• Title/Summary/Keyword: 접근 통제

Search Result 723, Processing Time 0.023 seconds

A Study on Access Control Method and the user level authentication using OTP(One-Time Pad) (OTP(One-Time Pad)를 이용한 사용자 등급별 인증과 접근제어 방법에 관한 연구)

  • Lee, Chang-Soo;Lee, Young-Gu
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.402-403
    • /
    • 2012
  • 최근 정보화 사회 발전에 따라 기업 비밀의 유출사고가 빈번하게 발생하고 있으며 지식 정보의 가치가 커짐에 따라 기업의 피해도 같이 증가하고 있다. 외부의 공격으로 개인 또는 기업의 중요한 정보가 유출되거나 정당하지 않은 목적으로 수집, 가공되어 오/남용되어 정보의 악영향을 초래하고 있기 때문에 효율적으로 기업 정보를 관리하는 방법을 요구하고 있다. 본 논문에서는 사용자 인증과 문서 접근 시 자신의 보안 등급과 관련 부서를 확인하고 사용자 등급에 맞는 OTP(One-Time Pad)를 부여하여 사용자 등급에 맞는 문서만을 열람할 수 있다. 또한 문서의 무결성 보장과 문서 열람 Log를 통해 효율적이고 안전하게 접근 통제를 할 수 있다.

  • PDF

A Study on Disorientation Issues in the Hypermedia Learning Environments (하이퍼미디어 학습 환경에서 학습 방향 상실(Disorientation)에 대한 연구)

  • Kim, Dong-Sik;Rho, Kwan-Sik;Im, Chang-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.4 no.1
    • /
    • pp.135-143
    • /
    • 2001
  • Although the concern on hypermedia learning environment is increased among educators, disorientation in hypermedia learning space becomes a critical issue for an efficient navigation and learning. In order to overcome the obstacle, the comprehensive approaches such as learner's control, metacognitive support, structuring hypermedia contents, and efficient interface design were addressed.

  • PDF

Control measures in Cyberspace in the light of Rimland theory (림랜드 이론으로 본 사이버공간 통제방안 (북한의 사이버전 사례연구를 중심으로))

  • Dong-hyun Kim;Soo-jin Lee;Wan-ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.11-16
    • /
    • 2022
  • Development of science technology make integrated CPS(Cyber-Physical System) appear. In CPS era, cyberspace and physical-space are hard to separate anymore, that is developing toward integrated CPS. The reality is not stopping, that is consistently changing and the concept of space is developing too. But several articles are considering for cyberspace and physical-space separately, and they are developing tailed alternative each case. The theorical approaching that is not considering reality is dwelled on past, and is dangerous from dropping down to floating cloud that is not considering progressed reality. This article is suggested to consider rimland theory to control measures in cyberspace. That is dedicated to integrated approaching from physical-space to cyberspace. And that is developing concreted controling measures in cyberspace. Especially, this article is suggested to policy alternative by analyzing north korea cyber warfare from rimland theory including human sources. Simplicity is the ultimate sophistication. This article make integrated approaching effects about cyberspace and physical-space to preparing in the CPS era.

A Study on Strategic Approach to Expand Korean e-Government Export (한국 전자정부 해외진출 확대를 위한 전략적 접근방향에 관한 연구)

  • Lee, Chae-Eon;Choi, Yong Lak;Shin, Yongtae
    • Journal of Service Research and Studies
    • /
    • v.6 no.1
    • /
    • pp.1-15
    • /
    • 2016
  • The purpose of this study is to suggest strategic approach to expand Korean e-government export. Korean e-government was evaluated as a top level by UN electronic government survey 2014. However its export is very limited. This study reviews the literature related to e-government, and analyze existing Korean e-government export. The results of this analysis are as follows: lack of a law related e-government export, decentralized organizations, insufficient export process, lack of e-government solution for sale, limited funds, deficiency of cooperation between large and small enterprises. This study suggests a strategic approach such as to clarify the purpose of e-government export, to decide government or civilian-oriented export, to establish driving strategy, to improve and develop e-government export related areas. There are many ways for improvement and development of e-government export as follows: to enact a basic law or to revise the e-government law, to integrate functions of separated organizations and establish control tower, to improve export process, to build information sharing system, to develop standardized solution module, and to expand fund to support. The author expects that this paper will contribute to enhance Korean e-government export.

Study on the scheme to reinforce military security system based on location information (위치정보를 이용한 군 보안체계 강화 방안)

  • Kim, Yun Young;Namkung, Seung Pil
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.83-90
    • /
    • 2015
  • Current PKI system will confront more dangerous elements in the wireless network. Accordingly, this study suggests a plan to strengthen authentication system plan with using access control and encryption to the location. Locational information collecting devices such as GPS and sensor are utilized to create a new key for authentication and collect locational information. Such a key encodes data and creates an authentication code for are access control. By using the method suggested by this study, it is possible to control access of a military secret from unauthorized place and to protect unauthorized user with unproposed technique. In addition, this technique enables access control by stage with utilizing the existing PKI system more wisely.

Design of the Access Control System for MS-WORD Document System (MS-Word 문서 접근 제어시스템 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1405-1411
    • /
    • 2018
  • This paper designs access control system for MS-word(Microsoft-word) document system. The system designed in this paper uses the document-related information by analyzing the MS-word document structure. It is designed to block access to users who can not access the modified information by partially modifying MS-word document information. This makes it impossible to read documents other than those who have access to the MS-word document. This allows you to control access to the MS-word document. A user with access to the MS-word document will be able to retrieve the modified information back to the original information so that the document can be read normally. In this paper, we design and implement experiments. In the experiment, we performed document access if MS-word document information was modified. Experimental results show that the MS-word access control system operates normally.

ROK Navy's Response to China's Naval Modernization: Based on Command, Control, Capability, and Capacity Analysis Framework (중국 해군 현대화에 대한 한국 해군의 대응 방안 : 지휘, 통제, 능력, 수량 분석을 중심으로)

  • Oh, Dongkeon
    • Strategy21
    • /
    • s.45
    • /
    • pp.188-211
    • /
    • 2019
  • 중국 해군의 성장은 동아시아의 안보환경 변화에 지대한 영향을 미치고 있으며, 한국 해군 또한 그 영향에서 벗어날 수 없는 실정이다. 대한민국은 중국과 지리적으로 맞닿아 있으며, 현재 불법 중국어선 및 이어도 문제 등 중국과의 수많은 해양갈등을 겪고 있는 상황으로, 이에 대한 적절한 대응을 위해서 한국 해군은 중국 해군의 현대화에 대한 대응을 준비해야만 한다. 본고는 중국과 한국의 해군력을 로버트 토마스 전 미 해군 중장이 제시한 지휘, 통제, 능력, 수량의 네 가지 측면에서 분석 및 비교하였다. 중국 해군은 적의 접근을 원해에서부터 차단하는 것을 목표로 하고(지휘), 그에 걸맞게 C4I 능력을 확충해나가고 있으며(통제), 전력투사. 수중/수상전, 해상재보급 역량을 늘려가고(능력), 최근 4년간 세계 대다수 해군의 총 톤수를 능가하는 수준의 함정건조 추세를 보이고 있다(수량). 한국 해군은 90년대 이후 "대양해군"을 목표로 해왔으며(지휘) 아덴만까지 실시간으로 통제 가능한 뛰어난 C4I 능력을 갖추었으나(통제), 아직 대양해군에 걸맞는 능력 및 전력을 구비하였다고 보기는 어렵다. 한국 해군이 상기 네 가지 측면에서 중국 해군을 따라잡는 것은 거의 불가능에 가깝다. 중국은 GDP의 2% 이내에서 국방비를 책정함에도 매년 GDP의 2.7%를 국방비에 투자하는 한국 국방비의 6배를 상회하며, 이 격차는 계속 커져가는 추세이다. 따라서, 대한민국 해군은 첫째, 잠수함 등 비대칭 전력 확보에 주력하고 방공/대잠능력 등 방어력을 향상시켜야 하며, 둘째, 관련국과의 긴밀한 협력을 통해 동아시아 및 서태평양 지역에서의 해양안보 안정화를 위해 노력해야한다. ADMM+3 등 다자 안보의 틀 안에서 역내 해양의 안정을 꾀할 수 있도록 한국 해군은 정책적 노력을 경주해야할 것이다.

Authority Control in the Digital Age: A Study of japanese Journal Titles and Corporate Names in the OPACs in Korea (디지털 정보시대의 전거통제 (II): 국내 목록 데이터 베이스의 일본 학술지명과 단체명 연구)

  • 윤정옥
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.35 no.4
    • /
    • pp.161-175
    • /
    • 2001
  • The purpose of this study is to examine how the titles and corporate names of Japanese scholarly journals are treated, and how well the authority control is implemented to assist the access with various names and forms of names to the OPACS. Without the help of either references or internal links among those names and forms of names in the DBs, users are likely to fail in getting the right results. In this study, the cataloging records for serials from the National Assembly Library, KISTI, Yonsei University and the KERIS were examined, and the comparison was made with the records from the NACIS-WebCat of the National Institute of Informatics in Japan. Major findings include (1) the lack of consistency in applying cataloging rules, (2) the lack of proper authority control in treating corporate names, and (3) the lack of references or links among names and variant forms of names. The overall improvement of cataloging practices and application of authority control is strongly recommended for enabling users to access better to those DBs of interest.

  • PDF

Effects of MyData Service Attributes on Intention to Use (마이데이터 서비스 속성이 이용의도에 미치는 영향)

  • Kim, Soo-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.271-278
    • /
    • 2022
  • MyData service integrates and manages user's personal data such as finance, credit, etc, and is expected to provide useful information to the user as personal data in various fields are gradually integrated. Discovering factors that affect the intention to use of MyData service is a very important topic for understanding that service. To this end, in this study, the attributes of the MyData service were derived, and the derived service attributes were grouped together by using factor analysis. As a result, we found four factors such as "convenience", "usefulness", "security", and "control". After that, we established our research model to analyze the causal relationship between these four factors and the intention to use of MyData service. According to the analysis results, among the factors of the MyData service attribute, "convenience", "usefulness", and "control" had a significant effect, and "security" did not have a significant effect. In particular, it was confirmed that "control" had the greatest influence on the intention to use. This study suggests that MyData service provider need to make users recognize they are controlling their data and develop services that provide various benefits to users.

Towards Real Time Detection of Rice Weed in Uncontrolled Crop Conditions (통제되지 않는 농작물 조건에서 쌀 잡초의 실시간 검출에 관한 연구)

  • Umraiz, Muhammad;Kim, Sang-cheol
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.1
    • /
    • pp.83-95
    • /
    • 2020
  • Being a dense and complex task of precisely detecting the weeds in practical crop field environment, previous approaches lack in terms of speed of processing image frames with accuracy. Although much of the attention has been given to classify the plants diseases but detecting crop weed issue remained in limelight. Previous approaches report to use fast algorithms but inference time is not even closer to real time, making them impractical solutions to be used in uncontrolled conditions. Therefore, we propose a detection model for the complex rice weed detection task. Experimental results show that inference time in our approach is reduced with a significant margin in weed detection task, making it practically deployable application in real conditions. The samples are collected at two different growth stages of rice and annotated manually