2013
Á¦
15ȸ Çѱ¹ ¼ÒÇÁÆ®¿þ¾î°øÇÐ Çмú´ëȸ ³í¹®Áý
Proceedings of the 15th Korea Conference on Software Engineering (KCSE 2013)
¡¡
ÀϽÃ: 2013³â 1¿ù 30ÀÏ(¼ö) ~ 2¿ù 1ÀÏ(±Ý)
Àå¼Ò: °¿øµµ Æòâ ÈִнºÆÄÅ© Ò® ÇÑȸ®Á¶Æ®
¡¡
ÁÖÃÖ:
Çѱ¹Á¤º¸°úÇÐȸ, Çѱ¹Á¤º¸Ã³¸®ÇÐȸ
¡¡
ÁÖ°ü: Çѱ¹Á¤º¸°úÇÐȸ ¼ÒÇÁÆ®¿þ¾î°øÇÐ ¼Ò»çÀ̾îƼ
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ¼ÒÇÁÆ®¿þ¾î°øÇÐ ¿¬±¸È¸
Çѱ¹ÀüÀÚÅë½Å¿¬±¸¿ø
¡¡
ÈÄ¿ø:
Á¤º¸Åë½Å»ê¾÷ÁøÈï¿ø
SW°øÇм¾ÅÍ, ¢ßÄÉÀÌƼ, ¢ßºñÆ®ÄÄÇ»ÅÍ,
¢ß´ÙÇÑÅ×Å©, ¢ß¼Ö·ç¼Ç¸µÅ©,
½´¾î¼ÒÇÁÆ®Å×Å©¢ß,
(ÁÖ)¾ÅÅ©Æ÷ºñ¿¤,
STAÅ×½ºÆÃÄÁ¼³Æâß, LG CNS, ÀÌ¿¡½ºÁö¢ß,
¢ßÀÎÁö¼ÒÇÁÆ®, Çö´ë¿¥¿£¼ÒÇÁÆ®¢ß
¡¡
![]() |
![]() |
![]() |
¡¡
¡¡
¡¡
ÃÊ´ëÀÇ ±Û
2013³âÀ» ¸ÂÀÌÇÏ¿© Çѱ¹ ¼ÒÇÁÆ®¿þ¾î°øÇÐ Çмú´ëȸ Âü°¡ÀÚ ¿©·¯ºÐÀÇ ¹«±ÃÇÑ ¹ßÀüÀ» ±â¿øÇÕ´Ï´Ù.
±â¾÷, ¿¬±¸¼Ò ¹× Çа迡¼ È°µ¿ÇÏ°í °è½Å ¼ÒÇÁÆ®¿þ¾î°øÇÐ °ü·Ã Àü¹®°¡µéÀÇ ¸ðÀÓÀÎ Çѱ¹Á¤º¸°úÇÐȸÀÇ ¼ÒÇÁÆ®¿þ¾î°øÇÐ ¼Ò»çÀ̾îƼ¿Í Çѱ¹Á¤º¸Ã³¸®ÇÐȸÀÇ ¼ÒÇÁÆ®¿þ¾î°øÇבּ¸È¸¿¡¼´Â ¿©·¯ »ê¾÷ºÐ¾ß¿¡¼ ¼ÒÇÁÆ®¿þ¾î°øÇÐÀÇ Á߿伺ÀÌ ³¯·Î ºÎ°¢µÇ°í ¼ÒÇÁÆ®¿þ¾î ±â¼úÀÌ ¹Ì·¡ ±¹°¡ ¹ßÀü¿¡ Áß¿äÇÑ ºÎºÐÀ¸·Î ÀνĵǴ ½ÃÁ¡¿¡¼ ¼ÒÇÁÆ®¿þ¾î°øÇÐ ±â¼úÀÇ ¹ßÀü°ú Àû¿ëÀÇ È®´ë¸¦ µµ¸ðÇÏ°íÀÚ »ê, ÇÐ, ¿¬À» Áß½ÉÀ¸·Î ÇÏ´Â Á¦ 15ȸ Çѱ¹ ¼ÒÇÁÆ®¿þ¾î°øÇÐ Çмú´ëȸ(KCSE 2013)¸¦ °³ÃÖÇÏ°Ô µÇ¾ú½À´Ï´Ù.
1¿ù 30ÀϺÎÅÍ 2¿ù 1ÀϱîÁö °¿øµµ º¸±¤ÈִнºÆÄÅ©¿¡¼ °³ÃֵǴ À̹ø Çмú´ëȸ¿¡¼´Â ƯÈ÷ ¡°½º¸¶Æ® ½Ã´ëÀÇ Áøȸ¦ À§ÇÑ ¼ÒÇÁÆ®¿þ¾î°øÇÐ ¿ø¸®¡±À» ÁÖÁ¦·Î »ê, ÇÐ, ¿¬ °¢°è¿¡¼ Á¦ÃâÇÑ ³í¹® 80¿©ÆíÀÌ ¹ßÇ¥µË´Ï´Ù.
¶ÇÇÑ ¼ÒÇÁÆ®¿þ¾î°øÇÐ ÀÌ·Ð, ±³À°, ½Å±â¼ú ¹× °ü·Ã »ê¾÷ü ±â¼ú ºÐ¾ß ¼Ò°³ µî ÃÑ 6°³ÀÇ À¯ÀÍÇÑ Æ©Å丮¾óÀÌ ÁغñµÇ¾î ÀÖ°í World Best Software(WBS)¿Í Software Visualization ¹× Áß¼Ò SW ±â¾÷ÇöÀå Àû¿ë ¿ì¼ö »ç·Ê ¼Ò°³, ±×¸®°í Cyber-Physical Systems(CPS) °ü·Ã ÃÊû ¼¼¼Çµµ ÁøÇàµË´Ï´Ù. ¾Æ¿ï·¯ ¼ÒÇÁÆ®¿þ¾î »ê¾÷ ¹ßÀüÀÇ ½Ç¹«¸¦ ´ã´çÇÏ°í °è½Å Àú¸íÀλç 2ºÐÀÇ ±âÁ¶¿¬¼³µµ ÀÖ½À´Ï´Ù. ³í¹® ¹ßÇ¥´Â ¸ðµ¨ ¹× Á¤Çü±â¹ý, SW Ç°Áú ¹× Å×½ºÆ®, °ü¸® ¹× ÇÁ·Î¼¼½º, ¿ä±¸°øÇÐ, SW ¾ÆÅ°ÅØó, SW Àç»ç¿ë ¹× SPLE, ÀûÀÀÇü SW, ¸ð¹ÙÀÏ SW, ÀÓº£µðµå SW, ¼ºñ½º, ¿ÂÅç·ÎÁö, SW ÀÀ¿ë µî ´Ù¾çÇÑ ÁÖÁ¦ÀÇ ¼¼¼ÇÀ¸·Î ±¸¼ºµÇ¾î ÁøÇàµÇ¾î °ü·Ã ÁÖÁ¦¿¡ ´ëÇÑ È°¹ßÇÑ Á¤º¸±³È¯°ú Åä·ÐÀÇ ÀåÀÌ ¿¸± °ÍÀÔ´Ï´Ù.
º» Çмú´ëȸ°¡ Çѱ¹ÀÇ ¼ÒÇÁÆ®¿þ¾î°øÇÐÀÇ Çй®Àû ¹ßÀü°ú ¼ÒÇÁÆ®¿þ¾î »ê¾÷±â¼ú ¹ßÀüÀÇ Å« ÀåÀÌ µÇ´Â ¸¸Å, È°¹ßÇÑ Çмú ¹× ±â¼ú ±³·ù´Â ¹°·Ð °ÝÀÇ ¾ø´Â Åä·ÐÀÇ ÀåÀÌ µÉ ¼ö ÀÖµµ·Ï ¿©·¯ºÐÀÇ ¸¹Àº Âü¿©¸¦ ºÎŹ µå¸³´Ï´Ù. À̹ø Çà»ç¸¦ À§ÇØ ¼ö°íÇØ ÁֽŠ´ëȸ Áغñ À§¿øµé°ú ÈÄ¿øÇØ ÁֽŠ±â°ü ¿©·¯ºÐ²² Áø½ÉÀ¸·Î °¨»ç¸¦ µå¸³´Ï´Ù.
¡¡
Çѱ¹Á¤º¸°úÇÐȸ ¼ÒÇÁÆ®¿þ¾î¼Ò»çÀ̾îƼ ȸÀå ÇÑÇõ¼ö
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ¼ÒÇÁÆ®¿þ¾î°øÇבּ¸È¸ ¿î¿µÀ§À§¿øÀå ÀÌÀº¼®
¡¡
¡¡
¡¡
Çмú´ëȸ Áغñ À§¿øȸ
°øµ¿ ´ëȸÀå: ÇÑÇõ¼ö ±³¼ö(»ó¸í´ëÇб³), ÀÌÀº¼® ±³¼ö(¼º±Õ°ü´ëÇб³)
Á¶Á÷ À§¿øÀå: ±Ç±âÇö ±³¼ö(°æ±â´ëÇб³)
Á¶Á÷À§¿ø: ±è¿µÃ¶ ±³¼ö(È«ÀÍ´ë), ±èöÁø ±³¼ö(ÀÎÇÏ°øÀü), ±èÄ¡¼ö ±³¼ö(°øÁÖ´ë), ¹Ú»çõ ¹Ú»ç(ETRI), ¹éÁ¾¹® ±³¼ö(KAIST), ¼ÁÖ¿µ ±³¼ö(¾ÆÁÖ´ë), À¯Áعü ±³¼ö(°Ç±¹´ë), À¯Ã¶Áß ±³¼ö(ÀüºÏ´ë),
À̺´°É ±³¼ö(¼¿ï¿©´ë), À̺´Á¤ ±³¼ö(¼¿ï½Ã¸³´ë), À̼¼¿µ ¹Ú»ç(NIPA SW°øÇм¾ÅÍ), ÀÌÁ¤¿ø ±³¼ö(¾ÆÁÖ´ë), ÀÌÂù±Ù ±³¼ö(Áß¾Ó´ë), Á¤È¿µ ±³¼ö(°æÈñ´ë), Á¶Àº¼÷ ±³¼ö(¼ÀÏ´ë),
Â÷¼º´ö ±³¼ö(°í·Á´ë), ÇÏ¾á ±³¼ö(°æÀο©ÀÚ´ëÇÐ), ÇÑÁ¤¶õ ±³¼ö(Çù¼º´ë), Ȳ¼®Çü ±³¼ö(¼±¹®´ë)
ÇмúÀ§¿øÀå: °íÀοµ(KAIST)
ÇмúÀ§¿ø: °¹®¼³ ±³¼ö(±¤ÁÖ´ë), °¼º¿ø ±³¼ö(KAIST), ±è¹®ÁÖ ±³¼ö(KAIST), ±èÀ¯ÀÏ ¹Ú»ç(»ï¼ºÀüÀÚ), ±èÁ¤¾Æ ±³¼ö(°üµ¿´ë), ±èÅÂÈ£ ¹Ú»ç(ETRI), ³²¿µ±¤ ±³¼ö(¿¬¼¼´ë),
¹Î»óÀ± ¹Ú»ç(¼Ö·ç¼Ç¸µÅ©), ¹Ú¸íȯ ±³¼ö(°ø±º»ç°üÇб³), ¹Ú¼öÁø ±³¼ö(¼°´ë), ¹Ú¿ë¹ü ±³¼ö(´Ü±¹´ë), ¿°±ÙÇõ ±³¼ö(ºÎ»ê´ë), ¿ÀÀç¿ø ±³¼ö(Ä«Å縯´ë), À±È¸Áø ±³¼ö(Çù¼º´ë),
ÀÌ°ü¿ì ±³¼ö(ÇѼº´ë), À̱٠¹Ú»ç(»ï¼ºÀüÀÚ), ÀÌ¿ìÁø ±³¼ö(°æºÏ´ë), ÀÌÀº¼ ±³¼ö(¾Èµ¿´ë), ÀÌÁöÇö ±³¼ö(´ëÀü´ë), ÀÎÈ£ ±³¼ö(°í·Á´ë), Á¤ÇýÁ¤ ±³¼ö(ÆòÅôë), Áø¿µÅà ±³¼ö(Çѹç´ë),
äÈï¼® ±³¼ö(ºÎ»ê´ë), È«ÀåÀÇ ±³¼ö(ÃæºÏ´ë)
¡¡
¡¡
¡¡
¸ñ Â÷
¡¡
Æ©Å丮¾ó |
Architecture for Cloud, Ucloud for Architecture ¼Û¼ø¿ë ÆÀÀå(KT) ¡¡ Ucloud ¼ºñ½º ¹× Academy Program ¼Ò°³ ÀÌÇöÁÖ ÆÀÀå(KT)
T2: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ÀÌ·Ð Æ©Å丮¾ó ¼ÒÇÁÆ®¿þ¾î ¾ÆÅ°ÅØó ¼³°èÀÇ ±Ùº»¿ø¸®µé °¼º¿ø ±³¼ö(KAIST)
T3: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ½Å±â¼ú Æ©Å丮¾ó 1 Combinatorial Test Design and Its Applications À±ÀÏö ±³¼ö(SUNY Korea)
Ŭ¶ó¿ìµå ±â¹ÝÀÇ ½º¸¶Æ®¿öÅ© (A journey to the Smart Working Era on the Cloud) ½ÅâÇö ÆÀÀå(LGCNS)
T5: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ±³À° Æ©Å丮¾ó ¼ÒÇÁÆ®¿þ¾î °øÇÐ ±³À° – ½Ç¹«Àû Á¢±Ù¹ý ÃÖÀº¸¸ ±³¼ö(µ¿±¹´ë)
T6: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ½Å±â¼ú Æ©Å丮¾ó 2 Towards Dependable and Secure Software: Requirements Engineering Approach À̼®¿ø ±³¼ö(¾ÆÁÖ´ë) |
°ü¸® ¹× ÇÁ·Î¼¼½º |
CMMIÀÇ GP¿Í SP°£ ¿¬°ü¼º¿¡ °üÇÑ ½ÇÁõÀû¿¬±¸ [¹Ú»ç³í¹®] À̹ÎÀç(¼þ½Ç´ë)
¼ÒÇÁÆ®¿þ¾î ÇÁ·ÎÁ§Æ® °èȹ¿¡¼ÀÇ ±¸Ã¼Àû ½Ç¹«À̽´¸¦ ¹Ý¿µÇÑ ÀÚµ¿ÈµÈ ÀηÂÇÒ´ç±â¹ý [ÃÖ¿ì¼ö³í¹®] ÈÁö¹Î, ¹ÚÁöÈÆ, ½Åµ¿È¯, È«±¤ÀÇ, ¼¿µ¼®, ¹è±â°ï, ¹èµÎȯ(KAIST)
SW°øÇмöÁØ, Á¶Á÷º¯ÈÀνİú ÇÁ·ÎÁ§Æ®¼º°ú [»ê¾÷ü³í¹®] ±è½Â±Ç(NIPA SW°øÇм¾ÅÍ)
SI°³¹ß ÇÁ·ÎÁ§Æ®¿¡ Àû¿ëµÈ Ç°Áú°ü¸®Ã¼°è [»ê¾÷ü³í¹®] ¹ÚÁ¾¸ð, ÀÌÀç´ö(NIPA SW°øÇм¾ÅÍ) |
±¹³»±â¾÷ Àû¿ë»ç·Ê ¿¬±¸¿¡ ±â¹ÝÇÑ ¾ÖÀÚÀÏ SW °³¹ß 101 [»ê¾÷ü³í¹®] À̼¼¿µ(NIPA SW°øÇм¾ÅÍ)
±è¹ÎÈ£, ¹Î»óÀ±(KAIST), ¹ÎÇö±â(SK C&C)
¼ÒÇÁÆ®¿þ¾î °³¹ß¿¡¼ ½É¸®ÇÐÀÇ Á߿伺 [¿ì¼ö»ê¾÷ü³í¹®] ¼ÒÁ¤¿¬(»ï¼ºÀüÀÚ/KAIST), ÃÖâÁø(ÆÃÅ©¿þ¾î/KAIST), Çѽ¹ü(°í¿µÅ×Å©³î·¯Áö/KAIST), ¹Î»óÀ±(¼Ö·ç¼Ç¸µÅ©/KAIST) |
¿ä±¸°øÇÐ |
»ç¿ëÀÚ ÀÇ°ß¿¡¼ ¿ä±¸»çÇ×À» ÃßÃâÇϱâ À§ÇÑ ÇÁ·Î¼¼½º ¹× ±â¹ý [¹Ú»ç³í¹®] º¯Á¤¿ø(¼þ½Ç´ë)
À¯ÁîÄÉÀ̽º ½Ã³ª¸®¿À¿¡¼ À¯ÁîÄÉÀ̽º ÆÐÅÏÀ» ÀÌ¿ëÇÑ ¿ä±¸»çÇ× ´ëü È帧 Ãßõ ±â¹ý [ÃÖ¿ì¼ö³í¹®] ±èÀ¯¸², °í´öÀ±, ¹Ú¼ö¿ë(¼°´ë), ±èÁøÅÂ(¼ÒÇÁÆ®¿þ¾î°øÇп¢½ºÆÛÆ®±×·ì)
¿Ö âÀÇÀûÀÎ ¿ä±¸»çÇ×ÀÌ ³ª¿ÀÁö ¾ÊÀ»±î? [»ê¾÷ü³í¹®] ±èÁ¾¿í(»ï¼ºÀüÀÚ/KAIST)
À¯½ºÄÉÀ̽º±â¹ÝÀÇ »ç¿ëÁ᫐ ¿ä±¸»çÇ× ¸í¼¼ [´ÜÆí³í¹®] ±èÁ¤¹Î, ÇÑÇõ¼ö(»ó¸í´ë) |
»ç¿ëÀÚ Needs ±â¹ÝÀÇ ¿ä±¸°øÇÐ ¿¬±¸ ¹Úº¸°æ(È«ÀÍ´ë), ±è±âµÎ(TTA), ±è¿µÃ¶, ¹Úº´È£(È«ÀÍ´ë)
¸ð¹ÙÀÏ°ú Social Network Service(SNS)±â¼ú¿¡ ±â¹ÝÇÑ Çù¾÷Àû ¿ä±¸»çÇ× °ü¸® ¹æ¹ý [»ê¾÷ü³í¹®] ±è¹®¼ö(»ï¼ºÀüÀÚ/KAIST), À±»óö(VMS Solutions/KAIST), ±èÁ¾¿í(»ï¼ºÀüÀÚ/KAIST), Á¤ÀºÈ(LGÀüÀÚ/KAIST), ¹Î»óÀ±(¼Ö·ç¼Ç¸µÅ©/KAIST)
A»çÀÇ ½º¸¶Æ®ÆùÀ» À§ÇÑ ¼ÒÇÁÆ®¿þ¾î ¿ä±¸»çÇ× ÇÁ·Î¼¼½º °³¼± [»ê¾÷ü³í¹®] Â÷¿µÅÂ, À̼öÁø, ÀÓÁ¤¹¬(LGÀüÀÚ/KAIST)
AOP¸¦ ÀÌ¿ëÇÑ ISO/IEC 9126 ºñ±â´É ¿ä±¸»çÇ× ¶óÀ̺귯¸® [´ÜÆí³í¹®] ÃÖÈñ¼º, ÃÖÀº¸¸(µ¿±¹´ë) |
¸ðµ¨ ¹× Á¤Çü±â¹ý |
Á¤Çü ±â¹ýÀ» ÀÌ¿ëÇÑ Å×½ºÆ® ¿À¶óŬ »ý¼º ±Ç·É±¸, ±Ç±âÇö(°æ±â´ë)
ÇÁ·ÎÁ§Æ®ÀÇ °í½Å·Ú¼º È®º¸¸¦ À§ÇÑ Á¤Çü ±â¹ý °¡À̵å¶óÀÎ ¹Ú»çõ, ±èÅÂÈ£, ÀÓä´ö(ETRI)
Development of Decommissioning Engineering System [»ê¾÷ü³í¹®] ¹Ú½Â±¹, ¹®Á¦±Ç(KAERI) |
¾ÆÅ°ÅØó |
À¯ºñÄõÅͽº ȯ°æ¿¡¼ Àú¿ÂÀúÀå°í¸¦ Áö¿øÇϱâ À§ÇÑ ½º¸¶Æ® Àú¿ÂÀúÀå°í °ü¸®½Ã½ºÅÛ ¹é¼±Àç, ¹ÚÁؼ®, ³²Å¿ì, ÃÖ°æ¼®, ¿°±ÙÇõ(ºÎ»ê´ë)
ÅëÇÕ°³¹ß ȯ°æ ±â¹ÝÀÇ UML 2.0 ¸ðµ¨¸µ µµ±¸ÀÇ º¯È [»ê¾÷ü³í¹®] Á¤¿¬´ë, ÀÓÁø¼ö(N3Soft)
ºÐ±âÁ¡ ±â¹Ý Æ®¸® ºÐ¼®À» ÅëÇÑ ¼ÒÇÁÆ®¿þ¾î Ŭ·¯½ºÅ͸µ °á°ú ºñ±³ [¿ì¼ö´ÜÆí³í¹®] ¾öÀçö, ÀÌÂù±Ù(Áß¾Ó´ë)
Ä¿¹Â´ÏƼ °ËÃâ±â¹ýÀ» ÀÌ¿ëÇÑ ¼ÒÇÁÆ®¿þ¾î ¾ÆÅ°ÅØÃÄ ¸ðµâ ºä º¹¿ø [¿ì¼ö´ÜÆí³í¹®] ±èÁ¤¹Î, ÀÌÂù±Ù(Áß¾Ó´ë) |
SW Àç»ç¿ë ¹× SPLE |
°³¹ßÀÚ Æ÷·³¿¡¼ °æÇè Àç»ç¿ëÀ» À§ÇÑ ÅäÇÈ È帧 ºñ±³ ¹æ¹ý ÀÌ¿øÁ¶, ¿À±³Áß, ÃÖÈ£Áø(KAIST)
¼ÒÇÁÆ®¿þ¾î Á¦Ç° ¶óÀο¡¼ Çü»ó°ü¸®ÀÇ Çö½ÇÀûÀÎ À̽´¿Í ¹ßÀü ¹æÇâ [»ê¾÷ü³í¹®] ÀÓÁØÇÐ(»ï¼ºÀüÀÚ/KAIST), ±èÀº¿µ, °µ¿ÀÎ(LGÀüÀÚ/KAIST)
OSGi ÇÁ·¹ÀÓ¿öÅ©¿¡ ±â´í Á¦Ç°¶óÀÎ ¼ÒÇÁÆ®¿þ¾î °³¹ß Àû¿ë [´ÜÆí³í¹®] ¾çÁø¼®, °±³Ã¶(Æ÷Ç×°ø´ë)
¼ÒÇÁÆ®¿þ¾î Á¦Ç°¶óÀÎ ¿ª°øÇÐ Áö¿øµµ±¸ [´ÜÆí³í¹®] ¸²Ã», ºóŸ¿À, ¾çÁø¼®, ÀÌÇý¼±, °±³Ã¶(Æ÷Ç×°ø´ë)
Áö´ÉÇü ¼öÃâÅëÁ¦½Ã½ºÅÛÀÇ ÇÁ·¹ÀÓ¿öÅ© ¼³°è [´ÜÆí³í¹®] ±è»ê¼º, ±èÀÇÇö, ¼º¿ìö, À̹®¿ë(KAIST), ½Åµ¿ÈÆ(Çѱ¹¿øÀÚ·ÂÅëÁ¦±â¼ú¿ø) |
SW ÀÀ¿ë |
¸Þ½ÃÁö º¯È¯À» À§ÇÑ ¸Þ½ÃÁö ÇÊµå ¸ÅÇÎ °ü°è ½Äº° ÀÚµ¿È ¹æ¹ý ±èÁø±Ô (KAIST)
»çÀ̹ö-¹°¸® ½Ã½ºÅÛÀÇ ECMLÀ» À§ÇÑ ½Ã¹Ä¸µÅ© XMI º¯È¯±â °³¹ß ¼ÕÇö½Â(È«ÀÍ´ë), ±è¿ì¿(´ë±¸±³À°´ë), ÀüÀΰÉ, ÀüÀçÈ£(ETRI), ±è¿µÃ¶(È«ÀÍ´ë)
¿¬±¸¿µ¿ª¿¡¼ °áÇմܾ¼ Àü¹®¿ë¾î °ËÃâ ¹× ±¸¼Ó·Â°ÇÑ ´Ü¾îƯ¼º ºÐ¼®¿¡ °üÇÑ ¿¬±¸ Á¤¿µ¼·, ÀÓä±Õ, ±è½Â¼®, ÃÖÈ£Áø(KAIST)
UAV Áß°è±â¹Ý MANETÀÇ ¾ßÀü¿î¿ë¼º´É ÃÖÀûÈ ¸ðµ¨°³¹ß [»ê¾÷ü³í¹®] ¹Ú¿µ±Ô, ±è¼¼ÀÏ(±¹¹æ±â¼úÇ°Áú¿ø)
½º¸¶Æ® TV ¿ë °í¼Ó IO ±â¹ý [´ÜÆí³í¹®] Á¤Ã¢ÈÆ, ȲÅÂÈ£, ±è±ÔÀÏ, ¿øÀ¯Áý(ÇѾç´ë) |
¸ð¹ÙÀÏ SW |
µ¿Àû ¸ð¹ÙÀÏ ¿¡ÄڽýºÅÛÀÇ Ç°Áú°ü¸®¸¦ À§ÇÑ ÇÁ·¹ÀÓ¿öÅ© [¹Ú»ç³í¹®] ¿À»óÇå, ±è¼öµ¿(¼þ½Ç´ë)
MVCÆÐÅϱâ¹ÝÀÇ ¸ð¹ÙÀÏ ¾ÖÇø®ÄÉÀÌ¼Ç ¸ðµ¨ ¼¿ëÁø, ±èÇö¼ö(Ãæ³²´ë)
¾Èµå·ÎÀ̵å ÀÎÅÙÆ® ¸ÞÄ¿´ÏÁòÀÇ È®ÀåÀ» ÅëÇÑ µ¿Àû ÄÚµå Àç»ç¿ë [´ÜÆí³í¹®] ¾È¼öÁ¤, ±èº´È£, ±èÁøõ(°æ¼º´ë) |
¼ºñ½º |
¼ºñ½º ±â¹Ý ¾îÇø®ÄÉÀ̼ÇÀ» À§ÇÑ Á¤Àû ¹× µ¿Àû ÀûÀÀ ÇÁ·¹ÀÓ¿öÅ© [¹Ú»ç³í¹®] ¶óÇöÁ¤, ±è¼öµ¿(¼þ½Ç´ë)
À¯ºñÄõÅͽº ÄÄÇ»ÆÃÀ» À§ÇÑ ¿ÂÅç·ÎÁö ±â¹Ý ¼ºñ½º ¸ðµ¨¸µ ¹× ÇÕ¼º ±â¹ý [¹Ú»ç³í¹®] À̹̿¬, ÀÌÁ¤¿ø(¾ÆÁÖ´ë), ¹Ú½Â¼ö(ÀÌÈ¿©´ë)
ÀÓ¹« »óȲ Áß½ÉÀÇ µ¿Àû ¼ºñ½º Á¶ÇÕ ÇÁ·¹ÀÓ¿öÅ© ½Å»óº¹, ±¸Çü¹Î, °íÀοµ(KAIST) |
ÀÓº£µðµå SW |
ÀÌÁ¾ ¸ð¹ÙÀÏ ÀÓº£µðµå Ç÷§ÆûÀ» À§ÇÑ ¸ðµ¨ º¯È¯ ÇÁ·¹ÀÓ¿öÅ© ¿¬±¸ [¹Ú»ç³í¹®] ±è¿ì¿(´ë±¸±³À°´ë), ±è¿µÃ¶(È«ÀÍ´ë)
¹«±âü°è ¼ÒÇÁÆ®¿þ¾î °³¹ß ¹× °ü¸® Áöħ Àû¿ë »ç·Ê: ±âµ¿¹«±â ³»ÀåÇü ½Ç½Ã°£ Á¦¾î ½Ã½ºÅÛ¿ë RTOS ±â¼ú °³¹ß [»ê¾÷ü³í¹®] ¸¶À¯½Â, ¿ì´ö±Õ, ¸¶Æò¼ö(ETRI)
½Ç½Ã°£ ÀÓº£µðµå ½Ã½ºÅÛ¿¡¼ ÇÁ·Î¼¼¼ ÁÖÆļö ÀÇÁ¸ ÄÚµå ºñÀ²À» °í·ÁÇÑ ÃÖ¼Ò ¿¡³ÊÁö ¼Ò¸ð ÁÖÆļö °áÁ¤ ¹æ¹ý [´ÜÆí³í¹®] ±è¿µ¹Î, ÀÌÂù±Ù(Áß¾Ó´ë)
CPSȯ°æÀ» °í·ÁÇÑ Áö´ÉÇü Ȩ ³×Æ®¿öÅ© ½Ã½ºÅÛ °³¹ß ¹æ¹ý [´ÜÆí³í¹®] ¹Úâ±Ô, ÀÌÁ¤¿ø(¾ÆÁÖ´ë) |
¿ÂÅç·ÎÁö |
ÇàÀ§ ¿ÂÅç·ÎÁö: º¸¾ÈÀ» À§ÇÑ °ø°Ý ÆÐÅÏ °¨Áö ÇÁ·¹ÀÓ¿÷ ¿ÂÁøÈ£, ¿ì¼öÁ¤, À̹®±Ù(ÀüºÏ´ë)
ÅäÇÈ ¸ðµ¨¸µÀ» À§ÇÑ ½Ã¹Ä·¹ÀÌÅÍ µµ±¸°³¹ß Á¤¿µ¼·, ÀÓä±Õ, ÃÖÈ£Áø(KAIST)
¿ÂÅç·ÎÁö Ŭ·¡½º »ó°ü°ü°è ºÐ¼®À» ÅëÇÑ »óÀ§ ¿ÂÅç·ÎÁö ÃßÃâ ±â¹ý ÀÌÀÎȯ, ³²Å¿ì, ·ùÀÚÄ¡, ¿°±ÙÇõ(ºÎ»ê´ë)
µð¹ÙÀ̽º Çù¾÷ ȯ°æ¿¡¼ »óȲ ÀÎÁö¸¦ À§ÇÑ ¿ÂÅç·ÎÁö Ãß·Ð ±â¹ý [´ÜÆí³í¹®] ¼³±¤¼ö, ±èÁ¤µ¿, ÀÎÈ£, ¹éµÎ±Ç(°í·Á´ë) |
¡¡
KCSE 2013
»ó¼¼ ÇÁ·Î±×·¥
¡¡
¡¡
¡¡
¡¡
¡¡
¡¡
¡¡
¡¡
KCSE 2013 Æ©Å丮¾ó
Æ©Å丮¾ó T1: »ê¾÷ü Æ©Å丮¾ó 1
- ÀϽÃ: 1¿ù 30ÀÏ (¼ö) 14:30-15:45
- Àå¼Ò:
±×·£µåȦ2
¡¡
- Á¦¸ñ: 'Architecture for Cloud, Ucloud for Architecture'
- ¿¬»ç: ¼Û¼ø¿ë ÆÀÀå(KT Cloud¿£Áö´Ï¾î¸µ´ã´ç VPC¿£Áö´Ï¾î¸µÆÀÀå)
- Æ©Å丮¾ó ÃÊ·Ï:
¸¹Àº ±â¾÷µéÀÌ Å¬¶ó¿ìµå ±â¹ÝÀ¸·Î IT ÀÎÇÁ¶ó¸¦ ±¸ÃàÇÏ´Â ¹æ¾ÈÀ» °ËÅä, ½ÇÇàÇÏ°í ÀÖÁö¸¸, ÁÖ·Î ±âÁ¸ÀÇ ½Ã½ºÅÛ ±¸Á¶¸¦ 1:1 ¸¶À̱׷¹ÀÌ¼Ç ÇÏ´Â °ÍÀ» ÀüÁ¦·Î ºñ¿ë Àý°¨ È¿°ú¿¡¸¸ ÁýÁßÇÏ°í ÀÖ´Ù. ±×·¯³ª Ŭ¶ó¿ìµå°¡ Á¦°øÇÏ´Â ÄÄÇ»Æà ȯ°æÀº ºÐ¸íÈ÷ ±âÁ¸ÀÇ ¿£ÅÍÇÁ¶óÀÌÁî ȯ°æ°ú ´Ù¸¥ Ư¼ºµéÀÌ Àֱ⠶§¹®¿¡ ½Ã½ºÅÛ ±¸Á¶ ÀÚü¸¦ ¹ßÀü½ÃÅ°´Â ³ë·ÂÀÌ ÇÊ¿äÇÏ´Ù. º» ¼¼¼Ç¿¡¼´Â Ŭ¶ó¿ìµå ȯ°æ¿¡ ÀûÇÕÇÑ ½Ã½ºÅÛ-¾îÇø®ÄÉÀÌ¼Ç ¾ÆÅ°ÅØÃÄ´Â ¾î¶°ÇØ¾ß ÇÏ´ÂÁö ¸î °¡ÁöÀÇ »ç·Ê¸¦ °çµé¿© ³íÀÇÇغ¸°íÀÚ ÇÑ´Ù. ¿ªÀ¸·Î Ŭ¶ó¿ìµå »ç¾÷ÀÚ´Â ±âÁ¸ÀÇ ½Ã½ºÅÛ ±¸Á¶¸¦ ¹«¸® ¾øÀÌ ¼ö¿ëÇÒ ¼ö ÀÖµµ·Ï ´Ù¾çÇÑ ¼ºñ½º¸¦ Á¦°øÇÒ ÇÊ¿ä°¡ ÀÖ´Ù. ¾Æ¸¶Á¸ µîÀÇ ¼±Áø »ç¾÷ÀÚµéÀÌ 2012³âµµ¿¡ SSD±â¹ÝÀÇ °¡»ó¼¹ö¸¦ Á¦°øÇϱ⠽ÃÀÛÇÑ °Íµµ ±×·¯ÇÑ ¸Æ¶ôÀ¸·Î º¼ ¼ö ÀÖ´Ù. º» ¼¼¼Ç¿¡¼´Â KT À¯Å¬¶ó¿ìµå ¼ºñ½ºÀÇ »ç·Ê¸¦ ÅëÇØ Å¬¶ó¿ìµå »ç¾÷ÀÚÀÇ ±×·¯ÇÑ ³ë·ÂÀ» »ìÆ캸°íÀÚ ÇÑ´Ù
- ¼Û¼ø¿ë ÆÀÀå ¾à·Â:
1993³â ¼¿ï´ëÇб³ ´ëÇпø ÀüÀÚ°øÇаú Á¹¾÷ (¼®»ç)
1993³â~ÇöÀç KT ±Ù¹«
- HAN/B-ISDN ÇÁ·ÎÁ§Æ® Âü¿©
- ÃÊ°í¼Ó±¹°¡¸Á °ü¸®½Ã½ºÅÛ °³¹ß
- RFID/USN Ç÷§Æû °³¹ß
- BcN °ü¸®½Ã½ºÅÛ °³¹ß (BcN : Broadband Convergence Network)
- ¼¿ï´ëÇб³ KT-MBA °úÁ¤ ¼ö·á
úÞ CloudÃßÁøº»ºÎ Cloud¿£Áö´Ï¾î¸µ´ã´ç VPC¿£Áö´Ï¾î¸µÆÀÀå
- Á¦¸ñ: 'Ucloud ¼ºñ½º ¹× Academy Program ¼Ò°³'
- ¿¬»ç: ÀÌÇöÁÖ ÆÀÀå(KT Cloud»ç¾÷´ã´ç Cloud¸¶ÄÉÆÃÆÀÀå)
- Æ©Å丮¾ó ÃÊ·Ï:
±¸±Û°ú ÆäÀ̽ººÏÀÇ °øÅëÁ¡Àº ¼¼°è IT ½ÃÀåÀ» ¼±µµÇÏ´Â ±â¾÷À̶ó´Â Á¡, ÀþÀº °æ¿µÀÚ°¡ CEO¶ó´Â Á¡. ¸¶Áö¸·À¸·Î ´ëÇÐ(¿ø)»ýÀÌ Ã¢¾÷ÇÑ »ç·Ê¶ó´Â Á¡ÀÌ´Ù. ºñÁî´Ï½ºÀÇ ÁÖ±â´Â ª¾ÆÁö´Â ¹Ý¸é ¸ð¹ÙÀÏ µ¥ÀÌÅÍ ÆøÁõÀ¸·Î À̸¦ ¼ö¿ëÇÒ °ø°£Àº Àý´ëÀûÀ¸·Î ºÎÁ·ÇÏ´Ù. ÀÌ·± »óȲ¿¡¼ ¡®Å¬¶ó¿ìµå¡¯°¡ Á¦°øÇÏ´Â ÄÄÇ»Æà ȯ°æÀº ±âÁ¸ ¸ÞÀÎÇÁ·¹ÀÓ ³»Áö´Â Ŭ¶óÀ̾ðÆ® ÄÄÇ»Æà ½Ã´ëÀÇ ÄÄÇ»Æðú´Â ´Ù¸¥ Çõ½ÅÀ» Áö¿øÇÏ°í ÀÖ´Ù. º» ¼¼¼ÇÀº ±¹³» ÃÖÃÊ·Î ÆÛºí¸¯ Ŭ¶ó¿ìµå¸¦ »ó¿ëÈ ÇßÀ¸¸ç, Ŭ¶ó¿ìµå ½ÃÀåÀ» ¼±µµÇÏ´Â ±â¾÷ kt°¡ Á¦°øÇϴ Ŭ¶ó¿ìµå »óÇ°°ú À̸¦ ÀÀ¿ëÇÑ »ç·Ê¸¦ ³íÀÇÇÏ°íÀÚ ÇÑ´Ù. ¾Æ¿ï·¯ kt°¡ ´ëÇб³¸¦ ÇâÇØ ´øÁö´Â ȵΠ¡®ucloud academy¡¯¿¡ ´ëÇØ ¼Ò°³ÇÏ°íÀÚ ÇÑ´Ù.
- ÀÌÇöÁÖ ÆÀÀå ¾à·Â:
1996 University of Iowa, °æÁ¦ÇÐ Çлç
2006 IE Business School, MBA
1997³â~ÇöÀç KT ±Ù¹«
- ÀÎÅͳݻç¾÷ÆÀ, IRÆÀ, »ç¾÷Àü·«ÆÀ, ÃâÀڰ濵ÆÀ µî ±Ù¹«
úÞ CloudÃßÁøº»ºÎ Cloud»ç¾÷´ã´ç Cloud¸¶ÄÉÆÃÆÀÀå
¡¡
Æ©Å丮¾ó T2: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ÀÌ·Ð Æ©Å丮¾ó
- ÀϽÃ: 1¿ù 30ÀÏ (¼ö) 14:30-15:45
- Àå¼Ò: ¼¼¹Ì³ª½Ç1
- Á¦¸ñ: ¡®¼ÒÇÁÆ®¿þ¾î ¾ÆÅ°ÅØó ¼³°èÀÇ ±Ùº»¿ø¸®µé¡¯
- ¿¬»ç: °¼º¿ø ±³¼ö(KAIST)
- Æ©Å丮¾ó ÃÊ·Ï:
ÀÌ Æ©Å丮¾ó¿¡¼´Â È¿°úÀûÀÎ ¼ÒÇÁÆ®¿þ¾î °³¹ßÀ» À§ÇÑ ÇʼöÀûÀÎ ±â¼ú·Î¼ ¿ µÎ °³ÀÇ ±Ùº»ÀûÀÎ ¼ÒÇÁÆ®¿þ¾î ¾ÆÅ°ÅØó ¼³°è¿ø¸®¸¦ ¼³¸íÇÑ´Ù. ¾ÆÅ°ÅØó ¼³°è´Ü°èµéÀ» ¹®Á¦ÀÇ ÆľÇ, ¾ÆÅ°ÅØó ¸ðµ¨¸µ ¹æ¹ýÀÇ °áÁ¤, ¾ÆÅ°ÅØó ¼³°èÀÇ ¼öÇà ±×¸®°í ¼³°èµÈ ¾ÆÅ°ÅØóÀÇ Æò°¡ÀÇ ³× °³ÀÇ ´Ü°è ±ºÀ¸·Î ³ª´©°í, ÀÌ ´Ü°è±º ¾È¿¡¼ ±×¸®°í ´Ü°è±º °£¿¡ È°¿ëµÇ´Â ¾ÆÅ°ÅØó ¼³°èÀÇ ¿ø¸®µéÀ» ½Äº°ÇÏ°í ±× ¿ªÇÒÀ» ¼³¸íÇÑ´Ù.
- °¼º¿ø ±³¼ö ¾à·Â:
2011.8.10~12: ±¹Á¦ÄÁÆÛ·±½º ÇÁ·Î±×·¥ °øµ¿ÀÇÀå, SERA 2011 (Software Engineering Research, Management and Applications)
2009.3 ~ ÇöÀç: KAIST Àü»êÇаú ºÎ±³¼ö
2003 ~ ÇöÀç: ¹Ì±¹ Ä«³×±â¸á·Ð ´ëÇб³ MSE ÇÁ·Î±×·¥ °âÀÓ±³¼ö
2001.10 ~ 2009.2: Çѱ¹Á¤º¸Åë½Å´ëÇб³ Á¶±³¼ö, ºÎ±³¼ö
2001.8.28 ~ 31: ±¹Á¦ÄÁÆÛ·±½º °øµ¿ÀÇÀå, FORTE 2001 (Formal Techniques for Networked and Distributed Systems)
1995.9 ~1996.9: ¹Ì±¹ ±¹¸³Ç¥Áرâ¼ú¿¬±¸¼Ò(NIST) °´¿ø¿¬±¸¿ø
1993.12 ~ 2001.10: Çѱ¹Åë½Å(KT) ¼±ÀÓ¿¬±¸¿ø
Àú¼: ¼ÒÇÁÆ®¿þ¾î ¾ÆÅ°ÅØó·ÎÀÇ ÃÊ´ë, 2012.
¡¡
Æ©Å丮¾ó T3: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ½Å±â¼ú Æ©Å丮¾ó 1
- ÀϽÃ: 1¿ù 30ÀÏ (¼ö) 14:30-15:45
- Àå¼Ò: ¼¼¹Ì³ª½Ç2
- Á¦¸ñ: ¡®Combinatorial Test Design and Its Applications¡¯
- ¿¬»ç: À±ÀÏö ±³¼ö(SUNY Korea)
- Æ©Å丮¾ó ÃÊ·Ï:
Combinatorial test design is a test-case selection technique where each test case (called configuration) is a value combination of test input parameters. The main rationale behind this design is that software faults are often caused by unintended or unexpected interactions between test input values. Since its rebirth as a software black-box testing technique, combinatorial test design has been applied to various problems in the Software Engineering discipline and the cost-effectiveness of the technique has been empirically proven by a large stack of studies carried out over the last two decades.
In this tutorial, I will introduce a number of combinatorial test design techniques that use different strategies or coverage criteria for the value selection process, with the special focus given to the t-wise interaction coverage design. Two natural extensions to the base design will then be presented. The extensions are to improve test effectiveness by prioritizing test cases generated or to reduce the size of test suites while preserving test strength. Researches on the application of the techniques to address various problems in Software Engineering will also be presented to raise understanding of actual use-cases. The application areas may include fault characterization, software performance enhancement, web application testing, and GUI testing.
- À±ÀÏö ±³¼ö ¾à·Â:
Professor Ilchul Yoon received B.S. in Computer Science at Sogang University, M.S. in Computer Science at Korea Advanced Institute of Science and Technology, and Ph.D. in Computer Science at University of Maryland, College Park. As an assistant professor in the department of Computer Science, he is working for State University of New York, Korea, which is the first foreign university established on Korean soil. His research interests lie in the fields of software compatibility testing, interaction test design, and software process. He also has interests in distributed high-performance computing researches, and participated in the peer-review processes of major conferences in the discipline.
¡¡
Æ©Å丮¾ó T4: »ê¾÷ü Æ©Å丮¾ó 2
- ÀϽÃ: 1¿ù 31ÀÏ (¸ñ) 09:00-10:15
- Àå¼Ò: ±×·£µåȦ2
- Á¦¸ñ: ¡®Å¬¶ó¿ìµå ±â¹ÝÀÇ ½º¸¶Æ®¿öÅ© (A journey to the Smart Working Era on the Cloud)¡¯
- ¿¬»ç: ½ÅâÇö ÆÀÀå(LG CNS Ŭ¶ó¿ìµå»ç¾÷ÆÀÀå)
- Æ©Å丮¾ó ÃÊ·Ï:
¡®12³â °¡Æ®³Ê ½ÉÆ÷Áö¿ò¿¡¼ ¹ßÇ¥µÇ±â·Î Ŭ¶ó¿ìµå´Â Àû¾îµµ ¹Ì±¹ ½ÃÀå¿¡¼´Â ChasmÀ» ³Ñ¾î¼¹´Ù°í ÇÑ´Ù. ´õÀÌ»ó Ŭ¶ó¿ìµå´Â ½Å±â¼ú/½Å»ç¾÷ ¿µ¿ªÀÌ ¾Æ´Ñ CommodityÈ µÇ¾î°¡´Â Ãß¼¼ÀÌ°í ±¹³» ½ÃÀåÀº ±Û·Î¹ú ´ëºñ ¼Óµµ°¡ ´À¸®³ª Àü »ê¾÷¿µ¿ª¿¡ °ÉÃÄ ±× È°¿ëµµ°¡ Áõ´ëµÇ¾î °¡°í ÀÖ´Ù. ¿ì¸®°¡ ÈçÈ÷ »ý°¢Çϴ Ŭ¶ó¿ìµå´Â ¼¹ö, ½ºÅ丮Áö µî ÀÎÇÁ¶ó¸¦ Á¦°øÇÏ´Â IaaS¿Í SW¸¦ ¼ºñ½º·Î Á¦°øÇÏ´Â SaaS ¿µ¿ª ¿Ü¿¡ ÃÖ±Ù¿¡´Â »ç¿ëÀÚ Å¬¶óÀ̾ðÆ® ¿µ¿ª(PC)±îÁöµµ Ŭ¶ó¿ìµå·Î Á¦°øÇÏ´Â ¼ºñ½º°¡ ¿£ÅÍÇÁ¶óÀÌÁî ½ÃÀå¿¡¼ ÁÖ¸ñÀ» ¹Þ°í ÀÖ´Ù. º» ¼¼¼ÇÀº ±â¾÷ º¸¾ÈÀ» ³Ñ¾î ½º¸¶Æ®¿öÅ© °üÁ¡¿¡¼ µ¥½ºÅ©Å¾ Ŭ¶ó¿ìµå ȯ°æÀÌ ¾î¶»°Ô ±â¾÷¿¡¼ ¾î¶»°Ô È°¿ëµÇ°í ÀÖ´ÂÁö¸¦ »ç·Ê¿Í ´õºÒ¾î ¼Ò°³ÇÏ°íÀÚ ÇÑ´Ù.
- ½ÅâÇö ÆÀÀå ¾à·Â:
¡¯97 ~ ¡¯02 : LG-EDS(úÞ LG CNS) ÀÔ»ç. ÀÀ¿ë½Ã½ºÅÛ SI / SM
¡¯03 ~ ¡¯05 : LG CNS ½Å±Ô»ç¾÷ °³¹ß ¾÷¹«Àü¹®°¡
¡¯05 ~ ¡¯09 : LG CNS °¡»óÈ ±â¼ú ±â¹Ý »ç¾÷ °³¹ß ¹× ÀÌÇà
¡¯10 ~ ÇöÀç : LG CNS Ŭ¶ó¿ìµåÄÄÇ»Æà »ç¾÷
°ÀÇÀÌ·Â : ÅëÇÕÀü»ê¼¾ÅÍ, ƯÇãû, °ü¼¼Ã» µî °ø°ø±â°ü ¹× ´Ù¼ö ¹Î°£ ÄÁÆÛ·±½º ¹ßÇ¥
úÞ LG CNS Ŭ¶ó¿ìµå»ç¾÷ÆÀÀå
¡¡
Æ©Å丮¾ó T5: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ±³À° Æ©Å丮¾ó
- ÀϽÃ: 1¿ù 31ÀÏ (¸ñ) 09:00-10:15
- Àå¼Ò: ¼¼¹Ì³ª½Ç1
- Á¦¸ñ: ¡®¼ÒÇÁÆ®¿þ¾î °øÇÐ ±³À° – ½Ç¹«Àû Á¢±Ù¹ý¡¯
- ¿¬»ç: ÃÖÀº¸¸ ±³¼ö(µ¿±¹´ë)
- Æ©Å丮¾ó ÃÊ·Ï:
¼ÒÇÁÆ®¿þ¾î ¿£Áö´Ï¾î¸¦ Å°¿ì±â À§Çؼ´Â ¼ÒÇÁÆ®¿þ¾î °øÇÐÀÇ ¹æ¹ý·Ð°ú À̷и¸ÀÌ ¾Æ´Ï¶ó ½ÇÁ¦ °³¹ßÀ» À§ÇÑ ½Ç¹«Àû ÈÆ·ÃÀÌ ÇÊ¿äÇÏ´Ù. ÇÏÁö¸¸ ´ëÇÐ ÇкΠ°úÁ¤ÀÇ ¼ÒÇÁÆ®¿þ¾î ±³À°Àº Ä¥ÆÇÀ̳ª ÇÁ·ÎÁ§Å͸¦ ÀÌ¿ëÇÏ¿© ±× ¹æ¹ýÀ» ¼Ò°³Çϴµ¥ ÁßÁ¡À» µÎ°í ÀÖ´Ù. ¶ÇÇÑ »ê¾÷ ÇöÀå¿¡¼ »ç¿ëµÇ´Â IT ±â¼úÀº ºü¸£°Ô ¹ßÀüÇÏ°í ´Ù¾çÇØÁ® ¾î¶² °ÍÀ» ¾î´À Á¤µµ·Î ´Ù·ç¾î¾ß ÇÒÁö ±âÁØÀÌ ¼Áö ¾Ê´Â´Ù. ÀÌ Æ©Å丮¾ó¿¡¼´Â »ê¾÷ ÇöÀå¿¡ ¹Ù·Î ÅõÀ﵃ ¼ö ÀÖ´Â ¼ÒÇÁÆ®¿þ¾î ¿£Áö´Ï¾î¸¦ ±³À°Çϱâ À§ÇÏ¿© ÇÊ¿äÇÑ ±³À° ³»¿ë, ¹Ù¶÷Á÷ÇÑ ±³À° ¹æ¹ý, ÃֽŠ½ÃµµµÇ°í ÀÖ´Â ½Ç¹«Àû ±³À° ¹æ¹ý¿¡ ´ëÇÏ¿© ¾Ë¾Æº»´Ù.
- ÃÖÀº¸¸ ±³¼ö ¾à·Â:
1982. µ¿±¹´ëÇб³ Àü»êÇаú Á¹¾÷(Çлç)
1985. Çѱ¹°úÇбâ¼ú¿ø Àü»êÇаú Á¹¾÷(°øÇм®»ç)
1993. ¹Ì±¹ Illinois Institute of Technology Àü»êÇаú Á¹¾÷(Àü»êÇйڻç)
1985. Çѱ¹Ç¥ÁØ¿¬±¸¼Ò ¿¬±¸¿ø
1986~1988 Ãæ³²´ë, ¸ñ¿ø´ë ´ëÀü »ê¾÷´ë °»ç
1988. Çѱ¹µ¥ÀÌŸÅë½Å(ÁÖ) ÁÖÀÓ¿¬±¸¿ø
1992. ½ÃÄ«°í ÁÖ¸³´ë Àü»êÇаú °»ç
1997¢¦2004, Çѱ¹Á¤º¸°úÇÐȸ ¼ÒÇÁÆ®¿þ¾î °øÇÐ ¿¬±¸È¸ ¿î¿µÀ§¿ø
2001~2005. Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ÇÐȸÁö ÆíÁýÀ§¿ø
2000. 2007 ÄÝ·Î¶óµµ ÁÖ¸³´ë(Æ÷Æ®Äݸ°½º) Àü»êÇаú ¹æ¹®±³¼ö
2002. Ä«³×±â ¸á·Ð ´ëÇÐ ¼ÒÇÁÆ®¿þ¾î °øÇÐ ´Ü±â °úÁ¤ ¿¬¼ö
1993¢¦ÇöÀç, µ¿±¹´ëÇб³ ÄÄÇ»ÅÍ °øÇаú ±³¼ö
¡¡
Æ©Å丮¾ó T6: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ½Å±â¼ú Æ©Å丮¾ó 2
- ÀϽÃ: 1¿ù 31ÀÏ (¸ñ) 09:00-10:15
- Àå¼Ò: ¼¼¹Ì³ª½Ç2
- Á¦¸ñ: ¡®Towards Dependable and Secure Software: Requirements Engineering Approach¡¯
- ¿¬»ç: À̼®¿ø ±³¼ö(¾ÆÁÖ´ë)
- Æ©Å丮¾ó ÃÊ·Ï:
Engineering a dependable software system that meets our needs is a challenging task and requires a variety of analysis and development techniques. Dependability has to be engineered into a system in its early stage of design and development task to build comprehensive understanding of its nature and purposeful behavior within the context of people, technology and the process. Among many dependability attributes, we focus on the security attribute and its certification and accreditation process that aggregates evidences for multi-dimensional analysis to assure its level of acceptance. Security breaches most often occur due to a cascading effect of failure among security constraints that collectively contribute to overall secure system behavior in a socio-technical environment. Therefore, during security certification activities, analysts must systematically take into account the nexus of causal chains that exist among security constraints imposed by regulatory requirements. Numerous regulatory requirements specified in natural language documents or listed in spreadsheets/databases do not facilitate such analysis. We present a step-wise methodology to discover and understand the multi-dimensional correlations among regulatory requirements for the purpose of understanding the potential for risk due to non-compliance during system operation. Our lattice algebraic computational model helps estimate the collective adequacy of diverse security constraints imposed by regulatory requirements and their interdependencies with each other in a bounded scenario of investigation. Abstractions and visual metaphors combine human intuition with metrics available from the methodology to improve the understanding of risk based on the level of compliance with regulatory requirements. In addition, a problem domain ontology that classifies and categorizes regulatory requirements from multiple dimensions of a socio-technical environment promotes a common understanding among stakeholders during certification and accreditation activities. A preliminary empirical investigation of our theoretical propositions has been conducted in the domain of The United States Department of Defense Information Technology Security Certification and Accreditation Process (DITSCAP). This work contributes a novel approach to understand the level of compliance with regulatory requirements in terms of the potential for risk during system operation. This work has been partially supported by the grants from Space and Naval Warfare Systems Center (SPAWAR) US Department of Navy, Department of Defense, and National Science Foundation.
- À̼®¿ø ±³¼ö ¾à·Â:
Dr. Seok-Won Lee is currently the Head of Graduate School of Software and Associate Professor of Information & Computer Engineering at Ajou University since 2012. He has been an Assistant Professor of Information Security at the University of Texas at San Antonio, a Visiting Professor at the University of Nebraska – Lincoln and an Assistant Professor of Software Engineering and a Director of Knowledge-intensive Software Engineering (NiSE) research group at the Univ. of North Carolina at Charlotte (2003- 2010). Prior to joining to the UNC Charlotte, he was affiliated with Science Applications International Corporation (SAIC) and IBM T.J. Watson Research Center as senior research scientists. He received his M.Sc. in Computer Science from University of Pittsburgh, and Ph.D. in Information Technology from George Mason University. His areas of specialization include software engineering with specific expertise in ontological requirements engineering and domain modeling, and knowledge engineering with specific expertise in knowledge acquisition, machine learning and knowledge-based systems. He serves as chairs, organizers, editors and the program committee members for numerous journals, conferences, and workshops in software requirements engineering, secure software engineering and other related areas such as information security and assurance, critical infrastructure protection, service-oriented computing, visual analytics and self-adaptive software systems. He has published more than 100 refereed articles. He is a professional member of IEEE, ACM and AAAI.
¡¡
¼¼¼Ç ¹ßÇ¥ »çÁø
![]() |
![]() |
![]() |
![]() |
ÀÓä±Õ (KAIST) | |||
![]() |
![]() |
![]() |
![]() |
±èÀǼ· (°Ç±¹´ë) | |||
|
|
![]() |
|
|
|
|
|
±è¿øÅ ¹Ú»ç (ETRI) | |||
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
¸¸Âù »çÁø
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
½Ã»ó ¹× °¨»çÆÐ Àü´Þ »çÁø
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Æ©Å丮¾ó ¹× ±âŸ »çÁø
![]() |
![]() |
![]() |
![]() |
|
Æ©Å丮¾ó - À̼®¿ø ±³¼ö (¾ÆÁÖ´ë) | ±âÁ¶¿¬¼³ - ¹Ú¼ö¿ë ¿øÀå (NIPA) | |||
|
|
|
| |
![]() |
|
|
||
Æ©Å丮¾ó - ¼Û¼ø¿ë ÆÀÀå (KT) | Æ©Å丮¾ó - ½ÅâÇö ÆÀÀå (LGCNS) | ±âÁ¶¿¬¼³ - ÀÌ»óÀº ¼¾ÅÍÀå (NIPA SW°øÇм¾ÅÍ) |