• Title/Summary/Keyword: 정보통신 표준화

Search Result 2,952, Processing Time 0.027 seconds

A Study on the Application Method of Digital Signature to International e-Trade over the Internet (인터넷 전자무역에서의 전자서명 적용방안 연구)

  • Park, Sang-Hwan;Lee, Seok-Lae;Park, Chu-Hwan
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.3
    • /
    • pp.227-241
    • /
    • 2004
  • With the expansion of internet usage and the advanced technology for information and communication, the international e-Trade environment gradually migrates from the VAN/EDI to the global Internet-based e-Traed on an ebXML framework. In an effort to provide a Internet-based e-Trade environment with a security and trust, this paper analyzes security components and proposed the SSL and ebXML security technologies in order to assure of the trust and security over Internet-based e-Trade. In addition, this paper presents 3-phase methodology to realize the secure and trustworthy Internet-based e-Trade. In summary, as the first phase, the e-Trade business processes are re-engineered and the digital signature council for mutual recognition is orgainzed. And as the second phase, the Internet-based e-Trade system and the concerned digital signature technology are implemented. Finally as third phase, the PKI mutual recognition agreement is signed by parties concerned and then the Internet-based e-trade business is started. Furthermore, this paper presents the promising Internet-based e-Trade models where the digital signature can be applied.

  • PDF

Analysis of Keyword Trend for ICT Convergence Services (ICT 융합 서비스의 키워드 트렌드 분석)

  • Jang, HeeSeon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.35-41
    • /
    • 2014
  • With ubiquitous computing and network, the concern of government, business and academy for IT or ICT convergence has been increased. In this paper, through the analysis of keyword trend for ICT convergence services from 2000's mid, the efficient policy is proposed by estimating the understanding and concern of common people. In addition to, the concept and development step of convergence are analyzed, and the keyword analysis for the ICT convergence services defined in TTA is performed. The services are classified into smart home work transportation, Health ICT, RFID USN, M2M IoT, e-Navigation, intelligent robot, and the keywords for each service are analyzed. The analytic results indicate that the keyword trend varies in the time, and highly indexing keywords and new trend are defined. To provide the efficient ICT services, the new ICT convergence services needed for customer will be proposed with new IT technology development, IT standard, law management, and policy provisioining.

Design and Implementation of IPTV based interactive public services of Converged Broadcasting and Telecommunications (IPTV기반 방통융합 양방향 공공서비스 설계 및 구현)

  • Park, Joo-Gi;Choi, Eun-Bok
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.4
    • /
    • pp.489-496
    • /
    • 2010
  • Since the specifications of public services in broadcasting-telecommunication convergence environment are not standardized, the public services should be developed and presented by each IPTV service provider, and therefore it is worried that public organizations and IPTV service providers may invest in the public services redundantly, which are managed inefficiently. To resolve those problem, in this paper, the service and network interfaces among multiple public organizations and multiple IPTV service providers and the interactive VOD-type public service providing system of one source multi-use based on ACAP-J are proposed. The proposed system can be utilized in the standard platform of the evolved new public services. And the used technologies can be utilized as a guide for the development of new services.

  • PDF

A Study on CA-VPN Design using Authentication Mechanism (인증 메커니즘을 이용한 CA-VPN 설계에 관한 연구)

  • 김도문;전정훈;전문석
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.60-68
    • /
    • 2003
  • Now the development of using a internet and security equipment is Processed actively. But It is presented problems about compatability and availability between variable equipment as several protocol. It is able to occur the Problem which is not considered efficiency as monopoly security equipment for the standardization of some vendor As a using of VPN gateway equipment. the same equipments have been actually used only for sale a communication equipment which are not confirmed(authenticate) between of mutual equipments. These problem is remain which are not considered suitable network environment and Position by mutual authentication Processing. Because it is considered for only sale a equipment of several vendor. And You will be remain where is unable to protect from attack of using the same equipment, and You will need a actually Protected method. By authentication system of base on Pn , although there is an intended attack from the third intruder, users can be protected with safe from the physical attacks since he is not a Permitted user by employing CA-VPN gateway that is more viable than the previous VPN connection in its security and certification.

  • PDF

SWOT Analysis for Small and Medium Enterprise in Smart Factory introduction (중소기업의 스마트 공장 도입을 위한 SWOT 분석)

  • Lee, Hyeon Ho;Leem, Choon Seong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.1-14
    • /
    • 2018
  • The 4th Industrial Revolution has been rapidly changing the environment of all industries and the new technologies as included in the 4th Industrial Revolution has taken the lead in this change. Domestic SME need to change according to the 4th Industrial Revolution. Specially, it is necessary to introduce smart factories to the SME. Thus, this study suggests strategies for successful introduction of smart factories to SME through SWOT analysis about the situation of the SME. As strategies for utilizing its strengths, first, it is an activation through superior competitiveness. Second, the utilization of excellent technology and information is considered. Third, it is suggested to utilize global network-based environment. The strategies for making up for weakness are provided as follows. First, it is suggested to raise awareness of information security. Second, it is considered to establish technical standardization for the construction of evaluation system. Third, the promotion of manpower to secure professional manpower is suggested. The implication of this study is that it suggests the necessity of smart factory to understand and prepare for effective strategies for SME and various external strategies for the fourth industrial revolution.

XML/EDl 수출통관시스템 개발에 관한 연구

  • 김현수;박남규;손형수
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2000.11a
    • /
    • pp.385-394
    • /
    • 2000
  • 기업간 및 기업 대 정부간 문서교환의 요구를 충족시키기 위한 일원으로 기업들은 산업 표준에 따른 전자문서교환(EDI)에 많은 관심과 노력을 기울여왔으며, 국내에서는 한국 EDIFACT위원회를 중심으로 전자문서 표준화가 이루어졌다. 국내 수출업자들이 관세청에 수출신고를 위한 통관 EDI 교환은 주로 부가가치통신망(VAN) 사업자들을 통해 이루어지고 있으나 이러한 EDI 중계 서비스는 특정 VAN사업자들을 통해 EDI서비스가 독점됨에 따라 서비스 이용에 있어 값비싼 전송료 및 통신망 임차비, 잦은 통신 지연, 기업 내부 시스템과의 연계의 어려움 등으로 인하여 많은 문제점을 낳았다. 현재 이러한 전통적 방식의 EDI를 인터넷 기반으로 전환할 때 인터넷의 개방성과 저렴한 사용비용등의 장점으로 인해 비용절감과 사용자 편이성을 크게 증가시킬 것으로 기대된다. 본 연구에서는 인터넷과 웹을 이용하여 통관 EDI 중계 시스템을 개발하였다. 현재 수출을 하고자 하는 주체는 관세청에서 반드시 EDI로 수출에 관한 신고를 하여야 하는바, 본 시스템은 이러한 EDI신고를 인터넷상에서 가능하도록 한 것이다. 본 연구에서는 기존 HTML에서 진일보한 차세대 마크업 언어인 XML을 이용하였다. 본 연구에서 구축한 XML/EDI 통관시스템은 수출신고에 필요한 11개의 전자문서에 대한 XML Schema를 디자인하고, 사용자 관리, SchemaStyleTemplate 관리, XML/EDI 문서관리 XML/EDI변환, EDI 송수신 관리, 인증관리, 로그관리 등의 모듈을 지니고 있으며 개방형 EDI와 인터넷 EDI의 장점을 취합하여 설계되었다. 본 시스템은 기존의 UN/EDIFACT표준을 사용하고 있는 EDI환경과 기존 VAN 방식의 EDI 중계 시스템과 연동되며, 향후 관세청의 XML/EDI 표준 시행을 미리 대비하는 선도연구로서 자리매김이 된다. 본 연구에서는 개발된 XML/EDI 통관시스템은 향후, 서비스의 최대 걸림돌이 되어왔던 값비싼 EDI 사용료의 부담에서 벗어날 수 있게 할 것이며, 저렴한 EDI구축/운영 비용으로 전자문서교환의 활성화와 XML이 인터넷 기반의 문서유통 표준으로 자리매김할 수 있는 중요한 계기가 될 것이다.

  • PDF

Geographic and Energy Aware Geocasting in Ad-Hoc Networks (Ad-Hoc 네트워크에서 위치와 에너지를 고려한 지오캐스팅 알고리즘)

  • Lee Ju-Young
    • Journal of Internet Computing and Services
    • /
    • v.5 no.2
    • /
    • pp.75-84
    • /
    • 2004
  • Geocasting, a variant of the conventional multicasting problem, is one of communication type in which the data packets are delivered to a group of all nodes within a specified geographical region (i.e., the geocasting region) and is called location-based multicasting(LBM)(l). An Ad-hoc network is a dynamically reconfigurable and temporary wireless network where all mobile devices using batteries as energy resources cooperatively maintain network connectivity without central administration or the assistance of base stations. Consequently, the technique to efficiently consume the limited amounts of energy resources is an important problem so that the system lifetime is maximized. In this paper, we propose a LBPA(Location-Based Power Aware) geocasting algorithm that selects energy-aware neighbor to route a packet towards the target region In Ad-hoc network environments. The method Is such that the energy consumption is balanced among the nodes in proportion to their energy reserves. Through the simulations, the proposed LBPA algorithm shows better results, that is, as good as 40% on the average over the conventional LBM algorithm in terms of the network lifetime.

  • PDF

How to Impact the Adoption of Managed Service on IT Governance of Enterprises? (매니지드 서비스 도입이 기업의 IT 거버넌스에 미치는 영향 분석)

  • Jang, Hyuk Soo;Jun, Eunsuk;Lee, Myung Jin;Oh, Jun-Tack;Lee, Bong Gyou
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.399-409
    • /
    • 2013
  • The development of IT has led to increase the business's dependence on IT and the interests of enterprises on IT governance. Also, more enterprises have adopted managed services to save operating costs in IT departments and to maximize their business efficiency. However, until recently, there are very few academic as well as practical researches regarding managed services, IT service effectiveness, IT governance and their interrelations. This study analyzes the effects of managed services on IT governance based on the IT-BSC (Balanced Scorecard) model. Using the expert FGI (Focus Group Interview) and survey, the research results present that managed services have the most significant effect on the user-oriented and the operational efficiency in enterprises. Also, managed services through the business process standardization can improve the IT governance more effectively. This study will be a relevant guideline for enterprises that will adopt managed services.

스마트팜의 기술적 특성이 수용의도에 미치는 영향요인 연구: 노력기대의 매개효과를 중심으로

  • An, Mun-Hyeong;Heo, Cheol-Mu
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2018.11a
    • /
    • pp.111-120
    • /
    • 2018
  • 최근 농촌 고령화와 노동력 부족, 경지면적의 감소, 이상기후에 따른 환경 변화, 시장개방에 따른 무한경쟁 상태에 놓인 국내 농업의 어려운 상황 속에서 스마트팜은 미래 농업의 새로운 트렌드로 주목받고 있다. 이에 본 연구는 스마트팜의 기술수용의도에 미치는 영향요인들을 살펴보고 이를 바탕으로 스마트팜 도입 확산을 위한 제언을 하고자 한다. 본 연구에서는 스마트팜 수용의도에 가장 영향을 미치는 요인으로 통합기술수용이론(UTAUT)을 근거로 스마트팜의 기술적 특성과 노력기대를 제시하였다. 실제 농업에 종사하고 있는 농업인들을 대상으로 수집한 설문결과를 자료분석에 사용하였으며, 독립변수로는 스마트팜의 기술적 특성으로 가용성, 신뢰성, 경제성을 선정하여 종속변수인 스마트팜 수용의도에 미치는 영향요인을 분석하였고, 노력기대의 매개효과를 분석하였다. 연구결과, 스마트팜의 기술적 특성 중 가용성과 경제성은 스마트팜 수용의도에 정(+)의 영향을 미치며, 신뢰성은 스마트팜 수용의도에 영향을 미치지 않는 것으로 나타났다. 또한, 스마트팜의 기술적 특성인 가용성, 신뢰성, 경제성은 스마트팜 노력기대에 정(+)의 영향을 미치는 것으로 나타났다. 이와 함께 스마트팜에 대한 노력기대는 스마트팜의 기술적 특성과 독립적으로 스마트팜 수용의도에 정(+)의 영향을 미치는 것으로 나타났다. 매개효과와 관련해서는, 스마트팜에 대한 노력기대는 스마트팜의 기술적 특성인 가용성, 신뢰성, 경제성과 스마트팜 수용의도간의 관계를 매개하는 것으로 나타났다. 이러한 분석결과는 농업인들의 스마트팜 도입을 촉진시키기 위해서는 스마트팜 기술의 안정적 기능 수행을 체감할 수 있는 전문적인 현장실습교육 프로그램, 기기 및 통신의 표준화, 스마트팜 도입에 따른 투자대비 수익성 변화의 구체적 제시, 양질의 환경 생육 데이터 수집 및 활용 체계 구축이 필요함을 시사한다.

  • PDF

Design and Implementation of the CDMA2000 1x EV-DO Security Layer to which applies 3GPP2 C.S0024-A v.2.0 Standard (3GPP2 C.S0024-A v.2.0 표준을 적용한 CDMA2000 1x EV-DO 보안 계층 설계 및 구현)

  • Yang, Jong-Won;Cho, Jin-Man;Lee, Tae-Hoon;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.59-65
    • /
    • 2008
  • In security layer in the CDMA2000 1x EV-DO, a standard - C.S0024-a v2.0 is being accomplished under the project of 3GPP2(3rd Generation Partnership Project2). Therefore, a security device is needed to implement the security layer which is defined on the standard document for data transfer security between AT(Access Terminal) and AN(Access Network) on CDMA2000 1x EV-DO environment. This paper realizes the security layer system that can make safe and fast transfer of data between AT and AN. It could be applied to various platform environments by designing and implementing the Security Layer in the CDMA2000 1x EV-DO Security Layer to which applies C.S0024-A v2.0 of 3GPP2.