• 제목/요약/키워드: security strategy

검색결과 979건 처리시간 0.025초

의료용 데이터 웨어하우스를 위한 메타데이터 기반의 보안 프로토타입 시스템 구현 (Implementing Metadata-based Security Prototype System for Medical Data Warehouse)

  • 김종호;김태훈;송해용;홍수희;박진두;민성우;이희석
    • 한국데이타베이스학회:학술대회논문집
    • /
    • 한국데이타베이스학회 1999년도 국제컨퍼런스 디지털컨텐츠 활용을 통한 지식경영의 확산
    • /
    • pp.113-118
    • /
    • 1999
  • 본 연구는 통합병원정보시스템 (Integrated Hospital Information System) 에서 의료용 데이터 웨어하우스 (Medical Data Warehouse) 부분의 보안 프로토타입 시스템을 메타데이터 기반으로 설계하고 구현하는 데 주안점을 두었다. 특히, 의료용 데이터 웨어하우스 중에서도 임상 데이터 웨어하우스 (Clinical Data Warehouse) 에 초점을 두었으며 이에 대한 프로토타입은 ㅈ 병원에 적용되어서 개발되었다.

  • PDF

개선된 병렬 논리프로그래밍 시스템의 복잡도 분석

  • 정인정
    • 정보보호학회논문지
    • /
    • 제2권1호
    • /
    • pp.59-77
    • /
    • 1992
  • 본 논문은 컴퓨터 시스템의 보호 및 데이타 통신의 암호등과 관계가 있는 논리 프로그래밍에 대한 것이다. 본 논문에서 우리는 병력 논리프로그래밍 시스템에 대한 개선된 conteol strategy를 제안하였으며, 이에대한 형식적인 syntax와 semantics등을 정의하였다. 병렬 논리프로그램에 대한 병력성등을 분류하여, 이들이 어떻게 활용되는지 설명하였다. 또한 병렬 논리프로그램의 유도과정과 계산방식이 같은 alternating Turing machine이란 병렬 계산모형을 제안하여, 논리프로그램의 복잡도의 분석과 제안된 idea에 대한 타당성을 ATM을 이용하여 하였다.

원양 작전 능력 확보를 위한 한국 해군의 장기(長期) 발전 방안 - 항공모함 및 원자력 잠수함 도입제안을 중심으로 - (Republic of Korea Navy's Long-Term Development Plan to Acquire Operational Capabilities at Distant Ocean - Focused on Introduction of Aircraft Carrier and Nuclear-powered Submarine -)

  • 김재엽
    • Strategy21
    • /
    • 통권34호
    • /
    • pp.149-177
    • /
    • 2014
  • Today distant oceans around the world are regarded as a major 'global commons' for international trade and transportation. Korea is not an exception, because Korea hugely depends on sea lines of communication (SLOC) for supplying vital commodities such as food and energy resource. As a result, assuring a free and safe use of distant ocean beyond territory is also an important agenda for Korea's maritime security. However there are a number of challenges for Korea to enjoy a free and safe use of distant ocean; dangers of regional maritime conflict in East Asia, naval arms race of China and Japan, and concerns on possible decline of U.S naval presence and power projection capabilities. These factors provide a reasonable basis for Republic of Korea Navy (ROKN) to pursue capabilities for major naval operations at distant ocean in a long-term perspective toward the year 2030. The introduction of aircraft carrier and nuclear-powered submarine is a key requirement for achieving this goal. ROKN needs to acquire a 'multi-role strategic landing platform' type of light aircraft carrier, which takes a role to escort naval task force by providing air superiority at distant ocean. Additionally nuclear-powered submarine will offer ROKN a formidable power to carry out offensive missions effectively at distant ocean.

Industry's Response to the Green Movement

  • Little, Barry F.P.
    • 분석과학
    • /
    • 제8권4호
    • /
    • pp.1075-1078
    • /
    • 1995
  • This paper describes how industry has responded to the environmental challenge. Benefits include compliance with environmental legislation; genuine reductions to environmental impact; sustainable improvements to profitability in the face of increased competitive pressure. National and international Standards for environmental management offer security and direction for a company wishing to improve environmental performance and coupled with a waste minimisation strategy many financial and environmental benefits can be achieved. Introduction of new technical skills, techniques and worker understanding to aid motivation is an essential component of such a strategy. Monitoring and targeting has a key role to play in the establishment of improved environmental performance.

  • PDF

유비쿼터스 컴퓨팅 환경 하에서의 전자무역 보안 쟁점과 전략에 관한 소고 (A Study on E-trade Security Issue and Strategy in Ubiquitous Computing Environment)

  • 정성훈;강장묵;이춘수
    • 통상정보연구
    • /
    • 제7권3호
    • /
    • pp.135-156
    • /
    • 2005
  • The rapidly developed environment by ubiquitous computing make the paradigm from e-trade to u-trade. The purpose of the study is to find out issue and the strategic suggestions that could link together between the e-trade and ubiquitous computing in side of information security. The study include the contents as follows; firstly, the technical explanations under the ubiquitous computing, secondly, e-trade's risks in security technology and lastly, issue and strategic suggestions how link them together in integrated view.

  • PDF

Food Security and Nutrition Information and Knowledge Management in Case of Cambodia

  • Vong, Sokha
    • Agribusiness and Information Management
    • /
    • 제2권1호
    • /
    • pp.117-128
    • /
    • 2010
  • Coordination has been identified as a concern in the cross-cutting issues of food security and nutrition (FSN) in Cambodia. Food Security and Nutrition Information System (FSNIS) in Cambodia is the only "entry portal" to support policy formulation and decision-making with regard to FSN. While this knowledge and information management system has earned a respectful reputation, Council for Agricultural and Rural Development (CARD) faces many challenges in the implementation of the system. This paper will present how FSNIS has been developed and impacts on policy or strategy related to FSN. In addition, sustainability of the system is a key challenge for FSNIS; yet it is interesting to see how it works. Along with a success story, FSNIS is recognized by its stakeholders as the most successful knowledge and information management system in the field of FSN in Cambodia.

  • PDF

안전한 u-Korea 실현을 위한 정보화 역기능 방지 대책 – "Security Belt" (Information Security Strategy for Secure u-Korea – "Security Belt")

  • 최병철;김광식;서동일;장종수
    • 전자통신동향분석
    • /
    • 제20권2호통권92호
    • /
    • pp.93-102
    • /
    • 2005
  • 유비쿼터스 코리아(u-Korea) 기본전략에 따르면 우리나라는 정치. 사회. 문화. 의료. 복지. 교육. 노동. 외교 등 사회 전반에 걸친 생활문화 혁명이 실현될 것으로 전망된다. 이러한 시점에서 정보보호는 u-Korea 실현의 중요한 핵심 엔진 기술로써u-Korea 전략 추진의 주요한 장애 요인으로 예상되는 사생활 문제와 지역 간. 계층간 정보격차 문제 등의 정보화 역기능을 해소하는 역할을 수행해야 한다. 본 고에서는 정통부가 추진하고자 하는 u-Korea 기본 전략에 대해서 살펴보고, 안전한 u-Korea 실현을 위해서 구체적인 정보화 역기능 방지 대책을 제안한다. 특히, BcN 인프라 보호 기술, RFID/USN 개인 프라이버시 보호 기술, WiBro 및 DMB 등에서 사용되는 복합단말기용 통합 인증. 인가 기술, 안전한 사용자 서비스 제공을 위한 서비스 사용의 익명성과 서비스 관리의 실명성이 제공되는 보안위임서비스 기술 등으로 형성되는 “Security Belt” 정보화 역기능 방지 대책에 대해서 소개한다.

서버 중심의 취약성 관리를 위한 SCAP 적용 가능성 (SCAP Applicability for Vulnerability Management of Server-Oriented System)

  • 신동천;김선광
    • Journal of Information Technology Applications and Management
    • /
    • 제26권4호
    • /
    • pp.19-30
    • /
    • 2019
  • Many organizations need to comply with ISMS-P for information systems and personal information management for ISMS-P certification. Organizations should safeguard vulnerablities to information systems. However, as the kinds of information systems are diversified and the number of information systems increases, management of such vulnerabilities manually accompanies with many difficulties. SCAP is a protocol to manage the vulnerabilities of information system automatically with security standards. In this paper, for the introduction of SCAP in domestic domains we verify the applicability of server-oriented system which is one of ISMS-P certification targets. For SCAP applicability, For obtaining this goal, we analyze the structures and functions of SCAP. Then we propose schemes to check vulnerabilities of the server-oriented system. Finally, we implement the proposed schemes with SCAP to show the applicability of SCAP for verifying vulnerabilities of the server-oriented system.

ETRI AI 실행전략 7: AI로 인한 기술·사회적 역기능 방지 (ETRI AI Strategy #7: Preventing Technological and Social Dysfunction Caused by AI)

  • 김태완;최새솔;연승준
    • 전자통신동향분석
    • /
    • 제35권7호
    • /
    • pp.67-76
    • /
    • 2020
  • Because of the development and spread of artificial intelligence (AI) technology, new security threats and adverse AI functions have emerged as a real problem in the process of diversifying areas of use and introducing AI-based products and services to users. In response, it is necessary to develop new AI-based technologies in the field of information protection and security. This paper reviews topics such as domestic and international trends on false information detection technology, cyber security technology, and trust distribution platform technology, and it establishes the direction of the promotion of technology development. In addition, the development of international trends in ethical AI guidelines to ensure the human-centered ethical validity of AI development processes and final systems in parallel with technology development are analyzed and discussed. ETRI has developed AI policing technology, information protection, and security technologies as well as derived tasks and implementation strategies to prepare ethical AI development guidelines to ensure the reliability of AI based on its capabilities.

퍼지 알고리즘을 이용한 보안 프로토콜 검증 (New Approach to Verification in Security Protocol by using Fuzzy Algorithm)

  • 신승중;박인규
    • 한국데이타베이스학회:학술대회논문집
    • /
    • 한국데이타베이스학회 2000년도 추계학술대회 E-Business와 정보보안
    • /
    • pp.343-349
    • /
    • 2000
  • 본 논문은 TCP/IP 상에서 전자서명과 공개키 분배 및 인증 등의 기능이 포함된 메시지전송 프로토콜로 구현된 프로그램의 검증문제를 Choquet 퍼지적분을 이용하여 해결하고 이를 퍼지적분과 비교분석하였다. 기능별로 보안기술, 보안정책, 전자문서처리, 전자문서전송, 암ㆍ복호화키로 나누어 분류하여 구현된 내용을 기능별점수와 전문가의 요구사항을 구현된 프로토콜에서 산출 값과 비교하여 메시지 보안프로토콜을 기능별로 점수화하여 검증하였다.

  • PDF