• Title/Summary/Keyword: engineering information

Search Result 83,033, Processing Time 0.085 seconds

Design of Access Control Model in Personal information System (개인정보시스템에서 접근제어 모델 설계)

  • Park, Ik-Su;Cho, A-Aeng;Lee, Kyoung-Hyo;Seo, Jea-Hyun;Oh, Byeong-Kyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.76-79
    • /
    • 2007
  • 유비쿼터스는 다양한 상황 정보들에 따라 여러 가지 형태의 서비스들이 요청되어 처리되어야 하는 환경이며, 이러한 환경의 태생적인 한계로 인해 사용자가 인지 못하는 사이에 야기 되어지는 개인정보 침해는 해결되어야 하는 직면된 문제 중 하나이다. 유비쿼터스 컴퓨팅은 원활한 정보 공유와 서비스 이용을 위한 환경으로 정보 공유가 필요하며, 정보에 대한 접근제어 정책으로 정제된 정보 공유를 적용하여 개인정보 보호가 가능하다. 본 논문에서는 개인정보 보호를 위한 해결방안들에 관하여 고찰하고, 정보주체에 대한 자기정보결정권을 지닌 개인정보 보호 접근제어 모델을 제안한다.

  • PDF

A Study on the Reengineering of Partial Business in Information System Planning of information Engineering (정보공학의 정보시스뎀기획에 있어서 일부 업무의 재설계 적용방안)

  • 배재식;염창선
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.25 no.2
    • /
    • pp.27-34
    • /
    • 2002
  • Many organizations attempt to plan information strategy reflecting their overall business and direction using the information engineering methodology. They also try to redesign the process for partial business area. The above two approaches can be combined because information technology Plays an important role as an enabler for business process reengineering. For theses organizations, a new information strategy planning procedure that considers reengineering of partial business is proposed in this study. The proposed procedure is designed to minimize the change of information strategy planning procedure of the information engineering methodology. The project of K company is used as the case study.

A Study on the New Threat Level Decision Method for Information System (새로운 정보시스템 위협수준결정방법론에 대한 연구)

  • Kim, Tai-Hoon;Yeo, Sang-Soo;Cho, Sung-Eon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2280-2286
    • /
    • 2007
  • Information system contains various components, and these components can be categorized into some types. When preparing security level management activity, it is most important to define the target of management activity. And after deciding these targets, security level management activity can be started. This paper defines management targets by dividing information system into some parts, and shows these targets can be managed variously according to operation environments and characteristics.

The Expansion of BIRS for Information Flow Analysis (정보흐름분석을 위한 BIRS의 확장)

  • Jung, Ji-Woong;Kim, Je-Min;Kim, Seon-Tae;Park, Joon-Seok;Yoo, Weon-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.269-271
    • /
    • 2012
  • 프로그램에 대한 검증을 수행하기 위해서는 프로그램 안에서 여러 가지 분석이 이루어진다. 그 중에서 객체지향언어의 경우 분석을 위하여 객체지향적인 특성에 맞는 정보흐름분석을 사용해야 한다. 본 논문에서는 왜 객체지향언어의 특성에 맞는 정보흐름분석이 필요한지를 보이고, 객체지향적인 특성을 고려하지 않은 정보흐름분석 시에 어떤 문제가 생기는지 예시를 들어 설명한다. 그리고 자바의 검증도구인 BIRS(Bytecode Intermediate Representation with Specification)언어를 대상으로 하여 객체지향언어의 특성을 고려한 정보흐름분석이 가능하도록 새로운 명세를 추가하여 확장한다.

USER-DEFINED PROPERTY SETS-BASED IFC EXTENSION FOR BRIDGE APPLICATION INFORMATION MODEL

  • Sang-Ho Lee;Sang Il Park;Munsu Yang
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.433-436
    • /
    • 2013
  • This study suggests IFC-based bridge information modeling methods and its application model in BIM environment. Data model extension for bridge structure was achieved using user-defined property sets based on IFC framework. First, identification information was added. Bridge members are identified through physical and spatial semantic information added as property sets. Instances for semantic information were assigned according to standardized rules. Second, CO2 related factors were added for application information model. It can play a role to calculate and manage the quantity of CO2 emission. Third, properties for temporary structure to estimate and manage the construction cost were added. Finally, we investigated proposed methods through implementing the application information model of bridges.

  • PDF

Artificial neural network for safety information dissemination in vehicle-to-internet networks

  • Ramesh B. Koti;Mahabaleshwar S. Kakkasageri;Rajani S. Pujar
    • ETRI Journal
    • /
    • v.45 no.6
    • /
    • pp.1065-1078
    • /
    • 2023
  • In vehicular networks, diverse safety information can be shared among vehicles through internet connections. In vehicle-to-internet communications, vehicles on the road are wirelessly connected to different cloud networks, thereby accelerating safety information exchange. Onboard sensors acquire traffic-related information, and reliable intermediate nodes and network services, such as navigational facilities, allow to transmit safety information to distant target vehicles and stations. Using vehicle-to-network communications, we minimize delays and achieve high accuracy through consistent connectivity links. Our proposed approach uses intermediate nodes with two-hop separation to forward information. Target vehicle detection and routing of safety information are performed using machine learning algorithms. Compared with existing vehicle-to-internet solutions, our approach provides substantial improvements by reducing latency, packet drop, and overhead.

Finger Vein Recognition Based on Multi-Orientation Weighted Symmetric Local Graph Structure

  • Dong, Song;Yang, Jucheng;Chen, Yarui;Wang, Chao;Zhang, Xiaoyuan;Park, Dong Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4126-4142
    • /
    • 2015
  • Finger vein recognition is a biometric technology using finger veins to authenticate a person, and due to its high degree of uniqueness, liveness, and safety, it is widely used. The traditional Symmetric Local Graph Structure (SLGS) method only considers the relationship between the image pixels as a dominating set, and uses the relevant theories to tap image features. In order to better extract finger vein features, taking into account location information and direction information between the pixels of the image, this paper presents a novel finger vein feature extraction method, Multi-Orientation Weighted Symmetric Local Graph Structure (MOW-SLGS), which assigns weight to each edge according to the positional relationship between the edge and the target pixel. In addition, we use the Extreme Learning Machine (ELM) classifier to train and classify the vein feature extracted by the MOW-SLGS method. Experiments show that the proposed method has better performance than traditional methods.

Cryptanalysis on the Authentication Mechanism of the NateOn Messenger (네이트온 메신저의 사용자 인증 메커니즘에 대한 취약점 분석)

  • Shin, Dong-Hwi;Choi, Youn-Sung;Park, Sang-Joon;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.67-80
    • /
    • 2007
  • Nateon Messenger, which has the most number of users in Korea, supports many services such as E-mail, note, Cyworld, SMS, etc. In this paper, we will analyse the authentication traffic which is transmitted and received by the Nateon Messenger. Through performing the replay attack with the authentication information, we will show that an attacker can be authenticated illegally. Furthermore, we will show that other domestic messengers have similar security problems.

Exploratory Study on BIM-based Information Breakdown Structure for Construction Document Management

  • Lee, Dong Gun;Cha, Hee Sung
    • Journal of Construction Engineering and Project Management
    • /
    • v.5 no.1
    • /
    • pp.32-39
    • /
    • 2015
  • Construction industry is an aggregate of information that diverse information is integrated and controlled. To implement successful construction projects, it can be said that the information management is very important. In particular, because information of construction sites is controlled in a form of documents, importance of the document management in construction has been increased. But, by controlling information through documents, there are difficult problems in writing and classification of the documents and preservation and utilization of the information. Also, due to incompletion of the information management system, difficulty in systematic info management arises. For this reason, this study intends to suggest the document information breakdown structure for controlling document info efficiently which is generated at construction sites. For this, through the examination of preceding studies, establishment of the concept of the document info breakdown structure, the space breakdown structure, and the info breakdown structure, availability of document information is intended to heighten.

Implement Static Analysis Tool using JavaCC

  • Kim, Byeongcheol;Kim, Changjin;Yun, Seongcheol;Han, Kyungsook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.89-94
    • /
    • 2018
  • In this paper, we implemented a static analysis tool for weakness. We implemented on JavaCC using syntax information and control flow information among various information. We also tested the performance of the tool using Juliet-test suite on Eclipse. We were classified using information necessary for diagnosis and diagnostic methods were studied and implemented. By mapping the information obtained at each compiler phase the security weakness, we expected to link the diagnostic method with the program analysis information to the security weakness. In the future, we will extend to implement diagnostic tools using other analysis information.