• Title/Summary/Keyword: 기술적 보안성

Search Result 2,294, Processing Time 0.032 seconds

A Novel Redundant Binary Montgomery Multiplier and Hardware Architecture (새로운 잉여 이진 Montgomery 곱셈기와 하드웨어 구조)

  • Lim Dae-Sung;Chang Nam-Su;Ji Sung-Yeon;Kim Sung-Kyoung;Lee Sang-Jin;Koo Bon-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.33-41
    • /
    • 2006
  • RSA cryptosystem is of great use in systems such as IC card, mobile system, WPKI, electronic cash, SET, SSL and so on. RSA is performed through modular exponentiation. It is well known that the Montgomery multiplier is efficient in general. The critical path delay of the Montgomery multiplier depends on an addition of three operands, the problem that is taken over carry-propagation makes big influence at an efficiency of Montgomery Multiplier. Recently, the use of the Carry Save Adder(CSA) which has no carry propagation has worked McIvor et al. proposed a couple of Montgomery multiplication for an ideal exponentiation, the one and the other are made of 3 steps and 2 steps of CSA respectively. The latter one is more efficient than the first one in terms of the time complexity. In this paper, for faster operation than the latter one we use binary signed-digit(SD) number system which has no carry-propagation. We propose a new redundant binary adder(RBA) that performs the addition between two binary SD numbers and apply to Montgomery multiplier. Instead of the binary SD addition rule using in existing RBAs, we propose a new addition rule. And, we construct and simulate to the proposed adder using gates provided from SAMSUNG STD130 $0.18{\mu}m$ 1.8V CMOS Standard Cell Library. The result is faster by a minimum 12.46% in terms of the time complexity than McIvor's 2 method and existing RBAs.

SW Quality of Convergence Product: Characteristics, Improvement Strategies and Alternatives (융합 소프트웨어 품질의 특성, 개선 전략과 대안)

  • Min, Sang-Yoon;Park, Seung-Hoon;Lee, Nam-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.19-28
    • /
    • 2011
  • In today and near future, most of the commercially manufactured IT products will be evolved into software convergence product. Recently, the embedded software products is called as 'Software Convergence Products.' This phenomenon does not simply show the trendy fashion, but has the seriously implication that the functionalities of IT product is accomplished and evolved via software technology, not via mechanical nor electrical means. It will become true that the quality of the convergence product is dominantly governed by the software it uses. Meanwhile, we are facing with the threatening fact that software defects in the mass products will requires tremendous amounts of cost proportional to the quantity of the product. We can remind ourselves of the disasters that have been already happened, such as Automotive recalls, Smart-phone recalls, and others. In software engineering, there have been large amount of work done in software quality improvement for the past couple of decades. Software process improvement, and testings are the representative ones. But we are facing with limitations of those traditional approaches in current convergence industry; exponentially increasing software sizes and rapid changes in software technology. In this paper, we analyze the characteristics of the software convergence industry, the limitations of the traditional Software quality improvement approaches. We suggest a new approaches in software quality improvement in different angles of thought and philosophy.

  • PDF

Sensitivity Analysis of Quasi-Governmental Agencies' Decisions for Cloud Computing Service (준 정부기관 클라우드 컴퓨팅 서비스 결정에 대한 민감도 분석)

  • Song, In Kuk
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.91-100
    • /
    • 2015
  • Recently many companies began to feel the pressures of cost savings due to the global recession, so they have been interested in the Cloud Computing. Cloud Computing is one of using method of IT resources through the network. Users can borrow softwares or hardwares instead of buying them. Many people expect remarkable growth in Cloud Computing industry because of it's effectiveness. But Cloud Computing industry is still at an early stage. Especially, people who in the public sector hesitate to adopt Cloud Computing Services due to security issues and their conservative views. Also, they just have limited understanding, so we need to investigate what they really know and understand. Researches about the Cloud Computing generally focus on technical issues, so we can hardly find researches reference for decision making in considering the services. The study aims to investigate diverse factors for agencies' adoption decisions, such as benefits, costs, and risk in developing the most ideal type of cloud computing service for them, and performs priority analyses by applying ANP (Analytic Network Process). The results identify that features pertaining to the risk properties were considered the most significant factors. According to this research, the usage of private cloud computing services may prove to be appropriate for public environment in Korea. The study will hopefully provide the guideline to many governmental agencies and service providers, and assist the related authorities with cloud computing policy in coming up with the relevant regulations.

An Evaluation Technique for the Path-following Control Performance of Autonomous Surface Ships (자율운항선박의 항로추정성능 평가기법 개발에 관한 연구)

  • Daejeong Kim;ChunKi Lee;Jeongbin Yim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.1
    • /
    • pp.10-17
    • /
    • 2023
  • A series of studies on the development of autonomous surface ships have been promoted in domestic and foreign countries. One of the main technologies for the development of autonomous ships is path-following control, which is closely related to securing the safety of ships at sea. In this regard, the path-following performance of an autonomous ship should be first evaluated at the design stage. The main aim of this study was to develop a visual and quantitative evaluation method for the path-following control performance of an autonomous ship at the design stage. This evaluation technique was developed using a computational fluid dynamics (CFD)-based path-following control model together with a line-of-sight (LOS) guidance algorithm. CFD software was utilized to visualize waves around the ship, performing path-following control for visual evaluation. In addition, a quantitative evaluation was carried out using the difference between the desired and estimated yaw angles, as well as the distance difference between the planned and estimated trajectories. The results demonstrated that the ship experienced large deviations from the planned path near the waypoints while changing its course. It was also found that the fluid phenomena around the ship could be easily identified by visualizing the flow generated by the ship. It is expected that the evaluation method proposed in this study will contribute to the visual and quantitative evaluation of the path-following performance of autonomous ships at the design stage.

A Study on the Development of Case Management Program for Arthralgia in Customized Visiting Health Care (맞춤형 방문건강관리사업에서의 관절통증 사례관리 프로그램 개발 연구)

  • Lee, Moo-Sik
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.474-478
    • /
    • 2009
  • 본 연구는 2008년 맞춤형 방문건강관리사업에 사용되고 있는 관절통증을 중심으로 한 사례관리를 수정 보안하여 우리나라 실정에 맞는 관절통증 사례관리 프로그램을 개발, 제안하며, 맞춤형 방문건강 관리사업의 활성화와 완성도를 높이는데 있다. 연구방법으로는 2007년 전국 12주 관절통증 사례관리 결과자료 분석하고, 전국 253개 보건소의 맞춤형 방문건강관리사업 인력에 대한 자료 분석과 전국 보건소 전문가 자문회의와 토론 결과를 통해 설문지를 수정 보완하여 2008년도 충청남도 관절통증 12주 사례관리를 실시하였다. 자료분석은 SPSS 12.0 통계 프로그램을 이용하여, p-value가 0.05 미만과 0.01미만인 경우를 통계적으로 유의한 것으로 판정하였으며, 전국자료는 빈도분석, wilcoxon 부호순위 검정과 McNemar's 검정을 실시하였으며, 12주의 관절통증 사례관리의 연구기간동안 수집된 자료를 1주와 8주간, 1주와 12주간, 8주와 12주간을 paired t-test 검정과 McNemar's 검정을 실시하여 유의성 평가를 실시하였다. 연구결과는 다음과 같다. 12주 기간 동안 사전 사례관리 방문간호사의 교육을 통한 사례관리 서비스의 강도의 조절 및 매주로 서비스의 횟수를 조절하여 사례관리를 실시한 결과 총 109개 항목에서 1주와 8주간에 유의한 항목은 TG(mg/dl)를 비롯한 51개 항목, 1주와 12주간에는 콜레스테롤(mg/dl)을 비롯한 53개 항목, 8주와 12주간에는 지난 48시간동안 관절통증 점수를 비롯한 3개 항목으로 유의한 차이를 볼 수 있었으며, 1주와 8주간은 유의하나 1주와 12주간은 유의하지 않게 나타나는 항목은 TG(mg/dl)를 비롯한 3개 항목, 1주와 8주간은 유의하지 않다가 1주와 12주간은 유의하게 나타나는 항목은 콜레스테롤(mg/dl)를 비롯한 6개 항목, 1주, 8주, 12주간의 모든 기간에서 유의한 항목은 지난 48 시간동안 관절통증 점수를 비롯한 3개 항목으로 조사되었다. 결론적으로 현재 우리나라에서 추진되고 있는 맞춤형 방문건강관리 사업의 사업지침에 대한 보완을 위해 관절통증사례관리 프로그램에 있어 중재 서비스 또는 프로그램의 기간은 12주간에서 8주간으로 조정 되어야 하며, 추가가 필요한 항목으로는 교육, 자기역량 강화, 운동처방, 물리치료, 약물치료, 대체요법, 식이, 영양, 생활지도 등이며, 어골도 분석을 위한 기본 틀 및 주요 구성요소를 제시 및 기여 요인 및 결정요인을 위한 논리적 모형 제시가 필요하며, 개선목표를 위한 유지증진 및 관리능력, 지기 관리 수행도 개선과 대상자별 맞춤형 사례관리를 위한 표준화된 행동 체크리스트 제작 보급 및 사례별 운동, 물리치료 지도 방법 계획 수립에 대한 인력 충원이 필요하다.

  • PDF

Design and Implementation of a Backup System for Object based Storage Systems (객체기반 저장시스템을 위한 백업시스템 설계 및 구현)

  • Yun, Jong-Hyeon;Lee, Seok-Jae;Jang, Su-Min;Yoo, Jae-Soo;Kim, Hong-Yeon;Kim, Jun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.1
    • /
    • pp.1-17
    • /
    • 2008
  • Recently, the object based storage devices systems(OSDs) have been actively researched. They are different from existing block based storage systems(BSDs) in terms of the storage unit. The storage unit of the OSDs is an object that includes the access methods, the attributes of data, the security information, and so on. The object has no size limit and no influence on the internal storage structures. Therefore, the OSDs improve the I/O throughput and the scalability. But the backup systems for the OSDs still use the existing backup techniques for the BSDs. As a result, they need much backup time and do not utilize the characteristics of the OSDs. In this paper, we design and implement a new object based backup system that utilizes the features of the OSDs. Our backup system significantly improves the backup time over existing backup systems because the raw objects are directly transferred to the backup devices in our system. It also restores the backup data much faster than the existing systems when system failures occur. In addition, it supports various types of backup and restore requests.

A Study on the Application of Smart Home Services to Contemporary Han-ok Housing (주거용 현대한옥의 스마트홈서비스 적용 방안 연구)

  • Jeon, Jin-Bae;Kim, Seung-Min
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.675-683
    • /
    • 2018
  • As interest in eco-friendly architecture and Korean traditional culture is increasing, interest in contemporary han-ok is steadily increasing. Recently, many people experienced the han-ok directly and indirectly with the attention of a commercial contemporary han-ok such as restaurants, coffee shops, and lodging facilities, and as a result, the house has a preference for the residence of the contemporary han-ok. Compared to modern residential houses, however, han-ok is lack the convenience of heating and cooling, energy management, security, and maintenance. For this reason, the increased interest and preference for han-ok does not lead to living in contemporary han-ok. This study was conducted in the following ways to improve inconvenience by applying smart home services to contemporary han-ok. Recent technology trends in smart home services and technologies developed and marketed to date have been identified in previous research cases and literature studies. Based on this, a list of smart home services and their application methods were derived that would relieve the inconvenience of contemporary han-ok for smart home services. We hope that this research will serve as a reference for subsequent researchers studying contemporary han-ok.

A Study of the Future Terrorism : Its Patterns and Perspectives (미래 국제 테러 유형과 전망에 관한 연구)

  • Choi, Jin-Tai
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.337-358
    • /
    • 2008
  • With the Japanese attacks on Pearl Harbor in 1941, approximately 2,500 people were killed. The terrorist attack on World Trade Center in the United States resulted in the heavy loss of people's lives, 2,749 in all. The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. In addition, terrorist armed with new and high technologies have become more dangerous elements to the international community. Especially, the fact that the weapons of mass destruction are used by terrorist organizations is a matter of great concern. The strength of terrorist arsenal gives terrorist a decided advantage over us. The chances of success for terrorist have been increased due to the terrorist friendly environments. Terrorism has evolved without stopping from its birth, which is imposing a great burden on the authorities concerned. The counter-terrorism strategy and tactics used in the past have been useless in the fighting against new terrorism. To cope with the fast changing terrorism, comprehensive countermeasures should be developed. The purpose of this study is to know the enemy. To achieve the goal, the current situation on international terrorism as a whole is examined. Based on the result of the research, this paper also tried to give a perspectives on the future terrorism. At the same time, it provides a guidelines of the direction in the fighting against terrorism.

  • PDF

A Design of Hybrid Implementation Server System for Network Game (네트워크 게임을 위한 하이브리드 분산 서버 시스템 설계에 관한 연구)

  • 배재환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.455-459
    • /
    • 2003
  • In the great motive power which promotes the Game of future to develop. three main factors focus on 3D Graphics, Network and Virtual Reality. the Network technique as necessary elemental technique in Next-generation on-line game is being researched largely. However, from viewing the features of on-line game, if many users meet in same server, it not only causes heavy load to the server and brings inconvenience to the users, but also increases expense to the service provider and creates a problem which is to put up server or not. A proposal is going to do hybrid distributed system a client hardly depends on server for this paper, and to be able to enjoy a network game through information alternating current between clients. depended on the existing server, and the most message processing did a design in order to achieve between clients. A design way to propose is as follows. Primarily it was done in order proposed a message grade anger process way, and to be able to manage server or a client according to importance of message, and, with the second, did a Client-Server method and a Pear-to-Pear method at the same time, and a chase did efficiency. Third is going to propose other problem solving way by message grade anger in multi-anger and a security section of a message cue.

  • PDF

A Study on the Ransomware Detection System Based on User Requirements Analysis for Data Restoration (데이터 복원이 가능한 사용자 요구사항 분석기반 랜섬웨어 탐지 시스템에 관한 연구)

  • Ko, Yong-Sun;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.50-55
    • /
    • 2019
  • Recently Ransomware attacks are continuously increasing, and new Ransomware, which is difficult to detect just with a basic vaccine, continuously has its upward trend. Various solutions for Ransomware have been developed and applied. However, due to the disadvantages and limitations of existing solutions, damage caused by Ransomware has not been reduced. Ransomware is attacking various platforms no matter what platform it is, such as Windows, Linux, servers, IoT devices, and block chains. However, most existing solutions for Ransomware are difficult to apply to various platforms, and there is a limit that they are dependent on only some specific platforms while operating. This study analyzes the problems of existing Ransomware detection solutions and proposes the onboard module based Ransomware detection system; after the system defines the function of necessary elements through analyzing requirements that can actually reduce the damage caused by the Ransomware from the viewpoint of users, it supports various OS without pre-installation and is able to restore data even after being infected. We checked the feasibility of each function of the proposed system through the analysis of the existing technology and verified the suitability of the proposed techniques to meet the user's requirements through the questionnaire survey of a total of 264 users of personal and corporate PC users. As a result of statistical analysis of the questionnaire results, it was found that the score of intent to introduce the system was at 6.3 or more which appeared to be good, and the score of intent to change from existing solution to the proposed system was at 6.0 which appeared to be very high.