http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Semiclassical Analysis for O + Pb Elastic Scattering at E=216.6 and 312.6 Mev
최치규,현남규,김용주,홍성락 제주대학교 1992 논문집 Vol.34 No.-
실험실계에서의 입사핵?? 에너지가 216.6과 312.6 MeV이고 표적핵?? 인 탄성산란에 대한 실험데이타를 수정된 Glauber모델을 사용하여 분석하였다. 계산된 결과들은 실험데이타와 좋은 일치를 보여주었다. .
분산 시스템 환경의 인증 서비스 및 실체 인증 메커니즘 분석
최용락 大田大學校 産業技術硏究所 1996 산업기술연구소 論文集 Vol.7 No.2
A distributed system is susceptible to a variety of security threats mounted by intruders as well as legitimate users of the system. This paper deals with authentication services in a distributed system. By reviewing some basic authentication requirements and comparing several authentication schemes, we can make the consideration of main design issues for a complete cryptographic-based authentication mechanism. In this paper, the various types of masquerade and replay attacks among the communication entities are analyzed in the related authentication mechanism such as Kerberos, X.509, Difffie&Hellman, PGP and SPX.
최용락 大田大學校 産業技術硏究所 1997 산업기술연구소 論文集 Vol.8 No.1
This paper proposes a two pass and a three-pass authentication exchange schemes which combine public-key based on the mutual entity authentication with a Diffie-Hellman key derivation exchange. The security of key exchange of the proposed schemes depends on the discrete logarithm problem. The security of the entity authentication depends on that of the signature mechanism to be used in the proposed scheme. In comparison with the Kerberos, X.509 exchanges, and ISO 3-way authentication protocol, the proposed schemes ar not only simple and efficient, but also resistant to the full range of replay and interception attacks.
소프트 실시간 시스템의 주기변형에 의한 프로세스 스케줄링
崔龍洛,朴眞燮 大田大學校 1989 論文集 Vol.8 No.1
This paper studies on the period transformation algorithm. Rate monotonic algorithm was proved to be the optimal static priority scheduling algorithm for periodic process. Under dynamic environment, both earliest deadline and liast laxity scheduling algorithm were proven to be optimal dynamic priority scheduling algorithm. In spite of the optimality property, none of these algorithm are widely used in practice. But, by the period transformation on the basis rate monotonic algorithm, this problem was solved easily. Though this algorithm has low efficiency, simulation result was proven that nonperiodic deadline was guaranteed all.
개방형 분산환경의 정보보호를 위한 범용 암호 서비스 모델
최용락 大田大學校 産業技術硏究所 1997 산업기술연구소 論文集 Vol.8 No.2
This paper analysis the design model of generic security services for application programmers in open distributed environment. The generic security service provides cryptographic interfaces to application programmers which don't have the knowledge of cryptographic algorithm in detail. In this paper, GSS-API, GCS-API and PKI that can be used in various application mechanisms are reviewed and the design strategies of a generic cryptographic service API are proposed.
김용수,최용락 대전대학교 산업기술연구소 1999 산업기술연구소 論文集 Vol.10 No.2
The performance of neural network depends on the structure, the similarity measure used, and the learning rule. This paper presents a fuzzy learning rule which incorporates fuzzy membership value and intra-cluster membership value into the leaky competitive learning rule. The proposed learning rule is compared with the Kohonen learning rule. The IRIS data set is used to analyze the effect of two learning rules on the performance of the neural network.
SESAME를 이용한 초고속 통신망에서의 안전한 원격 의료 서비스에 관한 연구
김수광,최용락,김성훈 大田大學校 産業技術硏究所 1997 산업기술연구소 論文集 Vol.8 No.1
Enforcing network security in telemedicine systems is necessary to ensure security of the information exchanged. This paper deals with the need for security in application programming based on the information superhighway. A secure network is critical for the survival and success of applications. In this paper we discuss some features of well-known security mechanisms such like Kerberos, NetSP, SPX and SESAME. We also propose a software design strategy of telemedicine systems using SESAME developed by ECMA.
박진호,최용락 大田大學校 産業技術硏究所 1996 산업기술연구소 論文集 Vol.7 No.1
Security is defined as protection of information against unauthorized observation, unauthorized or improper modification, and denial of service. Assuring security is not a trivial task; suitable methods and tools are required for developing secure systems. The objective of security modeling is to produce a high-level, software-independent, conceptual model, starting from requirements specifications that describe the protection needs of the system. Access controls in information systems are responsible for ensuring that all direct accesses to the entities occur exclusively according to the access modes and rules fixed by security policies. On this paper, security policies for access control model are presented from the view points of identity-based, rule-based and role-based policy. We give a design of access control model for secure information service based on the derived access control rules and operations to enforce the defined security policies. The proposed access control model provides a integrity, a confidentiality and a flow control of information.
분산 실시간 시스템을 위한 로컬 스케줄러 확장에 관한 연구
하수철,최용락,박진섭 大田大學校 1988 論文集 Vol.7 No.1
This paper is a study on the scheduling mechanism for distributed real time systems. A MINIX system uses preemptive priority scheduling policy and round robin method which take multi-level queueing systems. but this method is unsuitable for distributed real time systems, because it is designed for single syytem environments and used fixed priority based on cpu time. This paper presents extended scheduling mechanism of MINIX system for distributed real time system environment. First, Decision Routine is designed for determination of the execution of the real time processes on the local node. Second. Local Scheduler and Global Scheduler are designed for lical scheduling and global scheduling of real time process based deadline and computation time. Designed module is implimented on MINIX system under IBM-PC/AT.