목차
Ⅰ. 서론
Ⅱ. CALS/EC 정보보호 위협요소분석
1. 컴퓨터통신 정보보호 요소분석
2. EDI 정보보호 요소분석
3. CALS 정보보호 요소분석
4. EC 정보보호 요소분석
Ⅲ. 결론
참고문헌
Abstract
*한글97
Ⅱ. CALS/EC 정보보호 위협요소분석
1. 컴퓨터통신 정보보호 요소분석
2. EDI 정보보호 요소분석
3. CALS 정보보호 요소분석
4. EC 정보보호 요소분석
Ⅲ. 결론
참고문헌
Abstract
*한글97
본문내용
보안기술 워크숍 특강자료집, 1997, 5.
10. 임채훈, "인터넷 인증 및 공개키 기반구조," KRNET '97 발표자료집 Ⅱ, 1997, 7.
11. 임신영·임창순·변옥환, "전자상거래 보안 시스템 및 암호화 기술의 적용," 제8회 정보보호와 암호에 관한 학술대회 논문집, 1996.
12. To. Carty,“GTE, Security Electronic Commerce, Certificate Management Sys- tems," 9Th CITSS '97, 12-16 May, 1997.
13. Fred Cohen,“Large Information System Attack Methods : A Preliminary Classification Scheme," Computer & Security, Vol.16, No.1, 1997.
14. ITU-T X.435,“Message Handling System : EDI Message System," Geneva, 1991.
15. 강창구, "EDI 정보보호 서비스 분석," 제2차 안전한 EDI 관련기술 심포지움, 1996. 3.
16. 전윤호·이필중, "EDI 표준과 관련된 EDI 보안 서비스에 관한 고찰," 통신정보보호학회지, Vol.4, No.2, 1994. 6.
17. 이경상, "CALS 표준에 따른 EDI 보안," 정보과학회지 제13권 11호, 1995. 11.
18. 윤여웅·소우영·한근희, "안전한 CALS 구현을 위한 정보보호 기술 활용," 정보보호학술대회 발표논문집, 1997. 9.
19. 강창구·최용락, "개방형 분산시스템 환경의 인증 메커니즘 분석," 통신정보보호학회지, Vol.7, No.2, 1997, 6.
20. 최용락·강창구, "디렉토리 모델과 정보보호 서비스," 통신정보보호학회지, Vol.5, No.3, 1995. 9.
21. 정진욱, "EDI 보호(Security)," 전자공학회지, 제21권 5호, 1994. 5.
22. 김상진, "CALS/EC구축 표준모형," 한국CALS/EC 충청지부학회, 제2회 초청세미나, Oct., 1997
23. 김진웅, "전자상거래 개요 및 국내 추진현황," 한국CALS/EC 충청지부학회, 제2회 초청세미나, Oct., 1997.
24. 박성준, "전자상거래와 정보보호 기술," 한국CALS/EC 충청지부학회, 제2회 초청세미나, Oct., 1997.
25. 김춘길, "전자상거래와 한국통신의 추진전략," 충청지부학회, 제2회 초청세미나, Oct., 1997.
26. 류철철, "전자상거래를 위한 신용보증 시스템," 한국CALS/EC 충청지부학회, 제2회 초청세미나, Oct., 1997.
27. 한국통신정보보호학회 '97, "초고속 정보통신 기반 안전성 기굴," 제1회 개방형보안기술과 응용 워크숍, 1997.
28 최영철·원동호, "An Improved Single Term Off-Line Coins," processing of JW-ISC '97, Oct., 1997.
Abstract
Analysis of Components Endangering Information Protection in CALS/EC
Kang suck-joo·Kim, Chang-tae
CALS(Commerce At Light Speed)/EC(Electronic Commerce) is drawing considerable interest as strategic part of efforts for computerization of the government and companies and for industry-wide innovation, using Internet and information superhighway that is widely expanding world-wide with the development of computers and information communication technology. In the current industry infrastructure, standardization is difficult but very important among the parties that want to share the added value, as external environmental components increase since the advent of computers.
However, information security technology is not permitted to be exported in light of national interest or high amount of royalty should be paid. Moreover, if we cannot fully analyze the international standard and imported technology in order to verify the safety of using them, domestic information can be exposed according to the desire of the country exporting the technology.
In particular, information security technology should be developed by ourselves, considering technology protection and export prevention policies of foreign countries. Therefore, this paper presents information security technology and standardization trends for several application fields regarding CALS/EC implementation in our and foreign countries. This paper also analyzes such trends and proposes strategic direction for standardization suited for domestic environment.
10. 임채훈, "인터넷 인증 및 공개키 기반구조," KRNET '97 발표자료집 Ⅱ, 1997, 7.
11. 임신영·임창순·변옥환, "전자상거래 보안 시스템 및 암호화 기술의 적용," 제8회 정보보호와 암호에 관한 학술대회 논문집, 1996.
12. To. Carty,“GTE, Security Electronic Commerce, Certificate Management Sys- tems," 9Th CITSS '97, 12-16 May, 1997.
13. Fred Cohen,“Large Information System Attack Methods : A Preliminary Classification Scheme," Computer & Security, Vol.16, No.1, 1997.
14. ITU-T X.435,“Message Handling System : EDI Message System," Geneva, 1991.
15. 강창구, "EDI 정보보호 서비스 분석," 제2차 안전한 EDI 관련기술 심포지움, 1996. 3.
16. 전윤호·이필중, "EDI 표준과 관련된 EDI 보안 서비스에 관한 고찰," 통신정보보호학회지, Vol.4, No.2, 1994. 6.
17. 이경상, "CALS 표준에 따른 EDI 보안," 정보과학회지 제13권 11호, 1995. 11.
18. 윤여웅·소우영·한근희, "안전한 CALS 구현을 위한 정보보호 기술 활용," 정보보호학술대회 발표논문집, 1997. 9.
19. 강창구·최용락, "개방형 분산시스템 환경의 인증 메커니즘 분석," 통신정보보호학회지, Vol.7, No.2, 1997, 6.
20. 최용락·강창구, "디렉토리 모델과 정보보호 서비스," 통신정보보호학회지, Vol.5, No.3, 1995. 9.
21. 정진욱, "EDI 보호(Security)," 전자공학회지, 제21권 5호, 1994. 5.
22. 김상진, "CALS/EC구축 표준모형," 한국CALS/EC 충청지부학회, 제2회 초청세미나, Oct., 1997
23. 김진웅, "전자상거래 개요 및 국내 추진현황," 한국CALS/EC 충청지부학회, 제2회 초청세미나, Oct., 1997.
24. 박성준, "전자상거래와 정보보호 기술," 한국CALS/EC 충청지부학회, 제2회 초청세미나, Oct., 1997.
25. 김춘길, "전자상거래와 한국통신의 추진전략," 충청지부학회, 제2회 초청세미나, Oct., 1997.
26. 류철철, "전자상거래를 위한 신용보증 시스템," 한국CALS/EC 충청지부학회, 제2회 초청세미나, Oct., 1997.
27. 한국통신정보보호학회 '97, "초고속 정보통신 기반 안전성 기굴," 제1회 개방형보안기술과 응용 워크숍, 1997.
28 최영철·원동호, "An Improved Single Term Off-Line Coins," processing of JW-ISC '97, Oct., 1997.
Abstract
Analysis of Components Endangering Information Protection in CALS/EC
Kang suck-joo·Kim, Chang-tae
CALS(Commerce At Light Speed)/EC(Electronic Commerce) is drawing considerable interest as strategic part of efforts for computerization of the government and companies and for industry-wide innovation, using Internet and information superhighway that is widely expanding world-wide with the development of computers and information communication technology. In the current industry infrastructure, standardization is difficult but very important among the parties that want to share the added value, as external environmental components increase since the advent of computers.
However, information security technology is not permitted to be exported in light of national interest or high amount of royalty should be paid. Moreover, if we cannot fully analyze the international standard and imported technology in order to verify the safety of using them, domestic information can be exposed according to the desire of the country exporting the technology.
In particular, information security technology should be developed by ourselves, considering technology protection and export prevention policies of foreign countries. Therefore, this paper presents information security technology and standardization trends for several application fields regarding CALS/EC implementation in our and foreign countries. This paper also analyzes such trends and proposes strategic direction for standardization suited for domestic environment.