customer's perceived service quality significantly. For gaining good trust of customer in Internet site, we suggest that familiarity should fit into customer's needs.

A Study on DDoS(Distributed Denial of Service) Attack Detection Model Based on Statistical (통계 기반 분산서비스거부(DDoS)공격 탐지 모델에 관한 연구)

  • Kook, Yoon-Ju;Kim, Yong-Ho;Kim, Jeom-Goo;Kim, Kiu-Nam
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.41-48
    • /
    • 2009
  • Distributed denial of service attack detection for more development and research is underway. The method of using statistical techniques, the normal packets and abnormal packets to identify efficient. In this paper several statistical techniques, using a mix of various offers a way to detect the attack. To verify the effectiveness of the proposed technique, it set packet filtering on router and the proposed DDoS attacks detection method on a Linux router. In result, the proposed technique was detect various attacks and provide normal service mostly.

  • PDF

Bird's-Eye View Service under Ubiquitous Transportation Sensor Network Environments (Ubiquitous Transportation Sensor Network에서 Bird's-Eye View 서비스)

  • Kim, Joohwan;Nam, Doohee;Baek, Sungjoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.225-231
    • /
    • 2013
  • A bird's-eye view is an elevated view of an object from above, with a perspective as though the observer were a bird, often used in the making of blueprints, floor plans and maps. It can be used under severe weather conditions when visibility is poor. Under low visibility environments, drivers can communicate each other using V2V communication to get each vehicle's status to prevent collision and other accidents. Ubiquitous transportation sensor networks(u-TSN) and its application are emerging rapidly as an exciting new paradigm to provide reliable and comfortable transportatione services. The ever-growing u-TSN and its application will provide an intelligent and ubiquitous communication and network technology for traffic safety area.

Development of the Cross-vertical Ontology for Context Aware Service in Various IoT Environment (다양한 IoT 환경에서 상황인지 서비스 제공을 위한 크로스 버티컬 온톨로지 개발)

  • Yang, Nari;Choi, Hoan-Suk;Rhee, Woo-Seop
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.58-73
    • /
    • 2015
  • In the IoT environment, context information is important to provide context service to the user. For this, collected data from devices such as sensors or actuators, converts to context information using the ontology. Because the existing ontologies designed for target service, if the user wants to change the service requirements, service condition, service environment or another service, overall ontology will be redesigned to the changed service. To overcome this difficulty, we propose the cross-vertical ontology model called the Generic Ontology Models(GOMs). It can define the user's desired services without regarding to place and situation. Also, we propose IoT service concept model that represents data flow of the IoT service and IoT service environment. Moreover, as the use case, we show that the proposed GOMs are able to provide the IoT service well.

The Influence of Hotels' Service Quality and Customer Value on the Reservation Intention: Temporal Construal Theory Perspective (호텔서비스품질과 고객가치가 예약의도에 미치는 영향: 시간해석이론 관점에서)

  • Do, Hyun-Ok;Kim, Gwi-Gon
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.307-313
    • /
    • 2012
  • The purpose of this study is to suggest a research for hotels' expected service quality which influences reservation intention of hotel services. And we checked that these relations are formed by mediating of customer value on the basis of temporal construal theory. The result of our studies is as follows: 1) An abstract hotels' expected service quality(a concrete hotels' expected service quality) influence more on the customer's the social psychological value(the functional value) than the functional value(the social psychological value). 2) The customer's functional value(the social psychological value) influence more on the reservation intention of hotel service near(distant) in time than distant(near) in time. This research provides a theoretical-practical implications to the marketing staffs like packaging designers as well as scholars to study hotel services.