• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.033 seconds

A study on Rate Making Scheme of Korean Hull Insurance Rate in Preparation for the Opening of Hull Insurance Market (선박보검시장의 개방에 대비한 우리나라 선박보검기준 산정방안에 관한 연구)

  • 김형건
    • Journal of the Korean Institute of Navigation
    • /
    • v.18 no.3
    • /
    • pp.31-49
    • /
    • 1994
  • In the meantime Korean Insurance Industry has been developed a steady growth under government's political protection. But insurance market seems to be opened unavoidably owing to the liberalization of international trade by the Agreements of UR and the bloc of economy by EC Integration and the Organization of NAFTA. By the above reason, especially, in case of hull insurance, the rate of hull insurance is being instituted as a problem. Accordingly the recognition for the problem like this, in thsi study, explained the major objectives of rate making and described the basic rate making methods that are used in property and liability insurance, and searched the rate making schemes of hull insurance rate of the major nations by comparing method. And as a conclusion, the writer presented several schemes including new rate making scheme of hull insurance rate and the security of statistical data about loss ratio, and the establishment of Korean Hull Insurance Association.

  • PDF

A proposal of a smart home platform for home entertainment experience (홈 엔터테인먼트를 위한 스마트 홈 플랫폼 제안)

  • Wu, Jing;Liu, Hao;Jung, Jae yu;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.931-933
    • /
    • 2012
  • In this thesis propose a conceptual design of a platform for better home entertainment experience. Smart phone, smart TV and a personal computer are the most important devices in this platform design. The platform was designed and proposed by a personal computer. The platform provides a high degree of interaction and integration among devices within the environment. The clouds are better than the traditional approaches and it is more acceptable in terms of security and economy.

  • PDF

The System Architecture and Standardzation of Production IT Convergence for Smart Factory (스마트공장을 위한 IT 융합 표준화 동향 분석과 시스템 구조)

  • Cha, Suk Keun;Yoon, Jae Young;Hong, Jeong Ki;Kang, Hyun Gu;Cho, Hyeon Chan
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.32 no.1
    • /
    • pp.17-24
    • /
    • 2015
  • Smart factory requires 4 Zero factors including Zero Waiting-time, Zero Inventory, Zero Defect, Zero Down-time) that needs IT convergence for production resources of 4M1E(Man, Machine, Material, Method, Energy) in real time and event processing in all type of manufacturing enterprises. This paper will be explaining about core emerging production IT convergence technologies including cyber device security, 4M1E integration, real time event driven architecture, common platform of manufacturing standard applications, smart factory to-be model for small and medium manufacturing enterprises.

Antecedents of Continuous Use and Purchase Intention: In the Context of Mobile Application Store

  • Kim, Yoo-Jung;Han, Jin-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.7
    • /
    • pp.65-76
    • /
    • 2015
  • This study investigates predictors of continuance intention and purchase intention in mobile application(App) stores. This study identifies the structural relationships among app store quality, user habit, switching costs, user loyalty, continuance intention, and purchase intention in mobile application stores. The results indicate that user loyalty increases continuance intention and purchase intention and that user habit positively affects perceived switching costs and user loyalty. App store quality is a formative construct including quality of content, ease of use, and security. App store quality affects user habit positively. This study theoretically and practically contributes to the integration of influential factors for continuance intention as well as purchase intention.

Application of Multi-Resolution Modeling in Collaborative Design (협업 설계에서의 다중해상도 모델링 응용)

  • Kim, Tae-Seong;Han, Jung-Hyun
    • The KIPS Transactions:PartA
    • /
    • v.10A no.4
    • /
    • pp.339-346
    • /
    • 2003
  • This paper provides a framework for information assurance within collaborative design, based on a technique we call role-based viewing. Such role-based viewing is achieved through integration of multi-resolution geometry and security models. 3D models are geometrically partitioned, and the partitioning is used to create multi-resolution mesh hierarchies. Extracting a model suitable for access rights for individual designers within a collaborative design environment Is driven by an elaborate access control mechanism. 

A Design of WBAN Data Integration System for the HL7-based patient management

  • Hwang, Chigon;Shin, Hyoyoung;Lee, Jongyong;Jung, Kyedong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.66-69
    • /
    • 2015
  • Recently with the development of IT technology, the medical technology have been developed in various ways. Among them, WBAN can check the state of the patient in real time. However, the data generated by these techniques have a problem that they have heterogeneous properties depending on the type of sensors and devices. In this paper, we proposed a method using meta repository as a way to provide the sensing data of WBAN for the health care system by integrating along the HL7 standard item.

안전한 웹 서비스를 위한 SOAP 메시지 보안기술 연구

  • 박배효;이재일
    • Review of KIISC
    • /
    • v.14 no.4
    • /
    • pp.10-18
    • /
    • 2004
  • 상호운영성, 유연성, P2P(피어투피어), 역동성, 확장성 등 웹 서비스가 지닌 다양한 특성으로 인하여 웹 서비스 보안은 안전한 웹 서비스 운영을 위한 핵심요소라 할 수 있다. 웹 서비스의 기본 구성은 서비스 수요자와 제공자, 검색소로 구성되며 WSDL(Web Service Definition Language), UDDI(University Discovery and Integration of Business for Web), SOAP(Smple Object Access Protocol)등 세 개의 표준으로 서비스는 이루어진다. 이 중에서 특히 메시지 교환을 담당하는 통신 프로토콜인 SOAP는 웹 서비스 보안의 중심에 있으며, 웹 서비스 보안은 SOAP 메시지의 사용자 인증과 무결성, 기밀성을 보장하는 것으로 정의할 수 있다. SOAP는 HTTP를 통해 일반적으로 전송되므로 HTTP 상의 모든 위협을 가지게 되며 전송계층에 기반을 둔 보안을 생각할 수 있지만, 사실상 웹 서비스는 다수의 중간 중개자를 가질 수 있는 구조이기 때문에 단대단 보안(메시지 레벨의 보안)이 반드시 필요하다. 또한, 웹 서비스 상에서 단대단 보안을 보장하기 위해서는 각 객체와 키와의 연결이 중요하며 특정 객체에게 발행한 보안토큰의 신뢰성 화보를 위한 메카니즘을 필요로 한다. 본 논문에서는 이러한 보안 요구사항을 만족하기 위하여 XML 메시지 보안을 위한 전자서명 및 암호화 표준과 SOAP을 위한 W3C, OASIS의 통합표준을 중심으로 SOAP 메시지 보안기술을 분석하고자 한다.

Integration of Static and Dynamic Analysis based AOP for Security Vulnerability Analysis (보안 취약점 검사를 위한 AOP 기반의 정적/동적 분석의 통합)

  • Seo, Kwang-Ik;Choi, Eun-Man
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06b
    • /
    • pp.34-38
    • /
    • 2010
  • 최근 DDoS와 같은 악의적 인터넷 공격의 횟수가 증가하고 그에 따른 피해도 커지고 있다. 이를 방지하기 위해 개발 초기 단계에서부터 프로그램 코드를 분석하여 보안의 취약점을 제거하려는 노력을 하고 있다. 하지만 대부분은 개발 초기의 빠른 적용과 분석 효율성을 강조하여 정적 분석에만 집중하고 있어 실행 시점에서 발생할 수 있는 취약점은 정확히 예측하기 어렵다. 따라서 본 연구는 이러한 제약사항을 해결하기 위해 AOP를 이용하여 정적 분석과 동적 분석의 통합이 가능하면서 동시에 분석 모듈의 확장성을 높일 수 있는 방법을 제안한다.

  • PDF

Secured MPLS-based Mobile IP using the Private IP Address

  • Wiroon, Sriborrirux;Kim, Jeong-Beom;Rhe, Yun-Jung;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1289-1292
    • /
    • 2002
  • The number of connected computers in the Internet, which has reached a state in which its address space is becoming insufficient is exponentially increased. Also nowadays modern Laptops and Mobile terminal are being used more and more. As hewn, the number of available IPv4 address is limited and many organizations have limited budget to use the global address. So the way to overcome such problems is using private addresses in their networks. In addition, the use of private address makes the system more secure. Moreover, we have considered about supporting of the scalability of data forwarding processes of nodes in their network especially Mobile IP data communication. Thus, we propose the integration of MPLS and Mobile IP network. Also we propose the security services of a constrained LSP for the MPLS payloads.

  • PDF

Design Principles for Learning Environment based on STEAM Education

  • Kim, Sunyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.55-61
    • /
    • 2021
  • In this study, a learning environment based on STEAM theory was proposed to support and improve learners' activities and achievements for convergent design education. The learning environment design influence STEAM education with intentional design and schedule coordination, schools can create informal environments that are crucial to STEAM education. The physical surroundings of the learning space should be applied to teaching methods and learning activity, especially for STEAM-based education, physical space conditions should support the learner's design thinking and process. Furthermore, STEAM-based education environment should support a vast array of experiences that allow students to learn the context around ideas and skills. For spaces for learning environment based on STEAM, common design principles should be considered such as technology integration, safety and security, transparency, multipurpose space, and outdoor learning. Therefore, the learning environment based on STEAM needs flexible and mobile, connected, integrated, organized, flipped, and team-focused surroundings to support the learners understand, participate, cooperate, and accomplish the design process.