• 제목/요약/키워드: Information Protect Model

검색결과 311건 처리시간 0.024초

UML기반의 공공부문 정보화프로젝트관리모델에 관한 연구 (A Prefect Management Model for Developing Information Systems in Public Sector with UML)

  • 옹상순;최재현;박제원;이남용
    • 한국IT서비스학회지
    • /
    • 제8권3호
    • /
    • pp.101-109
    • /
    • 2009
  • For half a century, PMM(Project Management Model) continually has been advanced by many researchers and managers. Especially, the model for civil and construct engineering has now high maturity, but the model for IT engineering has not acceptable maturity. PMI(Project Management Institute) provides the knowledge of protect management for general purpose, it is not adequate for IT prefect management without complements. In this paper, we propose IT project management model based the knowledge of PMI using UML. IT project management model provides not only functions for project planning, budgeting, design and Implement, but also the knowledge for managing IT protect efficiently. We use uses case diagrams to describe the details of the model. We expect the model to be used in management of IT project efficiently in public sector.

익명성 보호를 위한 스마트 컨트랙트의 배송추적 방지 모델 (Delivery Tracing Protect Model Based Smart Contract for Guaranteed Anonymity)

  • 김영찬;김영수;임광혁
    • 산업융합연구
    • /
    • 제16권1호
    • /
    • pp.15-20
    • /
    • 2018
  • 인터넷 쇼핑의 증가와 함께 운송장에 적힌 배송정보를 악용한 범죄가 보이스피싱을 통한 물품 가로채기, 상해, 성범죄에 이르기까지 갈수록 고도화 세분화 되고 있다. 따라서 고객의 배송정보에 대한 익명성을 보장하기 위해서 다수 운송업자 상호간에 제품의 배송 구간에 대한 경로 정보를 비밀로 유지하는 배송추적 방지 시스템이 필요하다. 이를 위해서 인터넷 쇼핑의 대금결제와 개인정보의 연계 분리는 블록체인기반 암호화폐의 익명성 기술을 사용하여 보호하고 운송정보에 포함되는 배송정보를 암호화해서 익명성을 보호하는 배송추적 방지 모델 제안한다. 우리의 제안 모델은 고객의 배송정보에 대한 익명성을 보장함과 동시에 기업에게 고객의 배송정보를 제외한 제품판매에 대한 정보를 동시에 제공함으로서 블록체인 기반 인터넷 쇼핑의 활성화에 기여한다.

최소 권한 계정 분리 모델을 이용한 데이터베이스 엑세스 제어 연구 (A Study on Database Access Control using Least-Privilege Account Separation Model)

  • 장영수
    • 디지털산업정보학회논문지
    • /
    • 제15권3호
    • /
    • pp.101-109
    • /
    • 2019
  • In addition to enabling access, database accounts play a protective role by defending the database from external attacks. However, because only a single account is used in the database, the account becomes the subject of vulnerability attacks. This common practice is due to the lack of database support, large numbers of users, and row-based database permissions. Therefore if the logic of the application is wrong or vulnerable, there is a risk of exposing the entire database. In this paper, we propose a Least-Privilege Account Separation Model (LPASM) that serves as an information guardian to protect the database from attacks. We separate database accounts depending on the role of application services. This model can protect the database from malicious attacks and prevent damage caused by privilege escalation by an attacker. We classify the account control policies into four categories and propose detailed roles and operating plans for each account.

Oil Spill Response System using Server-client GIS

  • Kim, Hye-Jin;Lee, Moon-Jin;Oh, Se-Woong
    • 한국항해항만학회지
    • /
    • 제35권9호
    • /
    • pp.735-740
    • /
    • 2011
  • It is necessary to develop the one stop system in order to protect our marine environment rapidly from oil spill accident. The purpose of this study is to develop real time database for oil spill prediction modeling and implement real time prediction modelling with ESI and server-client GIS based user interface. The existing oil spill prediction model cannot provide one stop information system for public and government who should protect sea from oil spill accident. The development of multi user based information system permits integrated handling of real time meteorological data from external ftp. A server-client GIS based model is integrated on the basis of real time database and ESI map to provide the result of the oil spill prediction model. End users can access through the client interface and request analysis such as oil spill prediction and GIS functions on the network as their own purpose.

블록체인 기반 의료정보시스템 도입을 위한 의사결정모델 (Decision making model for introducing Medical information system based on Block chain Technologies)

  • 정아군;김근형
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제29권1호
    • /
    • pp.93-111
    • /
    • 2020
  • Purpose The purpose of this paper is to observe the relative priorities of importances among the modified versions of Block chain system, being based on AHP decision support model which should be also proposed in this paper. Design/methodology/approach Four versions modified from the beginning of Block chain were divided into Public& Permissionless, Private&Permissionless, Public&Permissioned and Private&Permissioned types. Five criteria for evaluating the four versions whether the version were suitable for Medical information system were introduced from five factors of Technologies Accept Model, which were Security, Availability, Variety, Reliability and Economical efficiency. We designed Decision support model based on AHP which would select the best alternative version suitable for introducing the Block chain technology into the medical information systems. We established the objective of the AHP model into finding the best choice among the four modified versions. First low layer of the model contains the five factors which consisted of Security, Availability, Variety, Reliability and Economical efficiency. Second low layer of the model contains the four modified versions which consisted Public&Permissionless, Private&Permissionless, Public&Permissioned and Private& Permissioned types. The structural questionnaire based on the AHP decision support model was designed and used to survey experts of medical areas. The collected data by the question investigation was analyzed by AHP analysis technique. Findings The importance priority of Security was highest among five factors of Technologies Accept Mode in the first layer. The importance priority of Private&Permissioned type was highest among four modified versions of Block chain technologies in second low layer. The second importance priority was Private&Permissionless type. The strong point of Private&Permissioned type is to be able to protect personal information and have faster processing speeds. The advantage of Private& Permissionless type is to be also able to protect personal information as well as from forging and altering transaction data. We recognized that it should be necessary to develop new Block chain technologies that would enable to have faster processing speeds as well as from forging and altering transaction data.

OLAP 환경에서 개인정보보호를 위한 개인정보 분리 권한관리 모델 (A Model of Authority Management for the Protection of Personal Information in OLAP)

  • 김형규;김민호;권정숙;최용락
    • 한국IT서비스학회지
    • /
    • 제13권2호
    • /
    • pp.163-172
    • /
    • 2014
  • Personal information has been stolen continuously and it is also affected from development of the Internet. So the government requires that companies spend more effort for protecting customers' personal information. The OLAP server also should meet this requirement, but it is hard to satisfy for the authority management. The OLAP server must use personal information to extract required information from database. This thesis suggests a model of separating between general information and personal information, so this model can help to minimize the leakage of personal information. The model is implemented and tested as a prototype. This prototype can prove that the new model is better than the original one. This study presents that the authority management on the separation between personal information and general information helps protect the personal information of customers.

중요문화재의 소방안전 진단 및 예방관리 시스템 모델 연구 -경기도내 전통적인 목조건축물 중심으로- (A Study of Prevention Management System Model and Fire Safety Diagnose for Cultural Heritages -Based on Traditional wooden structure in kyong gi-Do-)

  • 정길흥
    • 기술사
    • /
    • 제32권6호
    • /
    • pp.148-157
    • /
    • 1999
  • As cultural Heritages are source of the national history and a life transition, their extinction is a fatal shock as result of cutoff the genealogy of the creative national spirit. So, we have necessarily to protect them, and to get the duty and the responsibility which the cultural inheritance hands over tnem to descendants with preserving and meaning safely at present time. In these days, the risk of fire in the Cultural Heritages building is increased because of rash changing environments from the indiscreet development of them. Accordingly, in order to get the original transmission of the Cultural Heritages, this paper involves being intensive the fire safety information of the Cultural Heritage in kyonggi-do province, analyzing their diagnoses, and studying a Fire Safety Prevention Management model to protect and to maintain them continuously. Therefore, it is to contribute from this approach to collecting fire safety information, analyzing diagnostic problems in fire accidents, and to manage the prevention method for protecting and maintaining the Cultural Heritages.

  • PDF

사용자 개인 정보 및 위치 정보를 보호하기 위한 NFC결제 시스템 모델 (NFC Payment System Model for Security Privacy and Location Information of User)

  • 김경일;전귀수;채규수
    • 중소기업융합학회논문지
    • /
    • 제5권2호
    • /
    • pp.21-26
    • /
    • 2015
  • 최근 스마트폰을 이용하여 개인 인증과 전자결제를 수행하는 근거리 무선통신 NFC 기술이 다양한 분야에서 각광을 받고 있다. 그러나, 기존 모바일 서비스 및 기기와 쉽게 융합이 가능하기 때문에 개인정보 및 위치정보와 관련된 보안이 취약하다. 본 논문에서는 다양한 분야에서 서비스되고 있는 NFC 결제 시스템의 사용자 개인정보 및 위치정보를 보호하기 위한 NFC 결제 모델을 제안한다. 제안 모델은 사용자의 개인정보 및 위치정보를 보호하기 위해서 Tag 기반 서비스를 이용한다. Tag 기반 서비스를 이용하는 제안 모델은 손쉽게 접근할 수 있는 장소에서 간단한 Tag만으로 다양한 정보 확인이 가능한 특징이 있다.

  • PDF

협업 설계에서의 다중해상도 모델링 응용 (Application of Multi-Resolution Modeling in Collaborative Design)

  • 김태성;한정현
    • 한국컴퓨터그래픽스학회논문지
    • /
    • 제9권2호
    • /
    • pp.1-9
    • /
    • 2003
  • Information assurance(IA) refers to methodologies to protect engineering information by ensuring its availability, confidentiality, integrity, non-repudiation, authentication, access control, etc. In collaborative design, IA techniques are needed to protect intellectual property, establish security privileges and create "need to know" protections on critical features. Aside from 3D watermarking, research on how to provide IA to distributed collaborative engineering teams is largely non-existent. This paper provides a framework for information assurance within collaborative design, based on a technique we call role-based viewing. Such role-based viewing is achieved through integration of multi-resolution geometry and security models. 3D models are geometrically partitioned, and the partitioning is used to create multi-resolution mesh hierarchies. Extracting an appropriately simplified model suitable for access rights for individual designers within a collaborative design environment is driven by an elaborate access control mechanism.

  • PDF

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • 제6권2호
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.