• Title/Summary/Keyword: Information Assurance

Search Result 650, Processing Time 0.045 seconds

Characterization of Primary Dynamic Resistance in Resistance Spot Welding (저항 점 용접의 1차 동저항 특성에 관한 연구)

  • 조용준;이세헌;신현일;배경민
    • Journal of Welding and Joining
    • /
    • v.17 no.2
    • /
    • pp.97-103
    • /
    • 1999
  • The dynamic resistance monitoring in primary circuit is one of the important issues. Because in-process and real time quality assurance of resistance spot weld is needed to increase the product reliability. In this study, new dynamic resistance detecting method is proposed as a practical manner of weld quality assurance using instantaneous current and voltage measured at the primary circuit. and also, various patterns of primary dynamic resistance curve are characterized with the macro photograph and the weldability lobe curve. It is found that the primary dynamic resistance patterns are basically similar to those of the secondary, but there is evident advantage such as no extra devices are needed to obtain the quality information and eventually real time feedback control will be possible.

  • PDF

A Verified Formal Specification of A Secured Communication Method For Smart Card Applications

  • Kim, Donald D.
    • Journal of Appropriate Technology
    • /
    • v.7 no.2
    • /
    • pp.172-187
    • /
    • 2021
  • In remote villages without access to modern IT technology, simple devices such as smartcards can be used to carry out business transactions. These devices typically store multiple business applications from multiple vendors. Although devices must prevent malicious or accidental security breaches among the applications, a secure communication channel between two applications from different vendors is often required. In this paper, first, we propose a method of establishing secure communication channels between applications in embedded operating systems that run on multi-applet smart cards. Second, we enforce the high assurance using an intransitive noninterference security policy. Thirdly, we formalize the method through the Z language and create the formal specification of the proposed secure system. Finally, we verify its correctness using Rushby's unwinding theorem.

Quality Evaluation Factors and Continuance Intention for Web-based Legal Information Services (웹기반 법률정보서비스 품질 평가요인 및 지속의도에 관한 연구)

  • Park, Ji-Hong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.28 no.4
    • /
    • pp.57-76
    • /
    • 2017
  • The purpose of this study is to investigate the determinants of the quality of Web-based legal information services and their significant influences on the user continuance intentions. Based on the main dimensions of the SERVQUAL, this study conceptualizes five dimensions of reliability, assurance, design, empathy, and responsiveness. It measures the level of expectation and satisfaction on the basis of these five dimensions. Regression analysis was conducted to extract and analyze the determinants of the service quality and the factors affecting continuous intention. The level of legal information service quality is superior in empathy, responsiveness, and design category, but it is relatively insufficient in reliability and assurance category. In the reliability category, the relevance of the search results was an issue. The problems related to the authority and information sources were recognized as important. Reliability implies that there is a relatively close relationship between empathy and responsiveness, and that it is necessary to improve the quality of contents such as empathy and responsiveness in order to increase reliability. In order to increase the ongoing use of legal information services in the future, it is more effective to make sure that assurance is top priority.

A Proposal of Personal Information DB Encryption Assurance Framework (개인정보 DB 암호화 검증 프레임웍 제안)

  • Ko, Youngdai;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.397-409
    • /
    • 2014
  • According to the Personal Information Protection Act(PIPA) which is legislated in March 2011, the individual or company that handles personal information, called Personal information processor, should encrypt some kinds of personal information kept in his Database. For convenience sake we call it DB Encryption in this paper. Law enforcement and the implementation agency accordingly are being strengthen the supervision that the status of DB Encryption is being properly applied and implemented as the PIPA. However, the process of DB Encryption is very complicate and difficult as well as there are many factors to consider in reality. For example, there are so many considerations and requirements in the process of DB Encryption like pre-analysis and design, real application and test, etc.. And also there are surely points to be considered in related system components, business process and time and costs. Like this, although there are plenty of factors significantly associated with DB Encryption, yet more concrete and realistic validation entry seems somewhat lacking. In this paper, we propose a realistic DB Encryption Assurance Framework that it is acceptable and resonable in the performance of the PIPA duty (the aspect of the individual or company) and standard direction of inspection and verification of DB Encryption (the aspect of law enforcement).

A Study on the Development of Korea Defense PKI for Information Assurance (정보보증을 위한 국방PKI 구축 방안에 관한 연구)

  • 김종문;남길현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.637-641
    • /
    • 2002
  • 현재 국방부는 국방 정보 통신망에서 소통되는 정보에 대한 기밀성 및 무결성을 보장하고, 접근통제, 사용자 식별 및 인증, 부인봉쇄 등의 보안서비스를 제공하기 위한 국방 인증체계 구축 사업을 추진하고 있다. 본 논문은 미 국방부의 미 국방 PKI를 연구하고, 현재 우리 군에서 추진하고 있는 국방 인증체계 구축 노력에 대한 문제점을 분석하여 앞으로 우리 군이 국방 인증체계 구축을 위해 추진해 나가야 할 방향을 제시하였다.

  • PDF

Development of the Cyber University's Admission Quota Policy Model (사이버대학 학생정원 관리모형 개발)

  • Lee, In-Sook;Suh, Soon-Shik
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.3
    • /
    • pp.493-503
    • /
    • 2011
  • The Korea Ministry of Education, Science and Technology (MEST) determines admission quota of cyber universities. MEST's decision is made based on each university's physical and administrative capacity for handling admission numbers. However, the unique characteristics of cyber universities (e.g., online teaching and learning environments) are not considered in MEST's current decision process. MEST also lacks specifics in their policies that are required to ensure university's autonomous control for admission number as well as learners' rights and quality assurance. This study intended to improve decision making process on admission quota of cyber universities so as to increase quality assurance of education. The alternative admission quota decision frameworks have been formulated based on (a) the analysis of the current practices of cyber universities, (b) focus group interviews, and (c) recommendations of the expert.

  • PDF

Trust Assurance of Data in Cloud Computing Environment (클라우드 컴퓨팅 환경의 데이터 신뢰 확보)

  • Jung, Im-Y.;Jo, In-Soon;Yu, Young-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1066-1072
    • /
    • 2011
  • Cloud Computing Environment provides users with a blue print of IT Utopia with virtualization; unbounded computing power and data storage free from the cost and the responsibility of maintenance for the IT resources. But, there are several issues to be addressed for the Cloud Computing Environment to be realized as the blue print because users cannot control the IT resources provided by the Cloud Computing Environment but can only use them. One of the issues is how to secure and to trust data in the Cloud Computing Environment. In this paper, an efficient and practical trust assurance of data with provenance in Cloud Computing Environment.

A Study on a Traffic Conditioning Scheme for Alleviating a bias against Reserved Bandwidth Size in Differentiated Services Network (차별 서비스 네트워크에서 예약 대역폭의 편향성을 완화하는 트래픽 조절 기법 연구)

  • 이성근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.228-235
    • /
    • 2002
  • Differentiated services network (DiffServ) aims to provide the same service to a group of connections that have similar Quality of Service requirements. One of the essential function to realize DiffServ is the traffic conditioning mechanisms to support the required services. The paper proposes the enhanced traffic conditioning mechanism which alleviates a bias against reserved bandwidth size. The simulation results show that the new mechanism is rather insensitive of size of reserved bandwidth, and performs better both in terms of throughput assurance and fair distribution of excess bandwidth in case of well-provisioned and over-provisioned network environment.

Performance Analysis of the Data Delivery Schemes for Reliability Assurance in Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크의 신뢰성 확보를 위한 데이터 전송 방법의 성능 비교)

  • Kim, Seung-Cheon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.45-51
    • /
    • 2008
  • As noted in the various USN service implementations including those in U-City, the reliable data transmission has become the essential component as the USN services are getting more various. The assurance of the reliability is needed sometimes prior to other QoS specifications of the USN services. The efficiency would become more important as well in USNs because the efficient and reliable delivery of a packet could be consequently linked to the energy saving. This paper is intended to provide the performance comparisons of data delivery schemes in USNs.

Design of the Security Evaluation System for Internet Secure Connectivity Assurance Platform (인터넷 패킷 보호 보증 플랫폼에서의 보안성 평가 시스템 설계)

  • 김상춘;한근희
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.207-216
    • /
    • 2004
  • IPsec protocol has been developed to provide security services to Internet. Recently IPsec is implemented on the various operating systems Hence, it is very important to evaluate the stability of the Ipsec protocol as well as other protocols that provide security services. However, there has been little effort to develop the tools that require to evaluate the stability of IPsec protocols. Therefore, in this paper, we develope the security requirements and suggest a security evaluation system for the Internet packet protection protocols that provide security services at the If level that can be used to check if the security protocols Provide the claimed services correctly This system can be used as debugging tool for developing IPsec based security system.