• Title/Summary/Keyword: 엔진인증

Search Result 98, Processing Time 0.033 seconds

A Development Of Extended ERP Based Model AND System In Construction Industry (확장형ERP 건설분야 적용모델(E2CM) 및 시스템(eCOMIS)개발)

  • Lee, Min-nam;Oh, Dong-hwan;Shin, Tae-hong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.565-568
    • /
    • 2004
  • 최근 ERP에 고객관계관리(CRM), 공급망관리(SCM), 지식관리(KMS) 등의 기능을 확장한 확장형 ERP에 대한 연구개발이 활발해지고 있다. 그러나 타산업과 달리 건설산업의 특수성으로 인한 정보화의 부진으로 인해 이러한 새로운 개념을 적용할 수 있는 ERP 확장모델이 없는 상태이며, 대기업의 경우 일부 이러한 모듈을 부분적으로 적용하려는 움직임은 보이고 있으나, ERP와 별도의 이종시스템으로 관리되고 있어 통합적인 ERP운용을 통해 얻을수 있는 효과를 기대하기 어려운 실정이다. 이에 본 연구에서는 산자부에서 건설표준ERP템플릿으로 지정받은 ERP엔진을 모체로 협력업체와의 인터페이스 제공을 위한 협업적IT시스템과 전자계약시스템, 그리고 변화되는 ISO에 대한 기업의 대처능력 향상을 위한 ISO인증관리시스템, 고객과의 관계관리를 위한 고객관계관리시스템, 절차서와 같은 기업 내의 표준화 된 문서를 관리하기 위한 전자매뉴얼관리시스템, 결재관리를 위한 그룹웨어, 기업 내의 지식저장소 관리를 위한 지식관리시스템을 연구범위로 하여 건설분야 확장형ERP 모델(E2CM)을 개발하였으며, 이를 검증을 위한 시스템(eCOMIS)을 개발하였다.

  • PDF

An Implementation and Performance Evaluation of IPsec System engaged IKEv2 Protocol Engine (IPsec System에서 IKEv2 프로토콜 엔진의 구현 및 성능 평가)

  • Kim, Sung-Chan;Chun, Jun-Ho;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.35-46
    • /
    • 2006
  • The current Internet Key Exchange protocol(IKE) which has been used for key exchange of security system was pointed out the faults of scalability, speed, efficiency and stability. In this research, we tried to resolve those faults, and implemented the newly designed IKEv2 protocol in the IPsec test bed system. In the trend of network expansion, the current Internet Key Exchange protocol has a limitation of network scalability, so we implemented the new Internet Key Exchange protocol as a recommendation of RFC proposal, so as to resolve the fault of the key exchange complexity and the speed of authentication process. We improved the key exchange speed as a result of simplification of complex key exchange phase, and increased efficiency with using the preexistence state value in negotiation phase.

Current research trends in HACCP principles (HACCP의 연구동향)

  • Hwang, Tae-Young;Lee, Sun-Yong;Yoo, Jae-Weon;Kim, Dong-Ju;Lee, Je-Myung;Go, Ji-Hun;Kim, Myung-Ho
    • Food Science and Industry
    • /
    • v.54 no.2
    • /
    • pp.93-101
    • /
    • 2021
  • Hazard Analysis Critical Control Point (HACCP) systems were developed to ensure a high level of food safety and reduced risk of foodborne illness. This paper focuses on significant issues associated with the implementation of HACCP; it provides an overview on recent literature. The structure of the paper follows six groupings of issues in the international literature of HACCP: (1) comparative studies and unification plan between HACCP and other food safety regulations; (2) verification of the HACCP system's effectiveness in improving food safety; (3) establishment of critical control point (CCP) for various foods HACCP model development; (4) expansion of HACCP application in the various fields and small businesses;(5) the impacts of HACCP on consumer's preferences and firms' financial performance in food industry; (6) HACCP and technological changes. The paper concludes with some suggestions for the future research in order to promote safe food supply chain for global customers.

An Implementation and Evaluation of Improved Anti-DoS IKE Protocol Engine for Interaction with IPsec System (IPsec과 연동되는 개선된 Anti-DoS IKE 프로토콜 엔진의 구현 및 평가)

  • Kim, Sung-Chan;Choun, Jun-Ho;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11B
    • /
    • pp.1005-1016
    • /
    • 2006
  • As the increment usage of Internet, the security systems's importance is emphasized. The current Internet Key Exchange protocol(IKE) which has been used for key exchange of security system, was pointed out a problem of efficiency and stability. In this research, we try to resolve those problems, and evaluate the newly designed Key Exchange protocol in the IPsec interaction test bed system environment. In this research we implemented the new Key Exchange Protocol as a recommendation of RFC proposal, so as to resolve the problem which was pointed out the key exchange complexity and the speed of authentication process. We also designed the defense mechanism against the Denial of Service attack. We improved the key exchange speed as a result of simplification of complex key exchange phase, and increased efficiency as a result of reuse the preexistence state value when it's renegotiated.

A Study on the Risk-based Model for Validation of Civil Aircraft (민간항공기 형식증명승인을 위한 위험기반 모델 개발 동향)

  • Baek, Unryul;Lee, Eunhee;Kim, Jinhee;Lee, Kyungchul
    • Journal of Aerospace System Engineering
    • /
    • v.12 no.4
    • /
    • pp.1-8
    • /
    • 2018
  • The state of registry issues a type certificate validation (TCV) based on the satisfactory evidence that the product (aircraft, engine, and propeller) is in compliance with the appropriate airworthiness requirements. The Korean government performs an evaluation to determine whether the product complies with Korean airworthiness standards for issuing TCV according to the Korean aviation safety law. Recently, the Validation Principles Working Group (VPWG) has developed a risk-based model for validation of civil aeronautical products. Also, VPWG proposed to incorporate this validation model into the corresponding ICAO Standards and Recommended Practices and guidance material. In this paper, we have reviewed the validation model and discussed improvements in the validation process.

A Study on the Chattering under Cryogenic Flow Test of a Oxidizer Shutoff Valve (산화제 개폐밸브의 극저온 유동시험에서 채터링의 고찰)

  • Lee, JoongYoup;Han, SangYeop;Lee, SooYong
    • Aerospace Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.108-117
    • /
    • 2013
  • The oxidizer shutoff valve of a gas generator controls the mass flow rate of the propellant of a rocket engine using pilot pressure and spring the force of the valve. The developing oxidizer shutoff valve can be shut off if the pilot pressure is removed from the actuator. Therefore, force balancing is necessary to analyze the characteristics of the forces with respect to the opening and closing of the valve in order to evaluate its performance. In light of this, the valve has been designed to adjust the control pressure required to open the poppet and to determine the working fluid pressure at which the valve starts to close. Under cryogenic flow test as a tests level of C.R.T(Control Random Test), the chattering phenomena occurred due to much leakage of a metal seat section. The pressure for chattering of the oxidizer valve is predicted at about 11 bar using force balancing analysis.

Development of Communication Module for a Mobile Integrated SNS Gateway (모바일 통합 SNS 게이트웨이 통신 모듈 개발)

  • Lee, Shinho;Kwon, Dongwoo;Kim, Hyeonwoo;Ju, Hongtaek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.2
    • /
    • pp.75-85
    • /
    • 2014
  • Recently, mobile SNS traffic has increased tremendously due to the deployment of smart devices such as smart phones and smart tablets. In this paper, mobile integrated SNS gateway is proposed to cope with massive SNS traffic. Most of mobile SNS applications update the information with individual connection to the corresponding servers. The proposed gateway integrates these applications. It is for reducing SNS traffic caused by continuous data request and improving the mobile communication performance. The key elements of the mobile integrated SNS gateway are the synchronization, cache and integrated certification. The proposed protocol and gateway system have implemented on the testbed which deployed on the real network to evaluate the performance of the proposed gateway. Finally, we present the caching performance of gateway system implementation.

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF

An Extended SNMP Scheme for a Digital Convergence Device with Control Functions (제어 기능을 갖는 디지털 컨버전스 장비를 위한 SNMP 확장에 관한 연구)

  • Heo, Gil;Kim, Eun-Hoe;Choi, Jae-Young
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.369-380
    • /
    • 2009
  • SNMP (Simple Network Management Protocol) is a standard protocol for management of network devices, and it provides excellent features such as scalability, information management, authentication, encryption, and access control. However, SNMP has a structural weakness to fully support control functions for integrated management of digital convergence devices, and it has a limitation of message length in SNMP communication. In this paper, we present an extended SNMP scheme for integrated management of digital convergence devices with control functions. We modified the SNMP architecture by adding DDS (Device Driver Subsystem) to SNMP engine for controlling different devices and by defining CADM (Control Agent Driver Model), therefore we solved the ambiguity problem between 'set' and 'control' of SNMP. And the extended SNMP made it easy for SNMP applications to use various control functions. The extended SNMP can transport massive high-level information by adding three new SNMP commands which eliminate the limit of message length.

Design and Implementation of the Semi-automated Evaluation Workflow Management System(Sa-EWMS) (반자동화 평가워크플로우 관리 시스템 설계 및 구현)

  • Kang Yeon-hee;Kim Jung-dae;Lee Gang-soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.39-50
    • /
    • 2005
  • An evaluation demand and a market growth regarding evaluation and certification are increasing because the importance of information Security is gradually rising to solve the information disfunction. Therefore, it is necessary the cost-effect evaluation management of the Information Security System(ISS). In this paper, we propose the Semi-automated Evaluation Workflow Management System(Sa-EWMS) based on the Common Criteria(CC) which performs and manages evaluation work through the procedure when evaluator evaluates the Information Security System(ISS). The Sa-EWMS is solving a problem of consumption of time and effort and performing efficient evaluation, it is playing a significant role that traces workflow process of each work of the Engines and controls performance. It will be able to use useful the private evaluation enterprise which confront in an evaluation demand and a market growth.