• Title/Summary/Keyword: Security Cooperation

Search Result 886, Processing Time 0.023 seconds

Sketch effect generating technique based on real painting analysis (실제 작품 분석에 기반한 스케치 효과 생성 기법)

  • Lee, Won-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.8
    • /
    • pp.3687-3691
    • /
    • 2012
  • Various digital contents generation techniques are widely utilized by upgrading PC and mobile device. In this paper, we propose sketch effect simulation based on real drawing pieces. For this, we analyze Vincent Van Gogh's drawing pieces; and then construct DB by extracting sketch stroke pattern of each object. From this database, we select stroke pattern at each object, and then, apply it. Our algorithm can generate similar effect look like real drawing piece. It may be utilized various contents such as children's painting education book.

A New Lightweight Mutual Authentication Protocol for Home Network (홈네트워크를 위한 새로운 경량화된 상호인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2384-2389
    • /
    • 2009
  • In this paper, we propose a lightweight mutual authentication protocol for secure and efficient home network service. Lee et al. recently proposed an attribute-base authentication key agreement protocol using public key in home network. Its protocol provided forward secrecy but don't diminish conspicious overhead of operation using ticket. Therefore the proposed protocol provided the security and efficiency using hash function and counter. Also it can provide secure home network service by check consumer electronics control level of users after created session key.

Research On Factors for Adoption and Business performance of ASP Introduction - Focused on Cosmetic Industries (국내 미용업계의 ASP 도입 요인과 성과에 관한 연구)

  • Song, Yeong-Woo;Jeon, In-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.3011-3022
    • /
    • 2009
  • The analytic test results are as follows. This thesis categorized into independent variables, multiple factors, such as asset attributes, cost reduction expectation, corporate IT competence, service qualities, system adequacy, information security, easy system management, uncertain IT, supplier capacity, intra-industry competition. And, this research thesis categorized into moderators, the factor, such as the adequacy between suppliers and customers industries. And, this categorized into dependent variables, multiple factors, such as the effects of ASP introduction. But, it was analyzed that only cost reduction expectation out of independent variables had not positive effects on the effects of ASP introduction. And, it was confirmed that the higher communications between suppliers and customers' industries, and the higher fulfillment of contracts, suppliers' service qualities, and suppliers' cooperation with customers had the adjusting effects on factors of ASP-based introduction.

The Strategies of the Acquisition and Use of Scientific and Technological Information of the Former USSR (구소련(舊蘇聯) 과학기술(科學技術) 정보의 수집 및 활용전략(活用戰略))

  • Kwack, Dong-Chul
    • Journal of Information Management
    • /
    • v.24 no.2
    • /
    • pp.1-18
    • /
    • 1993
  • It is just two years that our country drived forward the project acquiring and using the scientific and technological information of the former USSR. The activities acquiring information are necessary to stir up the scientific and technological cooperation with the former USSR. But it is impossible for any man or institution to accomplish the activities acquiring the scientific and technological information of the former USSR, on the whole, considering political and economic confusion, perfect security policy, and 6,000 research institutes in the former USSR and so on. Thus the support of specialists and budgets should be realized in the national level, along with taking a proper step on mutual cooperation between the related institutions.

  • PDF

A Study on the Establishment of the Korea-Russia Trade Activation with the Arctic Sea Route Cooperation (북극항로 협력 등 한-러 무역활성화 구축을 위한 연구)

  • Kim, Bong-chul
    • Korea Trade Review
    • /
    • v.44 no.4
    • /
    • pp.115-128
    • /
    • 2019
  • This article analyzes issues regarding the economic development of the arctic area with the aim of finding ways to help solve the problems and to support sustainable economic development of the arctic area. Some proposals are introduced for establishing a sound legal infrastructure of the Korea-Russia economic development of the arctic area. As Russia develops the Arctic area and the route through the Arctic area, Korea will gain the possibility of transportation efficiency, vitalization of international transaction, and finding new markets. Resource development in the North Pole is ongoing, with matching international transaction and economic benefits. To reflect the Korea-Russia interests and to sustain the effect, the legal infrastructure is inevitable. For example, it would be reinforced by pushing forward the Korea-Russia FTA. The legal infrastructure for economic cooperation of Korea and Russia has to reflect that 'the development of the Arctic area and making the route through the Arctic area' should increase the sustainability and vitality of international transaction. The legal infrastructure for economic benefits can also help mitigating non-economic arguments of international community such as the security risk in the Korean-peninsula and around the world.

RECENT DEVELOPMENTS IN EU SPACE POLICY AND LAW

  • Masson-Zwaan, Tanja
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.25 no.2
    • /
    • pp.231-247
    • /
    • 2010
  • This paper starts with a brief overview of the history of the European Space Agency and recalls some of its main features. Next, the gradual process of cooperation between ESA and the EU is outlined, leading to the creation of the Framework Agreement in 2004 and the adoption of the European Space Policy in 2007. The entry into force of the Lisbon Treaty in 2009 codified the space competence of the EU, and its implications are addressed. Lastly, some attention is paid to the issue of space security in Europe, through ESA's new SSA programme adopted in 2008, and to the relevance of the EU Council initiative for a Code of Conduct for Outer Space Activities in 2008. The paper ends with some conclusions.

  • PDF

The Design of a Multimedia Data Management and Monitoring System for Digital Rights Protection (디지털 저작권 보호를 위한 멀티미디어 데이터 관리 및 감시 시스템의 설계)

  • Cho, Hyun-Seob;Oh, Myoung-Kwan;Jun, Ho-Ik
    • Proceedings of the KAIS Fall Conference
    • /
    • 2012.05b
    • /
    • pp.817-819
    • /
    • 2012
  • This paper propose an interested digital rights protection scheme to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

A Study on the LMS Model for Distance Education of Mobile Environment (모바일환경의 원격교육실현을 위한 LMS 모델에 관한 연구)

  • Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.9-14
    • /
    • 2005
  • In this treatise when, proposed to supplement studying contents relationship conversion service and cooperation studying service function to LMS that analyze existing e-learning model's limitation for ubiquitous environment e-learning model that can study regardless of, ubiquitously, some contents and do based on SCORM ubiquitous-network and next generation sensor technology etc.

  • PDF

Design of P2P Secure Protocol Using Kerberos (Kerberos를 이용한 P2P 보안 프로토콜 설계)

  • 이규형;송영상;우찬일;신인철
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.51-54
    • /
    • 2002
  • P2P implies direct exchange between peers. If you have something I want, 1 go directly to you and obtain il. There is one of the most advantages of formation of community in P2P. For a specified purpose through P2P, the Peers who make temporary a group delivery a request efficient and safe. And the resources can be jointed common, cooperation and communication. When P2P is developed more, we can expect more formation of online community and development. But to be a safe of personal ID and password in internet, it should be possible to make a key-exchange. In the paper, it suggest P2P security system suitable to personal security that Kerberos be transformed. The user who make community in P2P, have Kerberos Server, and using Physical Address of Ethernet card in personal computer, authenticate users.

  • PDF

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.