• Title/Summary/Keyword: 정보정잭

Search Result 4, Processing Time 0.018 seconds

Design of A Security Framework for Collaborative System (협력시스템에서의 보안 프레임워크 설계)

  • 정연일;이승룡
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.616-618
    • /
    • 2001
  • 협력 시스템은 분산 시스템 환경에서 호스트들이 네트워크를 통하여 상호 연결되어 있으며 다양한 사용자가 여러 자원들 공동으로 활용한다. 협력 시스템 발전 및 정보 보안의 중요성에 대한 인식 증가로 인하여, 개방형 분산 협력 시스템 환경에서도 정보 통신 시스템의 자원을 보호하기 위한 여러 가지의 보안 서비스에 대한 연구가 진행되고 있다. 하지만 기존의 일반적인 보안 서비스로는 협력 시스템에 특징과 구조에 맞는 서비스를 제공하기 어려운 점이 있다. 본 논문에서는 저자가 개발한 산업 디자인 협력 시스템에서의 보안 프레임워크를 제안한다. 제안된 프레임워크는 인증, 암호와 정잭, 접근제어, 보안 정보 관리의 네 가지로 구분하며 각각의 서비스가 상호 보완적으로 구성되어 있다. 또한, 특정 협력 시스템에 맞도록 구성되었지만 다른 협력 시스템에도 응용할 수 있도록 표준화를 따랐으며, 사용자의 요구에 따라 다른 비밀성과 투결성을 지원하기 위한 QoP(Quality of Protection) 서비스도 고려하여 설계하였다. 제안된 보안 프레임워크는 접근제어 요소를 협력 시스템의 구성에 맞도록 재구성하여 기존 정책의 단점인 복합적인 상황에서 확실한 보안을 할 수 있었으며 접근 정의에 따라 다른 알고리즘을 사용함으로 보안 프레임워크가 포함된 후에도 빠른 협력 작업이 가능했다. 또한 디자인 협력 시스템의 동시성 제어 정책을 기반으로 접근 제어 정책을 결정하였기 때문에 시스템 성능에 향상을 가지고 왔다.

  • PDF

A Study of Personalized Information Retrieval (개인화 정보 검색에 대한 연구)

  • Kim, Tae-Hwan;Jeon, Ho-Chul;Choi, Joong-Min
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.683-687
    • /
    • 2008
  • Many search algorithms have been implemented by many researchers on the world wide web. One of the best algorithms is Google using PageRank technology, PageRank approach, computes the number of inlink of each documents then represents documents in order of many inlink. But It is difficult to find the results that user needs. Because this method finds documents not valueable for a person but valueable for public, this paper propose a personalized search engine mixed public with personal worth to solve this problem.

  • PDF

A Study on the Operation Support and Activation of Drone Geospatial Information Service (드론 공간정보 서비스 운영지원 및 활성화에 대한 연구)

  • Ok, Jin-A;Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.147-153
    • /
    • 2021
  • The purpose of this study is to establish strategic suggestions for the direction of the drone-related business by Gyeonggi-do through a survey on the operation and actual conditions of the drone geospatial information service business experienced by Gyeonggi-do civil servants. For this purpose, as a result of surveying the demand survey of 219 people in charge of drone field work, it was analyzed by dividing it into four categories: technology-based operation support, business discovery and support, legal and institutional support, and education and public relations. As an improvement measure, technology-based operation support is to secure service operation efficiency by establishing a dedicated manpower and a dedicated organization and securing drone-related experts.The plan for improvement of project discovery and support is as follows. 1) The government proactively discovers prior research projects for project discovery and support; 2) Legal and institutional support requires support services for simplification of administration such as drone geospatial data shooting schedules and permits, 3) legal and institutional review on improving the scope and restrictions for using drone geospatial data. In the field of education and publicity, it is necessary to operate an education program on the overall operation of drones, and to conduct seminars for each field and use, and to seek activation methods through practical application guidelines for the application process and system. The limitation of this study is that the survey subjects are related to Gyeonggi-do, and in the future, survey analysis through a wide range of participants is required.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.