Korean | English

pISSN : 2092-8114 / eISSN : 2733-4384

Home > Explore Content > All Issues > Article List

2014, Vol.10, No.1

  • 1.

    Analysis on How to Improve Copyright Appraisal Fee Estimation Methods in the Future

    Kim, Si Yeol | 2014, 10(1) | pp.1~8 | number of Cited : 0
    Abstract PDF
    This study examines specific changes that should be made to improve the appraisal fee estimation method as well as the other factors in line with it. This study finds the main fault, with providers of appraisal services, for limiting the efforts made so far to improve appraisal and concludes that plans for improvement can be effectively implemented only when service providers acknowledge such. This study also aims to suggest specific improvements factors in the appraisal feel estimation method, particularly as the current formula is out of date and fails to reflect the changes that have occurred since its conception.
  • 2.

    Benchmarking for Successful Software Non-turn Key Projects

    Kwon, Ki Tae | 2014, 10(1) | pp.9~17 | number of Cited : 0
    Abstract PDF
    By an unclear requirements of SW business and change in the business, quality deterioration of SW business and SW withdrawal phenomenon of advanced human resources occurs frequently. Therefore, to prevent ecosystem of SW industry to be weakening, and to reduce the risk of information technology business, to improve the quality of business and professional business, it's time advancement scheme of establishment is required. The SW non turn-key projects are divided into requirements and development business, in order PMO to allow integrated management of business, to derive a clear requirement, we have developed successful SW business promotion. To simplify the risk of acquisition management that occur in system integration, the SW non turn-key projects management has been established and enforced mainly the United States, and Japan, other industries. In this paper, we will be able to take advantage of the variety as basic data for the SW non turn-key projects by benchmarking the case of other industries and the case of overseas.
  • 3.

    A Technique for Protecting Android Applications using Executable Code Encryption and Integrity Verification

    HyungJoon Shim , Sangwook Cho , Younsik Jeong and 3 other persons | 2014, 10(1) | pp.19~26 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a method for protecting Android applications against reverse engineering attacks. In this method, the server encrypts the original executable code (DEX) included in an APK file, inserts into the APK file a stub code that decrypts the encrypted DEX later at run-time, and distributes the modified APK file. The stub code includes an integrity validation code to detect attacks on itself. When a user installs and executes the APK file, the stub code verifies the integrity of itself, decrypts the encrypted DEX, and loads it dynamically to execute. Since the original DEX is distributed as an encrypted one, we can effectively protect the intellectual property. Further, by verifying the integrity of the stub code, we can prevent malicious users from bypassing our method. We applied the method to 15 Android apps, and evaluated its effectiveness. We confirmed that 13 out of them operates normally.
  • 4.

    Traffic Characteristics Analysis of Distributed Mobility Management Mechanism

    Jang-Geun Ki | 2014, 10(1) | pp.27~35 | number of Cited : 0
    Abstract PDF
    Traditional centralized mobility management protocols have several problems such as overload, single point of failure, non-optimized data path, and scalability due to the concentration of both data and signaling messages at an anker point. To relieve these limitations, distributed mobility management mechanisms are actively studied by the IETF. In this paper, analysis of traffic characteristics in the distributed mobility management mechanism is conducted. In the developed simulation network model, several mobile nodes are randomly moving among MAAR nodes and generate multimedia traffic including UDP traffic, voice call, HTTP web browsing, e-mail, remote login session by Telnet, FTP file transfer, database access, and network file print.
  • 5.

    A Copyright of contents on the Torrent protocol

    LEE KYU TAE | 2014, 10(1) | pp.37~42 | number of Cited : 0
    Abstract PDF
    Torrent is the new technology for exchanging the files between each private person without handling of system operator. But it has a harmful disadvantages to digital contents owner cause the contents file could be transmitted with many divided files pieces even illegal copyright content. Also it could not be traced who is the heavy loader. By this reason, Torrent is known as the illegal content provide technology and many service provider like webserver manager, is now protecting the service to users. This paper shows the way of safe usages to contents for both of owner and torrent service provide.