PowerPoint Template
|
|
- 나리 여
- 7 years ago
- Views:
Transcription
1 SeoulTech UCS Lab st IP Security 오대명, 오현석 Copyright c 2014 by USC Lab All Rights Reserved. 1
2 Course Introduction 1. IP Security Overview 2. IP Security Policy 3. Encapsulating Security Payload 4. Combining Security Associations 5. Internet Key Exchange 6. Cryptographic Suites 2
3 1. IP Security Overview 3
4 What is IPSec? IPSec Framework Choices: IPSec Protocol ESP ESP ESP +AH AH Encryption DES DES 3 DES AES Authentication MD5 MD5 SHA Diffie-Hellman DH1 DH1 DH2 4
5 IPSec Security Services Confidentiality Data integrity Origin authentication Anti-replay 5
6 Applications of IPsec Main site IP HDR IP Payload IP HDR IP Sec HDR IP Payload LAN Branch or Business partner with router IPSec Internet IP HDR IP Sec HDR IP Payload Security gateway Server Cluster SOHO router Mobile laptop computer 6
7 IPsec Documents RFC IPsec Documents RFC Content 2411 IP Security Document Roadmap 2401 IPsec Architecture 2402 AH(Authentication Header)Protocol 2403 The Use of HMAC-MD5-96 within ESP and AH 2404 The Use of HMAC-SHA-1-96 within ESP and AH 2405 The ESP DES-CBC Cipher Algorithm 2406 ESP(Encapsulating Security Payload)Protocol 2407 IPSec DOI 2408 ISAKMP Protcol 2409 IKE(Internet Key Exchange)Protocol 7
8 2. IP Security Policy 8
9 SA(Security Association) IPsec SA is a one-way logical connection between a sender and a receiver that provide security services to the traffic flow on it. If a peer relationship is needed for two-way secure exchange, then two SA are required. Security Parameters Index (SPI) IP Destination Address Security Protocol Identifier 9
10 SAD(Security Association Database) SAD defines the parameters associated with each SA. A SA is defined by the following parameters in an SAD entry. Security Parameters Index (SPI) Sequence Number Counter Sequence Counter Overflow Anti-Replay Window AH Information ESP Information Lifetime IPsec Protocol Mode Path MTU 10
11 SPD(Security Policy Database) SPD means by which IP traffic is related to specific SA is the nominal SPD. Remote IP Address Local IP Address Next Layer Protocol Name Local and Remote Ports 11
12 Example SPD Remote office LAN: /24 Corporate Office Server: /24 HOST_A HOST_B Router_A IPsec tunnel Internet Router_B HTTP Server Router_A SPD Protocol Local IP S_Port Remote IP D_Port Action Comment TCP /24 * /32 80 PROTECT Encrypt to server ICMP * * * BAYPASS Router_B SPD Protocol Local IP S_Port Remote IP D_Port Action Comment TCP / /24 * PROTECT To Remote office 12
13 IP Traffic Processing(1/2) Outbound IP packet Discard packet No match found DISCARD Search Security policy database BYPASS Determine policy Match found Match found PROTECT Search security association database No match found Processing Model for Outbound Packets Process (AH/ESP) Internet Ke y Exchange Forward packet via IP 13
14 IP Traffic Processing(2/2) Processing Model for Inbound Packets Deliver packet to higher layer Process AH/ESP BYPASS Search security policy database Not BYPASS Discard packet No match found Match found Search security association database IP Packet type IPsec Inbound IP packet 14
15 Summary IKE Key exchange IKE IPsec IKE SA IPsec SA Pair IPsec IPsec ESP protects data 15
16 3. Encapsulating Security Payload 16
17 ESP(Encapsulating Security Payload) ESP protocol number is 50 in ip header. Encryption algorithm support DES,3DES,AES. Authencation algorithm support HMAC-MD5,HMAC-SHA-1. Provide confidentiality Ensures data integrity Provide origin authentication Provide anti-replay protection Router A Data payload is encrypted Router B 17
18 Encrypted ICV coverage ESP Format(1/2) Security parameters index (SPI) Sequence number Payload data (variable) Padding (0-255 bytes) Pad length Next header Integrity check value - ICV (variable) 18
19 ESP Format(2/2) Security Parameters Index (32 bits) Sequence Number (32 bits) Payload Data (variable) Padding (0 255 bytes) Pad Length(8 bits) Next Header (8 bits) Integrity Check Value (variable) initialization value (IV) Optional traffic flow confidentiality (TFC) Optional 19
20 Encryption and Authentication Algorithms The Payload Data, Padding, Pad Length, and Next Header fields are encrypted by the ESP service. The ICV field is optional.it is present only if the integrity service is selected.the ICV is computed after the encryption is performed. This order of processing reducing the impact of denial of service (DoS)attacks. 20
21 Padding Padding field is used to expand the plaintext to the required length. The ESP format requires that the Pad Length and Next Header fields be right aligned within a 32-bit word. Additional padding may be added to provide partial traffic-flow confidentiality by concealing the actual length of the payload. 21
22 Anti-Replay Service Replay attack is copy of an authenticated packet and later transmits it to the destination. The Sequence Number field is designed to thwart such attacks. Fixed window size W Advance window if valid packet to the right is received N N-W Marked if valid Unmarked if valid N+1 packet received packet not yet received 22
23 AH(Authentication Header) Does not provide confidentiality (no encryption) Ensures data integrity Provides origin authentication Uses HMAC-MD5,HMAC-SHA1 mechanism Provides anti-replay protection Router A All data in plaintext Router B 23
24 AH Format Version Header Length Type of Service Total Length Identification Flags(3bit) Fragment offset Time To Live Protocol Header Checksum Source IP Address Destination IP Address IP Header Next Header Payload Length Reserved Security parameters index (SPI) Sequence number Integrity check value - ICV (variable) AH Header 24
25 Transport and Tunnel modes Both AH and ESP support two modes of use: transport and tunnel mode. Transport mode provides protection primarily for upperlayer protocols. For example, ESP transport mode protection extends to the payload of an IP packet. Transport mode is used for end-to-end communication between two hosts. Tunnel mode provides protection to the entire IP packet. After the AH or ESP fields are added to the IP packet, and in the entire packet plus new outer IP header. Tunnel mode has been deployed widely to implement Virtual Private Networks (VPNs). 25
26 ESP Transport Mode Protocol Operation for ESP Original IP Packet Orig IP HDR Data Data ESP Trailer Encryption secret key DES 3DES AES Encryption Ciphertext ESP HDR Ciphertext Authencation secret key HMAC-MD5 HMAC-SHA-1 AUTH Orig IP HDR ESP HDR Ciphertext ESP AUTH 26
27 ESP Tunnel Mode Protocol Operation for ESP Original IP Packet Orig IP HDR Data Orig IP HDR Data ESP Trailer Encryption secret key DES 3DES AES Encryption Ciphertext ESP HDR Ciphertext Authencation secret key HMAC-MD5 HMAC-SHA-1 AUTH NEW IP HDR ESP HDR Ciphertext ESP AUTH 27
28 AH Transport Mode Protocol Operation for AH Original IP Packet Orig IP HDR Data Orig IP HDR AH HDR Data Authencation secret key HMAC-MD5 HMAC-SHA-1 Hash Authentication Data Orig IP HDR AH HDR Data 28
29 AH Tunnel Mode Protocol Operation for AH Original IP Packet Orig IP HDR Data NEW IP HDR AH HDR Orig IP HDR Data Authencation secret key HMAC-MD5 HMAC-SHA-1 Hash Authentication Data NEW IP HDR AH HDR Orig IP HDR Data 29
30 Summary Tunnel Mode and Transport Mode Functionality AH ESP Transport Mode SA Authenticates IP payload and selected portions of IP header. Encrypts IP payload(transpo rt level segment) and ESP trailer. Authenticates ESP header, IP payload(transport-level segment) and ESP trailer. Tunnel Mode SA Authenticates inner IP packet plus selected portions of outer IP header. Encrypts inner IP packet and ESP trailer. Authenticates ESP inner IP packet and ESP trailer. 30
31 4. Combining Security Associations 31
32 Security Association Bundle A sequence of SAs through which traffic must be processed to provide a desired set of IPsec services. Transport Adjacency. Refers to applying more than one security protocol to the same IP packet without invoking tunneling. Iterated Tunneling Refers to the application of multiple layers of security protocols effected through IP tunneling. 32
33 Authentication Plus Confidentiality ESP with authentication option The user first applies ESP to the data to be protected and then appends the authentication data field. Transport mode ESP : IP header is not protected. Tunnel mode ESP : The entire inner IP packet is protected by the privacy mechanism for delivery to the inner IP destination. 33
34 Protocol Operation for ESP(1/2) 34
35 Protocol Operation for ESP(2/2) 35
36 Authentication Plus Confidentiality Transport Adjacency( 중첩전송 ) Another way to apply authentication after encryption is to use two bundled transport SAs, with the inner being an ESP SA and the outer being an AH SA. The advantage is include the source and destination IP addresses. The disadvantage is the overhead of two SAs versus one SA. Transport-Tunnel Bundle( 전송 - 터널묶음 ) The use of authentication prior to encryption The authentication data are protected by encryption It may be desirable to store the authentication information with the message at the destination for later reference. 36
37 IPsec Architecture(1/4) Case 1. All security is provided between end systems that implement IPsec. For any two end systems to communicate via an SA, they must share the appropriate secret keys 37
38 IPsec Architecture(2/4) Case 2. Security is provided only between gateways (routers, firewalls, etc.)and no hosts implement IPsec. 38
39 IPsec Architecture(3/4) Case 3. This builds on case 2 by adding end-to-end security. 39
40 IPsec Architecture(4/4) Case 4. This provides support for a remote host that uses the Internet to reach an organization s firewall and then to gain access to some server or workstation behind the firewall. 40
41 5. Internet Key Exchange 41
42 The Key management portion of IPsec The key management portion of IPsec involves the determination and distribution of secret keys. A typical requirement is four keys for communication between two applications Transmit and receive pairs for both integrity and confidentiality. 42
43 Internet Key Exchange The IPsec Architecture document mandates support for two types of key management Manual( 수동 ) A system administrator manually configures each system with its own keys and with the keys of other communicating systems. This is practical for small, relatively static environments. Automated( 자동 ) An automated system enables the on-demand creation of keys for SAs. Facilitates the use of keys in a large distributed system with an evolving configuration. 43
44 Internet Key Exchange Protocol The default automated key management protocol for IPsec is referred to as : Oakley/ISAKMP Oakley Key Determination Protocol(Oakley 키결정프로토콜 ) Oakley is a key exchange protocol based on the Diffie-Hellman algorithm but providing added security. ISAKMP: Internet Security Association and Key Management Protocol( 인터넷보안연계와키관리프로토콜 ) ISAKMP provides a framework for Internet key management and provides the specific protocol support ISAKMP is including formats, for negotiation of security attributes 44
45 Key Determination Protocol IKE key determination is a refinement of the Diffie- Hellman key exchange algorithm. The Diffie-Hellman algorithm has two attractive features 비밀키는필요할때만생성 키교환은전역매개변수에대한동의외에사전기반구조불필요 The Diffie-Hellman algorithm has three disadvantages 상대방의신분에관한어떤정보도제공하지않음 Man-in-the-middle Attack 계산량이매우많음. 공격자의매우많은개수의키를요구하는방해공격 (clogging attack) 에매우취약 45
46 Features of IKE Key Determination The IKE key determination algorithm is characterized by five important features It employs a mechanism known as cookies to thwart clogging attacks. 상대의존적인쿠키생성과승인및쿠키의빠른생성과확인방안 It enables the two parties to negotiate a group 키교환전역매개변수정의와알고리즘식별지원 It uses nonces to ensure against replay attacks. 자체적으로생성된난수를응답메시지에포함하고암호화하여교환 46
47 Features of IKE Key Determination It enables the exchange of Diffie-Hellman public key values. It authenticates the Diffie-Hellman exchange to thwart man-inthe-middle attacks. 3 가지인증방식 : 디지털서명, 공개키암호화, 대칭키암호화 47
48 Cookie exchange 방해공격방지를위해쿠키 (cookie) 교환기법사용 양쪽의초기메시지에의사난수인쿠키를넣어서전송하고, 상대방의수신확인응답이필요 수신확인응답 (acknowledgement) 은 Diffie-Hellman 키교환의첫메시지에서반복 쿠키생성을위한기본요구사항 쿠키는특정상대에게의존적이어야함 발행개체가아닌다른개체에의해받아들여질쿠키를생성할수없어야함 발행개체가쿠키의생성과후속검증작업에서내부비밀정보를사용 프로세서자원을파괴하려는공격자를방지하기위해쿠키의생성과검증방법은신속해야함 쿠키생성을위한권장방법 IP 발신지와목적지주소, UDP 의발신포트와목적지포트, 그리고로컬에서생성된비밀값에대해빠른해쉬 ( 예 : MD5) 를실행 48
49 IKEv2 Exchanges(1/2) Initial exchange( 초기교환 ) 첫번째교환 두피어 (peer-to-peer) 는암호알고리즘과비표, Diffie-Hellman(DH) 값들과함께사용할다른보안매개변수에관한정보들을교환 교환후 IKE SA 라불리는특별한 SA 를설정 두피어 (peer) 간에보안채널을위한매개변수들을정의 두번째교환 두당사자들은상호인증 피어들간에일반 (non-ike) 통신을보호하기위해사용되는첫번째 IPsec SA 를설정 CREATE_CHILD_SA_exchange : 트래픽보호를위한추가 SA 를설정하기위해사용 Information exchange( 정보교환 ) : 관리정보, IKEv2 오류메시지등을교환하기위해사용 49
50 IKEv2 Exchanges(2/2) 50
51 Header and Payload Formats IKE Header Format 보안연계를만들고, 협상, 수정, 삭제하기위한절차와패킷형식을정의함 Payload Header 페이로드형식은특정한키교환프로토콜과, 암호알고리즘, 그리고인증메커니즘과는독립적이며, 일관된프레임워크를제공 51
52 IKE Header(1/2) 52
53 IKE Header(1/2) Initiator SPI (64 bits): A value chosen by the initiator to identify a unique IKE security association (SA). Responder SPI (64 bits): A value chosen by the responder to identify a unique IKE SA. Next Payload (8 bits): Indicates the type of the first payload in the message. Major Version (4 bits): Indicates major version of IKE in use. Minor Version (4 bits): Indicates minor version in use. 53
54 IKE Header(2/2) Exchange Type (8 bits): Indicates the type of exchange Flags (8 bits): Indicates specific options set for this IKE Message ID (32 bits): Used to control retransmission of lost packets and matching of requests and responses. Length (32 bits): Length of total message (header plus all payloads) in octets. 54
55 Generic Payload Header(1/2) 55
56 Generic Payload Header(2/2) 56
57 6. Cryptographic Suites 57
58 Cryptographic Suites 다양한유형의암호알고리즘을필요로함 상호운용성을촉진하기위해두가지 RFC 가권장하는암호도구를정의 RFC 4308 은가설사설망을위한두가지암호도구를정의 VPN-A 는일반적으로기업 VPN 보안으로사용. 3DES 와 HMAC 을필요로함 VPN-B 는더강한보안을제공하며, IPsecv3 와 IKEv2 로구현되는새로운 VPN 에권장. AES 를필요로함 RFC 4869 는미국국가안보국 (NSA: National Security Agency) 의 suite B 명세와호환되는 4 가지선택적암호 suites 를정의 ESP 와 IKE 에대한선택을제공 AES-GCM, AES-CBC, HMAC-SHA, ECP, ECDSA 58
59 Cryptographic Suites for IPsec 59
60 Cryptographic Suites 60
61 Reference William Stallings, 네트워크보안에센셜 서상원, 인터넷보안, IPSec 61
62 Q & A 62
63 Thank You! 63
Subnet Address Internet Network G Network Network class B networ
Structure of TCP/IP Internet Internet gateway (router) Internet Address Class A Class B Class C 0 8 31 0 netid hostid 0 16 31 1 0 netid hostid 0 24 31 1 1 0 netid hostid Network Address : (A) 1 ~ 127,
More informationVPN? VPN VPN Tunneling L2F PPTP L2tp IPSEC IKE -2 -
VPN ( ) VPN? VPN VPN Tunneling L2F PPTP L2tp IPSEC IKE -2 - VPN Virtual Private Network : Extranet Intranet -3 - -4 - , network network network network, -5 - Network interactive (, ) contents hosting,
More informationTCP.IP.ppt
TCP/IP TCP/IP TCP/IP TCP/IP TCP/IP Internet Protocol _ IP Address Internet Protocol _ Subnet Mask Internet Protocol _ ARP(Address Resolution Protocol) Internet Protocol _ RARP(Reverse Address Resolution
More information슬라이드 1
DHCP (Dynamic Host Configuration Protocol) Oct 2006 Technical Support Div. Tel : 031-739-6800 Mail : support@corecess.com DHCP Motivations Automatic network configuration for clients No administrator intervention
More informationSMB_ICMP_UDP(huichang).PDF
SMB(Server Message Block) UDP(User Datagram Protocol) ICMP(Internet Control Message Protocol) SMB (Server Message Block) SMB? : Microsoft IBM, Intel,. Unix NFS. SMB client/server. Client server request
More information05 암호개론 (2)
정보보호 06 암호의응용 (1) SSL (Secure Socket Layer) 특징 Netscape 사에서제안 HTTP 서비스의보안성제공 세션계층에서동작 기밀성과무결성제공 구성요소 SSL Record layer 분할, 식별 SSL Handshake layer 암호화방법또는키결정, 협상 암호화는대칭키암호화알고리즘이용 DES, 3DES, MD4, MD5 인증은공개키알고리즘사용
More information°í¼®ÁÖ Ãâ·Â
Performance Optimization of SCTP in Wireless Internet Environments The existing works on Stream Control Transmission Protocol (SCTP) was focused on the fixed network environment. However, the number of
More informationMicrosoft Word doc
TCP/IP 구조 1. I.P 구조설명 2. ARP 구조설명 3. TCP 구조설명 4. UDT 구조설명 5. RIP 구조설명 6. BOOTP 구조설명 7. TFTP 구조설명 destination addr source addr type data CRC 6 6 2 46-1500 4 type 0X0800 IP datagram 2 46-1500 type 0X0806
More informationUDP Flooding Attack 공격과 방어
황 교 국 (fullc0de@gmail.com) SK Infosec Co., Inc MSS Biz. Security Center Table of Contents 1. 소개...3 2. 공격 관련 Protocols Overview...3 2.1. UDP Protocol...3 2.2. ICMP Protocol...4 3. UDP Flood Test Environment...5
More information네트워크 안정성을 지켜줄 최고의 기술과 성능 TrusGuard는 국내 최초의 통합보안솔루션으로서 지난 5년간 약 4천여 고객 사이트에 구축 운영되면서 기술의 안정성과 성능면에서 철저한 시장 검증을 거쳤습니다. 또한 TrusGuard는 단독 기능 또는 복합 기능 구동 시
네트워크 보안도 안철수연구소입니다 통합 보안의 No.1 파트너, AhnLab TrusGuard 네트워크 환경을 수호하는 최고의 통합 보안 시스템 고성능 방화벽ㆍVPN Security 기술과 고품질 Integrated Security 기술의 강력한 결합 네트워크 안정성을 지켜줄 최고의 기술과 성능 TrusGuard는 국내 최초의 통합보안솔루션으로서 지난 5년간
More information0125_ 워크샵 발표자료_완성.key
WordPress is a free and open-source content management system (CMS) based on PHP and MySQL. WordPress is installed on a web server, which either is part of an Internet hosting service or is a network host
More informationChapter11OSPF
OSPF 111 OSPF Link state Interior Gateway Protocol OSPF 1988 IETF OSPF workgroup OSPF RFC 2383 version 2 Chapter OSPF Version 2 OSPFIGP AS 1 1111 Convergence Traffic Distance Vector Link state OSPF (Flooding),
More informationbn2019_2
arp -a Packet Logging/Editing Decode Buffer Capture Driver Logging: permanent storage of packets for offline analysis Decode: packets must be decoded to human readable form. Buffer: packets must temporarily
More informationPWR PWR HDD HDD USB USB Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl Cable PC PC DDNS (
PWR PWR HDD HDD USB USB Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl Cable PC PC DDNS (http://ddns.hanwha-security.com) Step 1~5. Step, PC, DVR Step 1. Cable Step
More information<303833315FC1A4BAB8B9FDC7D02031362D325FC3D6C1BEBABB2E687770>
개인정보보호법의 보호원칙에 대한 벌칙조항 연구 A Legal Study of Punishments in Terms of Principles of Private Informaion Protection Law 전동진(Jeon, Dong-Jin)*19) 정진홍(Jeong, Jin-Hong)**20) 목 차 Ⅰ. 들어가는 말 Ⅱ. OECD 개인정보 보호원칙과의 비교
More informationMicrosoft Word - [ ] IPv6 IPsec IKE Ç¥ÁØÀûÇÕ¼º ½ÃÇè_¾È_.doc
TTAS.KO-xx.xxxx 제정일 : 2005 년 XX 월 XX 일 T T A S t a n d a r d IPv6 IPsec IKE 표준적합성 시험 (IPv6 IPsec IKE Conformance Test) TTAS.KO-xx.xxxx 제정일 : 2005 년 XX 월 XX 일 IPv6 IPsec IKE 표준적합성시험 (IPv6 IPsec IKE Conformance
More informationUSB USB DV25 DV25 REC SRN-475S REC SRN-475S LAN POWER LAN POWER Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl C
USB USB DV25 DV25 REC SRN-475S REC SRN-475S LAN POWER LAN POWER Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl Cable PC PC Step 1~5. Step, PC, DVR Step 1. Cable Step
More information<BCADBFEFC1F6B9E6BAAFC8A3BBE7C8B85FBAAFC8A3BBE7203437C1FD2831B1C7292E687770>
기업의 영업비밀 보호정책의 한계 The Limitation of Internal Corporate Polices 辯 護 士 Bae Su Young 논문요약 영업비밀 이란 공공연히 알려져 있지 아니하고 독립된 경제적 가치를 가지는 것으로서, 상당한 노력에 의하여 비밀로 유지된 생산방법, 판매방법, 그 밖에 영업활동에 유용한 기술상 또는 경영상의 정보를 말한다.
More informationMicrosoft PowerPoint - 06-IPAddress [호환 모드]
Chapter 06 IP Address IP Address Internet address IP 계층에서사용되는식별자 32 bit 2 진주소 The address space of IPv4 is 2 32 or 4,294,967,296 netid 와 hostid 로구분 인터넷에서호스트와라우터를유일하게구분 IP Address Structure 2-Layer Hierarchical
More information歯I-3_무선통신기반차세대망-조동호.PDF
KAIST 00-03-03 / #1 1. NGN 2. NGN 3. NGN 4. 5. 00-03-03 / #2 1. NGN 00-03-03 / #3 1.1 NGN, packet,, IP 00-03-03 / #4 Now: separate networks for separate services Low transmission delay Consistent availability
More information본 강의에 들어가기 전
1 2.1 대칭암호원리 제 2 장. 대칭암호와메시지기밀성 2 3 기본용어 평문 (Plaintext) - original message 암호문 (Ciphertext) - coded message 암호화 (Cipher) - algorithm for transforming plaintext to ciphertext 키 (Key) - info used in cipher
More informationpublic key private key Encryption Algorithm Decryption Algorithm 1
public key private key Encryption Algorithm Decryption Algorithm 1 One-Way Function ( ) A function which is easy to compute in one direction, but difficult to invert - given x, y = f(x) is easy - given
More information1217 WebTrafMon II
(1/28) (2/28) (10 Mbps ) Video, Audio. (3/28) 10 ~ 15 ( : telnet, ftp ),, (4/28) UDP/TCP (5/28) centralized environment packet header information analysis network traffic data, capture presentation network
More information<30362E20C6EDC1FD2DB0EDBFB5B4EBB4D420BCF6C1A42E687770>
327 Journal of The Korea Institute of Information Security & Cryptology ISSN 1598-3986(Print) VOL.24, NO.2, Apr. 2014 ISSN 2288-2715(Online) http://dx.doi.org/10.13089/jkiisc.2014.24.2.327 개인정보 DB 암호화
More informationhttp://www.kbc.go.kr/pds/2.html Abstract Exploring the Relationship Between the Traditional Media Use and the Internet Use Mee-Eun Kang This study examines the relationship between
More information歯규격(안).PDF
ETRI ETRI ETRI ETRI WTLS PKI Client, WIM IS-95B VMS VLR HLR/AC WPKI Cyber society BTS BSC MSC IWF TCP/IP Email Server Weather Internet WAP Gateway WTLS PKI Client, WIM BSC VMS VLR HLR/AC Wireless Network
More informationAPOGEE Insight_KR_Base_3P11
Technical Specification Sheet Document No. 149-332P25 September, 2010 Insight 3.11 Base Workstation 그림 1. Insight Base 메인메뉴 Insight Base Insight Insight Base, Insight Base Insight Base Insight Windows
More informationMicrosoft PowerPoint - MobileIPv6_김재철.ppt
Jaecheol Kim Multimedia & Communications Lab. jchkim@mmlab.snu.ac.kr 2003. 9. 8 Contents IPv4 Overview IPv6 Overview 2 MIP 의필요성 Portable Computer 이동하며사용하지않음 이동시통신연결의유지필요없음 DHCP의경우Mobile IP 필요없음 Wireless
More information제20회_해킹방지워크샵_(이재석)
IoT DDoS DNS (jaeseog@sherpain.net) (www.sherpain.net) DDoS DNS DDoS / DDoS(Distributed DoS)? B Asia Broadband B Bots connect to a C&C to create an overlay network (botnet) C&C Provider JP Corp. Bye Bye!
More information[ 네트워크 1] 3 주차 1 차시. IPv4 주소클래스 3 주차 1 차시 IPv4 주소클래스 학습목표 1. IP 헤더필드의구성을파악하고요약하여설명할수있다. 2. Subnet ID 및 Subnet Mask 를설명할수있고, 각클래스의사용가능한호스트수와사설 IP 주소및네트
3 주차 1 차시 IPv4 주소클래스 학습목표 1. IP 헤더필드의구성을파악하고요약하여설명할수있다. 2. Subnet ID 및 Subnet Mask 를설명할수있고, 각클래스의사용가능한호스트수와사설 IP 주소및네트워크주소와 브로드캐스트주소를설명할수있다. 학습내용 1 : IP 헤더필드구성 1. Network Layer Fields 2. IP 헤더필드의구성 1)
More information歯III-2_VPN-김이한.PDF
VPN 2000. 2. 23 yihan@kt.co.kr kr VPN 2 (1) (Private WAN) ( Virtual Private Networks ) Headquarters Public Network VPN Telecommuter Branch Office Mobile Worker 3 4 VPN VPN ( ) / Outsourcing Outsourcing
More information○ 제2조 정의에서 기간통신역무의 정의와 EU의 전자커뮤니케이션서비스 정의의 차이점은
이동전화시장 경쟁활성화를 위한 MVNO 추진을 바라보며 김원식 1) 1. 들어가며 최근 이동전화의 무선재판매 시장 활성화 등을 위해 정보통신부가 준비한 전기통신사업 법 개정안 공청회에서 무선재판매의무제 관련규정을 둘러싸고 전문가들의 우려와 지적이 상당하였다. 우선 무선재판매 제도 도입의 배경을 살펴보자. 직접적 배경으로는 국내 이동전화 요금에 대한 이용자들의
More informationSena Device Server Serial/IP TM Version
Sena Device Server Serial/IP TM Version 1.0.0 2005. 3. 7. Release Note Revision Date Name Description V1.0.0 2005-03-7 HJ Jeon Serial/IP 4.3.2 ( ) 210 137-130, : (02) 573-5422 : (02) 573-7710 email: support@sena.com
More informationuntitled
PowerBuilder 連 Microsoft SQL Server database PB10.0 PB9.0 若 Microsoft SQL Server 料 database Profile MSS 料 (Microsoft SQL Server database interface) 行了 PB10.0 了 Sybase 不 Microsoft 料 了 SQL Server 料 PB10.0
More information- 2 -
- 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - - 13 - - 14 - - 15 - - 16 - - 17 - - 18 - - 19 - - 20 - - 21 - - 22 - - 23 - - 24 - - 25 - - 26 - - 27 - - 28 - - 29 - - 30 -
More information슬라이드 제목 없음
2006-09-27 경북대학교컴퓨터공학과 1 제 5 장서브넷팅과슈퍼넷팅 서브넷팅 (subnetting) 슈퍼넷팅 (Supernetting) 2006-09-27 경북대학교컴퓨터공학과 2 서브넷팅과슈퍼넷팅 서브넷팅 (subnetting) 하나의네트워크를여러개의서브넷 (subnet) 으로분할 슈퍼넷팅 (supernetting) 여러개의서브넷주소를결합 The idea
More information슬라이드 제목 없음
(JTC1/SC6) sjkoh@knu.ac.kr JTC1 JTC1/SC6/WG7 ECTP/RMCP/MMC (JTC1/SC6) 2/48 JTC1 ISO/IEC JTC1 Joint Technical Committee 1 ( ) ISO/TC 97 ( ) IEC/TC 83 ( ) Information Technology (IT) http://www.jtc1.org
More informationNetwork seminar.key
Intro to Network .. 2 4 ( ) ( ). ?!? ~! This is ~ ( ) /,,,???? TCP/IP Application Layer Transfer Layer Internet Layer Data Link Layer Physical Layer OSI 7 TCP/IP Application Layer Transfer Layer 3 4 Network
More informationDW 개요.PDF
Data Warehouse Hammersoftkorea BI Group / DW / 1960 1970 1980 1990 2000 Automating Informating Source : Kelly, The Data Warehousing : The Route to Mass Customization, 1996. -,, Data .,.., /. ...,.,,,.
More informationSchoolNet튜토리얼.PDF
Interoperability :,, Reusability: : Manageability : Accessibility :, LMS Durability : (Specifications), AICC (Aviation Industry CBT Committee) : 1988, /, LMS IMS : 1997EduCom NLII,,,,, ARIADNE (Alliance
More information歯김병철.PDF
3G IETF byckim@mission.cnu.ac.kr kckim@konkuk.ac.kr Mobile IP WG Seamoby WG ROHC WG 3G IETF 3G IETF Mobile IP WG 3GIP Seamoby WG ROHC WG MIP WG / NAI Mobile IP / AAA IPv4 / MIP WG RFC2002bis MIPv6 INRIA
More informationuntitled
- 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - - 13 - - 14 - - 15 - - 16 - - 17 - - 18 - - 19 - - 20 - ( ) / / / / (, /, ) /, - 21 - CMI DB DB - 22 - - 23 - - 24 - - 25 - - 26 - - 27 -
More information<3130C0E5>
Redundancy Adding extra bits for detecting or correcting errors at the destination Types of Errors Single-Bit Error Only one bit of a given data unit is changed Burst Error Two or more bits in the data
More information본 해설서는 정보통신망 이용촉진 및 정보보호 등에 관한 법률 (이하 법 이라 한다) 제28조제1항과 같은 법 시행령 제15조제6항에 근거한 개인정보의 기술적 관리적 보호조치 기준 이 개정 고시(2009.8.7)됨에 따라 - 동 기준의 각 조항별 주안점과 구체적인 사례를
2009. 9 본 해설서는 정보통신망 이용촉진 및 정보보호 등에 관한 법률 (이하 법 이라 한다) 제28조제1항과 같은 법 시행령 제15조제6항에 근거한 개인정보의 기술적 관리적 보호조치 기준 이 개정 고시(2009.8.7)됨에 따라 - 동 기준의 각 조항별 주안점과 구체적인 사례를 제시함으로써 해석상 오해의 소지를 없애고, - 동 기준에 대한 올바른 이해를
More information06_ÀÌÀçÈÆ¿Ü0926
182 183 184 / 1) IT 2) 3) IT Video Cassette Recorder VCR Personal Video Recorder PVR VCR 4) 185 5) 6) 7) Cloud Computing 8) 186 VCR P P Torrent 9) avi wmv 10) VCR 187 VCR 11) 12) VCR 13) 14) 188 VTR %
More information04-다시_고속철도61~80p
Approach for Value Improvement to Increase High-speed Railway Speed An effective way to develop a highly competitive system is to create a new market place that can create new values. Creating tools and
More informationTTA Verified : HomeGateway :, : (NEtwork Testing Team)
TTA Verified : HomeGateway :, : (NEtwork Testing Team) : TTA-V-N-05-006-CC11 TTA Verified :2006 6 27 : 01 : 2005 7 18 : 2/15 00 01 2005 7 18 2006 6 27 6 7 9 Ethernet (VLAN, QoS, FTP ) (, ) : TTA-V-N-05-006-CC11
More informationNetwork Security - Wired Sniffing 실습 ICNS Lab. Kyung Hee University
Network Security - Wired Sniffing 실습 ICNS Lab. Kyung Hee University Outline Network Network 구조 Source-to-Destination 간 packet 전달과정 Packet Capturing Packet Capture 의원리 Data Link Layer 의동작 Wired LAN Environment
More informationCisco SDN 3.0 DDoS DDoS Cisco DDoS Real Demo 2008 Cisco Systems, Inc. All rights reserved. 2
SDN DDoS (whchoi@cisco.com) Cisco Systems Korea 2008 Cisco Systems, Inc. All rights reserved. 1 Cisco SDN 3.0 DDoS DDoS Cisco DDoS Real Demo 2008 Cisco Systems, Inc. All rights reserved. 2 Cisco SDN 3.0
More informationDBPIA-NURIMEDIA
The e-business Studies Volume 17, Number 6, December, 30, 2016:275~289 Received: 2016/12/02, Accepted: 2016/12/22 Revised: 2016/12/20, Published: 2016/12/30 [ABSTRACT] SNS is used in various fields. Although
More informationecorp-프로젝트제안서작성실무(양식3)
(BSC: Balanced ScoreCard) ( ) (Value Chain) (Firm Infrastructure) (Support Activities) (Human Resource Management) (Technology Development) (Primary Activities) (Procurement) (Inbound (Outbound (Marketing
More informationOMA Bcast Service Guide ATSC 3.0 (S33-2) T-UHDTV 송수신정합 Part.1 Mobile Broadcast (Open Mobile Alliance) 기반 Data Model ATSC 3.0 을위한확장 - icon, Channel No.
Special Report_Special Theme UHDTV 지상파 UHD ESG 및 IBB 표준기술 이동관 MBC 기술연구소차장 2.1 개요 2.2 표준구성 TTA Journal Vol.167 l 63 OMA Bcast Service Guide ATSC 3.0 (S33-2) T-UHDTV 송수신정합 Part.1 Mobile Broadcast (Open Mobile
More informationFMX M JPG 15MB 320x240 30fps, 160Kbps 11MB View operation,, seek seek Random Access Average Read Sequential Read 12 FMX () 2
FMX FMX 20062 () wwwexellencom sales@exellencom () 1 FMX 1 11 5M JPG 15MB 320x240 30fps, 160Kbps 11MB View operation,, seek seek Random Access Average Read Sequential Read 12 FMX () 2 FMX FMX D E (one
More information1. 정보보호 개요
정보보호개론 16. VPN( 가상사설망 ) 1 목포해양대해양컴퓨터공학과 가상사설망 (VPN) (1) 공중망을사설망처럼이용할수있도록사이트양단간암호화통신을지원하는장치 원격사용자가공중망및인터넷을통해내부망의시스템사용시, 공중망구간에서의도청으로인한정보유출을방지하기위해사용자와내부망간암호화통신을지원 가상사설망의장점 저비용으로광범위한사설네트워크의구성이가능 기업네트워크관리및운영비용이절감됨
More informationMicrosoft PowerPoint - XP Style
Business Strategy for the Internet! David & Danny s Column 유무선 통합 포탈은 없다 David Kim, Danny Park 2002-02-28 It allows users to access personalized contents and customized digital services through different
More informationVoice Portal using Oracle 9i AS Wireless
Voice Portal Platform using Oracle9iAS Wireless 20020829 Oracle Technology Day 1 Contents Introduction Voice Portal Voice Web Voice XML Voice Portal Platform using Oracle9iAS Wireless Voice Portal Video
More information06_±è¼öö_0323
166 167 1) 2) 3) 4) source code 5) object code PC copy IP Internet Protocol 6) 7) 168 8) 9)10) 11) 12)13) / / 14) 169 PC publisher End User distributor RPG Role-Playing Game 15) FPS First Person Shooter
More informationBGP AS AS BGP AS BGP AS 65250
BGP AS 65000 AS 64500 BGP AS 65500 BGP AS 65250 0 7 15 23 31 BGP Message 16byte Marker 2byte Length, 1byte Type. Marker : BGP Message, BGP Peer.Message Type Open Marker 1.. Length : BGP Message,
More information#Ȳ¿ë¼®
http://www.kbc.go.kr/ A B yk u δ = 2u k 1 = yk u = 0. 659 2nu k = 1 k k 1 n yk k Abstract Web Repertoire and Concentration Rate : Analysing Web Traffic Data Yong - Suk Hwang (Research
More information11¹Ú´ö±Ô
A Review on Promotion of Storytelling Local Cultures - 265 - 2-266 - 3-267 - 4-268 - 5-269 - 6 7-270 - 7-271 - 8-272 - 9-273 - 10-274 - 11-275 - 12-276 - 13-277 - 14-278 - 15-279 - 16 7-280 - 17-281 -
More informationLXR 설치 및 사용법.doc
Installation of LXR (Linux Cross-Reference) for Source Code Reference Code Reference LXR : 2002512( ), : 1/1 1 3 2 LXR 3 21 LXR 3 22 LXR 221 LXR 3 222 LXR 3 3 23 LXR lxrconf 4 24 241 httpdconf 6 242 htaccess
More information(JBE Vol. 21, No. 3, May 2016) HE-AAC v2. DAB+ 120ms..,. DRM+(Digital Radio Mondiale plus) [3] xhe-aac (extended HE-AAC). DRM+ DAB HE-AAC v2 xhe-aac..
3 : xhe-aac (Bongho Lee et al.: A Study on the Variable Transmission of xhe-aac Audio Frame) (Special Paper) 21 3, 2016 5 (JBE Vol. 21, No. 3, May 2016) http://dx.doi.org/10.5909/jbe.2016.21.3.357 ISSN
More informationPowerPoint 프레젠테이션
NETWORK SECURITY ESSENTIALS - SSL/TLS - Boo-Hyung Lee (boohyung@pel.smuc.ac.kr) Protocol Engineering Lab., Sangmyung University 2015. 01. 30 1 Content 웹보안 SSL(Secure Socket Layer) SSL/TLS Protocol Engineering
More information` Companies need to play various roles as the network of supply chain gradually expands. Companies are required to form a supply chain with outsourcing or partnerships since a company can not
More informationIPv6Q 현배경 > 인터넷의급속한성장 -> IP 주소의고갈 개인휴대통신장치의보급 network TV, VOD 단말기등의인터넷연결 가정용품제어장치의인터넷연결 > 새로운 IP 로의이행문제 IPv4 호스트와의호환성문제를고려하여야합 ~ IPv4 의취약점보완 QoS 지원 인증
IPv6 개요 서울대학교전산과학과 정보통신연구실! 득즈 CJ M" L.!... @SNUINCLab 내용 Þ> IPv6 으 출현배경, 발전과정및특징 Þ> IPv6 헤더형식및옵션 Þ> IPv6 으 I Address 구조 Þ> Advanced Routing þ> QoS þ> IPv6 로의전이방법 þ> Auto Configuration þ> Security > 결론
More information(Exposure) Exposure (Exposure Assesment) EMF Unknown to mechanism Health Effect (Effect) Unknown to mechanism Behavior pattern (Micro- Environment) Re
EMF Health Effect 2003 10 20 21-29 2-10 - - ( ) area spot measurement - - 1 (Exposure) Exposure (Exposure Assesment) EMF Unknown to mechanism Health Effect (Effect) Unknown to mechanism Behavior pattern
More informationMicrosoft PowerPoint - 2.Catalyst Switch Intrastructure Protection_이충용_V1 0.ppt [호환 모드]
Catalyst Switch Infrastructure Protection Cisco Systems Korea SE 이충용 (choolee@cisco.com) Overview DoS (Denial of Service) 공격대상 - Server Resource - Network Resource - Network devices (Routers, Firewalls
More information05-08 087ÀÌÁÖÈñ.hwp
산별교섭에 대한 평가 및 만족도의 영향요인 분석(이주희) ꌙ 87 노 동 정 책 연 구 2005. 제5권 제2호 pp. 87118 c 한 국 노 동 연 구 원 산별교섭에 대한 평가 및 만족도의 영향요인 분석: 보건의료노조의 사례 이주희 * 2004,,,.. 1990. : 2005 4 7, :4 7, :6 10 * (jlee@ewha.ac.kr) 88 ꌙ 노동정책연구
More informationJournal of Educational Innovation Research 2018, Vol. 28, No. 3, pp DOI: NCS : * A Study on
Journal of Educational Innovation Research 2018, Vol. 28, No. 3, pp.157-176 DOI: http://dx.doi.org/10.21024/pnuedi.28.3.201809.157 NCS : * A Study on the NCS Learning Module Problem Analysis and Effective
More information歯T1-4김병철2.PDF
2. Mobile IPv6 IPv6 Mobile IPv6 1 IPv6 Sufficient Address Space 128 IPv4 : 32 Fixed IP header + Extension Processing overhead checksum (flow label) Stateless Address Auto-configuration Neighbor Discovery
More informationF1-1(수정).ppt
, thcho@kisaorkr IPAK (Information Protection Assessment Kit) IAM (INFOSEC Assessment Methodology) 4 VAF (Vulnerability Assessment Framework) 5 OCTAVE (Operationally Critical Threat, Asset, and Vulnerability
More informationMicrosoft PowerPoint - o8.pptx
메모리보호 (Memory Protection) 메모리보호를위해 page table entry에 protection bit와 valid bit 추가 Protection bits read-write / read-only / executable-only 정의 page 단위의 memory protection 제공 Valid bit (or valid-invalid bit)
More informationUML
Introduction to UML Team. 5 2014/03/14 원스타 200611494 김성원 200810047 허태경 200811466 - Index - 1. UML이란? - 3 2. UML Diagram - 4 3. UML 표기법 - 17 4. GRAPPLE에 따른 UML 작성 과정 - 21 5. UML Tool Star UML - 32 6. 참조문헌
More informationSecurity Overview
May. 14, 2004 Background Security Issue & Management Scope of Security Security Incident Security Organization Security Level Security Investment Security Roadmap Security Process Security Architecture
More informationBackup Exec
(sjin.kim@veritas.com) www.veritas veritas.co..co.kr ? 24 X 7 X 365 Global Data Access.. 100% Storage Used Terabytes 9 8 7 6 5 4 3 2 1 0 2000 2001 2002 2003 IDC (TB) 93%. 199693,000 TB 2000831,000 TB.
More informationPowerPoint 프레젠테이션
Reasons for Poor Performance Programs 60% Design 20% System 2.5% Database 17.5% Source: ORACLE Performance Tuning 1 SMS TOOL DBA Monitoring TOOL Administration TOOL Performance Insight Backup SQL TUNING
More information사용시 기본적인 주의사항 경고 : 전기 기구를 사용할 때는 다음의 기본적인 주의 사항을 반드시 유의하여야 합니다..제품을 사용하기 전에 반드시 사용법을 정독하십시오. 2.물과 가까운 곳, 욕실이나 부엌 그리고 수영장 같은 곳에서 제품을 사용하지 마십시오. 3.이 제품은
OPERATING INSTRUCTIONS OPERATING INSTRUCTIONS 사용자설명서 TourBus 0 & TourBus 5 사용시 기본적인 주의사항 경고 : 전기 기구를 사용할 때는 다음의 기본적인 주의 사항을 반드시 유의하여야 합니다..제품을 사용하기 전에 반드시 사용법을 정독하십시오. 2.물과 가까운 곳, 욕실이나 부엌 그리고 수영장 같은 곳에서
More informationhttp://www.kbc.go.kr/ Abstract Competition and Concentration in the Market for the Multichannel Video Programming G h e e - Young Noh ( P r o f e s s o, rschool of Communication,
More informationstep 1-1
Written by Dr. In Ku Kim-Marshall STEP BY STEP Korean 1 through 15 Action Verbs Table of Contents Unit 1 The Korean Alphabet, hangeul Unit 2 Korean Sentences with 15 Action Verbs Introduction Review Exercises
More informationsolution map_....
SOLUTION BROCHURE RELIABLE STORAGE SOLUTIONS ETERNUS FOR RELIABILITY AND AVAILABILITY PROTECT YOUR DATA AND SUPPORT BUSINESS FLEXIBILITY WITH FUJITSU STORAGE SOLUTIONS kr.fujitsu.com INDEX 1. Storage System
More informationARMBOOT 1
100% 2003222 : : : () PGPnet 1 (Sniffer) 1, 2,,, (Sniffer), (Sniffer),, (Expert) 3, (Dashboard), (Host Table), (Matrix), (ART, Application Response Time), (History), (Protocol Distribution), 1 (Select
More information0. 들어가기 전
컴퓨터네트워크 13 장. 네트워크보안 (2) - 암호화시스템 1 이번시간의학습목표 암호화알고리즘인 DES, RSA 의구조이해 전자서명의필요성과방법이해 2 대칭키암호방식 (1) 암호화와복호화에하나의키를이용 공통키또는대칭키암호방식이라고지칭 이때의키를비밀키 (secret key) 라고지칭 3 대칭키암호방식 (2) 암호화복호화를수행하는두사용자가동일한키를가지고있어야함
More information<30353132BFCFB7E15FC7D1B1B9C1A4BAB8B9FDC7D0C8B85F31352D31BCF6C1A4C8AEC0CE2E687770>
지상파 방송의 원격송신과 공중송신권 침해여부에 관한 사례연구 Case Study on Copyright Infringement of Remote Transmission of Television Program 최정열(Choe, Jeong-Yeol) * 목 차 Ⅰ. 서론 Ⅱ. 사실 관계 및 재판의 경과 1. 원격시청기기 및 그 사용방법 등 2. 피고의 서비스 3.
More information<313620C0CCC0B1C1A42D494B457632B8A620C1F6BFF8C7CFB4C BFA1BCADC0C720C5B020BAB9B1B820BCB3B0E82E687770>
한국산학기술학회논문지 Vol. 11, No. 4, pp. 1260-1265, 2010 이윤정 1, 김철수 1, 이봉규 1* 1 제주대학교전산통계학과 IPSec Key Recovery for IKEv2 Yoon-Jung Rhee 1, Chul Soo Kim 1 and Bongkyu Lee 1* 1 Dept. of Computer Science and Statistics,
More informationORANGE FOR ORACLE V4.0 INSTALLATION GUIDE (Online Upgrade) ORANGE CONFIGURATION ADMIN O
Orange for ORACLE V4.0 Installation Guide ORANGE FOR ORACLE V4.0 INSTALLATION GUIDE...1 1....2 1.1...2 1.2...2 1.2.1...2 1.2.2 (Online Upgrade)...11 1.3 ORANGE CONFIGURATION ADMIN...12 1.3.1 Orange Configuration
More informationRemote UI Guide
Remote UI KOR Remote UI Remote UI PDF Adobe Reader/Adobe Acrobat Reader. Adobe Reader/Adobe Acrobat Reader Adobe Systems Incorporated.. Canon. Remote UI GIF Adobe Systems Incorporated Photoshop. ..........................................................
More informationSomething that can be seen, touched or otherwise sensed
Something that can be seen, touched or otherwise sensed Things about an object Weight Height Material Things an object does Pen writes Book stores words Water have Fresh water Rivers Oceans have
More information10송동수.hwp
종량제봉투의 불법유통 방지를 위한 폐기물관리법과 조례의 개선방안* 1) 송 동 수** 차 례 Ⅰ. 머리말 Ⅱ. 종량제봉투의 개요 Ⅲ. 종량제봉투의 불법유통사례 및 방지대책 Ⅳ. 폐기물관리법의 개선방안 Ⅴ. 지방자치단체 조례의 개선방안 Ⅵ. 결론 국문초록 1995년부터 쓰레기 종량제가 시행되면서 각 지방자치단체별로 쓰레기 종량제 봉투가 제작, 판매되기 시작하였는데,
More information김기남_ATDC2016_160620_[키노트].key
metatron Enterprise Big Data SKT Metatron/Big Data Big Data Big Data... metatron Ready to Enterprise Big Data Big Data Big Data Big Data?? Data Raw. CRM SCM MES TCO Data & Store & Processing Computational
More informationUPMLOPEKAUWE.hwp
시청공간을 넘어 새롭게 소통하기 - 인터넷 기반의 를 중심으로 - New Communication beyond Viewing Space - Focused on Social Television based on Internet - 주저자 오종서 Oh, Jongsir 동서대학교 방송영상전공 조교수 Assistant Professor of Dongseo University
More information목 차 요약문 I Ⅰ. 연구개요 1 Ⅱ. 특허검색 DB 및시스템조사 5
2014 특허청정책연구결과보고서 발간등록번호 11-1430000-001369-01 ISBN 978-89-6199-792-8-13500 ᅦ 특허검색고도화를위한 검색시스템및검색기법연구 A Study on the Retrieval Systems and Techniques for Enhancing Patent Search 목 차 요약문 I Ⅰ. 연구개요 1 Ⅱ. 특허검색
More information- i - - ii - - iii - - iv - - v - - vi - - 1 - - 2 - - 3 - 1) 통계청고시제 2010-150 호 (2010.7.6 개정, 2011.1.1 시행 ) - 4 - 요양급여의적용기준및방법에관한세부사항에따른골밀도검사기준 (2007 년 11 월 1 일시행 ) - 5 - - 6 - - 7 - - 8 - - 9 - - 10 -
More information슬라이드 1
PKI Kerberos SAML & Shibboleth OpenID Cardspace & ID 2 < > (= ) password, OTP, bio, smartcard, pki CardSpace, ID What you have.., 2 factor, strong authentication 4 (SSO) Kerberos, OpenID 5 Shared authentication
More informationIntra_DW_Ch4.PDF
The Intranet Data Warehouse Richard Tanler Ch4 : Online Analytic Processing: From Data To Information 2000. 4. 14 All rights reserved OLAP OLAP OLAP OLAP OLAP OLAP is a label, rather than a technology
More information¹Ìµå¹Ì3Â÷Àμâ
MIDME LOGISTICS Trusted Solutions for 02 CEO MESSAGE MIDME LOGISTICS CO., LTD. 01 Ceo Message We, MIDME LOGISTICS CO., LTD. has established to create aduance logistics service. Try to give confidence to
More information(ISP) (EAP) (EA) 연방 전사 아키텍처 프레임워크[CIO Council, 1998 1999] ① 아키텍처 동기 전사적 아키텍처의 변화 원인이 되는 외부의 자극을 나타낸다. ② 전략적 방향 변화가 전체적인 방향과 일치하도록 보장한다. 달성하고자 하는 미래의 목표 상태인 비젼과 비젼을 구현하기 위한 지침 및 기준인 원칙으로
More information歯이시홍).PDF
cwseo@netsgo.com Si-Hong Lee duckling@sktelecom.com SK Telecom Platform - 1 - 1. Digital AMPS CDMA (IS-95 A/B) CDMA (cdma2000-1x) IMT-2000 (IS-95 C) ( ) ( ) ( ) ( ) - 2 - 2. QoS Market QoS Coverage C/D
More information歯목차45호.PDF
CRM CRM (CRM : Customer Relationship Management ). CRM,,.,,.. IMF.,.,. (CRM: Customer Relationship Management, CRM )., CRM,.,., 57 45 (2001 )., CRM...,, CRM, CRM.. CRM 1., CRM,. CRM,.,.,. (Volume),,,,,,,,,,
More informationMS-SQL SERVER 대비 기능
Business! ORACLE MS - SQL ORACLE MS - SQL Clustering A-Z A-F G-L M-R S-Z T-Z Microsoft EE : Works for benchmarks only CREATE VIEW Customers AS SELECT * FROM Server1.TableOwner.Customers_33 UNION ALL SELECT
More information