DOI QR코드

DOI QR Code

Proposed that Application of the Security Algorithm for Implement Smart m-Gov

스마트 전자정부 구현을 위한 보안 알고리즘 응용 제안

  • Received : 2013.12.26
  • Accepted : 2014.01.10
  • Published : 2014.01.31

Abstract

As ICT Ecosystem does, electronic government changes in its form. Accordingly, in order to realize Smarter m-Gov, the governments need to vitalize m-Gov services and enact technology policy. Therefor, this manuscript suggests possible model of m-Gov realization and security algorithm as a technology policy which applies quantum cryptography system to server security for the construction of secured m-Gov's infrastructure. What the manuscript suggests seeks administrative ideas of Smarter m-Gov's services which contain security, stability, and economic feasibility for the benefits of nation and enterprises.

ICT 생태계의 동인으로 전자정부는 그 형태의 변화를 가져온다. 이에 따라 스마트 전자정부 구현을 위해서 정부는 m-Gov 서비스를 활성화 하고, 이를 위해 기술정책을 수립할 필요가 있다. 따라서 본 논문에서 스마트 전자정부 구현 모형을 제시하고, 안전한 m-Gov의 인프라 구성을 위해 양자암호 시스템을 서버보안에 응용할 수 있는 정보보안 기술정책으로서 보안 알고리즘을 제안한다. 이것은 결국 보안성, 안전성, 경제성이 확보된 대국민 및 기업에 대한 스마트 전자정부 서비스를 제공하는 행정이념을 추구하는 것이다.

Keywords

References

  1. Gartner, Gartner Says Smartphone Sales Accounted for 55 Percent of Overall Mobile Phone Sales in Third Quarter of 2013 ; Barcelona, Spain, November 14, 2013. Available: http://www.gartner.com/newsroom/id/2623415?fnl=search
  2. Y. C Choung, Y. G Bae, "m-Gov Strategy and Policy Challenges ICT Ecosystem Changes," Journal of the Korea Institute of Information and Communication Engineering, vol. 17, no. 7, pp. 1532-1536, July. 2013. https://doi.org/10.6109/jkiice.2013.17.7.1531
  3. H. R Kang, Others. "Mobile broadband and mobile biz model," KISDI: Basic Research 12-7, pp. 157-158, Dec. 2012.
  4. Government Strategy Seminar based on Smart phone, "e-government(M-Gov) Policy Direction according to Spread of mobile," Ministry of Security and Public Administration, Republic of Korea: Jun. 2010.
  5. Y. C Choung, Y. G Bae, "Research of convergence application services in u-Gov," Journal of the Korea Institute of Information and Communication Engineering, vol. 11, no. 6, pp. 1048, Jun. 2007.
  6. M. Y Lee, Other. Network Security Technology of Next Generation, Life & Power Press, 2004.
  7. L. Nuaymi(c), "Possible Research Axis in Radio Resource Management," Telecom Bretagne, Rennes, Lisbon: pp.13, Feb. 2008.
  8. C. S Park, "Security measures for implementat of Secure mobile service," Government Strategy Seminar based on Smart phone, Seoul Womens University, Republic of Korea: Jun. 2010.
  9. J. Z Seol, K. C Rim, "Using Double Photon Transmission of Quantum Cryptography, "Journal of the Korea Institute of Information and Communication Engineering, vol. 17, no. 8, pp. 1859-1863, August. 2013. https://doi.org/10.6109/jkiice.2013.17.8.1857