http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
LMO 제품의 위해성 관리에 관한 논의의 주요 쟁점과 과제
김은진 경희대학교 법학연구소 2008 경희법학 Vol.43 No.1
On the basis of living-modified organisms (LMO) as life forms, many concerns have arisen surrounding the issue of safety for the human health and the environment. One result of such concerns is the “Cartagena Protocol on Biosafety.” The Protocol outlines a variety of structural mechanisms aimed at ensuring safety, such as risk assessment, risk management, public information, public participation, etc. The Protocol sets forth basic principles that must be established in each country regarding risk assessment and management. Modern science and technology have achieved outstanding developments but these developments per se are not perfect. As such, the Protocol prevents incomplete risk assessment and management by scientists and technicians through structural guarantees related to public information and participation aimed at ensuring to citizen consensus and choice. However, despite the principles guaranteed in the Protocol, a problem arises as to whether these principles can be taken as the preconditions for granting intellectual property rights. The development of LMO, due to their uniqueness, does not end with the mere possession of the technology involved, such development also take into consideration the post-development fact that the resolutions LMO can be cultured again. Even with the strictest standards of maintenance, unintentional proliferation cannot be entirely prevented. There is always room for problems even if the developer has no intention of such occurrences. For this reason, requirements must be included for monitoring influences on the human health and ecology. Furthermore, even if these requirements were included, how can we resolve other safety problems presently unforeseen by modern science and technology? Safety can only be guaranteed by means of a consensus based on a release of information and public participation. The range of the standards of risk assessment and management can be established through such consensus and these standards must be legally controlled. Standards established through public information and participation can limit those LMO products which do not meet these standards by excluding them from protection as intellectual property rights. However, it would also be difficult to apply these standards as the norm. More diverse measures must be taken into consideration to control certain rights. On the basis of living-modified organisms (LMO) as life forms, many concerns have arisen surrounding the issue of safety for the human health and the environment. One result of such concerns is the “Cartagena Protocol on Biosafety.” The Protocol outlines a variety of structural mechanisms aimed at ensuring safety, such as risk assessment, risk management, public information, public participation, etc. The Protocol sets forth basic principles that must be established in each country regarding risk assessment and management. Modern science and technology have achieved outstanding developments but these developments per se are not perfect. As such, the Protocol prevents incomplete risk assessment and management by scientists and technicians through structural guarantees related to public information and participation aimed at ensuring to citizen consensus and choice. However, despite the principles guaranteed in the Protocol, a problem arises as to whether these principles can be taken as the preconditions for granting intellectual property rights. The development of LMO, due to their uniqueness, does not end with the mere possession of the technology involved, such development also take into consideration the post-development fact that the resolutions LMO can be cultured again. Even with the strictest standards of maintenance, unintentional proliferation cannot be entirely prevented. There is always room for problems even if the developer has no intention of such occurrences. For this reason, requirements must be included for monitoring influences on the human health and ecology. Furthermore, even if these requirements were included, how can we resolve other safety problems presently unforeseen by modern science and technology? Safety can only be guaranteed by means of a consensus based on a release of information and public participation. The range of the standards of risk assessment and management can be established through such consensus and these standards must be legally controlled. Standards established through public information and participation can limit those LMO products which do not meet these standards by excluding them from protection as intellectual property rights. However, it would also be difficult to apply these standards as the norm. More diverse measures must be taken into consideration to control certain rights.
IPv6 호스트 접근제어를 위한 IPv6 주소관리서버의 설계 및 구현
한선영(Sunyoung Han),배상욱(Sangwook Bae),김민순(Minsoon Kim),손소라(Sora Son),손사민(Shimin Sun) 한국정보과학회 2014 정보과학회논문지 : 정보통신 Vol.41 No.1
미래 인터넷은 지난 30년 동안 꾸준히 발전하여 온 인터넷 프로토콜이 2000년대에 이르러 사용자의 요구사항 증대, 통신환경의 급격한 변화 등으로 수용할 수 없게 되자 시작된 연구이다. 이는 기존의 인터넷 프로토콜 자체의 근본적인 문제를 해결하고자 하였으며, 2가지의 내용으로 진행되고 있다. 첫번째는 기존의 인터넷 프로토콜이 아닌 새로운 고유 식별자를 이용하여 사용한다는 것과 두번째는 기존의 인터넷 프로토콜을 개선하여 이용하고자 하는 내용이다. IPv6는 후자에 해당하는 내용으로 기존의 약 43억개의 주소를 할당할 수 있는 IPv4의 주소체계는 이미 한계에 도달하였으므로 이를 해결하고 기존의 QoS, Security 등의 다양한 문제를 해결하기 위해 개발된 것이다. IPv6는 IPv4에 비하여 다양한 특징이 있는데 이중에서 Stateless Auto Address Configuration (SLAAC)는 호스트가 스스로 주소를 생성하여 통신을 가능하게 하는 기능이다. 하지만 이와 같은 기능은 네트워크 관리자나 기업에서는 보안 및 관리 측면에서 운영이 어렵다는 치명적인 단점을 가지고 있다. 이를 해결하기 위하여 중요한 호스트는 보호하며, 비인가 호스트의 접속을 차단하는 등의 호스트 제어 방법이 필요하다. 본 연구는 호스트 제어를 하기 위한 방법으로 ICMPv6 프로토콜을 이용하여 호스트의 주소 제어를 하도록 하였다. 먼저 호스트의 주소를 수집하는 과정은 Multicast Listener Discovery 프로토콜 및 Neighbor Discovery 프로토콜을 이용하였으며, 호스트 차단을 하기 위한 방법으로는 호스트들의 Neighbor Cache Table을 변조하는 방법을 이용하였다. 본 과정들을 이용하여 리눅스 환경에서 개발을 완료하였으며, 실제 연구망인 KOREN 네트워크 환경에서 테스트를 완료하였다. For the last 30 years, the Internet protocol has continuously evolved to meet the requirements of users, however, the rapid changes in communication environments in 2000s could not be accommodated appropriately. To overcome this situation, the research on the Future Internet has begun. To solve the fundamental limitations of the current Internet protocol, two research directions have been pursued. The first direction is to use a new unique identifier for host identification, which is totally different from the IP address in the current Internet protocol. The second direction is to continue to use IP addresses through the improvement of IP protocol by IP version 6 (IPv6). In the current situation that IPv4 addresses have been exhausted for 4.3 billion hosts, IPv6 addresses can be assigned to almost unlimited hosts in order to solve this IP address scarcity. Also, IPv6 has been designed and implemented to problems, such as Quality of Service (QoS) and Security. IPv6 is different from IPv4 in various features. Especially, Stateless Address Auto-Configuration (SLAAC) is a significant feature that allows an IPv6 host to generate and configure its own address for communications. However, this feature has drawbacks in terms of security in enterprise network management. To address this issue and protect sensitive hosts, a new host address management approach becomes required to block illegal host access to the enterprise network. In this study, we developed and implemented a mechanism collecting IPv6 addresses and blocking illegal hosts, based on Internet Control Message Protocol version 6 (ICMPv6), which is a companion protocol of IPv6. First, the method of collecting host addresses is explained to use Multicast Listener Discovery protocol that is the companion protocol of Neighbor Discovery protocol. Second, the method of blocking illegal hosts is described to use Neighbor Discovery protocol to manipulate Neighbor Cache Table for IPv6 host address management. For our test environment, a Linux system is used and our system was tested in the real research IPv6 network called KOREN.
이광휘,김태수 國立 昌原大學校 情報通信硏究所 1997 精報通信論文集 Vol.1 No.-
This paper presents a system for internetworking between different network management protocols. The interworking system between SNMP(Simple Network Management Protocol) and CMIP(Common Management Information Protocol) has been designed. SNMP has been used as a standard protocol in Internet and CMIP is selected as management protocol in TMN(Telecommunication Management Network) in Korea. A new approach has been introduced, so the managed object defined in this paper can support several management interfaces. This approach is different from previous researches using protocol conversion technique between management protocols. Our approach provides some benifits, for example, even if new management protocol has to be introduced, the new gateway system need not be designed. It can be achieved through minimum modification in the interface of the managed object. For this, we can support managed objects previously defined using MOVI(managed object view interface) concept presented in our previous research.
인프라구조 기반의 이동 애드혹 네트워크를 위한 인터넷 게이트웨이 중심의 링크상태 라우팅 프로토콜
이성욱(Sung Uk Lee),오지충(Chi-Trung Ngo),한충진(Trung-Dinh Han),김제욱(Je-Wook Kim),오훈(Hoon Oh) 한국통신학회 2012 韓國通信學會論文誌 Vol.37 No.10B
인프라구조 기반의 이동 애드혹 네트워크를 위한 기존의 프로토콜들은 이동성 관리와 라우팅 프로토콜을 분리하여 설계되었을 뿐만 아니라 플러딩을 사용하기 때문에 높은 제어 오버헤드를 발생시킨다. 본 논문에서는 트리기반의 이동성관리 방식을 사용하며 이 과정에서 부수적으로 구축되는 토폴로지 정보를 활용하는 단순하고 효율적인 라우팅 프로토콜을 제시한다. 제안하는 라우팅 프로토콜은 패킷 전송 과정에서 트리를 구성하는 중요 링크에 대한 파손을 발견하는 경우에 토폴로지 정보를 신속히 갱신한다. 이러한 방식으로 이동성 관리와 라우팅 프로토콜은 서로 협력한다. 또한 IG 주위에 트래픽 혼잡을 줄이기 위하여 점진적 경로탐색 방식을 사용하였으며, 제어메시지 전송 신뢰성을 높이고 링크 유효성을 신속히 판단할 수 있도록 유니케스트 기반의 브로드케스트 방식을 사용하였다. 그리고 플러딩을 배제하고 제어메시지 전송의 최적화를 통하여 오버헤드를 크게 줄임으로써 노드의 수가 증가하고 이동성이 높은 경우에도 안정적으로 작동할 수 있도록 하였다. 시뮬레이션을 통해서 제안하는 프로토콜이 Hybrid 이동성 관리 방식을 사용하는 AODV에 비하여 우수한 성능과 확장성을 갖는다는 것을 입증하였다. Since the existing protocols separated mobility management part and routing protocol part in their design and used a flooding, they suffer from the high control overhead, thereby limiting performance. In this paper, we use a tree-based mobility management method and present a simple and efficient routing protocol that exploits the topology information which is built additionally through mobility management. Thus, the mobility management and the routing protocol closely cooperate to optimize control overhead. Furthermore, we use a progressive path discovery method to alleviate traffic congestion around IG and a unicast-based broadcast method to increase the reliability of message delivery and to judge link validity promptly. The proposed protocol reduces control overhead greatly and works in a stable manner even with the large number of nodes and high mobility. This was proven by comparing with the AODV protocol that employs the hybrid mobility management protocol.
Wireless Certificate Management Protocol for Mobile Phone Security
이용(Yong Lee),이구연(Goo Yeon Lee) 대한전자공학회 2008 電子工學會論文誌-TC (Telecommunications) Vol.45 No.10
휴대폰에서의 제한된 메모리 용량 및 CPU 성능으로 인하여, 유선망에서의 전자상거래 보안에 사용되는 PKI를 그대로 휴대폰 보안에 사용하기는 적당치 않다. 그러므로 유선망과 비슷한 보안 기능을 제공하면서도 휴대폰에 적용할 수 있는 무선 PKI 기능을 개발할 필요가 있다. 이에 본 논문에서는 경량화되고 안전한 무선 인증서 관리 프로토콜을 제안한다. 제안한 프로토콜은 휴대폰의 제한된 통신 환경 및 성능을 고려하였다. 또한 우리는 제안된 프로토콜에 대하여 시험적으로 구현하였다. 시험 구현에서 무선 인증서 관리 프로토콜의 모듈 사이즈는 휴대폰에 탑재 할 수 있을 정도로 작게 구현되었으나, 보안 기능은 유선망의 인증서 관리 프로토콜의 경우에 비하여 비슷함을 알 수 있었다. PKI (Public Key Infrastructure) which is used for the security of E-commerce (Electronic-commerce) in wired internet is not suitable for the mobile phone because of the fundamental limitation of performance such as less memory and less powerful CPU. Therefore, we need to develop a wireless PKI (WPKI) that provides the similar security level as the wired PKI supporting mobile phone. In this paper, we propose a lightweight and secure Wireless Certificate Management Protocol (WCMP) that is executable to the mobile phone that has a constrained communication environment and limitation of performance, and show the implementation results of the scheme based on the mobile phone. We minimize data sizes processed in mobile phone, and optimize protocols for the certificate management. This results in the reduced module sizes to be able to install in mobile phone and shows as the same level as the wired CMP.
스마트 홈 환경에서 분산원장 기술을 활용한 키 관리 프로토콜 설계
박중오 대한산업경영학회 2024 산업융합연구 Vol.22 No.12
The evolution of smart home technology aims to enhance the convenience and efficiency of traditional residential living. These environments are characterized by various internet-connected appliances and systems that can be centrally or remotely controlled. However, leveraging network-based systems exposes them to various vulnerabilities and security threats, potentially leading to privacy breaches and financial losses. This paper proposes a distributed ledger technology (DLT)-based key management protocol to facilitate secure communication within smart home environments. The key generation protocol was created by verifying the hash value of information about users and IoT devices using the Merkle Tree method of distributed ledger technology. A comparative safety and performance analysis of the proposed protocol was also conducted. The results indicate an approximate 28% efficiency improvement over traditional certificate-based key generation protocols. Additionally, this paper outlines security policies and research directions for implementing the proposed protocol in smart home settings to provide a safer environment. 스마트 홈 환경 기술의 발전으로 기존의 주거 생활보다 편리하고 효율적으로 만드는 목표를 수행하고 있다. 이러한 스마트 홈 환경은 인터넷과 연결된 각종 가전제품과 시스템을 중앙에서 원격으로 제어할 수 있다. 스마트 홈 환경은 인터넷을 통해 사용자가 스마트 폰을 활용하여 주거하는 공간의 디바이스를 제어할 수 있다. 그러나 네트워크 기반을 수행함으로써 다양한 취약점 및 보안위협에 노출되어 있다. 이러한 피해를 통해 프라이버시 노출 및 재산상의 손실이 발생할 수 있어 강화된 대응책이 필요하다. 그러므로 본 논문에서는 스마트 홈 환경에서 안전하게 통신을 수행할 수 있도록 분산원장 기술을 활용한 키 관리 프로토콜을 설계하였다. 키 생성 프로토콜은 분산원장 기술의 머클트리 방식으로 사용자, IoT 디바이스에 대한 정보를 해쉬값을 검증하는 방식으로 생성하였다. 제안한 키 관리 프로토콜에 대해서 안전성 및 성능 분석도 수행하였다. 성능분석 결과 기존의 인증서 기반 키 생성 프로토콜 대비 100회당 약 28%의 효율성을 확인하였다. 제안한 키 생성 프로토콜을 스마트 홈 환경에 적용하기 위해 보안정책 및 연구방향을 제시하여 보다 안전한 환경에 대해 이점을 주고자 한다.
김성훈 ( Seong-hune Kim ),이홍창 ( Hong-chang Lee ),이명준 ( Myung-joon Lee ),박양수 ( Yang-su Park ) 한국인터넷정보학회 2010 인터넷정보학회논문지 Vol.11 No.1
WebDAV is an IETF standard protocol which supports asynchronous collaborative authoring on the Web. The WebDAV Access Control Protocol provides various methods of controlling the resources on a WebDAV server and their properties, helping high-level group activities to be performed through the WebDAV server. In this paper, to provide high level collaboration, we introduce a technique for managing access control over WebDAV resources through the WebDAV Acess Control Protocol and describe the development of an access control manager for the CoSlide Collaborative system based on the technique. To provide users with the access control features in an easily understandable manner, the developed technique presents the privileges for performing WebDAV methods instead of the standard privileges in the WebDAV Access Control Protocol. In addition, we present the facility for detecting conflicts between new access privileges on resources and old access privileges on them. We applied the method-based access control management technique to the CoSlide collaborative system. The developed access control manager enables us to create group workspaces with flexible access control strategies for group members and resources.
갈등 관리 프로세스에 의한 ABS협상의 갈등 사례 분석
민서정 ( Seo Jeong Min ),이관규 ( Gwan Gyu Lee ),김준순 ( Joon Soon Kim ) 한국환경연구원 2011 환경정책연구 Vol.10 No.2
Nagoya Protocol designed to establish criteria about material trade of biological genetic resources(ABS) was adopted in the 10th conference of the Parties to the Convention on Biological Diversity. In the course of the negotiation for adoption of the protocol, there was conflict between developed and developing countries, resource-rich and poor countries, and multinational corporations and environmentalists. This study investigates conflict process, subjects, issues and major factors in the negotiation case, and analyzes the negotiation by using the Conflict Management Process. To develope conflict management strategies for various conflict cases, we examine previous studies and analyze the intersectional conflict factors of this case and general cases, such as Fundamental side, Resource-allocation side, and Communication/Information-sharing side. These analyses of conflict prevention/resolution of the ABS negotiation show the importance of building mutual trust among stakeholders, enhancing mediator training, and constructing appropriate legislative/policy systems for successful conflict management.
다중 프로토콜 기반의 효율적인 하이브리드 조명관리 시스템 구현
홍성일,인치호,Hong, Sung-Il,Lin, Chi-Ho 한국전기전자학회 2013 전기전자학회논문지 Vol.17 No.4
In this paper, we propose an efficient hybrid lighting management system implementation on multiple protocol. The proposed hybrid lighting management system was implemented by configured as the data display part for management and control of lighting device and the data conversion-processing part the communication part of gateway. The data were designed the DB to enable to storage in real-time, and implemented able to manage by real time wireless remote control and schedule setting. The proposed an efficient hybrid lighting management system, it was possible the real-time monitoring and remote lighting control by peristalsis with smart devices and portable PC etc., and it could be obtained reduction effect of energy and electricity, communication cost.