• 제목/요약/키워드: 표준화 동향

Search Result 2,248, Processing Time 0.025 seconds

MPEG-21 Event Reporting Message Structure based on digital data broadcasting use case scenarios (디지털 데이터 방송 유즈케이스 시나리오에 기반한 MPEG-21 이벤트 리포팅 구조 설계)

  • 송영주;홍진우;문남미;지경희
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.399-409
    • /
    • 2003
  • In this paper, we present an Event Reporting which is one of the major items of MPEG-21 and exemplify two digital data broadcasting use case scenarios, and according1y we propose the Event Reporting message structure for MPEG-21 broadcasting contents that is based on these use case scenarios. Every interaction with a Digital Item in the multimedia framework can be called an Event. The need to standardize Event Reporting within the Multimedia Framework arise from the need to monitor and communicate amongst Peers and Users the Events relating to Digital Items and/or the programs and devices that operate on them at any given time. However, there are a number of difficulties in providing an accurate report about an Event. Different observers of the Event may have vastly different perspectives. In this paper, we describe a structure and vision of the Event Reporting. Besides we show the activities on MPEG-21 Event Reporting standardization.

AtoN AIS Standardization Research for Centralized Management of the AtoN(Aids to Navigation) (항로표지 집약관리를 위한 AtoN AIS의 표준화에 관한 연구)

  • Lim, Jong-Gun;Song, Gil-Boak;Park, Jeong-Nam;Cho, Tae-Gyun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2009.06a
    • /
    • pp.425-431
    • /
    • 2009
  • Recently, new technology has been introducing according to the efforts for maritime safety, traffic and environmental protection that uses electronic method to make use of maritime information effectively. To be associated with the tendance, international society which centered to IALA Introduces advanced technology of AtoN with Automatic Identification System(AIS) that it is crucial method to collect and transmit maritime data. This article is to thoroughly analyse and investigate the international and national regulation of related AtoN AIS, and propose to be included and applied into national radio-communication equipment regulation.

  • PDF

세계 담배관련 규제정책의 동향과 전망

  • 박준용
    • Proceedings of the Korean Society of Tobacco Science Conference
    • /
    • 2001.05a
    • /
    • pp.44-54
    • /
    • 2001
  • 담배는 오랜 과거부터 규제의 주요 대상이 되어 왔다. 1950년대 이전까지만 해도 담배관련 규제는 담배의 생산 및 제조활동과 함께 윤리 또는 규범적 차원에서 주로 이루어져 왔으나, 1950년대 초 이후부터 흡연의 건강 위해성에 관한 연구가 본격화되고 건강에 대한 공중의 관심이 확산되면서 담배와 흡연에 대한 사회적·법적 규제가 크게 강화되어 왔다고 할 수 있다. 담배산업이 그 동안 지속적인 성장을 하는 가운데에서도 담배와 흡연에 대해 강도 높은 규제가 가해져 온 이유는 담배가 성인들의 기호품으로써 보편화 된데 반해 건강 위해적 요소들을 내재하고 있고, 담배의 높은 수익가치로 인해 담배의 생산 및 판매가 정부의 재정사업으로 관할됨에 따라 정보에 의한 강력한 통제가 불가피했기 때문이라 할 수 있다. 세계 각 국에서 적용되고 있는 담배에 대한 일반적인 규제유형으로는 크게 흡연(smoking) 규제와 판매 및 촉진활동(sales & promotion) 규제, 경고문 부착(labeling)에 관한 규제, 그리고 진입 및 무역(entry & trade) 규제 등으로 구분될 수 있다. 한국의 경우는 전통적으로 흡연에 대해 매우 관대한 태도가 유지되어 왔으나, 95년도 중반 이후 국민건강 증진법 등의 규제법률이 제정·시행되면서 제도적·정책적 규제가 크게 강화되어 현재는 세계 최상위 수준을 유지하고 있다고 할 수 있다. 이러한 가운데 99년 5월 이후, 담배에 대한 표준화된 규제지침의 설정과 강화를 통해 궁극적으로 세상에서 담배를 근절시키고자 하는 목적 하에서 세계보건기구(WHO)의 주 역점사업으로서 추진되고 있는 담배규제협약(FCTC)은 담배에 대한 규제가 초국가적 차원으로 발전되는 계기를 제공하고 있다. 향후, 담배규제협약안의 세부사안들에 대한 합의과정에서 각 국별로 상당한 이견과 반발이 예상되고 있지만, 협약안의 전체 회원국 투표에서 승인될 경우 각 국가들뿐만 아니라 담배산업과 담배기업들에게 미치는 파급효과가 매우 클 것으로 예상된다. 대부분의 국제협약들이 그러하듯이, 담배규제협약도 그 적용 범위와 수준이 어느 정도로 결정되는지에 따라 각 국가와 기업별 이해관계가 크게 달라지게 되기 때문에 신중한 대응전략이 요구된다고 하겠다.

  • PDF

Challenges and Solutions of Electronic Journal Consortium (전자저널 컨소시엄의 당면과제와 해결방안 모색)

  • Kim, Sang-Jun
    • Journal of Information Management
    • /
    • v.41 no.4
    • /
    • pp.93-118
    • /
    • 2010
  • This study was aimed to establish a workable strategies to operate KESLI consortium reliably. To encourage the research purposes, it was mainly investigated international literature on current challenges for the e-journals consortium in comparison with the domestic implications. Major issues and challenges are divided to six items by scholarly communication changes and e-journals percentage increase, a big deal for a contract -based consortium pricing model in vogue, a consortium of the price hikes and making budget difficulties, use the standard statistics by the results of the use, archiving and archive security uncertainty, and contracts public availability of such external conditions. As a result, the international challenges of E-journals consortium was similar to KESLI, but the depth of information and research on domestic was weaker than the international research. To see more research and a rational perception based on scientific evidence and alternatives that enable KESLI working in the field was needed to be.

ISO and OGC Standards for Geo-spatial Image Information and Suggestions for Their Applications (공간영상정보 관련 ISO와 OGC 표준현황과 활용을 위한 제언)

  • Lee, Ki-Won;Kang, Hae-Kyong
    • Korean Journal of Remote Sensing
    • /
    • v.26 no.4
    • /
    • pp.451-464
    • /
    • 2010
  • In these days, application cases of national or international standards in the field of geo-spatial information based on information technology are being increased. Especially, demands regarding distribution, dissemination and interoperability of contents using geo-spatial images and these information resources are also on the increasing stage, so that standards as core elements supporting these trends are getting to be emphasized. However, interests on standards of geo-spatial image information processing including remotely sensed images and efforts for development and application of these standards are not enough, domestically. In this study, international standards for geo-spatial image information in ISO and OGC as well as the domestic status were reviewed with the summaries concerned. Comparison with international and domestic standards shows that most national standards were partly modified and translated with international ones, but there are rare cases of application plans or studies concerned in this field. If these situations are continued, industrial stack or applications of technologies regarding standards are getting lesser. Therefore, it is necessary to analyze some problems and to study strategy to overcome them, and the result of this study could be used for the initial works.

The Comparative Study of Adult Literacy Surveys for Composing the Base of Lifelong Learning Policies : Case Studies of UK, France and Germany (평생학습정책 기반 조성을 위한 성인 문해력 조사 비교 연구 - 영국, 프랑스, 독일 사례를 중심으로 -)

  • Lee, Ji-Hye;Heo, Joon
    • Korean Journal of Comparative Education
    • /
    • v.24 no.3
    • /
    • pp.101-125
    • /
    • 2014
  • The purpose of this study is to analyze comparatively adult literacy surveys of UK, France and Germany who have developed their own adult literacy survey tools independently. The results of the study show that these three countries are similar in that all of them utilize literacy survey tools linked to their own adult literacy policies. The survey tools of the countries are based on the definition of adult literacy as functional literacy and everyday life skill. The criteria of adult literacy levels are differentiated in the context of the countries. And SQC model is adopted as the main model of developing the survey tools. Through this analysis, the following implications could be obtained to improve Korean adult literacy survey. It needs 1) to unify execution subjects of adult literacy survey and adult literacy policy. 2) to develop survey tools reflecting everyday life, 3) to make tools into module form, 4) to pursue the efficiency of cost and utilization of tools.

The Integrated Cyber SRM(Security Risk Monitoring) System Based on the Patterns of Cyber Security Charts

  • Lee, Gang-Soo;Jung, Hyun Mi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.99-107
    • /
    • 2019
  • The "Risk management" and "Security monitoring" activities for cyber security are deeply correlated in that they prepare for future security threats and minimize security incidents. In addition, it is effective to apply a pattern model that visually demonstrates to an administrator the threat to that information asset in both the risk management and the security system areas. Validated pattern models have long-standing "control chart" models in the traditional quality control sector, but lack the use of information systems in cyber risk management and security systems. In this paper, a cyber Security Risk Monitoring (SRM) system that integrates risk management and a security system was designed. The SRM presents a strategy for applying 'security control' using the pattern of 'control charts'. The security measures were integrated with the existing set of standardized security measures, ISMS, NIST SP 800-53 and CC. Using this information, we analyzed the warning trends of the cyber crisis in Korea for four years from 2014 to 2018 and this enables us to establish more flexible security measures in the future.

A Research on the improvement of domestic IoT security certification system (국내 IoT 보안인증 제도 개선 연구)

  • Lee, Yongpil;Suh, YungJin;Lee, SangGeol
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.79-92
    • /
    • 2021
  • In a society where ICT technology is converged, the use of various network-connected devices such as IoT is spreading. Network-connected devices are inevitably exposed to the threat of hacking such as information leakage, and countermeasures need to be prepared to respond. Security certification system for IoT devices has been introduced to promote security of IoT products, and for this purpose, legalization and standardization of certification standards and methods are in progress. In line with this, in Korea, as the Information and Communication Network Act was revised in 2020, ICT convergence devices connected to the network were newly defined as "information and communication network connected devices," and the basis for the security certification system is being established. We summarized related domestic and foreign trends and suggest specific considerations for implementing the security certification system for IoT devices in South Korea.

Scheme of Secure IoT based Group communication (확장성과 보안을 보장하는 IoT 디바이스 기반의 그룹통신 기법)

  • Kim, Ki-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.1
    • /
    • pp.98-103
    • /
    • 2021
  • In this study, we propose a group communication technique that guarantees security and expandability by configuring a network consisting of IoT terminals equipped with security functions. As the number of devices participating in the network increases, network resources are proportionally reduced, and adding a security function to the IoT device increases the delay time due to encryption in the IoT device. If the error rate that occurs in the network increases, network resources are quickly consumed due to retransmission. Therefore, IoT terminals are grouped to ensure scalability while supporting security, reducing the consumption of network resources even when the number of participating nodes increases, thus ensuring scalability. For the future implementation, the encryption method used in IoT terminals considered the standard of IEEE802.5.4, and the standardization trend was investigated and classified. The proposed method applies IoT devices that provide security functions of the IEEE802.5.4 standard to the group communication base to ensure reliability and scalability. In the performance evaluation, the effectiveness of the proposed method was confirmed by comparing the delay times when grouping IoT devices with security functions through simulation.

Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems (UHF 수동형 RFID 시스템에 적합한 경량 고속의 보안 프로토콜 설계 및 구현)

  • Kang, You-Sung;Choi, Yong-Je;Choi, Doo-Ho;Lee, Sang-Yeoun;Lee, Heyung-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.117-134
    • /
    • 2010
  • A passive RFID tag which received attention as a future technology for automatic and quick identification faces some difficulties about security problems such as tag authentication, reader authentication, data protection, and untraceability in addition to cost and reliable identification. A representative passive RFID technology is the ISO/IEC 18000-6 Type C which is an international standard for 900 MHz UHF-band. This standard has some difficulties in applying to the security services such as originality verification, tag's internal information protection, and untraceability, because it does not provide high-level security solution. In this paper, we summarize security requirements of ISO/IEC ITC 1/SC 31 international standardization group, propose security protocols suitable for the UHF-band passive RFID system using a crypto engine, and analyze its security strength. In addition, we verify that it is possible to implement a tag conforming with the proposed security protocols by presenting concrete command/response pairs and cryptographic method.