• Title/Summary/Keyword: 공학인증

Search Result 1,047, Processing Time 0.024 seconds

Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality (개인정보의 위임 제공 및 데이터 기밀성을 보장하는 블록체인에 제공 정보의 저장)

  • Jun-Cheol, Park
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.76-88
    • /
    • 2022
  • Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-requesting user to authorize a secure delegated transfer of his personal information to the service provider via a reliable authority and enables only the two parties of the service to retrieve the provided information stored on a blockchain ensuring data confidentiality. It thus eliminates the necessity of storing customer information in the service provider's own database. As a result, the service provider can serve customers without requiring membership registration or storing personal information in the database, so that information leakage through the server database can be completely blocked. In addition, the scheme is free from the risk of information leakage and subsequent attacks through smartphones because it does not require a user's smartphone to store any authentication credential or personal information of its owner.

Automatic Test case Generation Mechanism from the Decision Table of Requirement Specification Techniques based on Metamodel (메타모델 기반 요구사항 명세 기법인 의사 결정표를 통한 자동 테스트 케이스 생성 메커니즘)

  • Hyun Seung Son
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.2
    • /
    • pp.228-234
    • /
    • 2023
  • As the increasing demand for high-quality software, there is huge requiring for quality certification of international standards, industrial functional safety (IEC 61508), automotive (ISO 26262), embedded software guidelines for weapon systems, etc., in the industry. Software companies are very difficult to systematically acquire the quality certification in terms of cost and manpower of Startup, venture small-sized companies. For their companies one test case automatic generation is considered as a core technique to evaluate or improve software quality. This paper proposes a test case automatic generation method based on the design decision table for system and software design verification. We apply the proposed method with OMG's standard techniques of metamodel and model transformation for automatically generating test cases. To do this, we design the metamodels of design decision table (Model) and test case document (Text) and define model transformation to automatically generate test cases, which will expect to easily work MC/DC coverage.

Contactless Access Certification Management System for Infection Control in Special Rooms in Medical Institutions (의료기관 특수실 감염관리를 위한 비접촉 출입인증 관리 시스템)

  • Lee, Hyo-Seung;Choi, Woo-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.387-392
    • /
    • 2022
  • In addition to complying with access standards for facilities that require infection control (operating rooms, delivery rooms, intensive care units, etc.) in accordance with the 2019 Medical Care Act Enforcement Regulations, entry, exit, contact information, etc. for entry and exit, the criteria for entering and exiting special rooms of medical institutions have been revised so that records of facts are kept for one year. However, even now, the inconvenience continues due to the fact that such contents are created by hand or due to errors. For this reason, this study designed and implemented a system that provides automatic opening, closing, and accessing record storage functions for authorized users using IoT devices and UWB technology, and we expected that the convenience of the visitors and systemized access control will be possible.

Enhancement of Security Monitoring & Control System in Zero Trust Security Models (제로트러스트 보안 모델에서 보안관제 시스템 강화 연구)

  • Wonhyung Park
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.51-57
    • /
    • 2022
  • Recently, the concept of zero trust has been introduced, and it is necessary to strengthen the security elements required for the next-generation security control system. Also, the security paradigm in the era of the 4th industrial revolution is changing. Cloud computing and the cybersecurity problems caused by the dramatic changes in the work environment due to the corona 19 virus continue to occur. And at the same time, new cyber attack techniques are becoming more intelligent and advanced, so a future security control system is needed to strengthen security. Based on the core concept of doubting and trusting everything, Zero Trust Security increases security by monitoring all communications and allowing strict authentication and minimal access rights for access requesters. In this paper, we propose a security enhancement plan in the security control field through a zero trust security model that can understand the problems of the existing security control system and solve them.

A Study of Quantitative Characterization of Physically Uncloanble Functions (물리적 복제 불가능 회로 정량적 특성 평가 방법 연구)

  • Moon-Seok Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.143-150
    • /
    • 2023
  • Applications on physically unclonable circuits (PUFs) for implementing and utilizing security protocols with hardware is on the rise. PUFs have the capability to perform functions such as authentication, prevention of replication, and secure storage of critical information in integrated circuits and security systems. Through the implementation of physically unclonable circuits, a wide range of security features, including confidentiality, integrity, and availability, can be applied. Therefore, PUFs are promising candidate to build secure integrated circuits and hardware systems. However, in order that PUFs possess security features, PUFs should possess characteristics such as unpredictability, uniqueness, and robustness characteristics. This study provides a detailed explanation and introduction of the methods to characterize the PUF properties. By applying the results, it becomes possible to quantitatively evaluate the characteristics of implemented PUFs and assess their availabilities for security system applications.

Development of segmentation-based electric scooter parking/non-parking zone classification technology (Segmentation 기반 전동킥보드 주차/비주차 구역 분류 기술의 개발)

  • Yong-Hyeon Jo;Jin Young Choi
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.125-133
    • /
    • 2023
  • This paper proposes an AI model that determines parking and non-parking zones based on return authentication photos to address parking issues that may arise in shared electric scooter systems. In this study, we used a pre-trained Segformer_b0 model on ADE20K and fine-tuned it on tactile blocks and electric scooters to extract segmentation maps of objects related to parking and non-parking areas. We also presented a method to perform binary classification of parking and non-parking zones using the Swin model. Finally, after labeling a total of 1,689 images and fine-tuning the SegFomer model, it achieved an mAP of 81.26%, recognizing electric scooters and tactile blocks. The classification model, trained on a total of 2,817 images, achieved an accuracy of 92.11% and an F1-Score of 91.50% for classifying parking and non-parking areas.

Blockchain based SDN multicontroller framework for Secure Sat_IoT networks (안전한 위성-IoT 네트워크를 위한 블록체인 기반 SDN 분산 컨트롤러 구현)

  • June Beom Park;Jong Sou Park
    • The Journal of Bigdata
    • /
    • v.8 no.2
    • /
    • pp.141-148
    • /
    • 2023
  • Recent advancements in the integration of satellite technology and the Internet of Things (IoT) have led to the development of a sophisticated network ecosystem, capable of generating and utilizing vast amounts of big data across various sectors. However, this integrated network faces significant security challenges, primarily due to constraints like limited latency, low power requirements, and the incorporation of diverse heterogeneous devices. Addressing these security concerns, this paper explores the construction of a satellite-IoT network through the application of Software Defined Networking (SDN). While SDN offers numerous benefits, it also inherits certain inherent security vulnerabilities. To mitigate these issues, we propose a novel approach that incorporates blockchain technology within the SDN framework. This blockchain-based SDN environment enhances security through a distributed controller system, which also facilitates the authentication of IoT terminals and nodes. Our paper details the implementation plan for this system and discusses its validation through a series of tests. Looking forward, we aim to expand our research to include the convergence of artificial intelligence with satellite-IoT devices, exploring new avenues for leveraging the potential of big data in this context.

A Study on the Architectural Education System for Globalization (국제화시대에 대비한 우리나라 건축교육제도 개선 연구)

  • Yim Chang-Bok
    • Journal of Engineering Education Research
    • /
    • v.2 no.1
    • /
    • pp.39-50
    • /
    • 1999
  • In recent globalization era, Korean architectural education and profession are emerging as the fields with serious problems. There are two major reasons. One is an internal factor caused by Ministry of Education's full scale shift from department to faculty system. Due to the drastic change in this system, most of schools have serious difficulties to deliver the proper professional education. And the other is an external factor. In WTO era, Union of International Architects has adopted $\ulcorner$UIA Accord on Recommended International Standards of Professionalism In Architectural Practice$\lrcorner$. According to the education section of the Accord, it requires 5 years of professional education in the accredited school. So, if it is formally adopted in the Beijing Congress, which is scheduled to be held in June 1999, we may face very serious problems in architectural education. As mentioned above, with the present education system it is believed not easy to meet their new criteria. Within the present system, which does not have any mandatory relationship with professional licence, students might go on to diverse fields such as architectural design, structural engineering, construction management and building equipment engineering. However, if UIA Accord and Engineering Accreditation are required at the same time, it will not be easy to meet their new criteria with present architectural education system. The goal of this paper is to suggest the models to meet the standards of international community while keeping the strengths of existing systems.

  • PDF

A Study on the Level of Self-regulated Learning Ability for Engineering College Students (공과대학 학생들의 자기조절 학습능력 수준에 관한 연구)

  • Shin, Min-Hee
    • Journal of Engineering Education Research
    • /
    • v.12 no.4
    • /
    • pp.84-92
    • /
    • 2009
  • The purpose of this study was to investigate the level of self-regulated learning ability for engineering students. Self-regulated learning theory has been studied as the theoretical background and assessment framework explaining life-long ability. A survey was conducted to engineering students from an engineering-centered university, located in Seoul. The research findings were as follows. First, each mean of cognitive regulation, motivation regulation, and behavior regulation was 3.041, 3.051, and 2.996 respectively, indicating that the scores were not high. Second, there was no significant difference in the mean score of self-regulated learning ability between female and male students. Third, students in ABEEK accredited program scored meaningfully higher than students in non-accredited program on only 3 sub-components of organization strategy, metacognition, and task value. Fourth, senior students scored meaningfully higher than 1st year students on only 3 sub-components of metacognition, intrinsic motivation, learning environment management. The results revealed that instructional interventions should be provided for engineering students to develop self-regulated learning ability.

A Study on Model Development for SW Human Resources Development using Supply Chain Management Model (SCM 모델을 이용한 SW인력양성 모형개발 연구)

  • Lee, Jung-Mann;Om, Ki-Yong;Song, Chan-Hoo;Kim, Kwan-Young
    • Journal of Korea Technology Innovation Society
    • /
    • v.10 no.1
    • /
    • pp.22-46
    • /
    • 2007
  • This article introduces a recent innovation in Korea's human resources development policy in the SW sector. Facing serious problems in cultivating SW engineers such as a mismatch in supply and demand of SW workers, shortage of globally competitive SW professionals, and insufficient education and training of university graduates, the Korean government has decided to adopt a new paradigm in national SW engineering education, based on supply chain management (SCM) in manufacturing. SCM has been a major component of the corporate competitive strategy, enhancing organizational productiveness and responsiveness in a highly competitive environment. It weighs improving competitiveness of the supply chain as a whole via long-term commitment to supply chain relationships and a cooperative, integrated approach to business processes. These characteristics of SCM are believed to provide insight into a more effective IT education and university-industry collaboration. On the basis of the SCM literature, a framework for industry-oriented SW human resources development is designed, and then applied in the case of nurturing computer-software engineers in Korea. This approach is expected to fumish valuable implications not only to Korean policy makers, but also to other countries making similar efforts to enhance the effectiveness and flexibility in human resources development. The construction of SCM-based SW HRD model is first trial to apply SCM into SW HRD field. The model is divided into three kinds of primary activities and two kinds of supportive activities in the field of value chain such as SW HRD Council, SW demand and supply plan establishment and the integration of SW engineering capabilities that contribute the reduction of the skill and job matching through SW HR demand and supply collaboration.

  • PDF