2017 (27)
2016 (39)
2015 (48)
2014 (48)
2013 (61)
2012 (46)
2011 (58)
2010 (53)
2009 (37)
2008 (47)
2007 (29)
2006 (25)
2005 (90)
Cloud Computing Security Issues and Access Control Solutions
보안공학연구지원센터(JSE) 보안공학연구논문지 Vol.9 No.2 2012.04 pp.135-142
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Cloud computing is a new computing paradigm that attracted many computer users, business, and government agencies. Cloud computing brought a lot of advantages especially in ubiquitous services where everybody can access computer services through internet. With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, internet services and networks. It will basically cut down the expenses of the company allotted for the maintenance of the computer system. Along with the good benefits of Cloud Computing has to offer, there are security problems which make users anxious about the safety, reliability and efficiency of migrating to cloud computing. In this paper, the authors tried to study the threats and attacks that possibly launch in cloud computing and the possible solutions to mitigate these attacks. Aside of having network and application securities being adopted, there must be a security that authenticate the user when accessing the cloud services that is bound to the rules between the cloud computing provider and the client side.
Mobile Cloud Computing Security Considerations
보안공학연구지원센터(JSE) 보안공학연구논문지 Vol.9 No.2 2012.04 pp.143-150
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Building applications on on-demand infrastructures instead of building applications on fixed and rigid infrastructures was provided by cloud computing provides. By simply tapping into the cloud, enterprises can gain fast access to business applications or infrastructure resources with reduced Capital Expenditure (CAPEX). The more and more information is placed into the cloud by individuals and enterprises, security issues begins to grow and raised. This paper discusses the different security issues that arise about how safe the mobile cloud computing environment is.
SIDS 예방 교육 프로그램의 멀티미디어 콘텐츠 제작을 위한 사례 분석 연구
보안공학연구지원센터(JSE) 보안공학연구논문지 Vol.9 No.2 2012.04 pp.151-162
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
본 연구의 목적은 SIDS를 효과적으로 예방하기 위해 SIDS의 다양한 원인 및 예방법을 조사하고, 예방 교육 프로그램을 적용한 사례를 분석함으로써 SIDS 예방 교육의 멀티미디어 콘텐츠 제작을 위 한 기초자료를 제공하는 데 있다. 연구 결과, 첫째, SIDS를 유발하는 원인은 유전적 측면과 환경적 측 면 그리고 시기적 측면이 연관되어 있으며, 이에 대한 예방법은 환경적 측면에서 제시되었다. 둘째, SIDS 예방 교육 프로그램의 교육 방법은 비판적 사고를 증진시킬 수 있는 구성주의적 접근이 요구되 었다. 셋째, 본 연구를 통해 얻은 개선방안은 교육 참여자에 대한 이해와 적절한 평가 방법 마련 그 리고 정기적인 재교육이었다.
This study aims to provide useful information for the development of multimedia contents related to prevention of SIDS(Sudden Infant Death Syndrome). For this purpose, we explored various factors affecting SIDS and its prevention through relevant literature and further examined a preventive education program. The study found that SIDS occurred from three type of causes; genetic, environmental, and developmental period. In addition, constructivism approach is more relevant for effective prevention program. Based on such results, we suggest that more opportunities to participate the preventive education program be provided with teachers on a regular basis and the evaluation of the program be taken with participants for effective operation of the program.
보안공학연구지원센터(JSE) 보안공학연구논문지 Vol.9 No.2 2012.04 pp.163-176
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
인터넷 인프라의 급속한 발전과 인터넷 보급율의 확대에 따라 사용자 PC의 보안을 위협하는 악성 프로그램이 갈수록 지능화, 다양화되고 있고, 악성 프로그램에 의한 피해는 나날이 커지고 있다. 또한 컴퓨터 성능의 발전 속도가 발라짐에 따라 피해 상황도 빨라지고 있다. 따라서 최근 보안 프로그램의 특징은 진화된 악성프로그램을 제어하기 위하여 실시간 감시, 바이러스, 안티스파이웨어가 결합된 프 로그램이 출시되고 있다. 그러나, 지능적으로 변모하는 변종 유해 프로그램에 대해 실시간으로 대응 할 수 없다는 문제점이 있다. 이에 본 논문에서는 전통적인 signature나 heuristic기법이 아닌 주요 운 영체제 함수를 실시간 감시함으로 프로세스의 행동 sequence를 추적하여 행동조합 시나리오 개념에 의한 매칭으로 악성 프로그램인지 판별하며 알려지지 않은 악성 프로그램 또는 변종까지 차단할 수 있으며 signature가 변하는 문제점을 해결하고 zero-day 공격까지 방어할 수 있는 방법을 제시하고자 한다.
The rapid development of Internet infrastructure and the expansion of Internet penetration, depending on your PC malicious programs that threaten the security of increasingly intelligent, diversified, and the damage caused by a malicious program that is growing day by day. In addition, the performance of your computer faster, depending on the speed of the development has speeded up the damage situation. Therefore, the characteristics of recent security program to control the evolution of real-time monitoring of malware, viruses, combined with anti-spyware program has been launched. However, a variant of transforming harmful programs that intelligently about not being able to respond in real time there is a problem. In this paper, the traditional signature or heuristic techniques rather than a major operating system function, real-time monitoring by the process's behavior sequence by tracking the behavior combination scenario concept by matching the malicious program, determine whether and unknown malicious programs or variants to be blocked and the signature is solve problems and changes to zero-day attack is to propose a way to defend.
A Self-Directed Dynamic Web-based Learning Environment : Proposal for ersonalized Learning Framework
보안공학연구지원센터(JSE) 보안공학연구논문지 Vol.9 No.2 2012.04 pp.177-188
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents a self-directed dynamic learning environment that fits the learner’s of the net generation – the personalized web-based learning framework. The design of the learning framework is based on the theory of connectivism which asserts that knowledge and the learning of knowledge is distributive and is not located in any given place but rather consists of the network of connections formed from experiences and interactions with a knowing community in such a way that the digital age learner is thinking and interacting in new dynamic ways. The framework’s approach to learning is embedded in meaningful everyday activities of people such as games or workflows. The personalized learning approach sees learning as an active, personal inquiry, interpretation, and construction of meaning from prior knowledge and experience with one’s actual environment.
Towards the Design of an Interactive U-Learning System
보안공학연구지원센터(JSE) 보안공학연구논문지 Vol.9 No.2 2012.04 pp.189-198
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A holistic notion and model of an open social web-based u-learning system, anchored with open content, providing an interactive online study group experience akin to sitting with study buddies on a world-wide campus quad is presented in this paper. The interactive u-learning system design helps conceptualize and maximize advantages of ubiquitous environment in learning. The design is enabled by state-of-the-art web technologies; real-time collaboration technologies for a highly interactive experience; intelligent recommender systems to help learners connect with relevant content and other learners; and mining and analytics to assess learner outcomes.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.