• Title/Summary/Keyword: 정보기술 아키텍처

Search Result 658, Processing Time 0.024 seconds

Modeling FORM Architectures Based on UML 2.0 Profiling (UML 2.0 프로파일링을 이용한 FORM 아키텍처 모델링)

  • Yang, Kyung-Mo;Jo, Yoon-Ho;Kang, Kyo-Chul
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.6
    • /
    • pp.431-442
    • /
    • 2009
  • The Software Product Line (SPL) engineering is one of the most promising software development paradigms. With Feature-Oriented Reuse Method (FORM), reusable and flexible components can be built to aid the delivery of various software products such as mobile phone and digital TV applications based on commonalities and variabilities identified during Feature modeling. Model Driven Architecture (MDA) is also an emerging technology which supports developing software products to work on different platforms with platform independent models (PIM). Combining advantages of these two approaches is helpful to build a group of software products which share common Features while working on various platforms. As first step to combine FORM with MDA, we extend UML2.0 with profiles by which FORM architectures and parameterized Statecharts can be modeled. Secondly, we provide rules to examine whether Features are allocated at positions of elements of Statecharts consistently between a Feature model and a parameterized Statechart. Some rules are designed to check the consistency between FORM architectures and parameterized Statecharts. A case study on an elevator control system is provided to demonstrate the feasibility of our modeling approach and consistency checking rules.

Cybersecurity Architecture for Reliable Smart Factory (신뢰성 있는 스마트팩토리를 위한 사이버보안 아키텍처)

  • Kim, HyunJin;Kim, SungJin;Kim, Yesol;Kim, Sinkyu;Shon, TaeShik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.629-643
    • /
    • 2019
  • In the era of the 4th industrial revolution, countries around the world are conducting projects to rapidly expand smart factory to secure competitiveness in manufacturing industries. However, unlike existing factories where the network environment was closed, smart factories can be vulnerable because internal and external objects are interconnected and various ICT technologies are used. And smart factories are likely to be the subject of cyber-attacks that are designed to cause monetary damage to certain targets because economic damage is so serious when an accident occurs. Therefore, it is necessary to study and apply security for smart factories, but there is no specific smart factory system architecture, so there is no establish for smart factory security requirements. In order to solve these problems, this paper derives the smart factory architecture that can extract and reflect the main characteristics of a smart factory based on the domestic and foreign reference model of smart factories. And this paper identifies the security threats based on the derived smart factory architecture and present the security requirements to cope with them for contributing to the improvement of the security of the smart factory.

A Study on Framework for Linkage of Research Performance Evaluation and Research Information Service (연구 성과평가와 연구정보서비스의 연계를 위한 기초 연구: 과학기술 분야 연구개발사업을 중심으로)

  • Kim, Pan-Jun
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.4
    • /
    • pp.243-261
    • /
    • 2011
  • This study aims to investigate a framework for linkage of national research performance evaluation and research information service from the perspective of metadata representation and exchange. Based on results of the functional requirements for metadata of national research performance evaluation are derived, this study suggests strategies for the application of international metadata standards. Also, this study presents an method to implement the metadata of research performance evaluation based on OAI-ORE, which is an international standard that can reuse and exchange the research information on web architecture.

Design and Implementation of Shipboard Integrated Information System based on IEC 61162-450 (IEC 61162-450에 기반한 선박 통합 정보시스템의 설계 및 구현)

  • Hwang, Hun-Gyu;Lee, Seong-Dae;Lee, Jang-Se;Jang, Kil-Woong;Park, Hyu-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.101-109
    • /
    • 2013
  • e-Navigation requires shipboard integrated information system to manage several kinds of data on shipboard. IEC 61162-450 may be adopted for the development of such system. Based on IEC 61162-450, this paper proposes an architecture of shipboard integrated information system, and describes a developed system. The system is composed of NMEA 2000 gateway, wireless sensor gateway, database, monitoring applications. This paper also shows the feasibility of the system through some tests.

A Study on Korea Government ITA Meta-Model Tailoring for National Defense Architecture Development (국방 관련 아키텍처 개발을 위한 범정부 정보기술아키텍처(ITA)의 메타모델 조정 방안 연구)

  • Jang, Jae-Deuck;Park, Young-Won;Park, Cheol-Young;Lee, Jung-Yoon;Koo, Yeo-Woon;Kim, Yeon-Tea
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.34 no.3
    • /
    • pp.344-354
    • /
    • 2008
  • The ITA meta-model descriptions being promoted by Korean government was developed to build information technology architecture for applications in public institutions. However, the application of this ITA meta-model is not easy because of the complexity and overlapping between classes and attributes which reside in the ITA meta-models. Additionally, the National Defense Architecture is planned for development using the MND-AF. Since the National Defense Architecture must align with the Government ITA for interoperability and consistency, it is crucial the differences in the meta-models between MND-AF and Government ITA must be resolved. This study presents the trade-off results between the meta-models of MND-AF and Government ITA. It also proposes a set of tailored meta-models for use with the National Defense architecture development. The tailored meta-models use an ERA (Element, Relationship, Attribute) data structure that decreases complexity and eliminates the overlapping between classes and attributes.

Analysis of Improving Requirement on Military Security Regulations for Future Command Control System (미래 지휘통제체계를 위한 보안 규정 개선 요구사항 분석)

  • Kang, Jiwon;Moon, Jae Woong;Lee, Sang Hoon
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.69-75
    • /
    • 2020
  • The command control system, like the human brain and nervous system, is a linker that connects the Precision Guided Missile(PGR) in information surveillance and reconnaissance (ISR) and is the center of combat power. In establishing the future command and control system, the ROK military should consider not only technical but also institutional issues. The US Department of Defense establishes security policies, refines them, and organizes them into architectural documents prior to the development of the command and control system. This study examines the security architecture applied to the US military command control system and analyzes the current ROK military-related policies (regulations) to identify security requirements for the future control system. By grouping the identified security requirements, this study identifies and presents field-specific enhancements to existing security regulations.

An Efficient Network Virtualization Model in Cloud Computing Environments (클라우드 컴퓨팅 환경에서의 효율적인 네트워크 가상화 모델)

  • Jung, Byeong-Man;Choi, Min;Lee, Bong-Hwan;Lee, Kyu-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.823-826
    • /
    • 2012
  • In this paper, we propose an efficient network virtualization model in cloud computing environments. Virtualization is a key technology for the implementation of service-oriented architecture. It is a standardized framework that can be reused or integrated with changing business priorities through a IT infrastructure. Network virtualization has emerged as an important technical issues of the future virtualization technology in Internet. The concept of network virtualization and related technologies stay in ambiguous status since network virtualization is in its early stage. Thus, we propose a network virtualization model for cloud environment by analyzing the existing network virtualization technologies.

  • PDF

Trusted Information Sharing Model in Collaborative Systems (협업 환경 내 신뢰할수 있는 정보 공유 모델)

  • Hong, Seng-Phil;Kim, Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.99-113
    • /
    • 2007
  • In the rapidly changing e-business environment, organizations need to share information, process business transactions, and enhance collaborations with relevant entities by taking advantage of the various technologies. However, there are always the security issues that need to be handled in order for the e-business operations to be run efficiently. In this research, we suggest the new security authorization model for safety flexible supporting the needs of e-business (e-marketplace) in an organization. This proposed model provides the scalable of access control policy among multi-domains, and preservation of flexible authorization management in distributed system environments. For servers to take the access control policy and enforcement decisions, we also describe the feasible authorization architecture is concerned with how they might seek advice and guideline from formal access control model.

  • PDF

Design and Estimation of Cyber Lecture System based on XML (XML 기반의 가상교육 시스템 설계 및 평가)

  • 이병수;안영두;조시용
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.136-142
    • /
    • 2002
  • In this thesis. we present the cyber lecture system based on XML that uses the communication network as the 100Mbps LAN. The system was designed to analysis the existing cyber lecture system and its details arid to examine web system architecture and XML 3-tier model The result of the study consists of he cyber lecture system based on XML developed on 100Mbps LAN to improve method of the cyber lecture system by using ma 3-tier model arid utilisation of web interface to offer handiness of the cyber lecture system.

  • PDF

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.