• Title/Summary/Keyword: 보안수준

Search Result 1,070, Processing Time 0.033 seconds

A Study on Excavation Method According to Passage under Adjacent Structure (인접구조물 하부통과에 따른 굴착공법에 대한 고찰)

  • Kim Tai-Hyun;Ko Chin-Surk;Cho Young-Dong
    • Explosives and Blasting
    • /
    • v.23 no.1
    • /
    • pp.31-39
    • /
    • 2005
  • This study is based on the reseach about conte. track$(Dugso\~wonju)$ double line electric railway tunnel. Authors conducted test blasting to examine the effect of blasting pollution. To be conducted safe and effective work by using this result studies sailable substitution excavation method. No-vibration section generates continuously the vibration of breaker working to go abreast necessarily secondary fragmentation working and according to judging that application is actually difficult in case of the condition of study site, the period of construction, the cost of construction, the efficiency of construction, pre-heavy caliber horizontally boring working + line drilling method + vibration control secondary blasting method excavation working is possible from level within blast vibration standard.

Development of Learning Model for Knowledge Management in Construction Area (건설분야의 지식관리 적용을 위한 학습모델 개발)

  • Jung In-Su;Kim Byung-Kon;Na Hei-Suk
    • Korean Journal of Construction Engineering and Management
    • /
    • v.3 no.1 s.9
    • /
    • pp.65-73
    • /
    • 2002
  • By its nature, software part of the construction industry such as engineering and so forth has been kept secret to outside, as it determines a company$^{\circ}{\phi}s$ competitiveness. As a result, construction field knowledge usually disappears with the end of a project. The objective of this study is to develop the knowledge management (BM) learning model tuned in to construction area in order to manage project-related knowledge and promote the knowledge management. This study presented a learning model for knowledge management in the construction field, with the aim to integrate a series of processes. The model is composed of EIP, EDMS, knowledge and failure cases management, CoP and e-Learning.

A Design and Implementation of WIPI-compatible Platform based on OpenOS (OpenOS 기반 WIPI 호환 플랫폼의 설계 및 구현)

  • Kim Byung-Gook;Choi Byoung-Kyu;Heu Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06a
    • /
    • pp.379-381
    • /
    • 2006
  • 모바일 표준 플랫폼 WIPI(Wireless Internet Platform for interoperability)는 모바일 단말기에 탑재되어 응용프로그램을 실행할 수 있는 실행환경을 제공하는 국내 모바일 표준 플랫폼이다. 2002년부터 개발이 시작되어 현재 WIPI 2.0 규격을 탑재한 모바일 단말기가 출시된 상황이다. WIPI 2.0 규격은 PC연결 등의 표준 입출력, 폰카메라, 위치알림 기능, 보안통신 등의 서비스까지 규격화하고 있으며, 차기 버전에서는 휴대폰은 물론 휴대인터넷이나 위성 디지털멀티미디어방송(DMB) 단말기 플랫폼으로의 확장도 모색되는 등 발전가능성이 크다. 그러나 WIPI가 고려되지 않고 설계된 현재의 운영체제상에서 구현된 표준 플랫폼은 설계상 제한이 있으며, 미들웨어의 성격이 강하기 때문에 특정하드웨어와 운영체제에서의 WIPI 지원여부에 따라 응용 분야에 제약이 가해진다. 본 논문에서는 모바일 디바이스를 위한 연구개발을 목적으로 개발된 오픈소스기반 운영체제인 OpenOS의 커널수준에서 WIPI 표준 플랫폼의 HAL(Handset Adaptation Layer)과 WIPI-C 필수 API를 구현하여 성능의 개선과 표준 플랫폼을 위한 운영체제로의 발전 및 활용 가능성을 제시한다.

  • PDF

Performance Evaluation of Device Pairing Techniques for Establishing Secure Session Using Mobile Wallet (모바일 지갑 세션보호를 위한 디바이스 페어링 기술 성능평가)

  • Ma, Gun-Il;Lee, Hyeong-Chan;Ki, Hyun-Sik;Choi, Dae-Seon;Jin, Seung-Hun;Yi, Jeong-Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.95-100
    • /
    • 2010
  • 높은 이동성 및 휴대성을 갖는 모바일 디바이스의 기술적 발전은 사용자로 하여금 보다 높은 수준의 통합된 편의 기능 제공이 요구되고 있다. 이러한 예로 기존 물리적 지갑에 보관하던 플라스틱 신용카드, 멤버쉽 카드, 신분증 등의 개인정보를 모바일 디바이스 안에 저장 관리하는 모바일 지갑 서비스가 현실화되고 있다. 모바일 지갑을 통한 상거래 서비스를 이용할 시 디바이스에 저장된 각종 개인정보가 근거리 무선통신 기술을 통해 다른 모바일 기기나 지불서버에 전달되는 데, 이 무선전송 구간은 근원적으로 많은 보안 취약점을 갖고 있다. 따라서 본 논문에서는 모바일 지갑 응용 서비스에 모바일 기기간 안전한 키 설정 시 공개키 인증서를 활용하지 않고 두 기기간 공유키 검증을 할 수 있는 세션 키 검증 기술들을 분석하고, 해당기술들을 구현하여 모바일 지갑 결제 테스트베드에 포팅한 실험 결과를 통한 성능분석 결과를 제시한다. 본 성능평가를 통해 향후 다양한 모바일 기기 특성에 따른 최적의 세션 키 공유 키 검증 방법 선택 시 유용한 근거자료로 활용할 수 있을 것으로 기대된다.

  • PDF

Development Strategies for Business GIS Based on NGIS (NGIS 기반하의 Business GIS 발전방안)

  • Lee, Bong-Gyou;Song, Ji-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.2 s.14
    • /
    • pp.3-14
    • /
    • 2005
  • The purpose of this study is to present the role of NGIS(National Geographic Information System) and the development strategy for Business GIS in the ubiquitous society. We analyze the level of GIS technology with the ICT(Information Communication Technology) as well as GIS application trends especially in location-based circumstances. Also, we advocate not only making GIS contents to meet the international standards such as GML(Geography Markup Language) and TPEG(Transport Protocol Experts Group) but applying GIS as a killer application to oncoming diverse ICT areas including LBS(Location -Based Service), Telematics, ITS(Intelligent Transport System), gCRM(geographic Customer Relationship Management), DMB(Digital Multimedia Broadcasting), u(ubiquitous)-City and u-Town. Finally, we build a conceptual Business GIS model based on NGIS for QoS, standardization, R&D, education, and security.

  • PDF

Symmetric key based user authentication between Grid Service and Portal (그리드서비스와 포털간의 대칭키 기반 사용자 단일인증에 관한 연구)

  • Hwang, Dae-Bok;Heo, Dae-Young;Hwang, Sun-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.19-26
    • /
    • 2007
  • In recent rears. web portal system has received much attention as a user interface for the grid environment. Grid system uses symmetric key for authenticating user identity while the traditional portal system does a password-based authentication. Regarding this, many researches are progressing to integrate portal accounts with symmetric key. Specially. researches such as GAMA and PURSE are active and those focus on easy usability for users who familiar with password-based authentication. However the protection of data and resources is a critical issue in Grid environment, because those are shared through a wide-area network. In this paper, we suggest a new authentication mechanism which unify authentication mechanisms between portal system and grid service by using symmetric key. It will improve a security level in UI layer as much as in grid service.

  • PDF

A Study of Implementing Efficient Rotation for ARX Lightweight Block Cipher on Low-level Microcontrollers (저사양 마이크로 컨트롤러에서 ARX 경량 암호를 위한 효율적인 Rotation 구현 방법 연구)

  • Kim, Minwoo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.623-630
    • /
    • 2016
  • Heterogeneous IoT devices must satisfy a certain level of security for mutual connections and communications. However, a performance degradation of cryptographic algorithms in resource constrained devices is inevitable and so an optimization or efficient implementation method is necessary. In this paper, we study an efficient implementation method for rotation operations regarding registers for running ARX lightweight block ciphers. In a practical sense, we investigate the performance of modified rotation operations through experiments using real experiment devices. We show the improved performance of modified rotation operations and discover the significant difference in measured performance between simulations and real experiments, particularly for 16-bit MSP microcontrollers.

Smart Gateway VPN Tunneling Control System based on IoT (IoT 기반 스마트 게이트웨이 VPN 터널링 제어 시스템)

  • Yang, Seungeui;Kim, Changsu;Lee, Jongwon;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.575-576
    • /
    • 2017
  • Recently, research have smart gateways can provide additional services through the IoT and Big Data. However, the existing System is number of devices connected increases to the Server, the stability of the network is degraded and data security is poor. In this paper, we design a smart gateway VPN tunneling control system based on IoT to solve these problems. we propose an effective VPN tunneling technology for low-end targets such as routers, and a method for efficiently controlling traffic in real-time in an environment where the quality of the Internet line changes dramatically. It is possible to control the sensor in the home safely through the VPN at the remote place.

  • PDF

A Study on the Determinants of Consumer Trust toward Internet-Only Banks (인터넷전문은행의 신뢰 결정요인 연구)

  • Nam, Sang-Wook
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.157-162
    • /
    • 2018
  • The purpose of this study is to evaluate the level of trust by financial consumers and attempt to investigate the determinants that influence consumer trust in internet-only banks. For this aim, I conducted an empirical study and the survey results was used to test a structural equation model that analyzed the financial consumer trust and estimated the level of trust for internet-only banks. As a result of the analysis, the three most effective determinants of trust were security, convenience and benefit. Also, the level of financial consumer trust for the internet-only banks, based on the three factors, was later extended to relationship commitment such as renewal and recommendation intentions. Therefore, Internet-only banks need to focus on promoting their trust more effectively for future sustainable growth.

A Dependability Analysis of the Group Management Protocol for Intrusion Tolerance of Essential Service (필수 서비스의 침입감내를 위한 그룹관리 프로토콜의 신뢰성 분석)

  • Kim, Hyung-Jong;Lee, Tai-Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.1
    • /
    • pp.59-68
    • /
    • 2007
  • IT (Intrusion Tolerant) technology is for guaranteeing the availability of service for certain amount time against the attacks which couldn't be prevented by the currently deployed information security countermeasures. IT (Intrusion Tolerant) technology mainly makes use of the replication of service and system fur enhancing availability, and voting scheme and GMP (Croup Management Protocol) are used for the correctness of service. This paper presents a scheme to analyze dependability of IT (Intrusion Tolerant) technology through probabilistic and simulation method. Using suggested analysis scheme, we can analyze the robustness and make a sensible trade-offs in of IT (Intrusion Tolerant) technology.

  • PDF