http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
전용희 한국정보기술학회 2017 한국정보기술학회논문지 Vol.15 No.12
The cyber security of Internet of Things(IoT) is inherently vulnerable since it includes diverse physical components and several types of technology elements such as communication/network technologies, service API technology, and user interface technology. This paper analyzes the security vulnerabilities and threats in IoT environments, and performs the security modeling and presents the results. The aim of security modeling is to derive the requirements and corresponding technology for security control of the system being developed by analyzing threat elements and attack possibility in advance. Accordingly this paper analyzes threat of each component for the IoT by STRIDE modeling and constructs attack trees by analyzing attack examples for every threats. Finally it proposes the security requirements and technology to respond against them, based on the analyzed threats and attack examples, and presents the security requirements for the typical applications for the IoT. 사물인터넷(IoT)은 다양한 물리적 구성요소와 통신/네트워크 기술, 서비스 API 기술 그리고 사용자 인터페이스 기술과 같은 여러 가지 형태의 기술 요소들을 포함하기 때문에 사이버 보안이 본질적으로 취약하다. 본 논문에서는 IoT 환경에서 보안 취약점과 위협을 분석하고, 그에 대응하기 위한 보안 요구사항을 도출하기 위하여 보안 모델링을 수행하고 그 결과를 제시하고자 한다. 보안 모델링의 목적은 개발 시스템에 대한 보안 위협 요소와 공격 가능성을 미리 분석하여 적절한 보안 통제를 위한 요구사항과 대응 기술을 도출하는데 있다. 따라서 사물인터넷 보안 위협요소를 STRIDE 모델링을 통하여 분석하고, 각 위협에 대한 공격 예제 분석을 통하여 공격 트리를 구축한다. 마지막으로 분석된 위협과 공격 예제를 기반으로, 그에 대응하기 위한 보안 요구사항과 기술을 분석하고 제안하며, 대표적 IoT 응용들에 대한 보안 요구사항을 제시한다.
전용희,박정숙,전향희 대구효성가톨릭대학교 응용과학연구소 1998 응용과학연구논문집 Vol.6 No.2
In a VOD(Video-On-Demand) system, video data are generally stored on magnetic disk array system. In order to provide the real-time requirements for the data retrieval, video streams must be delivered continuously to the clients such that the delivery of continuous media can be guaranteed in a timely fashion. Video information is generally encoded as a VBR(Variable Bit Rae) stream based on the relevant MPEG standards. To access the VBR data in a VOD system, we may have two approaches: CTL(Constant Time Length) and CDL(Constant Data Length) access policies. In this paper, we examined and compared the performance of CDL and CTL data access policy is a little better than CDL policy in term of the maximum allowable video streams. However, it is believed that further studies ae required to design an efficient data access policy to be used under a real VOD environment.
광대역 지능망 구조에서 원격교육 서비스를 위한 총괄 서비스 로직 설계
전용희 대구효성가톨릭대학교 응용과학연구소 1999 응용과학연구논문집 Vol.7 No.-
To implement a system which can efficiently support a multimedia service such as distance learning, we need network capability by which a call with multiple connections including point-to-multipoint or multipoint-to-multipoint connections can be supported. We also need a complex signalling in order to control network resources for the connections among the terminal equipments which have different characteristics(i.e., terminals with different encoding or presentation schemes). These resource control functions may easily be accomplished by using a flexible control capability of In(intelligent Network). In order to design distance learning services which is one of representative multimedia services, we utilized SIBs(Service Independent Building blocks) defined in IN. In this paper, we modelled the distance learning service in terms of GSL(Global Service Logic)on the IN GFP(Global Functional Plane) in accordance with the service usage procedures.
방송과 통신의 통합서비스를 위한 통신망 구조에 관한 연구
전용희,박수영 대구효성가톨릭대학교 응용과학연구소 1997 응용과학연구논문집 Vol.6 No.1
According to the development of information communications technology, the boundaries among broadcasting, communications and video industries are being blurred. Especially, the convergence of broadcasting and communications is expected to be accelerated in the near future because of their similarity in terms of technology. Therefore, it is in urgent request to devise the proper network architecture in order to provide efficiently the integrated services of broadcasting and communications. In this paper, we made an extensive study on the network architecture for the integration of broadcasting and communications services. The reference models for the access network architecture from the several worldwide standard bodies are analyzed. The progressive strategy for the migration from existing services to future services is also described.