• 제목/요약/키워드: Key Management Mechanism

검색결과 231건 처리시간 0.026초

국가 연구개발을 위한 웹기반의 과제관리 시스템 (A WEB-BASED PROJECT MANAGEMENT SYSTEM FOR GOVERNMENT R&D PROGRAMS)

  • 손권중
    • 기술경영경제학회:학술대회논문집
    • /
    • 기술경영경제학회 2003년도 제23회 하계학술발표회 논문집
    • /
    • pp.108-115
    • /
    • 2003
  • Government R&D Project Management in Korea has had considerable difficulties because of the lack of project monitoring systems and insufficient communication. The National Program for Tera-level Nanodevices (TND Program) is a ten-year R&D program for commercialization in the area of nano technology. Collaboration and communication among the various participants such as business companies, universities, and government R&D institutes are key success factors in this R&D program. TND Program office has developed a Web-based project management system. This system consists of mostly four sub-management functions: (1) Milestones management of all R&D projects; (2) DR (Design Review) management as the mechanism for checking the performance against milestones; (3) Project activity management using the WBS (Work Breakdown Structure); (4) Budget management. Additionally, it also has many R&D supporting functions such as technology information bulletin board, community management, and visual summary of project progress and performance. This system is effective for monitoring research project as well as measuring project performance of the overall research program. This Web-based system has become the useful tool of R&D moving target mechanism and effective communication and collaboration tool. System features and adoption process of the system are also suggested.

  • PDF

신뢰성 있는 그룹키 관리를 위한 키 복구 메커니즘 (A Key Recovery Mechanism for Reliable Group Key Management)

  • 조태남;김상희;이상호;채기준;박원주;나재훈
    • 한국정보과학회논문지:정보통신
    • /
    • 제30권6호
    • /
    • pp.705-713
    • /
    • 2003
  • 그룹 통신의 보안이나 과금을 위해 사용되는 그룹키는 멤버쉽의 변동이 있을 때 키 갱신 메시지를 통하여 변경해 주어야 한다. 만약 이 메시지를 분실할 경우 그룹 데이타의 복호화가 불가능하며 과금도 어려워지므로, 신뢰성 있는 그룹키 갱신 메시지의 전달뿐 아니라, 분실된 키의 복구는 매우 중요한 문제이다. 특히 멤버의 로그오프 동안 분실된 메시지는 실시간 복구 요청이 불가능하므로 이에 대한 대책이 필요하다. 키 분배 센터가 전송된 메시지를 저장하고 이를 재전송하는 방법은 키 분배 센터의 많은 저장 공간을 요구하고, 불필요한 키들을 전송하고 복호화하도록 하며, 저장되지 않은 메시지는 복구가 불가능하다. 본 논문에서는 키 갱신 메시지의 분실이나 멤버의 로그인시에 발생할 수 있는 문제점을 분석하고 효율적으로 그룹키 및 보조키들을 복구하는 방법을 제시한다. 제안한 방법에서는 키-트리에 저장된 갱신정보를 이용하여 복구가 요구된 그룹키뿐 아니라 이로부터 복호화가 불가능한 그룹키 및 보조키들을 계산하고 전송한다. 또한 간단한 그룹키 생성 방법을 제시함으로써, 메시지를 저장하지 않고 임의의 그룹키를 복구할 수 있도록 하였으며, 불필요한 보조키들의 전송 및 복호화를 제거하였다.

Design of Secure Information Center Using a Conventional Cryptography

  • 최준혁;김태갑;고병도;류재철
    • 정보보호학회논문지
    • /
    • 제6권4호
    • /
    • pp.53-66
    • /
    • 1996
  • World Wide Web is a total solution for multi-media data transmission on Internet. Because of its characteristics like ease of use, support for multi-media data and smart graphic user interface, WWW has extended to cover all kinds of applications. The Secure Information Center(SIC) is a data transmission system using conventional cryptography between client and server on WWW. It's main function is to support the encryption of sending data. For encryption of data IDEA(International Data Encryption Algorithm) is used and for authentication mechanism MD5 hash function is used. Since Secure Information Center is used by many users, conventional cryptosystem is efficient in managing their secure interactions. However, there are some restrictions on sharing of same key and data transmission between client and server, for example the risk of key exposure and the difficulty of key sharing mechanisms. To solve these problems, the Secure Information Center provides encryption mechanisms and key management policies.

유보가격 보고 메커니즘을 이용한 협상거래 지원시스템 효율 증대 방안 연구 (The Study of Reserve Price Reporting Mechanisms: A New Mechanism for Negotiation Support Systems)

  • 샹웨이;권성우;리이준;유병준
    • Asia pacific journal of information systems
    • /
    • 제17권1호
    • /
    • pp.59-76
    • /
    • 2007
  • Information and Communication Technologies (ICT) changed our everyday business drastically. Business routines have been transformed to online activities. New theories and models were developed for the brand new online environment. For online negotiations, however, the research on new mechanisms is not enough, especially for bilateral distributive negotiations. A reserve price reporting mechanism (RPR) together with its extended version (ERPR) is proposed in this paper. The key improvement of reserve price reporting mechanisms is to let the negotiators report their reserve price to a third-party system before they actually start the negotiation. A prototype of this RPR system is developed and a lab experiment is conducted to test the performance of the two mechanisms compared with traditional direct bargaining (TDB) mechanism. The results of the experiment support that the reserve price report mechanisms proposed are more efficient than the traditional one in several dimensions including social welfare.

신뢰도와 키를 이용한 보안 라우팅 기법에 관한 연구 (A Study on Secure Routing Technique using Trust Value and Key in MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제11권3호
    • /
    • pp.69-77
    • /
    • 2015
  • MANET is composed of only the mobile nodes have a limited transmission range. The dynamic topology by the frequent movement of nodes makes routing difficult and is also cause exposed to security vulnerabilities. In this paper, we propose the security routing technique consisted of mechanism of two steps in order to respond effectively to attack by the modification of the routing information and transmit secure data. The hierarchical structure is used and the authentication node that issues the key of the nodes within each cluster is elected in this proposed method. The authentication node manages key issues and issued information for encrypting the routing information from the source node. The reliability value for each node is managed to routing trust table in order to secure data transmission. In the first step, the route discovery is performed using this after the routing information is encrypted using the key issued by the authentication node. In the second step, the average reliability value of the node in the found path is calculated. And the safety of the data transmission is improved after the average reliability value selects the highest path. The improved performance of the proposed method in this paper was confirmed through comparative experiments with CBSR and SEER. It was confirmed a better performance in the transmission delay, the amount of the control packet, and the packet transmission success ratio.

이동 애드혹 네트워크에서 세션 키 설정 방안 (A Session Key Establishment Scheme in Mobile Ad-Hoc Networks)

  • 왕기철;정병호;조기환
    • 한국정보과학회논문지:정보통신
    • /
    • 제31권4호
    • /
    • pp.353-362
    • /
    • 2004
  • 이동 애드혹 네트워크는 무선채널을 통해 데이타가 전송되고 중앙의 관리기관이 존재하지 않으므로 가용자원이 빈약하고 여러 가지 보안위협에 노출되어 있다 따라서 임의의 두 노드간에 안전한 통신을 수행하기 위해서는 안전하고 통신부하가 작은 세션 키 설정 방법이 요구된다. 그러나 애드혹 네트워크를 위한 기존의 키 설정 방법들은 모든 노드들에게 동일한 그룹 키를 분배하거나 효율적인 공개키 관리를 위한 방법들에 집중되어 왔다. 본 논문에서는 각 노드들간에 안전하게 그리고 작은 부하로 세션 키를 설정하는 방법이 제안된다. 제안하는 방법은 비밀 분산기법과 Diffie-Hellman 키 교환 방법을 이용한다. 클러스터내의 안전한 통신을 위해, 각 노드들은 클러스터내에서는 부분 비밀키를 사용하여 인증을 수행한 후에 자신의 클러스터 헤드와 세션 키를 생성한다. 또한 다른 클러스터간의 안전한 통신을 위해서 각 노드들은 상대방 노드의 공개키와 Diffie-Hellman 키 교환 방법을 이용하여 세션 키를 설정한다. 제안하는 방법은 실험을 통하여 클러스터 헤드 인중기반의 방법(1)에 비해 우수하다는 것을 입증하였다.

PROCESS ANALYSIS OF AUTOMOTIVE PARTS USING GRAPHICAL MODELLING

  • IRIKURA Norio;KUZUYA Kazuyoshi;NISHINA Ken
    • 한국품질경영학회:학술대회논문집
    • /
    • 한국품질경영학회 1998년도 The 12th Asia Quality Management Symposium* Total Quality Management for Restoring Competitiveness
    • /
    • pp.295-300
    • /
    • 1998
  • Recently graphical modelling is being studied as a useful process analysis tool for exploratory causal analysis. Graphical modelling is a presentation method that uses graphs to describe statistical models of the structures of multivariate data. This paper describes an application of this graphical modeling with two cases from the automotive parts industry. One case is the unbalance problem of the pulley, an automotive generator part. There is multivariate data of the product from each of the processes which are connected in the series. By means of exploratory causal analysis between the variables using graphical modeling, the key processes which causes the variation of the final characteristics and their mechanism of the causal relationship have become clear. Another case is, also, the unbalanced problem of automotive starter parts which consists of many parts and is manufactured by complex machinery and assembling process. By means of the similar technique, the key processes are obtained easily and the results are reasonable from technical knowledge.

  • PDF

시스템 인증기법을 적용한 DRM 시스템 설계 및 구현 (A Design and Implementation of DRM System by Applying System Authentication Method)

  • 장은겸;이범석
    • 디지털산업정보학회논문지
    • /
    • 제5권2호
    • /
    • pp.177-184
    • /
    • 2009
  • The digital contents distribution system via network provides comfortability, usability, and diversified functions to content's users. However, for the characteristic of easy access of digital contents, the copyright infringements and indiscreet contents distribution are realized in this days. In other words, any users with the authentication key can access to copyright contents with any restrictions. To solve this problems, we proposed a user authentication mechanism which prevent indiscreet access to the digital content by using user system information. Also, to provide safe distribution of digital content, we used user's unique content authentication key.

Key Success Factors of Blockchain Platform for Micro-enterprises

  • YANG, Mei-Hsiang;LEE, Tzong-Ru;CHANG, Tin-Chang
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제6권3호
    • /
    • pp.283-293
    • /
    • 2019
  • The purposes of the study are threefold: (1) develop key successful factors of blockchain platform for micro-enterprises based on Balanced Scorecard (BSC), (2) find out the correlation between the key successful factors of blockchain platform for micro-enterprises, and (3) understand the perception of micro-enterprise blockchain and the difference between theoretical guidance and practical application. This study combines Interpretative Structural Modeling Method, (ISM) and Decision-Making Trial and Evaluation Laboratory (DEMATEL) to analyze the causal relationships and hierarchical structures of the 12 key successful factors of blockchain platform for micro-enterprises and understand the correlation between factors. The 12 key successful factors developed based on the four perspectives of the Balanced Scorecard, and the questionnaire designs based on the concept of DEMATEL, and then analyzed data by DEMATEL and ISM methods to understand the correlation between key factors. The research results show that the key successful factors of blockchain platform for micro-enterprises include "brand equity", "security and anti-counterfeiting", "sales growth", "transparency and clear", "trust", "consensus mechanism", "traceability", "consistency", "tracking", "innovation management", "international", "organizational adaptation", in which consumer "trust" plays an important role. Micro-enterprises can use blockchain to expand the market, provide customers with better service quality, and bring sales growth to micro-enterprises.

Knowledge Extractions, Visualizations, and Inference from the big Data in Healthcare and Medical

  • Kim, Jin Sung
    • 한국지능시스템학회논문지
    • /
    • 제23권5호
    • /
    • pp.400-405
    • /
    • 2013
  • The purpose of this study is to develop a composite platform for knowledge extractions, visualizations, and inference. Generally, the big data sets were frequently used in the healthcare and medical area. To help the knowledge managers/users working in the field, this study is focused on knowledge management (KM) based on Data Mining (DM), Knowledge Distribution Map (KDM), Decision Tree (DT), RDBMS, and SQL-inference. The proposed mechanism is composed of five key processes. Firstly, in Knowledge Parsing, it extracts logical rules from a big data set by using DM technology. Then it transforms the rules into RDB tables. Secondly, through Knowledge Maintenance, it refines and manages the knowledge to be ready for the computing of knowledge distributions. Thirdly, in Knowledge Distribution process, we can see the knowledge distributions by using the DT mechanism.Fourthly, in Knowledge Hierarchy, the platform shows the hierarchy of the knowledge. Finally, in Inference, it deduce the conclusions by using the given facts and data.This approach presents the advantages of diversity in knowledge representations and inference to improve the quality of computer-based medical diagnosis.