• Title/Summary/Keyword: 정보의 보호와 공유

Search Result 613, Processing Time 0.034 seconds

A Study on the Frequency Allocation to the Maritime Mobile Satellite Services in the X band under ITU-R Activities (X 대역 해상이동위성업무 추가 주파수 분배를 위한 ITU-R 표준화 연구 동향 및 대응 방안 연구)

  • Oh, Dae-sub;Chang, Dae-Ig
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.127-130
    • /
    • 2015
  • ITU-R has conducted a studies for the frequency allocation to the maritime mobile satellite service (MMSS) in the 7375 - 7750 / 8025 - 8400 MHz under WRC-15 agenda item 1.9.2. In order to allocate a certain frequency bands to the new service, compatibility between new service and the existing services is ensured taking into account protecting the existing services form interference of new service. In this paper, we present current studies results of the frequency sharing studies between new allocation to MMSS and the existing services in the ITU-R. In addition, some proposals for allocating the 7/8 GHz frequency bands to MMSS are also considered for efficient spectral utilization with respect to preparing WRC-15.

A Delphi Survey for Establishment of Standards Development Strategy in Digital Publication (전자출판 분야 표준 개발 전략 수립을 위한 델파이조사 연구)

  • Oh, Mi-Ja;Cho, Yong-Sang;Shin, Sung-Wook
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.1-13
    • /
    • 2013
  • The recent emergence of diverse platform-based media devices such as smart phones and iPads has aroused interest of consumers all across the world. This interest has led to digitalization of paper books and a steep growth in the digital publishing industry at home and abroad. However, advent of various devices and content has caused the issue of compatibility and produced needs and demand for standardization to exchange and share content related to digital publication. Through collection of opinions of 16 stakeholders from the industrial, academic, research, and public sectors, this study aims to examine predictable future changes about content and its distribution, devices, standardization, technical protective measures, and obstacles in future digital publishing and eventually to draw out areas and elements for future standards development.

The Status and Suggestions for Big Data Adaptation in the Government and the Public Agency (정부 및 공공기관에서의 빅데이터 활용에 대한 현황 및 실행방안 제안)

  • Byeon, Hyeon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.13-25
    • /
    • 2017
  • Volume in data storage is growing more than ever before. This phenomenon is caused by the participation of governments and firms as well as general users. As for big data, governments and public agencies are likely to play important roles in applications since they can access and operate personal data for public purposes. In this study, the author examined the status and countermeasure of big data from different countries and drew some common grounds. The suggestions are as follows. First of all, securing manpower and technology have to take precedence. In addition, share and development between the government and the private sector are required. And organizations should come up with long-term strategies along with the development of data loading and analysis. In conclusion, the author propose the recognition of the importance of data management, privacy protection and the expansion of field application possibilities for political usage of big data.

A Framework for Concurrency Control and Writing Authority Control in Collaborative Writing Systems (공동저작 시스템에서의 동시성 제어와 쓰기 권한 제어)

  • Yoo, Jae-Hong;Sung, Mee-Young
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2
    • /
    • pp.347-354
    • /
    • 2000
  • This paper presents the efficient mechanisms for concurrency control and writing authority control in collaborative writing system are represented by the tree structures which consist of the logical objects and the content objects connected to the terminal objects of trees. For concurrency control, we adopted the approach to extend the multiple-granularity-locking-scheme. This scheme allows us to lock any objects at each level of the hierarchy. We also defined the locking compatibility table by analysing the operations applicable to any objects at each level of the hierarchy. We finally suggest the extended-multiple-granularity-locking mechanism which uses the locking compatibilility table for deciding to lock an object. This scheme gives the benefit to maximize the possibility of concurrent accessing to the shared objects. In addition, we suggest a mechanism for writing authority control which prohibits the Non-Group users from modifying the shared objects based on the concept of Group/Non-Group The proposed mechanism allows us to protect copyright very reasonably.

  • PDF

Study on Model Case of Ideal Digitization of Korean Ancient Books (국학고전자료의 디지털화를 위한 모범적인 방안 연구)

  • Lee, Hee-Jae
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.1 s.55
    • /
    • pp.105-123
    • /
    • 2005
  • The most of all, this study is planned to search an ideal methods to develop the digital library system for our korean ancient books for their safe preservation and, at the same time, for their perusal of transcendental time and space : first. to offer the various access points like traditional oriental Four parts Classics classification, current subject classification and index keyword, etc. : second, to program a digital library system using MARC or XML, but with all bibliographic descriptive elements as possible; third, to prepare the more easy annotated bibliography and index for users' better comprehension, and last, to build original text database for practical reading to avoid the damage of original text. This type of korean ancient books digital library will be developed to the real international bibliographic control by networking enter the same kinds of internal and external organizations.

The Efficient AES-CCM Architecture for a hardware library in the WAVE (WAVE 하드웨어 암호 라이브러리에 적합한 효율적인 AES-CCM 구조 설계)

  • Lee, Yeon-Cheol;Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2899-2905
    • /
    • 2013
  • According to developing wireless communications in vehicle, various security threat in the WAVE(Wireless access in vehicular environments) is increased. To protect this, IEEE 1609.2 specify services as for prevent message from attacks such as spoofing, eavesdropping and replay. It is possible to implement a hardware library for defending these attacks. In this paper, we proposed a efficient AES-CCM architecture for the hardware library in the WAVE. We compare our architecture to the previous one in the same FPGA. And our design uses less slices than 27 % of it and less slices than 45 % of it if we share registers that were used by other modules in the library. We also achieves a throughput of 1355 Gbits/s in xc5vlx110t-2ff1136.

Improvement of Runtime Intrusion Prevention Evaluator (RIPE) (실행시간 침입 방지 평가 프로그램(RIPE)의 개선)

  • Lee, Hyungyu;Lee, Damho;Kim, Taehwan;Cho, Donghwang;Lee, Sanghoon;Kim, Hoonkyu;Pyo, Changwoo
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1049-1056
    • /
    • 2015
  • Runtime Intrusion Prevention Evaluator (RIPE), published in 2011, is a benchmark suite for evaluating mitigation techniques against 850 attack patterns using only buffer overflow. Since RIPE is built as a single process, defense and attack routines cannot help sharing process states and address space layouts when RIPE is tested. As a result, attack routines can access the memory space for defense routines without restriction. We separate RIPE into two independent processes of defense and attacks so that mitigations based on confidentiality such as address space layout randomization are properly evaluated. In addition, we add an execution mode to test robustness against brute force attacks. Finally, we extend RIPE by adding 38 attack forms to perform format string attacks and virtual table (vtable) hijacking attacks. The revised RIPE contributes to the diversification of attack patterns and precise evaluation of the effectiveness of mitigations.

Oral History Research and Human Subject Research on Bioethics and Safety Law (구술사 연구와 「생명윤리법」의 인간대상연구)

  • Lee, Hosin
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.3
    • /
    • pp.1-21
    • /
    • 2017
  • Oral history research is carried out through collecting information about a living person. The data collected from an oral history project is not a mere fact or a mass of information but accounts of persons who reveal their own personalities. For this reason, oral history research and data collection and the use of such data must be based on rigorous ethical standards. The Bioethics and Safety Law shares a similar view on human subject research, and the Institutional Review Boards includes human subject research as a subject of review and management. However, the Bioethics and Safety Law's protection of personalities and human rights focuses on life sciences methodologies, which are not suitable for qualitative research, such as an oral history of a value oriented and critical approach to human beings. This study examines the details of the Bioethics and Safety Law related to human subject research and the problems that may arise when this law is applied to subjects in humanities and social sciences such as oral history. Through this study, alternative methodologies, which can be used for oral history research, while maintaining academic autonomy, are suggested.

Study on Digital Finance Secure Architecture based on Blockchain (블록체인 기반의 디지털 금융보안 아키텍처에 관한 연구)

  • Kim, Kyoung-jin;Hong, Seng-phil
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.5
    • /
    • pp.415-425
    • /
    • 2021
  • In line with the trend of the digital transformation, the financial sector is providing financial services with new technologies. Among them, the open banking, which is drawing attention from global financial industry, is a service environment that maximizes customers' convenience and data utilization. In addition, the shift in the digital paradigm has also increased anxiety that security problems such as hacking and information leakage caused by data sharing are also concerned. A failure to overcome the negative view will hinder the development of financial services. This study presents a security governance system that can safely and comprehensively manage data in a digital financial ecosystem. This prepares a technical application plan by presenting a digital financial security architecture to field workers, focusing on the open banking service environment. It can be seen that this study is worthwhile by presenting a comprehensive information protection system that allows financial IT to introduce and utilize open banking services in a changing environment.

The Representation of Memory and New Directions of Archival Description Discourse (기억의 재현과 기록 기술(archival description) 담론의 새로운 방향)

  • Jo, Minji
    • The Korean Journal of Archival Studies
    • /
    • no.27
    • /
    • pp.89-118
    • /
    • 2011
  • This paper considers the relationship between memory and archives by exploring the concepts and meaning of archivist and archival description. The author considers the metaphor of archives as memory and relates our understanding of creation, arrangement, preservation, description, and use of records and archives. The author argues that archivists demonstrate their knowledge and background when they organizing and preserving records and archives.