• Title/Summary/Keyword: 융합인증

Search Result 602, Processing Time 0.024 seconds

A Study on Developing Quality Control of Security Screening for Deterrence from Acts of Unlawful Interference - Focused on the Factors of Incheon International Airport (불법방해행위의 억지를 위한 보안검색 수준향상 방안 연구 - 인천국제공항 요인 분석)

  • Im, Sang-Hun;No, Yeong-Dong
    • 한국항공운항학회:학술대회논문집
    • /
    • 2016.05a
    • /
    • pp.245-248
    • /
    • 2016
  • 현대의 항공테러는 단순한 항공기 납치뿐만 아니라 항공기의 공중 폭파, 항공기에 대한 미사일 공격, 공항과 승객에 대한 공격, 그리고 항공 외부 시설에 대한 공격 등 실로 다양한 형태로 자행되고 있다. 항공 교통에서의 불법 방해행위를 사전에 방지하기 위해서는 출발지의 보안 검색이 무엇보다도 중요하며, 이를 위해서 사전 예방적 선제적 항공보안관리 체계 전환, 출입부터 탑승까지 전 과정을 프로세스화한 점검활동 강화, 국제권고기준 항공보안장비 보유와 첨단화 등 미래 변화에 대한 능동적 대처뿐만 아니라 정확한 보안검색과 고객편의의 융합을 통해 세계 최고 공항으로 지향하며, 행동탐지기법의 도입을 통해 일상적이고 포괄적인 보안검색 운영의 약점을 보완하여 항공보안 강화의 토대를 마련해야 하고, 불법 방해행위의 억지를 위해 2015년부터 새롭게 실시하는 국제민간항공기구 상시 모니터링 제도의 항공보안 평가(USAP-CMA) 방식을 적극 검토하여 국정원 공항공사 항공사 등 관련기관 정보 공유, 지속적인 모니터링 및 국내 국제민간항공기구(ICAO) 인증 항공 보안평가관 등과 철저히 대비한 세부 대응 계획을 수립하고 항공보안 전문가 육성을 강구하여야 한다.

  • PDF

Multi-modal Biometrics System Based on Face and Signature by SVM Decision Rule (SVM 결정법칙에 의한 얼굴 및 서명기반 다중생체인식 시스템)

  • Min Jun-Oh;Lee Dae-Jong;Chun Myung-Geun
    • The KIPS Transactions:PartB
    • /
    • v.11B no.7 s.96
    • /
    • pp.885-892
    • /
    • 2004
  • In this paper, we propose a multi-modal biometrics system based on face and signature recognition system. Here, the face recognition system is designed by fuzzy LDA, and the signature recognition system is implemented with the LDA and segment matching methods. To effectively aggregate two systems, we obtain statistical distribution models based on matching values for genuine and impostor, respectively. And then, the final verification is Performed by the support vector machine. From the various experiments, we find that the proposed method shows high recognition rates comparing with the conventional methods.

The Evaluation on EU′s Info-Communication Regulatory Policy in Preparation for Media Convergence (미디어 융합에 대응한 EU의 통신규제정책에 대한 평가)

  • Kim Pang-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11B
    • /
    • pp.1001-1011
    • /
    • 2004
  • The structure of info-communications industry has been changing from vertical integration to horizontal layered disintegration as the Internet technology has been rapidly developed. Considering with this background, EU has decided to introduce new regulatory framework called 2003 framework and asked member states to shift to new framework by July 2003. The key words of the new framework is to be denoted by the following three characteristics: Introduction of cross-media regulatory framework Alleviation of entry regulation by general authorization, Transition from ex ante regulation to ex post regulation.

Quantum cryptography-used Key Distribution Model Design of U-healthcare environment (양자 암호를 이용한 유헬스케어 환경의 키 분배 모델 설계)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.389-395
    • /
    • 2013
  • As fusing IT and medical technique, the number of patients who adhere medical equipment inside of them is increasing. However there is a problem of for the third person to tap or modulate the patient's biometric data viciously. This paper suggests quantum encryption-based key distribution model to share key for the third person not to tap or modulate the patient's biometric data between patient and hospital staff. The proposed model uses one-time pad key that shares key sending random bits not direct sending message of quantum data. Also, it guarantees patient's anonymity because the biometric data of injected-device in the body doesn't be exposed unnecessarily.

Security and Privacy Protection of Vehicle-To-Grid Technology for Electric Vehicle in Smart Grid Environment (스마트 그리드환경에서 전기자동차 양방향 충전기술의 보안과 개인정보 보호에 관한 연구)

  • Lee, Sunguk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.441-448
    • /
    • 2020
  • With help of Vehicle-to-Grid(V2G) technology battery in electric vehicle can be used as distributed energy resource and energy storage in a smart grid environment. Several problems of security vulnerability and privacy preservation can be occurred because V2G network supports 2 way communication among all components. This paper explains and makes analysis of architecture, privacy sensitive data, security vulnerability and security requirement of V2G system. Furthermore efficient architecture and operating scheme for V2G system are proposed. This scheme uses symmetric cryptosystem and hash algorithm to support privacy preservation and mutual authentication.

A Secure Authentication Protocol of Nodes between Cluster based on ECC (ECC 기반의 클러스터간 노드들의 안전한 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.167-175
    • /
    • 2008
  • The current pre-distribution of secret keys uses a-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among nodes and it is not efficient to find public-key because of the problem for time and energy consumption. We presents key establishment scheme designed to satisfy authentication and confidentiality, without the need of a key distribution center. Proposed scheme is scalable since every node only needs to hold a small number of keys independent of the network size, and it is resilient against node capture and replication due to the fact that keys are localized. In simulation result, we estimate process time of parameter used in proposed scheme and efficiency of Proposed scheme even if increase ECC key length.

  • PDF

A Structural Analysis of the Factors Affecting Productivity Performance: Based on SME of Manufacturing Certified the PMS (중소기업의 생산성 성과 요인에 관한 구조적 분석: 생산성경영시스템(PMS) 인증 제조업을 중심으로)

  • Seo, Chang Soo;An, Oak Hyeon
    • Journal of Korean Society for Quality Management
    • /
    • v.47 no.2
    • /
    • pp.295-314
    • /
    • 2019
  • Purpose: This study aims to investigate the factors affecting productivity performance for Korean SMEs of manufacturing which had obtained the certification of Productivity Management System(PMS) that is a Korean assessment program for enhancing maturity of company's management systems. Methods: The proposed model is based on the PMS model. The valid 759 data registered from 2010 to 2018 year was analyzed using SEM analysis for testing hypotheses. Results: The results are as follows. First, Leadership affects the five core sub-system processes positively, but doesn't a significant Business Performance directly. Secondly, HRM, Customer & Market Analysis, and Process Management excluding Productivity Development and Measurement Analysis and Knowledge Management have a significant effect on Business Performance. Lastly, when examining the mediation effect, Process Development, Customer & Market Analysis, and HRM have indirectly effect between Leadership and Business Performance. Conclusion: This study results suggest not only the role of leadership to improve productivity performance of SME, but also which core processes are focused and differentiated.

Factor Analysis for Activation of Certification industry (GS인증산업 활성화를 위한 요인분석)

  • Kim, Shin-Pyo;Lee, Soon-Bae;Lee, Gil-Min;Kim, Jong-Sik
    • Journal of Industrial Convergence
    • /
    • v.13 no.2
    • /
    • pp.1-9
    • /
    • 2015
  • This Study aims to present the guidelines for the activation of the domestic GS certification market through the assessment of the characteristics of the demands of the domestic SW companies pursuing to acquire GS certification. As the results of the factor analysis of the guidelines for the activation of the domestic GS certification market, (1) strictness of the certification standards, (2) level of satisfaction on the certification services and (3) certification effects were deduced as the specific variables. This study is highly significant in that the fact that the certification market is more effectively activated when the 3 factors, namely, strictness of the certification standards, level of satisfaction on the certification services and certification effects, have been intensively reinforced although there exist countless number of specific variables including certification system, certification cost, certification expertise and certification marketing, etc. in order to activate GS certification market has been statistically verified.

  • PDF

The Reliable Communication Method for Self-Sovereign Identity Ecosystems (자기주권 신원 생태계를 위한 신뢰할 수 있는 통신 방법)

  • Chio, Gyu Hyun;Kim, Geun-Hyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2022
  • With the recent increase in interest in metaverse in which virtual and physical spaces are digitally fused, many activities in physical spaces are expected to take place in web-based virtual spaces. Therefore, there is a need for research on a self-sovereign identity system that can secure privacy and mutual trust in a DID(decentralized identifier)-based virtual space environment. We, in this paper, developed and validated a reliable communication method consisting of DIDComm messages, a procedure for generating distributed identifiers, asymmetric keys, and DID documents based on Hyperledger Indy and DIDComm open sources. The developed communication method can be applied to verify each other by exchanging additional information and verifiable credentials for trust among communication participants.

Antibacterial Effects of Major Compounds in Essential Oil against Fish Disease Bacteria (식물 정유 주요 성분의 어병 세균에 대한 항균활성)

  • Kyoung-In, Lee;Geun-Jik, Lee;Young-Seung, Yoon;Byoung Sik, Pyo
    • Journal of Marine Bioscience and Biotechnology
    • /
    • v.14 no.2
    • /
    • pp.86-92
    • /
    • 2022
  • In this study, the antibacterial activity of major compounds obtained from domestic plant essential oils was investigated against four species of fish pathogenic bacteria, namely, Edwardsiella tarda, Vibrio harveyi, Streptococcus iniae, and Streptococcus parauberis. We observed that α-terpineol and eucalyptol showed high antibacterial activity against S. iniae, whereas α-terpineol and β-linalool showed high antibacterial activity against S. parauberis. The antibacterial activity of eucalyptol and β-linalool was significantly high against E. tarda, and α-terpineol and β-linalool exerted antibacterial activity against V. harveyi. All compounds showing significant antibacterial activity also exhibited high solubility in water (≥1,000 mg/L). In contrast, compounds such as α-limonene and α-pinene with low water solubility showed significantly low antibacterial activity against all bacteria. These findings can be utilized further to estimate the antibacterial activity of compounds isolated from plant essential oils for the prevention of fish disease.