• Title/Summary/Keyword: 서비스 인증

Search Result 2,199, Processing Time 0.043 seconds

Content Regulation: Meeting the Regulatory Challenge in the Age of Media Convergence (미디어 융합시대 콘텐츠 규제방안과 과제 - 심의제도를 중심으로 -)

  • Ahn, Jung-Mihn
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.155-184
    • /
    • 2013
  • This study takes a critical perspective that current vertical regulatory framework for broadcasting, telecommunications, films and games cannot cope with media development in the age of convergence. Changes in media environment mitigate the uniqueness of terrestrial television causing doubts as to why television contents should be treated more strictly than the rest of media contents. Consensus is being reached that horizontal regulation would be the appropriate regulatory measure for media contents. However, which content should be aligned to what level of regulations have not been fully dealt with. The paper shows that the current regulatory framework which is established according to each delivery platform is no longer valid in convergent media environment. It shows why all content regulation should be applied in platform neutral manner. Then it also suggests both short and long term regulatory changes that need to be made in order to meet the future challenges in media convergence era.

Classification of Growth Stages of Business Entities and Management Component Analysis in Forestry Convergence Industry (산림융복합산업 경영체의 성장단계 구분 및 경영요소 분석 연구)

  • Lee, Bohwi;Park, Chang Won;Joung, Dawou;Lee, Chagjun;Lee, Sang-Jin;Kim, Tae-Im;Park, Bum-Jin;Koo, Seungmo;Kim, Sebin
    • Journal of Korean Society of Forest Science
    • /
    • v.108 no.3
    • /
    • pp.429-439
    • /
    • 2019
  • The objectives of this study were to gauge the extent of the forestry business through establishing the definition of forestry industry from the perspective of economic convergence and to analyze key components that affect each growth phase of a forestry business entity by classifying them. A total of 1,397 "sixth-sector industry" management entities were certified by the Ministry of Agriculture, Food, and Rural Affairs in South Korea from 2012-2017. Of these, 259 (18.5%) were in the forestry sector. In this study, the 259 forestry management entities were further classified into three phases based on sales distribution: entrance, development, and maturity. The entrance phase (<100 million KRW), development phase (>100 million and <1 billion KRW), and maturity phase (>1 billion KRW) constituted 33.2%, 55.4%, and 12.4% of the total 259 entities, respectively. The results showed that most of the management entities were either in the entrance or development phases, and only a small portion was in the maturity phase. To identify the key variables that affect each of the phases, chi-square analysis was used. We designed the "sixth-sector industry" type as an independent variable, whereas selected region, business organization, manager age group, forest product, processing type, and service type were designated as dependent variables. The results of the analysis showed that the processing and service types influenced all three developmental phases. Moreover, as the phase advanced, processing type showed a higher proportion of health-functional ingredients, such as powder or extract from forest products, which enable to develop and produce a variety of products. Service type also changed from simple experience to integrated experience tourism and finally to tourism education. Distribution and sales channel also turned out to be a significant factor during the development phase. This study provides the basic information needed to guide government support in the implementation of a formal forestry business through convergence as well as to increase the efficiency of business management.

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

Factors affecting the Continuance Usage Intention of Biometric Technology : Comparing Dark Scenario with Bright Scenario (생체인식기술의 지속사용의도에 영향을 미치는 요인에 관한 연구 : 다크 시나리오와 브라이트 시나리오의 비교)

  • Lee, Byung-Yong;Kim, Min-Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.3
    • /
    • pp.1-22
    • /
    • 2011
  • The purpose of this study is to verify the relationship between expectancy confirmation and continuance usage intention in biometric technology. We extend the continuance usage intention model, TAM and expectation confirmation theory by adding perceived privacy, perceived security and trust. Results was analyzed by using structural equations model. The results show that satisfaction and perceived usefulness have positive effect on continuance usage intention in the bright scenario. Perceived privacy and perceived security are positive factors on perceived usefulness, and perceived privacy is positive effect on perceived security. On the other hand, the respondents who are exposed to the dark scenario have negative effects on the perceived privacy, perceived security and trust. And finally, trust has no significant effect on the perceived usefulness.

Design of a Real-Time Certificate Status Validation Mechanism Using Identity Information Hash Value of Signer (서명자의 신원정보 해쉬값을 이용한 실시간 인증서 상태 검증 메커니즘의 설계)

  • Kim Hyun-Chul;Kim Jung-Jae;Lee Jong-Hee;Oh Hae-Seok;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.147-154
    • /
    • 2006
  • The certificate status validation mechanism is a critical component of a public key infrastructure based on certificate system. The most generally mechanisms used these days are the use of the certificate revocation list and the real-time certificate status protocol. But the certificate revocation list can not give the real-time certificate status because the certificate is being delivered periodically, and the real-time certificate status protocol method will generate a concentrated load to the server because the protocol in the central server will be accessed whenever a certification is necessary. It will also take a long time to validate the certificate because each trade has to send mass information through the network. This paper will present that real-time validation is guaranteed as the real-time certificate status protocol method and the traffic congestion in the network Is reduced in a way that the certification would be requested using the user information hash value and would be validated using the user information kept in the certification authorities and the service providers. Based on the this study, we suggest a real-time certificate status validation mechanism which can reduce the certificate status validation time using the signed user information hash value. And we confirm speed of certificate status verification faster than existing CRL(Certificate Revocation List) and OCSP(Online Certificate Status Protocol) method by test.

Security Analysis and Implementation of Fast Inter-LMA domain Handover Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 LMA도메인 간 핸드오버 기법의 보안성 분석 및 구현)

  • Chai, Hyun-Suk;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.99-118
    • /
    • 2012
  • In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. The one of the protocols, Fast Handovers for Proxy Mobile IPv6(FPMIPv6)[1] has studied by the Internet Engineering Task Force(IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6(FMIPv6) in Proxy Mobile IPv6(PMIPv6), it reduces the packet loss. Conventional scheme has proposed that it cooperated with an Authentication, Authorization and Accounting(AAA) infrastructure for authentication of a mobile node in PMIPv6, Despite the best efficiency, without begin secured of signaling messages, PMIPv6 is vulnerable to various security threats such as the DoS or redirect attAcks and it can not support global mobility between PMIPv. In this paper, we analyze Kang-Park & ESS-FH scheme, and then propose an Enhanced Security scheme for FPMIPv6(ESS-FP). Based on the CGA method and the pubilc key Cryptography, ESS-FP provides the strong key exchange and the key independence in addition to improving the weaknesses for FPMIPv6. The proposed scheme is formally verified based on Ban-logic, and its handover latency is analyzed and compared with that of Kang-Park scheme[3] & ESS-FH and this paper propose inter-domain fast handover sheme for PMIPv6 using proxy-based FMIPv6(FPMIPv6).

Efficiency Analysis of Total Logistics Provider (종합물류기업의 경쟁력 분석)

  • Park, Hong-Gyun
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.2
    • /
    • pp.261-273
    • /
    • 2011
  • Mega-corporations are emerging as a result of M&As (mergers and acquisitions) in the logistics industry. The global logistics market has progressed in a continuously competitive manner. Global logistics corporations provide integrated set of services, from production to disposal in order to manage the process efficiently throughout the diverse regions of the world. To advance into an total integrated logistics provider, the corporation must have professional knowledge in logistics and information technology which are necessary to deliver effective integrated logistics solutions. The government has integrated the logistics corporations both horizontally and vertically with the aim to foster logistics corporations possessing global competitiveness. Six years have passed since the implementation of the comprehensive (total) logistics industry certification system in pursuit of making Korea the hub for the Northeast Asian logistics market. This study compares and analyzes the efficiency of nine mega integrated logistics providers by applying the CCR model and BCC model. Each of the nine corporations is subject to certification as integrated logistics corporations. In Korea, nine corporations are certified individually as integrated logistics corporations out of the 31 logistics providers. The analysis showed that the Glovis was the most efficient integrated logistics provider reaching 100% in efficiency and displayed the highest efficiency for six consecutive years from 2005 to 2010. The study also found that the Glovis will be able to maintain 100% in efficiency rate, even though the input are increased over six times as many as those of 2010.

A Comparative Study for Product Carbon Footprint of Detergent, Heat Insulating Material, Vacuum Cleaner (Korea, UK and Japan) (한국, 영국, 일본 제품 탄소발자국 기준에 따른 세제, 단열재, 진공청소기 산정 결과 비교 평가)

  • Ju, Hong-Shin;Yeon, Seong-Mo;Shin, Yoo-Jin;Kim, Burmshik;Lim, Noh-Hyun;Jeong, Heon-Chang;Hong, Eung-Pyo
    • Clean Technology
    • /
    • v.18 no.4
    • /
    • pp.440-445
    • /
    • 2012
  • 15 carbon footprint product (CFP) schemes, including Korea Carbon Footprint Label, UK Carbon Trust's Carbon Reduction Label and Japan CFP are implemented in the world. A CFP describes green house gases (GHGs) emissions emitted throughout product's life cycle and is intended to reduce GHGs emissions by labeling a CFP result on product. This study calculates Korea, UK and Japan CFP result of vacuum cleaner, detergent, packagin material in order to analyze the Korea, UK and Japan CFP standards. Our results demonstrate significant differences among then calculated results because of criteria, emission factors, etc. Therefore, there are many difficulties in providing various CFP results and the international standard and guidelines for product category are needed.

A Study on the Performance Improvement of the Security Transmission Using the SSFNet (SSFNet을 이용한 보안전송 성능개선에 관한 연구)

  • Ryu, Jung-Eun;Ryu, Dong-Ju;Lee, Taek-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.811-815
    • /
    • 2005
  • IPSec(Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. IPSec is providing authentication, integrity and confidentiality security services. The specifications for Internet Key Exchange(IKEv1) were released to the world. Some criticisms of IKEv1 were that it was too complex and endeavored to define too much functionality in one place. Multiple options for multiple scenarios were built into the specification. The problem is that some of the included scenarios are rarely if ever encountered. For IPsec to work, the sending and receiving devices must chare a Public Key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates. This thesis is a study on the performance improvement of the security transmission using the SSFNet(Scalable Simulation Framework Network Models)

  • PDF

A Study on the Practice Model for Practical Education for Health and Medical Information Management (보건의료정보관리 실습교육을 위한 실습모델 연구)

  • Choi, Joon-Young
    • Journal of the Health Care and Life Science
    • /
    • v.8 no.2
    • /
    • pp.83-93
    • /
    • 2020
  • In this study, a practical model for health information management education using the EMR education system at universities for nurturing health care information managers was studied. Currently, there is no practical training course for health care information management in the standards for evaluation and certification of health care information management education introduced to strengthen the job competency of health care information managers. Accordingly, the program was constructed so that the practice program suggested as an educational environment in the Health and Medical Information Management Education Evaluation and Certification Manual can be practiced in the EMR education system. In addition, a practical model that can be performed according to the on-site practice guidelines for health and medical information management for each program was studied. Using the health care information management education EMR system, master data management, patient registration, doctor prescription, medical cost calculation, health insurance claim management, form management, discharge registration, cancer registration, unrecorded management, health care data management, health care statistics, A practice model was studied so that practice on information protection/security management can be performed. It will be possible to play a role as a health care information management expert by raising the quality level of health care information management education through systematic and standardized health care information management practice courses at universities. Accordingly, it is necessary to cultivate health care information management experts who develop and manage medical services based on medical data analysis through practical training of health care information managers.