RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      PLM과 設計圖面 e-DRM의 效果的 聯動構造에 관한 硏究 = A Study on Effective Interlocking Architecture of PLM and drawing e-DRM

      한글로보기

      https://www.riss.kr/link?id=T10645541

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      Today, corporations' competitive power does not augment much outturns at early time. Secure much informations and value is the speed that classify and analyzes information. So, corporations create many documents by digital document as is manageable. And create information. Plan that invest much expenses be razor same .
      However, corporation's information leakage becomes serious the days go.
      Is threatening corporation's survival.
      This treatise PLM and e-DRM structure that worm propose. This is efficient gear structure that maximize performance of system. And embody actually by architecture that propose. And prove that is architecture that is efficient more than failure example that solubility and safety of system refer in front because operating.
      Gear architecture of PLM and e-DRM is no standard. Almost Gear is Custermizing form. Failure example is happening more much.
      Corporation's Legacy and e-DRM's gear, integration system construction growth intercepts corporation's information leakage as well as PLM.
      And this expect information property protect and may contribute in corporation's competitive power elevation.
      Also, the country must present construction activation way of e-DRM, c-DRM in corporation. And we must recognize that DRM is not ephemeral IT's current. This may have to do to recognize by essential system of interior security.
      번역하기

      Today, corporations' competitive power does not augment much outturns at early time. Secure much informations and value is the speed that classify and analyzes information. So, corporations create many documents by digital document as is manageable. A...

      Today, corporations' competitive power does not augment much outturns at early time. Secure much informations and value is the speed that classify and analyzes information. So, corporations create many documents by digital document as is manageable. And create information. Plan that invest much expenses be razor same .
      However, corporation's information leakage becomes serious the days go.
      Is threatening corporation's survival.
      This treatise PLM and e-DRM structure that worm propose. This is efficient gear structure that maximize performance of system. And embody actually by architecture that propose. And prove that is architecture that is efficient more than failure example that solubility and safety of system refer in front because operating.
      Gear architecture of PLM and e-DRM is no standard. Almost Gear is Custermizing form. Failure example is happening more much.
      Corporation's Legacy and e-DRM's gear, integration system construction growth intercepts corporation's information leakage as well as PLM.
      And this expect information property protect and may contribute in corporation's competitive power elevation.
      Also, the country must present construction activation way of e-DRM, c-DRM in corporation. And we must recognize that DRM is not ephemeral IT's current. This may have to do to recognize by essential system of interior security.

      더보기

      목차 (Table of Contents)

      • 1. 서 론 9
      • 2. DRM의 국제 표준화 현황 및 기술동향 11
      • 2.1 DRM의 국제 표준화 현황 11
      • 2.2 DRM의 국제 표준화 기술 13
      • 1. 서 론 9
      • 2. DRM의 국제 표준화 현황 및 기술동향 11
      • 2.1 DRM의 국제 표준화 현황 11
      • 2.2 DRM의 국제 표준화 기술 13
      • 2.2.1 MPEG-21 13
      • 2.2.2 OMA 15
      • 3. DRM과 PLM의 정의 및 분석 18
      • 3.1 DRM의 정의 18
      • 3.2 DRM의 구조적 모델 20
      • 3.3 DRM 기술요소 분석 22
      • 3.3.1 Identification 23
      • 3.3.2 Encryption 기술 25
      • 3.3.3 Key Management 기술 26
      • 3.3.4 Metadata 28
      • 3.3.5 Rights Expression 기술 29
      • 3.3.6 Packaging 기술 32
      • 3.3.7 Rights Enforcement 기술 33
      • 3.4 PLM의 정의 35
      • 3.5 PLM시스템과 Windchill 구성요소 36
      • 3.5.1 PLM시스템 구성요소 36
      • 3.5.2 Windchill의 구성요소 37
      • 4. PLM과 e-DRM의 효과적 연동 아키텍처 제안 39
      • 4.1 e-DRM 구축 요구사항 및 고려사항 분석 39
      • 4.1.1 e-DRM 구축을 위한 기업 요구분석 39
      • 4.1.2 e-DRM 구축을 위한 선행 요구분석 40
      • 4.1.3 PLM과 e-DRM 연동을 위한 고려사항 분석 42
      • 4.2 비효과적인 PLM과 e-DRM 연동 아키텍처 실패사례 48
      • 4.2.1 비효과적인 PLM과 e-DRM 연동 아키텍처 실패사례1 48
      • 4.2.2 비효과적인 PLM과 e-DRM 연동 아키텍처 실패사례2 50
      • 4.3 제안하는 PLM과 e-DRM의 효과적 연동 아키텍처 52
      • 4.4 제안하는 연동 아키텍처의 응용분야 56
      • 4.5 제안하는 PLM과 e-DRM의 연동 구현환경 57
      • 4.6 제안하는 PLM과 e-DRM의 연동 아키텍처 구현 57
      • 5. 결론 63
      • 참 고 문 헌 64
      • Abstract 66
      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼