• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö > Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C

Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ÈÞ´ë¿ëÅë½Å´Ü¸»ÀÇ È¿°úÀûÀÎ º¸¾È°ü¸®¸¦ À§ÇÑ º¸¾È À籸¼º±â¹ýÀÇ ¼³°è ¹× ±¸Çö
¿µ¹®Á¦¸ñ(English Title) Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device
ÀúÀÚ(Author) ¾È°³ÀÏ   ±è±â¿µ   ¼­µ¿ÀÏ   Gaeil An   Kiyoung Kim   Dongil Seo  
¿ø¹®¼ö·Ïó(Citation) VOL 16-C NO. 06 PP. 0691 ~ 0698 (2009. 12)
Çѱ۳»¿ë
(Korean Abstract)
ÈÞ´ë¿ë Åë½Å ´Ü¸»Àº ½º¸¶Æ® ÆùÀ̳ª PDA¿Í °°Àº Åë½Å ¼­ºñ½º¸¦ Á¦°øÇÏ´Â ÀÛÀº Å©±âÀÇ ÈÞ´ë¿ë ÄÄÇ»ÅÍÀÌ´Ù. ÇöÀç ÈÞ´ë¿ë Åë½Å ´Ü¸»ÀÇ ¹ßÀüÀ» °¡·Î¸·´Â °¡Àå Å« À庮ÁßÀÇ Çϳª°¡ ¹Ù·Î º¸¾ÈÀÌ´Ù. ºñ·Ï ÈÞ´ë¿ë Åë½Å ´Ü¸»À» º¸È£ÇÒ ¼ö ÀÖ´Â ´Ù¾çÇÑ º¸¾È±â¼úµéÀº ÀÖÁö¸¸, ÈÞ´ë¿ë Åë½Å ´Ü¸»Àº µ¥½ºÅ©Åé ÄÄÇ»ÅÍ¿¡ ºñÇØ ÄÄÇ»Æà ÀÚ¿øÀÌ ºó¾àÇÏ°í »ç¿ëÀÚ ÀÎÅÍÆäÀ̽º°¡ ºÒÆíÇÏ¿© ±× º¸¾È±â¼ú ¸ðµÎ¸¦ ÈÞ´ë¿ë Åë½Å ´Ü¸»¿¡ ¿î¿ëÇÒ ¼ö ¾ø±â ¶§¹®ÀÌ´Ù. º» ³í¹®¿¡¼­´Â ÈÞ´ë¿ë Åë½Å ´Ü¸»ÀÇ º¸¾ÈÀ» È¿°úÀûÀ¸·Î °ü¸®ÇÒ ¼ö ÀÖ´Â »óȲÀÎÁöÇü º¸¾ÈÀ籸¼º ±â¹ýÀ» Á¦¾ÈÇÏ°í ¼³°èÇÑ´Ù. º» º¸¾ÈÀ籸¼º ±â¹ýÀº ÈÞ´ë¿ë Åë½Å ´Ü¸»ÀÇ ÇöÀç º¸¾È »óȲ¿¡ °¡Àå ÀûÇÕÇÑ ÃÖÀûÀÇ º¸¾È ¼­ºñ½º¸¦ ÀÚµ¿À¸·Î Á¦°øÇÒ ¼ö ÀÖ´Ù. º» Á¦¾ÈÇÏ´Â ±â¹ýÀÇ ±¸Çö°ú ½ÇÇèÀ» ÅëÇÏ¿© º» ±â¹ýÀÌ º¸¾È¼öÁØÀ» ¶³¾î¶ß¸®´Â °Í ¾øÀÌ ÀÚ¿ø È¿À²¼º°ú »ç¿ëÀÚ ÆíÀǼº¿¡¼­ ¿ì¼öÇÏ´Ù´Â °ÍÀ» È®ÀÎÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
A mobile communication device is a small size of portable computer which provides communication service, such as smart phone and PDA. Currently, one of the biggest barriers in developing the mobile communication device is security issue. Even though there are excellent security functions which can remove the security issues, there is a problem that the mobile communication device can not be loaded with all the functions because it has low storage, poor computational power, and inconvenient user interface, compared to the desktop personal computer. This paper proposes a context-aware security reconfiguration scheme for effective security management of the mobile communication device. The scheme can provide the mobile communication device with the optimized security service which is most adapted to its current security context. Through the prototype implementation and the experiments of the proposed scheme, we have confirmed that the proposed scheme is excellent in terms of computing resource efficiency and usability, without degrading security level.
Å°¿öµå(Keyword) ´Ü¸»±âº¸¾È   º¸¾È°ü¸®   ÈÞ´ë¿ëÅë½Å´Ü¸»   º¸¾È»óȲ   º¸¾ÈÀ籸¼º   Device Security   Security Management   Mobile Communication Device   Security Context   Security Reconfiguration  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå