• Title/Summary/Keyword: 학과인증

Search Result 417, Processing Time 0.026 seconds

스마트 항로표지 서비스별 인증 절차 및 관리체계 정의

  • 홍승표;김종도;이훈재;이영실
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.306-308
    • /
    • 2023
  • IHO S-100(범용 수로 데이터 모델)은 차세대 전자해도 뿐만 아니라 수로 분야, 해사 분야, GIS 커뮤니티에서 필요로 하는 전자적 제품 개발을 위한 데이터 프레임워크를 제공하는 표준이다. 또한, S-100의 보안 영역(Part 15)은 기본적인 보안 이론을 명시하고 사용을 권장하고 있다. 본 논문에서는 S-100과 SECOM을 기반으로 서비스별 보안 적용이 된 시뮬레이션을 명시하였으며 각 서비스별 사용자 인증 절차 및 관리체계에 대하여 정의한다.

  • PDF

Comparison of Animal Welfare Standards for Broiler (육계 관련 동물복지 인증기준 비교)

  • Yoo, Geum Zoo;Cheon, Si Nae;Kim, Chan Ho;Jung, Ji Yeon;Kim, Dong-Hoon;Jeon, Jung Hwan
    • Korean Journal of Organic Agriculture
    • /
    • v.28 no.4
    • /
    • pp.643-658
    • /
    • 2020
  • Animal welfare has become a prominent concern around the world so that the laws and guidelines of animal welfare are being strengthened in many countries including the EU. In Korea, it is required to supplement animal welfare standards because social awareness of animal welfare has changed. This study was conducted to compare broiler welfare certification standards and improve the quality of practice. We found that broiler welfare certification standards differ among countries according to environmental and managemental differences. Standards for stocking density and perch which is considered more important for poultry welfare are similar, but there is a little difference in feed, water, litter and lighting. Therefore, we assumed that theses are able to revise standards taking into account the environment and suggested that the broiler welfare certification standard will serve as a more useful criterion if breeding conditions in Korea are considered.

Security Issues on Cloud Based Smart Grid (클라우드 기반 스마트 그리드 환경에서의 보안 이슈)

  • Lee, Hyeop-Geon;Lee, Kyoung-Hwa;Park, Min-Su;Shin, Yong-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.770-773
    • /
    • 2010
  • 최근 큰 관심을 모으고 있는 스마트 그리드는 그린 에너지 환경 구현을 위한 기반 기술로 에너지 효율을 최적화하고자 하는 차세대 전략망이다. 스마트 그리드의 다양한 활용 가능성에도 불구하고 구조적 특징과 상호 운용성 표준의 부재로 인해 신뢰적인 인증을 보장하지 못한다. 이로 인해 네트워크의 신뢰성을 약화시키는 요인으로 작용하며, 많은 보안상의 문제를 야기한다. 따라서, 신뢰적인 클라우드 기반 스마트 그리드 환경을 구현하기 위하여 표준 및 정책 제정과 안전한 데이터 통신을 위한 보안 메커니즘 개발 및 인증 기술 개발이 필요하다. 본 논문에서는 클라우드 기반 스마트 그리드와 표준화 동향 및 클라우드 기반 스마트 그리드 환경에서의 보안기술을 살펴보고 이를 해결하기 위한 대안을 제시함을 목표로 한다.

Face Recognition-based Conference Participant Management System (얼굴 인식 기반 회의 참가자 관리 시스템 설계 및 구현)

  • Choi, Minhyeok;Yoon, Taehwan;Kim, Yunseo;Kim, Wonvin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • fall
    • /
    • pp.223-224
    • /
    • 2021
  • 최근 코로나19로 인하여 건물의 출입 관리가 엄격해지고 있으며, 대규모 회의가 진행될 경우 많은 사람들의 출입으로 출입 관리에 어려움이 있다. 이에 본 논문은 이러한 어려움을 해결하기 위하여, 얼굴 인식 기반 회의 참가자 관리 시스템을 제안한다. 회의 개설자가 초대한 회의 참가자들은 얼굴 인식을 통해 본인의 신원을 인증하며, 인증된 사용자는 참가자 목록, 회의록과 같은 회의 정보를 열람할 수 있는 권한을 획득한다.

  • PDF

On a mobile security token using the PingPong-128 Generator (PingPong-128 키 수열 발생기를 이용한 모바일 보안 토큰에 관한 연구)

  • Kim, Nack Hyun;Cho, Sang Il;Kim, Tae Yong;Jang, Won Tae;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.351-354
    • /
    • 2009
  • In the internet communication technology, authentication of the user is main task. So far, very popular researches have been proposed for user authentications based on user_id and password. These existing methods have some merits as well as demerits also. In this paper, we analyzed the existing authentication method problems and implement a secure PingPong-128 based key generator for internet technology. In our new scheme, we are using one time password and security card numbers to generate the secure tokens for the user and internet service provider.

  • PDF

The Effect of Eco-friendly Characteristics on the Price of Office Buildings (친환경 특성이 오피스 빌딩 가격에 미치는 영향)

  • So, Soung Kue;Cho, Joo Hyun
    • Korea Real Estate Review
    • /
    • v.28 no.2
    • /
    • pp.49-64
    • /
    • 2018
  • The purpose of this study is to analyze the effect of eco-friendly building certification grade on the price and cost of office in Seoul office building. For this purpose, multiple regression analysis is used to examine the prices of buildings. In order to identify the effect of environmental cost reduction of buildings with high eco-friendly certification, we also performed LCC (Life Cycle Cost) + LCA (Life Cycle Assessment) analysis. Results of our analysis show that office buildings with a higher level of eco-friendly certification are priced significantly higher. Through LCC analysis, it was also found that buildings with high levels of eco-friendly certification cost less than those with lower-level certification. Furthermore, it was confirmed that office buildings with higher-level environmental certification have total lower environmental load costs (TCA = LCC+LCA) than buildings without certification. According to the TCA analysis, buildings with a high level eco-certification generated lower social costs than buildings with lower-level or no certification.

Improved Tree-Based ${\mu}TESLA$ Broadcast Authentication Protocol Based on XOR Chain for Data-Loss Tolerant and Gigh-Efficiency (데이터 손실에 강하고 효율적 연산을 지원하는 XOR 체인을 이용한 트리기반 ${\mu}TESLA$ 프로토콜 개선)

  • Yeo, Don-Gu;Jang, Jae-Hoon;Choi, Hyun-Woo;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.43-55
    • /
    • 2010
  • ${\mu}TESLA$ broadcast authentication protocol have been developed by many researchers for providing authenticated broadcasting message between receiver and sender in sensor networks. Those cause authentication delay Tree-based ${\mu}TESLA$[3] solves the problem of authentication delay. But, it has new problems from Merkel hash tree certificate structure. Such as an increase in quantity of data transmission and computation according to the number of sender or parameter of ${\mu}TESLA$ chain. ${\mu}TPCT$-based ${\mu}TESLA$[4] has an advantages, such as a fixed computation cost by altered Low-level Merkel has tree to hash chain. However, it only use the sequential values of Hash chain to authenticate ${\mu}TESLA$ parameters. So, It can't ensure the success of authentication in lossy sensor network. This paper is to propose the improved method for Tree-based ${\mu}TESLA$ by using XOR-based chain. The proposed scheme provide advantages such as a fixed computation cost with ${\mu}$TPCT-based ${\mu}TESLA$ and a message loss-tolerant with Tree-based ${\mu}TESLA$.

Analytical Model for Reducing Authentication Signaling Traffic in 3GPP Networks (인증 시그널링 트래픽 최소화를 위한 수학적 분석에 관한 연구)

  • Han, Chan-Kyu;Song, Sehwa;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1155-1158
    • /
    • 2009
  • 모바일 서비스는 사용자보호를 위해 인증 및 암호화 기능이 필수적으로 제공되어야만 한다. 3GPP는 3 세대 이동통신 (UMTS)를 위한 인증보안구조인 AKA를 정의하였다. AKA에서는 인증벡터를 다수 개 생성하여 처리하는 기법을 채택하고 있으나 이러한 기법이 인증서버의 load 증가 및 방문서버의 저장공간 소모라는 문제점을 야기한다. 하지만 인증벡터를 다수 개 생성하는 기법은 단말의 핸드오버를 위한 필수불가결한 기법이다. 따라서 본 논문에서는 사용자의 이동패턴 및 인증요청 처리 속도에 따른 인증벡터의 동적 선택 알고리즘을 제안하여 이동통신 네트워크의 signaling load를 최소화하고자 한다. 이를 위해 확률 및 큐잉 이론이 도입되었으며, 시뮬레이션을 통해 수학적 분석을 검증한다. 또한 기존 관련연구에서 제안 하는 알고리즘과 비교 평가하였다.

ZigBee Authentication Protocol with Enhanced User Convenience and Safety (사용자 편의성 및 안전성이 강화된 ZigBee 인증 프로토콜)

  • Ho-jei Yu;Chan-hee Kim;Sung-sik Im;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.81-92
    • /
    • 2022
  • The rapidly growing IoT market is expanding not only in general households but also in smart homes and smart cities. Among the major protocols used in IoT, ZigBee accounts for more than 90% of the smart home's door lock market and is mainly used in miniaturized sensor devices, so the safety of the protocol is very important. However, the device using Zig Bee is not satisfied with the omnidirectional safety because it uses a fixed key during the authentication process that connects to the network, and it has not been resolved in the recently developed ZigBee 3.0. This paper proposes a design method that provides omnidirectional safety to the ZigBee authentication protocol and can be quickly applied to existing protocols. The proposed improved ZigBee authentication protocol analyzed and applied the recently developed OWE protocol to apply ECDH, which has low computational volume and provides omnidirectional safety in IoT. Based on this, it provides the safety of the ZigBee authentication protocol, and it is expected that it will be able to provide user convenience as it does not require a separate certificate or password input.

Awareness and practice of infection control in dental hygienists: A comparison between accredited and non-accredited dental hospitals (치과위생사의 감염관리 인지 및 실천도 연구 :인증치과병원과 비인증치과병원의 비교)

  • Yang, Jin-Ju;Moon, Sang-Eun;Kim, Yun-Jeong;Kim, Seon-Yeong;Cho, Hye-Eun;Kang, Hyun-Joo
    • Journal of Korean society of Dental Hygiene
    • /
    • v.19 no.5
    • /
    • pp.677-688
    • /
    • 2019
  • Objectives: The purpose of this study was to examine the perception of dental hospital accreditation and the awareness and practice of infection control in dental hygienists. Methods: A self-reported questionnaire was completed by 238 dental hygienists working at dental hospitals in Gwangju Jeonnam and analyzed from October 24, 2016 to September 22, 2017. Data were analyzed with the independent t-test, one-way analysis of variance, Pearson's correlation analysis, and multiple regression analysis using the Statistical Package for the Social Sciences software, version 21.0. Results: Compared to non-accredited dental hospitals, all three variables were high for accredited dental hospitals. In accredited dental hospitals, healthcare accreditation expectancy effects correlated to awareness (r=0.407) and practice (r=0.533) of infection control, and awareness of infection control correlated to its practice (r=0.725). In non-accredited dental hospitals, healthcare accreditation expectancy effects correlated to awareness of infection control (r=0.239), and awareness of infection control correlated to its practice (r=0.481). Accredited dental hospitals showed healthcare accreditation expectancy effects (${\beta}=0.258$) and awareness of infection control (${\beta}=0.556$), and non-accredited dental hospitals were influenced by the number of employees (${\beta}=0.567$) and awareness of infection control (${\beta}=0.376$). Conclusions: It is necessary to develop efficient and systematic infection control programs to improve the awareness and practice of infection control in dental hygienists and patient's safety in the clinical field.