• Title/Summary/Keyword: 키 정책

Search Result 201, Processing Time 0.025 seconds

비즈니스 인사이드 - 코닥-풀린키, 통합 워크플로 솔루션 세미나 개최

  • 대한인쇄문화협회
    • 프린팅코리아
    • /
    • v.11 no.11
    • /
    • pp.94-95
    • /
    • 2012
  • (주)풀린키(대표이사 김일영)는 한국코닥(주)(대표이사 이수범)와의 대리점 계약체결을 기 념해 지난 10월 17일 호텔PJ에서 한국코닥과 공동으로 '코닥 통합 워크플로 솔루션 세미나'를 개최했다. 이날 세미나에서 코닥은 2012년도 하반기 더욱 강력해진 코닥 통합 워크플로 솔루션에 대해 공개했으며, 풀린키에서는 코닥 프리너지와 CIDPS 서체 판매정책에 대해 밝혔다.

  • PDF

다국적 담배기업에 대항하는 세계적연대와 금연운동

  • 대한결핵협회 편집부
    • 보건세계
    • /
    • v.37 no.5 s.405
    • /
    • pp.57-59
    • /
    • 1990
  • 제3세계에 엄청난 질병과 사망의 재앙을 초래할 다국적 담배기업의 무차별적 시장공략과 부도덕한 미국의 무역정책에 대항하기 위하여 제7차 담배와 건강 세계대회는 금연운동을 범세계적연대와 계획을 승인하고 이에 앞장선 미국암협회가 제창한 각국의 금연운동통신망 구축계획에 적극 참여키로 했다.

  • PDF

상반기 에너지정책 실적현황 - 에너지 저소비형 구조산업 전환에 역점

  • 한국온돌난방시공협회
    • 보일러설비
    • /
    • s.80
    • /
    • pp.62-64
    • /
    • 2000
  • 정부는 연말까지 대체에너지 보급목표 1.1${\%}$를 달성키 위해 중점기술분야에의 집중투자와 확보된 기술의 보급 확대를 적극 추진하고, 에너지 기술개발 10개년 계획의 실효성있는 수정보완을 통해 기술분류체계 개선 등 전략적 지원 방안을 모색하며, 기술의 중요성과 파급효과가 큰 중심기술 분야와 단기실용화가 가능한 일반 추진분야로 분류할 계획이다.

  • PDF

V+법률_특허관련 심판제도 - 특허출원과 특허관련 심판제도

  • 벤처기업협회 편집실
    • Venture DIGEST
    • /
    • s.129
    • /
    • pp.58-59
    • /
    • 2009
  • 최근 세계적인 경제 불황에 대처하기 위해 우리나라와 중국, 그리고 일본의 특허청장들이 모여 지식재산권 정책 방향의 조율과 함께 특허심사 효율성 제고 및 출원인 비용절감을 위한 공동 프로젝트를 추진키로 합의했다고 한다. 오늘날과 같은 지식정보사회에서는 첨단기술이 집약된 고부가가치의 상품이나 문화 예술작품을 만들어내는 것 못지않게 지적 창조자의 권익을 보호하는 것 또한 매우 중요하므로, 어떤 절차와 방법을 통해 권리를 보호받을 수 있는지 알아둘 필요가 있다.

  • PDF

Constant-Size Ciphertext-Policy Attribute-Based Data Access and Outsourceable Decryption Scheme (고정 크기 암호 정책 속성 기반의 데이터 접근과 복호 연산 아웃소싱 기법)

  • Hahn, Changhee;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.43 no.8
    • /
    • pp.933-945
    • /
    • 2016
  • Sharing data by multiple users on the public storage, e.g., the cloud, is considered to be efficient because the cloud provides on-demand computing service at anytime and anywhere. Secure data sharing is achieved by fine-grained access control. Existing symmetric and public key encryption schemes are not suitable for secure data sharing because they support 1-to-1 relationship between a ciphertext and a secret key. Attribute based encryption supports fine-grained access control, however it incurs linearly increasing ciphertexts as the number of attributes increases. Additionally, the decryption process has high computational cost so that it is not applicable in case of resource-constrained environments. In this study, we propose an efficient attribute-based secure data sharing scheme with outsourceable decryption. The proposed scheme guarantees constant-size ciphertexts irrespective of the number of attributes. In case of static attributes, the computation cost to the user is reduced by delegating approximately 95.3% of decryption operations to the more powerful storage systems, whereas 72.3% of decryption operations are outsourced in terms of dynamic attributes.

A study on non-face-to-face art appreciation system using emotion key (감정 키를 활용한 비대면 미술감상 시스템 연구)

  • Kim, Hyeong-Gyun
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.57-62
    • /
    • 2022
  • This study was conducted with the purpose of listening to the explanations of artworks in the non-face-to-face class and confirming the learner's feelings as a result of the class. The proposed system listens to the explanation of the artwork, inputs the learner's emotions with a dedicated key, and expresses the result in music. To this end, the direction of the non-face-to-face art appreciation class model using the emotion key was set, and based on this, a system for non-face-to-face art appreciation was constructed. The learner will use the 'smart device using the emotion key' proposed in this study to listen to the explanation of the artwork and to input the emotion for the question presented. Through the proposed system, learners can express their emotional state in online art classes, and instructors receive the results of class participation and use them in various ways for educational analysis.

ECC-based IPTV Service Key Establishment Protocol With User Attribute (사용자 속성을 이용한 ECC 기반의 IPTV 서비스 키 설립 프로토콜)

  • Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.105-111
    • /
    • 2012
  • Internet Protocol Television (IPTV) through broadband cable network is a subscriber-based system which consists of software and set-top box. However, a weakness for the current IPTV system is the lack of security between users and CAS. This paper proposes a user authentication protocol at STB, which limits the service by the user-valued attribute to prevent illegal IPTV users. User attribute values change the order with bit form according to the certain rule, and apply to one-way hash function and Diffie-Hellman's elliptic curve key-exchange algorithm. The proposed protocol is able to improve on user authentication and computation. Also, each user generates an authentication message by smart card and receives various services based on the user-valued attribute.

Designing and Implementing a PKI-based Safety Protocol for Electronic Medical Record Systems (공개키 기반의 안전한 전자의무기록에 관한 프로토콜 설계 및 구현)

  • Jin, Gang-Yoon;Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.243-250
    • /
    • 2012
  • This study proposes new protocol protecting patients' personal record more safely as well as solving medical dispute smoothly by storing the record not into a computer server in hospitals but into the National Health Insurance Corporation computer server. The new protocol for electronic medical record is designed using RSA public key algorithm and DSA digital signature. In addition, electronic medical record systems are built up with more safety and reliability through certificate authority. The proposed medical information systems can strengthen trust between doctors and patients. If medical malpractice occurs, the systems can also provide evidence. Furthermore, the systems can be helpful to reduce medical accidents. The systems could be also utilized efficiently in various applied areas.

mNPKI for Mobile Government in Developing Countries (개발도상국의 모바일 정부를 위한 mNPKI)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.161-171
    • /
    • 2019
  • Government transactions over wireless electronic devices are not safe and hence the messages are prone to attack. Thereby, devices supporting wireless Internet must assure the same level of security and privacy as the wired network. National public key infrastructure (NPKI) for electronic government used in the wired environment is not suitable for wireless environment for mobile government (mGovernment) because of the limitations of computing power, memory capacity and restricted battery power. This requires the development of a new NPKI for mGovernment, denoted as mNPKI, to developing countries, which provides the same security level as the wired NPKI. For the wireless environment requirements, mNPKI is based on short lived certificates. Analysis shows that mNPKI is well suited to wireless Internet and provides the same security requirement from the wired NPKI.

A Key Management Technique Based on Topographic Information Considering IoT Information Errors in Cloud Environment (클라우드 환경에서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법)

  • Jeong, Yoon-Su;Choi, Jeong-hee
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.233-238
    • /
    • 2020
  • In the cloud environment, IoT devices using sensors and wearable devices are being applied in various environments, and technologies that accurately determine the information generated by IoT devices are being actively studied. However, due to limitations in the IoT environment such as power and security, information generated by IoT devices is very weak, so financial damage and human casualties are increasing. To accurately collect and analyze IoT information, this paper proposes a topographic information-based key management technique that considers IoT information errors. The proposed technique allows IoT layout errors and groups topographic information into groups of dogs in order to secure connectivity of IoT devices in the event of arbitrary deployment of IoT devices in the cloud environment. In particular, each grouped terrain information is assigned random selected keys from the entire key pool, and the key of the terrain information contained in the IoT information and the probability-high key values are secured with the connectivity of the IoT device. In particular, the proposed technique can reduce information errors about IoT devices because the key of IoT terrain information is extracted by seed using probabilistic deep learning.