• Title/Summary/Keyword: User's Requirement

Search Result 278, Processing Time 0.024 seconds

Design of Security Model for Service of Company Information (기업 정보화 서비스를 위한 보안 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.2
    • /
    • pp.43-49
    • /
    • 2012
  • Recently, the safety of being processed in a corporate enterprise with a wide range of IT skills applied to the Corporate Affairs information services are increasing requirement. Businesses that are required by various IT corporate information technology services to companies that need to protect information being leaked to other companies, a security incident has been applied and is growing, but is lacking about how to respond to the protection of corporate information services. In this paper, the information that is important in the corporate authority by the user's access control model to reduce the number of security incidents such as information leakage and security services for enterprise informatization is proposed. The proposed model can be used in order to block the access of the users to access information managed by a central administrator role and the rights of users to access information any abnormality has been captured. In addition, the proposed model can take advantage of protecting corporate information from the systematic recovery and operational continuity strategies to build your company's information services.

  • PDF

Study on Procedure for Escrow Account to Resolve Controversy of Intellectual Property Right of Software for Rolling Stock (철도차량 Software 지적 재산권 분쟁 해결을 위한 Escrow Account 적용 절차에 대한 연구)

  • Park, Jun-Hyung;Cho, Chi-Hwan;Kang, Chan-Yong
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1479-1485
    • /
    • 2008
  • This paper shows the result of study on the detailed applicable procedure of software Escrow account applied for rolling stock. The customer as end-user requires software source code, related critical technical documents etc. about software based system of train for maintenance purpose through software modification and enhancement after completion of warranty period. Otherwise, it is not easy to keep up with the customer's requirement of demanding supplier's exclusive information because it is considered as intellectual property rights of supplier as software developer. Therefore, the main contractor(normally called as Car-builder) need to introduce software Escrow service in order to coordinate the different a standpoint between software developer and end-user. Software Escrow is a legal arrangement in which an software Escrow packages (software source code, software development tool, build process, proprietary information, copyright and etc.) is deposited into and Escrow account under the trust of a reliable third party (Escrow agent) depending on mutual agreement on Escrow contract condition as signing off Escrow agreement document. This paper deals with the study on the detailed procedure about the following general category of Escrow procedure and purpose to apply this specific procedure of Escrow into the future project onward.

  • PDF

Design of Push Agent Model for transmission of the Efficient Information (효율적인 정보 전송을 위한 푸시 에이전트 모델 설계)

  • 최은실;김광종;이연식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.545-549
    • /
    • 2002
  • For the efficient method for acquisition of informations suitable to user's preferences and objectives in distributed environment, various researches on push agent which automatically processes its roles and sends the results to users are continued. The existing push agent models have induced increasing network overheads and traffics by continuous transmission of informations in the network environment of limitative bandwidth. In this paper, for the solution of the problems on these existing push agent systems and their interoperability, we design a push agent model based on CORBA event service. The proposed model solves the above problems and provides the retrieved results which are more suitable for user's requirement more fast and stably through the optimal path searching and controling method. And, it also supports the filtering technique for processing the duplicated or useless data that comes from the various distributed information systems.

  • PDF

A Study on a Method to Utilize and Factors to Non-Use Archives (기록관 비이용 요인분석 및 이용활성화 방안에 관한 연구)

  • Choi, JungWon;Oh, Hyo-Jung;Han, Hui-Jeong;Kim, Yong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.51 no.1
    • /
    • pp.49-67
    • /
    • 2017
  • An archives collects and manages a variety of records and archives including information reflecting the phases of the times and has a role in society as archive information center. Also, archives support that users can efficiently search and use records. Although archives has a variety of records and archives, users and non-users has low recognition on it. This study aims to find factors why people don't use archives and analyzes requirements to utilize archives activation for users and non-users. To perform the goals, questionnaires were used to collect data from 148 domestic people. Also, this study used descriptive statistics and independent t-test to analyze the collected data. With the analyzed results, this study proposed suggestions to improve user's perception and factors for activation of archives.

Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques

  • Gadde, Swetha;Amutharaj, J.;Usha, S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.342-347
    • /
    • 2022
  • On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.

Comments on the Computation of Sun Position for Sun Tracking System (태양추적장치를 위한 태양위치계산에서의 제언)

  • Park, Young Chil
    • Journal of the Korean Solar Energy Society
    • /
    • v.36 no.6
    • /
    • pp.47-59
    • /
    • 2016
  • As the usage of sun tracking system in solar energy utilization facility increases, requirement of more accurate computation of sun position has also been increased. Accordingly, various algorithms to compute the sun position have been proposed in the literature and some of them insist that their algorithms guarantee less than 0.01 degree computational error. However, mostly, the true meaning of accuracy argued in their publication is not clearly explained. In addition to that, they do not clearly state under what condition the accuracy they proposed can be guaranteed. Such ambiguity may induce misunderstanding on the accuracy of the computed sun position and ultimately may make misguided notion on the actual sun tracking system's sun tracking accuracy. This work presents some comments related to the implementation of sun position computational algorithm for the sun tracking system. We first introduce the algorithms proposed in the literature. And then, from sun tracking system user's point of view, we explain the true meaning of accuracy of computed sun position. We also discuss how to select the proper algorithm for the actual implementation. We finally discuss how the input factors used in computation of sun position, like time, position etc, affect the computed sun position accuracy.

Design of Surveillance System for Fishery Safety and Security Using F-AIS (F-AIS를 이용한 어장보호 시스템 설계)

  • Yim Jeong-Bin;Nam Taek-Keun;Jeong Jung-Sik;Park Seong-Hyen;Yang Weon-Jae
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2005.11a
    • /
    • pp.71-74
    • /
    • 2005
  • This paper describes Fishery Safety and Security System using F-AIS based on the concepts of RFID(Radio Frequency Identification). This system is to track, protect and arrest the thief who invaded in an fishing ground. The system composed with various functional modules to implement selectively available system providing low cost to high cost and simple function to high function according to user's requirement in a practical fishing fields. Sea trial tests are carried out at Mokpo, Busan and Incheon and, it is found that the system can guard the wide area of cultivating farm field.

  • PDF

A Feasibility Analysis of Location-Based Service Systems Applying Petri net (페트리 넷을 적용한 위치기반 서비스 시스템의 타당성 분석)

  • Yim Jae-Geol;Joo Jae-Hun;Nam Yoon-Suk
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.1
    • /
    • pp.157-172
    • /
    • 2005
  • Recently, location-based service (LBS) is a hot issue in the field of computer applications. So many papers introducing new techniques of implementing a LBS and new application fields of LBS have been published recently. However, to the best of our knowledge, none of them discusses feasibility test in the prior to the implementation. The importance of a feasibility test for a design prior to the implementation cannot be overemphasized. This paper presents a method of feasibility test for a LBS design. Our method performs three steps. At the first step, we build a Petri net model of the LBS system which is depicted in natural language. The second step is to analyse the Petri net to find errors and flaws in the design. We also improve the Petri net model by fixing the errors and flaws in this step. A feasibility test is the third and final step. In this step. we verify if the design satisfies the user's requirement in the senses of quality of service (QoS) and of minimizing the implementation cost. The third step is performed in the manner of mathematical analysis of the Petri net.

  • PDF

Study on QoE of the VoIP Service for QoS levels over LTE Mobile Communication System (LTE 이동통신 시스템에서 QoS 변화에 따른 VoIP 서비스의 사용자 체감 품질 변화에 대한 연구)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.3
    • /
    • pp.309-316
    • /
    • 2016
  • Recently, the voice service over a mobile communication system tends to be provided based on the packet-based technology. Even though the sufficient transmission rate is supported by LTE mobile communication system, the quality of VoIP service that is experienced by the user can be degraded by the change in the transmission conditions and the terminal mobility. This paper has established an environment on which experiments are conducted for the different values of the major parameters that represent the transmission conditions. The result can contribute to the decision of the requirement that the mobile system should meet for maintaining the quality of VoIP service.

E-Mail Magazine Content Strategy for Popularization of Science (과학 대중화를 위한 메일매거진 콘텐트 전략 -'Kisti의 과학향기'를 중심으로-)

  • Shin Su-Mi;Lee Sang-Hwan;Kim Myung-Il
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.438-441
    • /
    • 2005
  • In a rapidly changing age of science and technology, important factor for the improvement of national competitive power is not only innovation development of scientific technique but also popularization of science, the understanding of general person about science. For popularization of science, scientific technical content serviced by using easy device and general person is interested in it's field. This paper suggests the E-mail Magazine content strategy for popularization of science. This suggestion is based on user's requirement investigation with on-line.

  • PDF