• Title/Summary/Keyword: 요구사항 분류체계

Search Result 94, Processing Time 0.023 seconds

XML Schema를 이용한 스키마 통합시 충돌 문제의 분류

  • 이승원;권석훈;김미혜;이경하;이규철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.31-33
    • /
    • 2001
  • 컴퓨터 시스템의 발달과 WWW(World Wide Web) 기술의 보편화는 수많은 정보 시스템의 출현과 다양한 정보 서비스로 인한 거대한 인터넷 정보 자원을 구축하게 되었고 이로 인하여 분산되어 있는 다양한 형태의 정보 자원들에 대한 통합의 요구가 발생하게 되었다. 이러한 요구사항의 해결방안으로 DTD 를 데이터의 스키마 정보로 활용한 데이터 통합에 대한 연구가 진행되어 왔었으나 DTD 자체가 가지고 있는 단점들로 인해 많은 문세점들이 지적되어 왔다. 이를 해결하기 위해 W3C 에서 새로운 스키마 정의 정어로 XML Schema를 표준화하였고, XML Sxhema는 DTD에 비해 방대해진 데이터 타입 부분을 고려할 때 장점 못지않은 해결해야 할 많은 충돌 문제들이 존재한다. 이에 따라 XML Schema를 이용해서 스키마 통합을 했을 때 발생할 수 있는 충돌 문제들에 대해 체계적인 분류를 통해 향후 XML Schema를 이용한 스키마 통합 연구에 있어 기반을 제시한다.

  • PDF

A Study of Quality Metrics Process Design Methodology for Field Application Encryption under Network Security Environment (네트워크 보안 환경에서의 현장적용 중심 암호품질 만족도 평가 메트릭스 설계 프로세스)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.29-35
    • /
    • 2015
  • The network security encryption type is divided into two, one is point-to-point, second method is link type. The level of security quality attributes are a system security quality requirements in a networked environment. Quality attributes can be observed and should be able to be measured. If the quality requirements can be presented as exact figures, quality requirements are defined specifically setting quality objectives. Functional requirements in the quality attribute is a requirement for a service function which can be obtained through the encryption. Non-functional requirements are requirements of the service quality that can be obtained through the encryption. Encryption quality evaluation system proposed in this study is to derive functional requirements and non-functional requirements 2 groups. Of the calculating measure of the evaluation index in the same category, the associated indication of the quality measure of each surface should be created. The quality matrix uses 2-factor analysis of the evaluation for the associated surface quality measurements. The quality requirements are calculated based on two different functional requirements and non-functional requirements. The results are calculated by analyzing the trend of the average value assessment. When used this way, it is possible to configure the network security encryption based on quality management.

A Study on the Information Service of the Science Digital Library for Youth (청소년 과학분야 디지털도서관의 정보서비스에 관한 연구)

  • Kwak Seung-Jin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.38 no.4
    • /
    • pp.67-83
    • /
    • 2004
  • The purpose of this study is to analyze the information service and the design of the information system of LG Science Land and NSDL which was designed as Integrated Information System in Science Digital Library for youth. After that, the requirement and inclination of the system user was analyzed through on-line questionnaire and finally the Subjective-Oriented Directory System was modified in detail as improvement issue of the system. This study has a significance in designing a user-friendly information environment that the youth can access information in science more conveniently and Proving the efficiency of it.

A Database Design for Remote Maintenance of Navigation and Communication Equipments in a Vessel (선박 항해통신장비 원격유지보수를 위한 데이터베이스 설계)

  • Kim, Ju-young;Ok, Kyeong-suk;Kim, Ju-won;Cho, Ik-soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2052-2060
    • /
    • 2017
  • The SOLAS ship should carry at least 83 different types of equipment based on the SFI group codes and each of which consists of several to dozens of components. During ship operation, it is necessary to ensure the normal operation of such equipment, and remote maintenance is highly demanded for immediate repair in the event of a equipment fault. This study proposes to find suitable classification system and to derive database structure for remote maintenance of navigation and communication equipment. As a result of this study, the classification system of equipment should be layered into equipment type, model, and component, and main table in the database consists of FMEA, service history, case data through Q&A, Preventive Maintenance. A database was constructed for 140 navigation and communication equipment models and 750 components. In order to evaluate the practical effects, service engineer evaluated the usefulness using the cloud app.

A Study on the Accessibility Requirements Analysis Model for the Preventive Safety and Disaster Service Information System - Focusing on the Communication Ability (정보시스템을 통한 생활안전 위험의 예방·대응을 위한 안전약자 요구사항 분석모델 연구 : 의사소통기능을 중심으로)

  • Lee, Yong-Jick;Ji, Seok-yeon;Kim, Sang-hwa
    • The Journal of Korean society of community based occupational therapy
    • /
    • v.10 no.3
    • /
    • pp.1-13
    • /
    • 2020
  • Objective : The purpose of this study is to present an analysis model in developing an inclusive response for safety hazards and disaster preventive information system for vulnerable people to the disaster including persons with disabilities, and those with specific needs. Methods : In this study, the persona analysis method is used to analyze fictitious characters that correspond to various characteristics such as age, disability, environment, occupation, etc. in terms of the scenario of some particular disaster subjects. Based on the user's communication problems derived from the persona analysis, focused group interview and ICF based analysis were implemented to identify needs and arbitration methods. Results : The needs from persona analysis and ICF-based communication items analysis identifies the factors that make each fictitious character difficult in terms of communication in obtaining the benefits consistent with the purpose of the service. The study derives service requirements that can provide arbitration or facilitation methods to increase communication ability of the users. Conclusion : Through the persona analysis method, difficulties that could occur when receiving disaster information using communication devices were identified and analyzed in conjunction with communication problems described in the ICF. In building information services for the prevention of safety hazards and disasters, this study presented a model that uses the persona analysis method and the ICF classification system to derive user requirements for accessible information system.

A Study on the Standard of ESS Requirement based on MIL-HDBK-344A (MIL-HDBK-344A 기반의 ESS 요구사항 표준안 연구)

  • Kim, Byung-Jun;Kim, Jin-Sung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.2
    • /
    • pp.335-342
    • /
    • 2020
  • ESS(Environmental Stress Screening) is an important production process to remove 'latent defects' introduced in the production of products. Recently, ESS is included in QAR(Quality Assurance Report) as an essential quality assurance requirement for products in the defense business. However, depending on the author of the QAR or the classification of the weapon system, it is often identified that the content and form are different or important elements are omitted. Therefore, this paper proposes a MIL-HDBK-344A based quantitative ESS requirement standard to secure the consistency and completeness of QAR. and to make easier to calculate PE(Precipitation Efficiency), which is an indicator for identifying the latent defects elimination effect.

A Study of Cloud Computing Security on User's View (사용자 관점의 클라우드 컴퓨팅 보안 연구)

  • Hwang, Sue-Yeon;Nam, Bo-won;Park, Min-Woo;Lee, Jun-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1233-1236
    • /
    • 2010
  • 클라우드 컴퓨팅 시스템은 방대한 정보와 자료를 가진 컴퓨팅 시스템으로 해커의 공격 대상이 되기쉽다. 또한 복잡한 구조를 가지기 때문에 취약점이 발생하기 쉬워 체계적인 보안 분석이 필요하다. 현재 클라우드 컴퓨팅 보안 요구사항 분석이나 권고 사항 연구를 위해 많은 국제 협의기구가 활발히 활동 중이다. 하지만 협의기구들의 연구 활동은 서비스 유형에 따라 사업자 기준에서 보안 분석이 이루어지고 있다. 클라우드 컴퓨팅 서비스가 보다 활발히 발달하기 위해서는 클라우드 컴퓨팅 서비스를 이용하는 사용자들을 세분화하고 그들에 맞는 보안 서비스가 제공되어야 한다. 본 논문에서는 기존의 보안 분석들과 다르게 사용자 기준에서 분석한 클라우드 컴퓨팅 서비스의 보안 분류를 제시한다.

A Threats Statement Generation Method for Security Environment of Protection Profile (PP의 보안환경을 위한 위협문장 생성방법)

  • 고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.69-86
    • /
    • 2003
  • A Protection Profile(PP) is a common security and assurance requirements for a specific class of Information Technology security products such as firewall and smart card. A PP should be included "TOE(Target of Evaluation) Security Environment", which is consisted of subsections: assumptions, treat, organizational security policies. This paper presents a new threats statement generation method for developing TOE security environment section of PP. Our survey guides the statement of threats in CC(Common Criteria) scheme through collected and analysed hundred of threat statements from certified and published real PPs and CC Tool Box/PKB that is included a class of pre-defined threat and attack statements. From the result of the survey, we present a new asset classification method and propose a threats statement generation model. The former is a new asset classification method, and the later is a production rule for a well formed statement of threats.

  • PDF

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Usability Quality Evaluation Criteria of e-Learning Software Applying the ISO Quality Evaluation System (ISO 품질평가 체계를 적용한 이러닝 소프트웨어의 사용성 품질평가 기준)

  • Lee, Ha-Yong
    • Journal of Digital Convergence
    • /
    • v.16 no.5
    • /
    • pp.239-245
    • /
    • 2018
  • So far, various researches have been conducted on evaluation of e-learning software, but subjective evaluation criteria are formed according to the classification presented from the viewpoint of the researcher rather than systematized form according to related standards. In addition, standards for software evaluation are continuously being supplemented for practical use, so it is urgent to establish evaluation bases by establishing evaluation criteria. Therefore, in order to establish the quality evaluation standard of e-learning software, this study analyzes the quality requirements of e-learning software based on the usability system among the quality characteristics of ISO/IEC 25000 series. This evaluation standard is distinguished by the fact that the evaluation standard of e-learning software that reflects the latest trend of related standardization has been established and practical utilization has been improved. It can be used effectively for quality evaluation and certification of e-learning software in the future.