RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        A Study on applying the CSSM API for Security Interface to Electronic Commerce

        김영덕(Yeong Deok Kim),신동명(Dong Myung Shin),최용락(Yong Rak Choi) 한국컴퓨터정보학회 2000 韓國컴퓨터情報學會論文誌 Vol.5 No.4

        전자상거래 활동은 인터넷과 같은 안전하지 않은 공중망을 사용하기 때문에 많은 보안 위협요소들이 존재한다. 따라서, 다양한 형태의 보안 어플리케이션들이 안전한 전자상거래의 구현을 위하여 CAPI(Cryptographic Application Programming Interface)가 사용될 것으로 예상된다. CAPI는 각 수준별 암호 서비스와 다양한 보안 서비스들을 제공한다. CSSM API는 다른 CAPI들에 비하여 모듈성, 단순성, 다양한 Add-in 모듈과 인터페이스에 의한 확장성을 제공한다. 본 논문은 다른 CAPI와 CSSM API의 비교분석과 전자상거래에 다양한 확장성과 멀티플랫폼을 지원하는 CSSM API의 적용 방안을 제안한다. CSSM API CSP 인터페이스의 암호화, 디지털서명 오퍼레이션에 대하여 기술하고, 전자상거래 위협요소에 대응한 보안 서비스의 연관관계로 CSSM API 적용에 따른 안전성 평가를 하였다. There are many security problems with Electronic Commerce since insecure public networks, especially Internet, are used. Therefore, for implementing secure Electronic Commerce, CAPI(Cryptographic Application Programming Interfaces) is expected to use various form of security applications. The Cryptographic Application Programming Interface supports cryptographic services for each level and various security services. The CSSM API(Common Security Service Management Application Programming Interface) provides modularity, simplicity, and extensibility in terms of various add-in modules and interfaces in contract to other CAPIs. This paper proposed an applying method of CSSM API having various extensibility and supporting multi-platforms to Electronic Commerce. we describe encryption, digital signature operation of CSSM API's CSP interface and evaluate secureness by matching relation of threatening factors to security services.

      • KCI등재

        AAO Template를 이용한 Au/TiO<sub>2</sub> 나노섬유 제조 및 응용에 관한 연구

        엄선미,박상선,김영덕,김용록,설용건,Eom, Seon-Mi,Park, Sang-Sun,Kim, Young-Deok,Kim, Yong-Rok,Shul, Yong-Gun 한국전기화학회 2009 한국전기화학회지 Vol.12 No.1

        본 연구에서는 불순물이 포함된 Al 기판으로부터 두 단계의 양극산화 (anodization) 법에 의해 균일한 나노기공을 갖는 AAO(Anodic Aluminum Oxide)을 제조하였다. 생성된 AAO템플릿 위에 Deposition-Precipitation(DP)방법을 사용하여 수직으로 형성된 $TiO_2$ 나노섬유에 Au를 첨가시켜 2 wt.% $Au/TiO_2$ 나노섬유룰 제조하였다. 두 단계의 양극산화를 통해 규칙적으로 배열된 AAO 기공 형상과 기판 위에 수직으로 배향된 $TiO_2$ 나노섬유의 형상을 SEM을 통해 확인하였다. 또한 $Au/TiO_2$ 나노섬유의 특성은 XRD와 Raman 분석을 통하여 $TiO_2$의 아나타제(anatase)와 루타일(rutile) 결정구조와 $TiO_2$ 나노섬유에 담지된 Au의 존재를 확인하였다. 또한 일산화탄소(CO) 산화반응을 통해 AAO(Anodic Aluminum Oxide)기판 위에 형성된 $TiO_2$와 2 wt% $Au/TiO_2$ 나노섬유의 광촉매적 활성을 비교하였다. In this study, highly ordered AAO (Anodic Aluminum Oxide) with nanopores was prepared by commercial grade Al substrate containing 3.5 wt.% impurities through two step anodizing method. Nanopores of prepared AAO arrays were used as templates for preparing nanofiber. $TiO_2$ was deposited by using DP (deposition-precipitation) method into AAO pores to grow nanofiber. Au particles were loaded on this $TiO_2$ nanofiber which was grown vertically. Prepared 2 wt.% $Au/TiO_2$ nanofiber was characterized by XRD, SEM and Raman. The crystal structure was analyzed by the XRD. SEM was used to observe pore size and pore wall thickness. Photocatalytic activity of co-oxidation was compared with $TiO_2$ and $Au/TiO_2$ nanofiber on AAO arrays.

      • ECG-Gated 심장 CT검사에서 다면 재구성 영상을 이용한 심근교 질환의 평가에 대한 유용성

        이현성(Hyun Sung Lee),김영덕(Young Deok Kim),김용완(Yong Wan Kim),이종호(Jong Ho Lee),최남길(Nam Gil Choi) 대한CT영상기술학회 2007 대한CT영상기술학회지 Vol.9 No.1

        Purpose To evaluate the incidence of myocardial bridging in symptomatic and asymptomatic patients and to investigate whether there is any parameter related to symptom in ECG-gated MDCT with multiplanar reformation. Materials and Methods 1030 patients were involved in this study. They consisted of the patients with atypical chest pain (n = 583) and who were referred for health screening (n = 447). MDCT scans were performed with two different 64-MDCT scanners (Light Speed VCT 64, GE and Sensation Cardiac 64, Siemens). We evaluated following parameters which are assumed to determine significance of myocardial bridging after multi planar reformation on MDCT : the depth and length of tunneled artery, and visualization of milking effect. To find out which parameter is related to symptom, we used Fisher’s exact test and Mann-Whitney U test, statistically. Results Among the 985 patients, 31 cases (3.1%) of myocardial bridging were detected. Incidences of myocardial bridging were 2.7 % in symptomatic patients and 3.4 % in asymptomatic patients, without statistical difference(p > 0.05). Most common location of myocardial bridging was at the middle third of the left anterior descending coronary artery (n = 25/31, 80.6%). Of these patients, the length of tunneled artery was between 11 and 48 mm (mean : 24 mm), and the depth of tunneled artery was between 0 and 8.5 mm (mean : 3.1 mm). The milking effect was observed in 19 of 23 patients (82.6%), but there was no specific parameter related to symptom, statistically (p > 0. 05). Conclusion It is known that the patients with myocardial bridging show variable clinical symptom, from no specific symptom to sudden death. In our study, there was no statistical difference of the incidence of myocardial bridging between symptomatic and asymptomatic patients, and there was no symptom-related specific parameter which determines significance of myocardial bridging in ECG-gated MDCT with multiplanar reformation.

      • 환경감시 시스템의 정보 인증 서브 시스템 설계 및 구현

        신동명(Dong-Myung Shin),김영덕(Yeong-Deok Kim),최용락(Yong-Rak Choi) 한국정보과학회 2000 한국정보과학회 학술발표논문집 Vol.27 No.1A

        환경부나 지방자치단체에서는 환경문제를 사전에 예방할 수 있는 세계를 마련하기 위하여 오염물질 배출업체가 환경감시 시스템을 통하여 환경오염물질의 배출상태를 실시간으로 측정하여 공시하도록 의무화 하고있다. 그러나 환경단체나 지역주민들은, 환경부나 지방자치단체에 제공된 환경정보에 대한 신뢰감이 부족한 현실이다. 본 논문에서는 환경정보의 신뢰성 제공을 위하여 암호학적 인증 메커니즘을 이용한 환경정도 인증 서브 시스템을 설계, 구현하였다. 제시한 환경정보 인증시스템에서는 클라이언트/서버간 인증, 환경정보에 대한 무결성 보장 및 접근통제, 감시기록의 기능을 제공한다.

      • Multi-detector Computed Tomography에서 환자의 자세 변화에 따른 Esophageal Cancer 진단의 유용성

        한재진(Jae Jin Han),김현석(Hyun Seok Kim),김영덕(Yong Deok Kim),이종호(Jong Ho Lee),최남길(Nam Kil Choi) 대한CT영상기술학회 2010 대한CT영상기술학회지 Vol.12 No.1

        Purpose The purpose of this study was to assess die utility of multi-detector computed tomography with a patient position change for die diagnosis of esophageal cancer. Material and methods Sixty nine patients with esophageal cancer underwent computed tomography(CT) in supine and prone positions. CT scans were performed in supine position at first, and in prone position followed. CT images were evaluated for perception esophageal cancer, findings of paraesophageal infiltration and presence of paraesophageal lymphadenopathy. The detectabilities of esophageal cancer, paraesophageal infiltration and paraesophageal lymphadenopathy were evaluated on prone position CT and compared with those of supine position CT, by scoring systems(1-3). In addition, findings on were correlated with those on endoscopy and post operatetive findings. Results The mean score for detectability of esophageal carcinoma on prone position CT (2.58±0.7367) was higher than on supine position CT(2.42±0.829). The mean score for detectability of paraesophageal infiltration was higher on prone position CT(2.91±0.29) than on supine position CT(2.65±0.48). The mean score for detectabiliry of paraesophageal infiltration in patient with esophagectomy was higher on prone position CT(2.39±0.85) than on supine position CT(2.06±0.73). Conclusion Multi-detector CT with prone position has advantages for evaluation of esophageal cancer by improving deteaability of mass lesion and paraesophageal infiltration.

      • 인증기관 구성 및 운영정책 요구사항 분석

        김영덕,정재수,최용락 대전대학교 산업기술연구소 1999 산업기술연구소 論文集 Vol.10 No.1

        This study purposes to analyze the configuration of CAs(Certification Authorities) and the operating policy of CAs for cross-trusted authentication services. The CA is an authority trusted by one or more users to create and assign certificates being used to user authentication in the network. In this paper, each country's law related to Electronic Commerce and the requirement of PKI(Public Key Infrastructure) components are analyzed, and the guideline to organize CA mechanism in the domestic is mentioned

      • 인증서의 상호인증을 위한 모델 체크리스트 분석

        김영덕,신동명,최용락 대전대학교 산업기술연구소 1999 산업기술연구소 論文集 Vol.10 No.2

        The Certification Authority in each country is briskly in progress to get the reliability of Electronic Commerce. One Certification Authority can not authenticate the reliability of Electronic Commerce spreading itself to the world rapidly. Therefore, Each country is constructing the base of Electronic Commerce Authority System and trying to provide cross connection with compatibility through the Cross-Authentication. This paper analysed the requirements of Cross-Authentication Mechanism on researching internationally and proposed the check-list of Cross-Authentication Model. The paper could be a guidance to organize domestic Cross-Authentication System Models.

      • 분산 어플리케이션의 정보보호 서비스를 위한 CAPI 설계 모델

        이상기,김영덕,최용락 대전대학교 산업기술연구소 1998 산업기술연구소 論文集 Vol.9 No.2

        Until recently, the integration of cryptographic functionality into application program has required that developers tightly couple the application to the cryptographic module. This approach forces each new combination of application and cryptography to be treated as a distinct development effort, and does not provide the modularity and maintainability. An approach that can provide flexibility and cost saving is the use of a standardized CAPI(Cryptographic Application Prigram Interface) suite. This Paper analyze the CAPI for the development of various types of security application programs in distributed environment. The analysis of CAPI are considered with the respect of 7 criteria items such as algorithm independence, application independence, cryptomodule independence, the degree of cryptographic awareness, modular design and auxiliary services, safe programming and security perimeter. In this paper, we suggested the basis of utilization to be selected for develope the cryptographic modules in distributed applications.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼