• 제목/요약/키워드: secured service

검색결과 195건 처리시간 0.037초

국제 GNSS 기구 동향 조사 (Survey of International GNSS Organizations)

  • 이정행;전종현;강정완;임종원;이병석;주정민;김선우
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제13권2호
    • /
    • pp.117-129
    • /
    • 2024
  • In this paper, we survey recent trends of International Global Navigation Satellite System (GNSS) organizations such as the International Committee on GNSS (ICG), International Civil Aviation Organization (ICAO), International Maritime Organization (IMO), and International Telecommunication Union (ITU), and investigate their impact on the maritime and aviation sectors. Each international organization promotes international cooperation, improvement of service quality, assurance of security, compliance with international regulations, and technological innovation and development. ICG develops a variety of satellite navigation enhancement systems. ICAO establishes international aviation regulations and standards to enhance aviation safety and security. IMO establishes international shipping conventions and rules to protect and regulate the shipping environment. Lastly, ITU establishes international communication regulations and standards. Investigation of such international organizations plays an important role in increasing the efficiency and reliability of GNSS systems. Each international organization promotes international cooperation, improvement of service quality, assurance of security, compliance with international regulations, and technological innovation and development. In the future, interoperability and compatibility with new satellite navigation systems and other GNSS and satellite navigation enhancement systems must be secured, so and thus investigation of international organizations must be conducted first.

A Performance Comparison between XEN and KVM Hypervisors While Using Cryptographic Algorithms

  • Mohammed Al-Shalabi;Waleed K. Abdulraheem;Jafar Ababneh;Nader Abdel Karim
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.61-70
    • /
    • 2024
  • Cloud Computing is internet-based computing, where the users are provided with whatever service they need from the resources, software, and information. Recently, the security of cloud computing is considered as one of the major issues for both cloud service providers CSP and end-users. Privacy and highly confidential data make many users refuse to store their data within cloud computing, since data on cloud computing is not dully secured. The cryptographic algorithm is a technique which is used to maintain the security and privacy of the data on the cloud. In this research, we applied eight different cryptographic algorithms on Xen and KVM as hypervisors on cloud computing, to be able to measure and compare the performance of the two hypervisors. Response time and CPU utilization while encryption and decryption have been our aspects to measure the performance. In terms of response time and CPU utilization, results show that KVM is more efficient than Xen on average at 11.5% and 11% respectively. While TripleDES cryptographic algorithm shows a more efficient time response at Xen hypervisor than KVM.

군 인적자원 채용제도 개선에 관한 연구 : 수정형 블라인드 채용의 도입 검토 (A study on the improvement of hiring system in the military human resources: introduction of modified blind hiring)

  • 정정균;박철
    • 융합보안논문지
    • /
    • 제19권3호
    • /
    • pp.93-99
    • /
    • 2019
  • 최근 금융감독원과 강원랜드등 공공기관의 채용비리 사건이 국가적인 관심의 대상이 되면서 국민들은 채용에서 평등하게 기회가 보장되고 공정한 과정에서 누구나 당당하게 실력으로 경쟁할 기회를 보장 받아야 함에도 불구하고 그러하지 못하는 현실에 공분을 하였다. 이에 정부는 2017년 하반기부터 공공기관을 대상으로 입사지원서에 출신 학교(학력), 학점, 영어점수 기입을 없애고 직무능력만 보고 뽑도록 하는 블라인드 채용을 의무화하였고, 2018년에는 5개년 반부패 종합계획을 발표하면서 채용비리를 엄단한다는 의지를 내비치고 검찰 역시 채용비리 수사에 박차를 가하고 있는 실정이다. 이러한 논란의 가운데 본 논문에서는 우리 군 인적자원 채용에 있어서 블라인드 채용제도의 도입에 대한 필요성과 공공기관 블라인드 채용 의무화에 따른 정부의 가이드라인과 우리 군의 블라인드 채용 적용 현황을 검토하여 우리 군이 군 인적자원을 채용하는데 있어서 군에 적합한 수정형 블라인드 채용 제도의 도입을 통해 나아가야 할 방향을 제시하고자 한다.

Study on Proactive Approach against a New Large-Scale Crisis of the Aviation and Tourism Industry such as COVID-19

  • Park, Yun-mi;Jeon, Aeeun
    • 한국항공운항학회지
    • /
    • 제28권4호
    • /
    • pp.176-181
    • /
    • 2020
  • In the face of the unprecedented crisis of coronavirus disease (COVID-19), the aviation and tourism industry fell without help. The bigger problem is that a crisis like COVID-19 can always come back. A new variant of the virus that is more powerful than COVID-19 may emerge, and another crisis such as a massive war may come. In addition, there may be an unexpected large-scale crisis that could shake the survival of the aviation and tourism industry in place. At that time, the aviation and tourism industry should not be pushed into a survival crisis defenselessly. Taking the experience of the crisis caused by COVID-19 as a crucial lesson, sufficient protection measures should be prepared in advance, and within the protection measures, the overall capabilities of the aviation and tourism industry should be preserved, and preparation should be made for the aftermath of the crisis. There is a need to establish a support system in which financial resources that can be used in crisis situation can be secured in advance, and various support measures can be implemented as effectively as possible by using the secured financial resources. Regarding the preparation for financial resources, various fundraising, insurance, and compensation for losses by the state or local government may be considered as a priority, and in addition, there is a need to continuously consider ways to prepare additional financial resources. On the other hand, in terms of system construction, establishment of the system inside the aviation and tourism industry may need to be considered first, but the improvement of related laws and systems needs to be more actively discussed and related legislation needs to be actively promoted.

항공보안 내부자 위협에 의한 불법방해행위의 대응을 위한 연구 (A Study on the Response to Acts of Unlawful Interference by Insider Threat in Aviation Security)

  • 임상훈;허백용;황호원
    • 한국항행학회논문지
    • /
    • 제27권1호
    • /
    • pp.16-22
    • /
    • 2023
  • 항공 테러는 역사적으로 다양한 형태의 공격 방법으로 민간항공의 취약한 부분을 공격해왔다. 최근 테러 수법은 승객과 별개의 전용 통로 사용, 개인물품 운반, 민감한 정보 접근 등의 권한을 가진 항공업계 종사자로 인한 것으로 보안 위협이 높아지고 있다. 또한, 전 세계적으로 인터넷과 소셜 미디어 등을 통한 급진화 현상으로 인한 내부자 위협은 더욱 고조되고 있는 실정이다. 대한민국 정부는 해외에서 발생한 내부자 보안 사례와 국제민간항공기구 및 미국, 영국 등에서 수립, 권고한 지침 등을 참고하여 항공보안의 불법방해행위에 직간접적으로 악용될 수 있는 내부자 위협에 대해 보안 규정을 사전에 수립하여 대처하여야 한다.

CD Copy업무 flow개선을 통한 고객만족도 향상에 관한 연구 - QI 활용을 중심으로 - (CD Copy Service to Enhance Customer Satisfaction Through Improved Flow Study - Based on QI Use -)

  • 최성현;황선광;이종웅;동경래;권대철;구은회;박창희
    • 대한디지털의료영상학회논문지
    • /
    • 제13권3호
    • /
    • pp.127-132
    • /
    • 2011
  • This is to improve the complicate process of the existing CD copy flow in Department of Radiology. It is also to improve the medical service of the hospital to secure private information of patients. Survey: The patients who ask for CD copies in the Department of Radiology of this hospital(for 6 months in 2010). Time: Comparing the total amount of time of the previous and the modified CD copy flow. Using the SPSS 12.0 program for testing significance of independent two-samples t-test. Private information: Introducing the identification-system based on the medical law to supplement the security of personal information of patients. There was manifold complaints due to receipt and issuing the prescription in Admission and Discharging office and outpatient department. The time has been approximately 50% reduced from 70 mistunes to 32 mistunes due to simplifying the routes. The security of the personal information has been supplemented by let patients submit documentary evidence based on the medical law. The service in the hospital has been improved as a result of simplifying the whole process of the routes and receipt process. Therefore, the each stage of waiting time has been decreased. In addition, the personal information of the patients has been more secured.

  • PDF

인증 및 경량화 암호알고리즘 기반 IoT 보안 서비스 (A IoT Security Service based on Authentication and Lightweight Cryptography Algorithm)

  • 김선집
    • 사물인터넷융복합논문지
    • /
    • 제7권1호
    • /
    • pp.1-7
    • /
    • 2021
  • IoT 시장은 지속적으로 확대 성장하고 있지만, IoT 기기에 대한 보안 위협 또한 증가하고 있다. 그러나 자원 한정의 문제점을 가지고 있는 IoT 기기에 기존 시스템에 적용되었던 보안기술을 적용하는 것은 어렵다. 이에 본 논문에서는 IoT 기기의 자원 한정이라는 특성 하에서 보안 기능 적용에 따른 오버헤드를 줄일 수 있는 인증 및 경량 암호알고리즘 적용하여 IoT 기기의 보안성을 향상시킬 수 있는 서비스를 제시하여 IoT 기기가 제공되는 홈네트워크 등에 보안성을 제공하고자 한다. 이에 본 논문에서 제시하고 있는 인증 및 경량 암호알고리즘 적용 서비스는 기존 연구에서 증명되었던 IoT 환경에서 적용 가능한 LEA 암호화 알고리즘의 이용과 더불어 비밀키 생성에 있어 이용자, IoT 기기와 서버가 참여하여 3자의 상호인증기반 비밀키 생성을 통해 서비스의 안전성을 확보하였으며 실험에서 랜덤하게 비밀키를 생성하는 방식과 속도의 차이가 없으나, 부가적으로 비밀키 공유를 위한 로직을 IoT 기기에 적용하지 않음으로써 IoT 기기의 자원 한정의 문제점을 해결할 수 있음을 검증하였다.

A study on the AC and PMI model for the Defense computer network

  • 윤희승;김상천;송주석
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2001년도 추계학술발표논문집 (하)
    • /
    • pp.977-980
    • /
    • 2001
  • This paper is a study on the AC and PMI model for the defense computer network. It is suggested that the organization plan of PMI model is a proper model for the characteristics of military system and military defense network security demands based on defense PKI system. Futhermore, it will be presented both various types of defense AC and AC according to the role and clearance in PMI. Defense AC will provide strong users' authentication and Role Based Access Control to give more secured and trusted authentication service by using users' attribute such as role and clearance.

  • PDF

개발분야의 6시그마와 TRIZ 연계를 통한 새로운 경영혁신 전략 (A New Management Innovation Strategy Through 6sigma for R&D linked with TRIZ)

  • 안영수;황인극
    • 산업경영시스템학회지
    • /
    • 제32권3호
    • /
    • pp.178-187
    • /
    • 2009
  • Six Sigma emphasizes KPI and establishes the present level as well as the goal level through statistical calculation and tries to achieve management innovation through process improvement. But in the area of new product development or service, sufficient data for statistical measurement may not be secured. On the other side, looking for contradictions through problem analysis, TRIZ is a methodology that stresses the process of solving these problems. TRIZ also has its own problems: it is hard to define its initial task, to objectify the measurement of effect, and to optimize the drawn out idea. The purpose of this report is to give a comprehensive understanding about each methodology (Sigma Six and TRIZ) through its analysis, to confirm the need of linking both methodologies, and to suggest a model for this linking process. Also, they will be verified through examples, and the synergy effect will be discussed.

AKARI Near-Infrared Spectroscopy of Blue Early-type Galaxies

  • 이준협;황호성;이명균;이종철
    • 천문학회보
    • /
    • 제35권1호
    • /
    • pp.75.1-75.1
    • /
    • 2010
  • The first near-infrared (NIR) spectroscopic survey of SDSS-selected blue early-type galaxies (BEGs) has been conducted using the AKARI/IRC. The NIR spectra of 36 BEGs are successfully secured, which are well balanced in their SF/Seyfert/LINER type composition. For high signal-to-noise ratio, we stack the BEG spectra all and in bins of several properties: color, specific star formation rate and optically-determined spectral type. We estimate the NIR continuum slope and the 3.3 micron PAH emission equivalent width in the stacked BEG spectra, and compare them with those of SSP model galaxies and known ULIRGs. We first report the NIR spectral features of BEGs and discuss the nature of BEGs based on the comparison with other objects.

  • PDF