• Title/Summary/Keyword: Information Exchange Requirements

Search Result 151, Processing Time 0.021 seconds

A Strategy for selectivity in research and development information: practical applications of the information analysis center concept (연구개발을 지원하는 정보 선별 전략 : 정보분석센터개념의 현실적 적용)

  • Koo Jayoung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.13
    • /
    • pp.143-181
    • /
    • 1986
  • The present study aims at figuring out the potential benefits occured from the practical pplications of the information analysis center concept in Korea. The R&D requirements in Korea at the moment is such that the highly specialized and sophisticated information services are essential. With the general information infrastructure still embryonic the best possible answer is sought in a specialized tried-out method, namely, the information analysis center which is to be planned and serviced as an integral part of a specific research project. The article examines the information exchange activities of scientists; the backgrounds of the development of the information analysis center concept into 'a technical institute'; the processess of information analyses and evaluations; the effects and values of an analysis center; and the applicabilities of the information analysis center concept with a special regard to the developing country's needs. The conclusion confirms of the potential benefits of the information analysis center type facilities for the current needs of the Korean research and development environments.

  • PDF

A Study on Efficient Management of Agricultural Information System (농업과학기술정보의 효율적 관리방안에 관한 연구)

  • 김태승
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 1994.12a
    • /
    • pp.161-164
    • /
    • 1994
  • Efficient use of scientific and technical information is indispensable for research and development. This study is aimed at new system design of Agricultural Information for RDA Library operation by an expeditious system for appropriate support of research activities through information service. Current Library management factors such as organization, budget, collections, staff. space, and information service was surveyed and user's requirements was also evaluated. In order of optimize the information system performance the new designed system was suggested as follows : 1) Existing dispersed library functions have to be unified as a whole 2) Library could be reorganize as a independent unit 3) Construction of inter-library network between libraries engaged in the same field highly recommand for the exchange of information.

  • PDF

Development of IFC Modeling Extension for the Exchange and Sharing of Design Guideline Information in the Architectural Design Phase (건축 설계 단계에서 설계지침정보의 공유 및 교환을 위한 IFC 확장모델의 개발)

  • Seo, Jong-Cheol;Kim, In-Han
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.5
    • /
    • pp.352-361
    • /
    • 2008
  • Architectural design work depends on information made from earlier phases such as feasibility study, planning, and conceptual design. This design guideline information includes design objectives, requirements, and constraints made by decision-making, and has great influence on various works of latter phases of design process. Despite of this cognition, however, the lack of design guideline information management still remains as one among the critical issues in design area. Design tools with design guideline information do not also address the issue of interoperability throughout the life-cycle of buildings. The purpose of this research is to propose a method for design guideline information management by using the IFC technology and IFC Property set (Pset) extension mechanism. The method comprises defining and mapping the practically used design guideline items and extensible IFC data model, and includes the management of relationships that exist between design guideline information and design model in the IFC data model.

A Study on Impact of the U.S. Security Initiatives on Korean Participants in Global Supply Chain (미국물류보안규범이 우리나라의 공급망 참여자에 미치는 영향과 대응방안)

  • Huh, Eun-Sook
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.217-236
    • /
    • 2008
  • The purpose of this paper is to discuss the impact of the New Container Security Initiatives of U.S., CSI(Container Security Initiative) and C-TPAT(Customs-Trade Partnership against Terrorism). The CSI which aims to pre-screen high-risk containers in ports of loading. It is a unilateral effort that seeks to develop bi-lateral agreements between the United States and foreign countries with significant container trade volumes into the U.S. C-TPAT is a voluntary initiative to develop cooperative security relationships between the U.S. government and U.S. firms in the global supply chain. Government and Industry have already responded with proposals to create more confidence in supply chain security. These proposals call for heightened inspection and scrutiny of the goods flowing through a supply chain, increased information exchange among participants of supply chain. While government and the private sector are working together to launch new initiative to create more secure and reliable supply chains, industry is rapidly exploring the potential of new technologies such as RFID. The security recommendations will eventually become the requirements to be complied with by importers and their supplier extending to the carriers. It is needed that Korean shippers involved in US importer's supply chain should pay attention to the requirements and start implementing the security measures.

  • PDF

Efficient Password-based Authenticated Key Exchange Protocol with Password Changing (패스워드를 변경 가능한 효율적인 패스워드 기반의 인증된 키 교환 프로토콜)

  • Lee Sung-Woon;Kim Hyun-Sung;Yoo Hee-Young
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.2 s.332
    • /
    • pp.33-38
    • /
    • 2005
  • In this paper, we propose a password-based authenticated key exchange protocol which authenticates each other and shares a session key using only a small memorable password between a client and a server over an insecure channel. The proposed protocol allows an authenticated client to freely change a his/her own password. The protocol is also secure against various attacks and provides the perfect forward secrecy. Furthermore, it has good efficiency compared with the previously well-known password-based protocols with the same security requirements.

Key Recovery Technology for Enterprise Information Infrastructure(EII) (기업 정보체계의 키 복구 기술)

  • 임신영;강상승;하영국;함호상;박상봉
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.3
    • /
    • pp.159-178
    • /
    • 1999
  • As Electronic Commerce is getting larger, the volume of Internet-based commerce by enterprise is also getting larger. This phenomenon applies to Internet EDI, Global Internet Business, and CALS information services. In this paper, a new type of cryptographic key recovery mechanism satisfying requirements of business environment is proposed. It is also applied to enterprise information infrastructure for managing employees' task related to handling official properties of electronic enterprise documents exchange. This technology needs to be complied to information management policy of a certain enterprise environment because behavior of cryptographic key recovery can cause interruption of the employees' privacy. However, the cryptographic key recovery mechanism is able to applied to any kind of information service, the application areas of key recovery technology must be seriously considered as not disturbing user's privacy It will depend on the policy of enterprise information management of a specific company.

  • PDF

Security Analysis On Battery Exchange System for Electric Vehicle (배터리 교체식 전기 자동차 시스템 연구 및 보안 요구 사항 분석)

  • Kwon, Yang-Hyeon;Choi, Yong-Je;Choi, Doo-Ho;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.2
    • /
    • pp.279-287
    • /
    • 2012
  • Recharging battery in electric vehicle takes a quite long time compared with gasoline and diesel vehicle which is a problem, the industries should solve, to introduce the electric vehicle into the market. For this reason, the institutions are suggesting a method replacing the discharged battery to recharged battery which is recharged in the switching center. However, this technology is still required to make clear the controversial issues such as threats to security and identification of users. In this paper, we explore the factors that threats to securities in battery exchange system and define the security requirements of the battery exchange system to solve suggested issues. The results of the research are expected to be the reference in the other studies of electric vehicle field of the commercialization of the battery recharging methods and analysis of the securities.

Studies on the Operating Requirements of Multi-Resolution Modeling in Training War-Game Model and on the Solutions for Major Issues of Multi-Resolution Interoperation between Combat21 Model and TMPS (훈련용 워게임 모델의 다중해상도모델링 운영소요 및 전투21모델과 TMPS의 다중해상도 연동간 주요 이슈 해결 방안 연구)

  • Moon, Hoseok;Kim, Suhwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.865-876
    • /
    • 2018
  • This study focuses on the operating requirements of multi-resolution modeling(MRM) in training war-game model and proposes solutions for major issues of multi-resolution interoperation between Combat21 model and tank multi-purpose simulator(TMPS). We study the operating requirements of MRM through interviews with defense M&S experts and literature surveys and report the various issues that could occur with low-resolution model Combat21 and high-resolution model TMPS linked, for example, when to switch objects, what information to exchange, what format to switch to, and how to match data resolutions. This study also addresses the purpose and concept of training using multi-resolution interoperation, role of each model included in multi-resolution interoperation, and issue of matching damage assessments when interoperated between models with different resolutions. This study will provide the common goals and directions of MRM research to MRM researchers, defense modeling & simulation organizations and practitioners.

An Encoding Method for Presentation of ISO 19848 Data Channel and Management of Ship Equipment Failure-Maintenance Types (ISO 19848 데이터 채널 표현과 선박 기관장비 고장·유지보수 유형 관리를 위한 코드화 기법)

  • Hwang, Hun-Gyu;Woo, Yun-Tae;Kim, Bae-Sung;Shin, Il-Sik;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.134-137
    • /
    • 2020
  • Recently, there are emphasized to support the maintenance and management system of vessels using acquired data from engine part equipment. But, there are limitations for data exchange and management. To solve the problem, the ISO published ISO 19847 and 19848. In this paper, we analyze the ISO 19848 requirements related to identify data channel ID for ship equipment, and propose the examples for applying encoding techniques. In addition, we suggest the proposed technique for applying of managing the failure and maintenance type of the ship's engine part facilities by examples. If this method is applied, the vessel's equipment can exchange data through the sharing of the code table, and express what response is needed or acted, including where the failure occurred.

Key Exchange Protocols for Domestic Broadband Satellite Access Network (광대역 위성 엑세스 방을 위한 키 교환 프로토콜 제안)

  • 오흥룡;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.13-25
    • /
    • 2004
  • The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the guideline of security functions in BSAN(Broadband Satellite Access Network), and analyze the specification of the security primitives and the hey exchange Protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(fretwork Control Centre). In addition, we propose the security specification for a domestic broad satellite network based on the analysis on the analysis profile of ETSI(European Telecommunications Standards Institute) standards. The key exchange protocols proposed in ETSI standard are vulnerable to man-in-the-middle attack and they don't provide key confirmation. To overcome this shortcoming, we propose the 4 types of the key exchange protocols which have the resistant to man-in-the-middle-attack, key freshness, and key confirmation, These proposed protocols can be used as a key exchange protocol between RCST and NCC in domestic BSAN. These proposed protocols are based on DH key exchange protocol, MTI(Matsumoto, Takashima, Imai) key exchange protocol, and ECDH(Elliptic Curve Diffie-Hellman).