• Title/Summary/Keyword: 초기인증

Search Result 204, Processing Time 0.032 seconds

Effects of Entrepreneurship Education Based on Relative Policies Link (창업교육연계의 효과측정모형 및 정책제안)

  • Seol, Byung-Moon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.2
    • /
    • pp.9-17
    • /
    • 2012
  • This paper integrates elements from the theory of agency, the entrepreneurship education, the start-up policies. Entrepreneurship education is demanded to enhance success of business candidate for business establishment and to increase start-up survival. Three researches are made by this study. First of all, Educational performance is measured and it explains why linked policies is needed. To explain linked performance, this paper introduces several hypothesis. These are about a rate of start-up failure caused by agency problem and a rate of education effect decreasing agency problem. Secondly, operation performance of it can be increased by linking among policies and should be for the original goals of start-up policies. Finally, several ideas including start-up certification is proposed. Start-up certification has role of contact point of different entrepreneurship policies. As a result, level of satisfaction of policies will increase and specially of education program by linked effects.

  • PDF

Missing Children Policy in Korea: A Legislative Model for Korean Code Adam Alert (한국형 코드아담제도 도입을 위한 입법모델 연구)

  • Lee, Sung Yong;Kim, Hakkyong
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.179-191
    • /
    • 2012
  • In 2003, the US Congress enacted the Code Adam Act of 2003. The Act was so-named in memory of six-year-old Adam Walsh, who was abducted from a Sears department store in Florida and was later found murdered in 1981. According to the Act, the designated authority for a public building must establish procedures for locating a child missing in a federal facility in the USA. In this context, the study basically aims to propose a legislative model for a missing children policy in Korean multi-use facilities, critically analyzing the US Code Adam Act. Unlike the Act, the proposed Korean bill requires all multi-use facilities beyond a certain size, including private buildings, to arrange a feasible missing child procedure on their own premises. The bill can impose an administrative fine on facilities which don't have the procedure in place, and further can make the list of the facilities known to the public. In order to encourage voluntary participation from the private sector, the bill finally suggests the Voluntary Certification Scheme through which participating business can take advantage of the certification logo commercially.

Two layered Secure Password Generation with Random Number Generator (난수 발생기를 이용한 이중화 구조의 안전한 비밀번호 생성 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.867-875
    • /
    • 2014
  • Rapid development of internet service is enabling internet banking services in anywhere and anytime. However, service access through internet can be exposed to adversary easily. To prevent, current service providers execute authentication process with user's identification and password. However, majority of users use short and simple password and do not periodically change their password. As a result of this, user's password could be exposed to attacker's brute force attack. In this paper, we presented enhanced password system which guarantee higher security even though users do not change their current password. The method uses additional secret information to replace real password periodically without replacement of real password.

A Design of Permission Management System Based on Group Key in Hadoop Distributed File System (하둡 분산 파일 시스템에서 그룹키 기반 Permission Management 시스템 설계)

  • Kim, Hyungjoo;Kang, Jungho;You, Hanna;Jun, Moonseog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.141-146
    • /
    • 2015
  • Data have been increased enormously due to the development of IT technology such as recent smart equipments, social network services and streaming services. To meet these environments the technologies that can treat mass data have received attention, and the typical one is Hadoop. Hadoop is on the basis of open source, and it has been designed to be used at general purpose computers on the basis of Linux. To initial Hadoop nearly no security was introduced, but as the number of users increased data that need security increased and there appeared new version that introduced Kerberos and Token system in 2009. But in this method there was a problem that only one secret key can be used and access permission to blocks cannot be authenticated to each user, and there were weak points that replay attack and spoofing attack were possible. Hence, to supplement these weak points and to maintain efficiency a protocol on the basis of group key, in which users are authenticated in logical group and then this is reflected to token, is proposed in this paper. The result shows that it has solved the weak points and there is no big overhead in terms of efficiency.

Girth Welding Procedure and Mechanical Properties of Gas Pipeline (가스배관 원주자동용접 공정 개발 및 기계적 특성 평가)

  • Kim, Woo-Sik;Kim, Young-Pyo;Kim, Choel-Man
    • Proceedings of the KWS Conference
    • /
    • 2009.11a
    • /
    • pp.84-84
    • /
    • 2009
  • 파이프라인을 건설함에 있어 가장 중요한 기술이 배관 용접기술이다. 즉 파이프와 파이프를 연결하는 작업이 공사 진척도를 결정하기 때문에, 이를 얼마나 경제적으로 신속하게 수행해 나가느냐하는 것은 건설기간 및 건설비용을 결정하는 핵심 요소이다. 가스배관 시공 원주용접 방법은 여러 가지 있는데, 현재 국내에서는 전량 수동용접을 채택하고 있다. 이 방법은 국내 가스배관을 건설한 초기부터 적용해온 것으로 우수한 품질을 확보할 수 있으며, 취약한 국내 자동화기술과 열악한 도로 매설 시공여건에서 적용하기 용이한 방안이다. 그러나 우수한 용접기량을 보유한 용접사가 점차 부족해지고, 배관시공 시간을 단축하고 비용을 줄이기 위한 필요성이 점차 커지면서 이를 해결할 수 있는 기술로서 자동원주용접방안이 있다. 이 기술들은 해외 가스배관에 이미 오래전부터 적용되어 용접부위 신뢰성과 품질 우수성을 확보하고 시공비용절감을 달성하고 있다. 자동용접을 적용하기 위해서는 용접절차를 수립하여 절차인증시험을 수행하고, 기존방안과 동일이상의 품질이 확보되며 효율성을 겸비해야만 한다. 국가 기본에너지의 안정적인 공급을 위해 적기 시공이 필요하고, 1 km당 10 억원 이상이 소요되는 배관시공비용 중 약 1/3이 용접비파괴검사 비용인 점을 감안할 때 품질이 확보되면서 경제적인 시공방안이 있다면 이를 적용하는 것이 국가 산업 경제적 측면에서 필요한 일이다. 이와 관련된 연구에서는 국내 가스배관 원주용접에 적용 가능한 용접공정을 검토하고, 용접절차를 수립하여 절차인증시험을 수행하였으며, 추가로 배관 원주 자동용접부위에 대한 기계적 특성 평가를 실시하였다. 현재 국내 건설여건과 비파괴검사 기준을 만족시키고 안전성과 효율성을 겸비한 방법으로는 초층과 2층은 수동 GTAW를 적용하고 나머지 층은 반자동 FCAW를 적용하는 방안이 적절한 것으로 판단된다. 전 층을 자동 GTAW로 용접하는 방안은 품질은 확보되지만 효율성측면에서 대형배관에는 적용하기 어려울 것으로 보이며, 해외에서 많이 사용되는 자동 GMAW 방안은 국내 비파괴검사기준을 만족시키기 어려워 검토대상에서 제외하였다. 본 논문에서는 두 가지 용접방법에 대한 용접공정개발과정과 원주용접부위 기계적 특성을 검토하여 최적방안을 제시하고자 한다.

  • PDF

A Study on the Implementation of Aircraft System Safety Assessment using Probabilistic Analysis of Failure Data (고장 데이터의 확률 분석을 적용한 항공기 시스템 안전성 평가 수행 방안 연구)

  • Yoo, Seung-woo;Kim, In-Gul
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.spc
    • /
    • pp.31-38
    • /
    • 2020
  • The aircraft system safety assessment, which is emphasized in the development and certification of aircraft, is a systematic and comprehensive evaluation process to determine that all relevant failure conditions have been identified and that all significant combinations of failures cannot result in unacceptable hazards. As the aircraft systems become more complex and require integrated function and performance, proper safety objectives must be established and appropriate assessments are need to be accompanied. This paper has prepared to propose the efficient probabilistic analysis of failure data to evaluate the risk level over the entire aircraft lifecycle through the safety assessment and to review the considerations for aircraft certification and safety improvement.

The automatic generation of MPTCP session keys using ECDH (MPTCP에서 ECDH를 이용한 세션 키 자동생성에 관한 연구)

  • Sun, Seol-hee;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1912-1918
    • /
    • 2016
  • MPTCP(Multipath Transmission Control Protocol) is able to compose many TCP paths when two hosts connect and the data is able to be transported through these paths simultaneously. When a new path is added, the authentication between both hosts is necessary to check the validity of host. So, MPTCP exchanges a key when initiating an connection and makes a token by using this key for authentication. However the original MPTCP is vulnerable to MITM(Man In The Middle) attacks because the key is transported in clear text. Therefore, we applied a ECDH(Elliptic Curve Diffie-Hellman) key exchange algorithm to original MPTCP and replaced the original key to the ECDH public key. And, by generating the secret key after the public key exchanges, only two hosts is able to make the token using the secret key to add new subflow. Also, we designed and implemented a method supporting encryption and decryption of data using a shared secret key to apply confidentiality to original MPTCP.

A Study on Development Direction of MRO Industry for SMB (소모성자재산업 발전방향 연구)

  • Kim, Kyung-Ihl
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.1
    • /
    • pp.49-55
    • /
    • 2013
  • This study is for preparation a solution develop small suppliers. For this goal survey for the buyers, agents, supplier's situation and difficulties, policy and support systems. And After benchmark the other's countries, develop government policy, suppoet systems. As a results, the support must be made for public organization, small suppliers. The Response direction must be made for agents and private buyers. At the point of support systems, public organizations must implement the purchase systems and provide the verified informations of suppliers. And it's necessary to educate marketing and sales solutions. At the point of Response directions, it's necessary to make a standard for supply replaced MRO. And the beginning positioning directions of MRO-mall is needed to stress the differentials with private suppliers.

  • PDF

Hash-based SSDP for IoT Device Security (IoT 기기 보안을 위한 해시 기반의 SSDP)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.9-16
    • /
    • 2021
  • Due to the prolonged infectious disease of COVID-19 worldwide, there are various security threats due to network attacks on Internet of Things devices that are vulnerable to telecommuting. Initially, users of Internet of Things devices were exploited for vulnerabilities in Remote Desktop Protocol, spear phishing and APT attacks. Since then, the technology of network attacks has gradually evolved, exploiting the simple service discovery protocol of Internet of Things devices, and DRDoS attacks have continued to increase. Existing SSDPs are accessible to unauthorized devices on the network, resulting in problems with information disclosure and amplification attacks on SSDP servers. To compensate for the problem with the authentication procedure of existing SSDPs, we propose a hash-based SSDP that encrypts server-specific information with hash and adds authentication fields to both Notify and M-Search message packets to determine whether an authorized IoT device is present.

Establishment of a public safety network app security system (재난안전망 앱 보안 체계 구축)

  • Baik, Nam-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1375-1380
    • /
    • 2021
  • Korea's security response to application service app is still insufficient due to the initial opening of the public safety network. Therefore, preemptive security measures are essential. In this study, we proposed to establish a 'public safety network app security system' to prevent potential vulnerabilities to the app store that distributes app in public safety network and android operating system that operate app on dedicated terminal devices. In order for an application service app to be listed on the public safety network mobile app store, a dataset of malicious and normal app is first established to extract characteristics and select the most effective AI model to perform static and dynamic analysis. According to the analysis results, 'Safety App Certificate' is certified for non-malicious app to secure reliability for listed apps. Ultimately, it minimizes the security blind spots of public safety network app. In addition, the safety of the network can be secured by supporting public safety application service of certified apps.