• Title/Summary/Keyword: 메커니즘 생성

Search Result 615, Processing Time 0.024 seconds

Interworking of SIP Authentication with DIAMETER and Security Analysis (SIP와 DIAMETER의 인증 연동 및 안전성 분석)

  • 박성준;정수환;이병길;김현곤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.426-435
    • /
    • 2004
  • The DIAMETER protocol provides Authentication, Authorization, and Accounting (AAA) transactions across the Internet. SIP(Session Initiation Protocol) will be used for new types of signaling, such as instant messaging and application level mobility across networks. And SIP will be a major signaling protocol for next generation wireless networks. But the Digest authentication scheme is not using a secure method of user authentication in SIP, and it is vulnerable to man-in-the-middle attacks or dictionary attacks. This study focused on designing a SIP proxy for interworking with AAA server with respect to user authentication and security analysis. We compared and analyzed the security aspects of the scenarios and propose two proposals that a response which include the user address and password-based mutual authentication and key agreement protocol. It is claimed to be more secure against common attacks than current scenarios.

Numerical Simulation of Failure Mechanism of PELE Perforating Thin Target Plates (얇은 표적체판에 천공하는 PELE 의 파괴 메커니즘 수치시뮬레이션)

  • Jo, Jong Hyun;Lee, Young Shin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.12
    • /
    • pp.1577-1583
    • /
    • 2012
  • Penetrator with enhanced lateral effect (PELE) is a novel projectile that does not require dynamite and a fuse. It comprises a high-density jacket that is closed at its rear end and filled with a low-density filling material. To study the explosion characteristics of PELE using AUTODYN-3D code, the calculation models of the projectile body and the bullet target were developed and the process of penetrating an aluminum-2024 alloy target using PELE was simulated. The scattering characteristics after PELE penetrated the aluminum-2024 alloy target were studied for different filling materials. The explicit finite element analysis of PELE fragmentation was implemented with the stochastic failure criterion in AUTODYN-3D code. As the filling expanded, the fragments gained velocity and dispersed laterally, increasing the damage area considerably. The number and shape of PELE fragments differed depending on the impact pressure of the filling that fragmented during the penetration and lateral dispersion processes.

Removal Efficiency of Organic Iodide on Silver Ion-Exchanged Zeolite and TEDA-AC at High Temperature Process (고온공정에서 은교환 제올라이트 및 TEDA 첨착활성탄의 유기요오드 제거성능)

  • 최병선;박근일;윤주현;김성훈;배윤영;지성균;양호연;유승곤
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2003.11a
    • /
    • pp.207-214
    • /
    • 2003
  • Removal efficiency of methyl iodide at high temperature process by TEDA-impregnated activated carbon used for radioiodine retention in nuclear facility was experimentally compared with that of silver ion-exchanged synthetic zeolite(AgX), In temperature ranges of$30^{\circ}C$ to $400^{\circ}C$, adsorption capacity of un-impregnated carbon was sharply decreased, but TEDA-impregnated carbon showed similar values of adsorption capacity of AgX even around $100^{\circ}C$. Especially, loading amount of methyl iodide on TEDA carbon up to$250^{\circ}C$ represented higher values compared to un-impregnated carbon. Breakthrough curves of methyl iodide in fixed bed packed with AgX and TEDA-impregnated carbon at high temperature was compared. Removal mechanism of methyl iodide on AgX was proposed, based on analysis of by-product gas generated from adsorption reaction.

  • PDF

A Progressive Metadata Building Methodology based on Data Visibility (데이타 가시성 기반의 점진적 메타데이타 레지스트리 구축 방법론)

  • 정동원;신동길;정은주;이정욱;서태설;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.6
    • /
    • pp.610-622
    • /
    • 2003
  • Metadata Registry was developed to dynamically manage metadata and to increase interoperability between various and heterogeneous metadata. The built metadata registry can be used as a standard guideline for creation of new databases and it provides a radical data integration mechanism. However, in the situation that an enormous databases must be integrated progressively, there is a limit to the existing metadata-based approach. In case that each database has no statistical information for its use rate and the restricted cost is given to us for a unit time, existing metadata-based approaches do not provide how to select some databases to be preferentially integrated and to build a metadata registry progressively, In this paper, we propose a methodology that can create progressively metadata registries in the case. The proposed methodology is based on data visibility and hierarchical metadata registry. We also describe the system that have been developed for applying the methodology to a real domain, and then described its results.

An Agent-based System for Character Motion Animation Control (캐릭터 동작 애니메이션 제어를 위한 에이전트 시스템)

  • Kim, Ki-Hyun;Kim, Sang-Wook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.5
    • /
    • pp.467-474
    • /
    • 2001
  • When user wants to animate more than one character, some unexpected motion animation like a collision between characters may occur. Therefore, this problem must be resolved using a proper control mechanism. Therefore, this problem must be resolved using a proper control mechanism. This paper proposes an agent-based system that controls the motion animation of the character for representing animation scenario reflecting user\`s intention. This system provides a method that coordinates a type of motion and avoids collision between characters according to the moving path of a character in three-dimensional space. Agent communicates with others for motion synchronization. Agent is extended into several intelligent agents that coordinate character\`s motion. Agent system enables not only an intended motion animation, but also the scheduling of motion to an entire character animation. It designs automata model using Petri-net analysis tool for the agent\`s interaction as a method that passes the agent\`s information and infers the current state of agents. We implement this agent system to control the motion of character using agent technology and show an example of controlling the motion of human character model to prove the possiblity of motion control.

  • PDF

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

An Analysis and Reduction Design of Combustion Instability Generated in Hybrid Rocket Motor (하이브리드 로켓 모터의 연소불안정 분석 및 저감 설계)

  • Lee, Jungpyo;Rhee, Sunjae;Kim, Jinkon;Moon, Heejang
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.18 no.4
    • /
    • pp.18-25
    • /
    • 2014
  • In this paper, the mechanism of the combustion instability which may occur in a hybrid rocket motor with a diaphragm was studied. And the new design for a hybrid motor grain was suggested. It could increase a regression rate of solid fuel, and reduce a large pressure oscillation in a hybrid rocket motor with a diaphragm. It was confirmed that the main mechanism of a large pressure oscillation was hole-tone, and it was caused by a collision between a diaphragm and a vortex which was generated in a pre-chamber. And 'Stepped Grain' design which had the mechanism for high regression rate in a motor with a diaphragm and could reduce a combustion instability was suggested.

An Effective Query Rewriting Method in Secure XML Access Control (안전한 XML 접근제어에서 효율적인 질의 재작성 기법)

  • An, Dong-Chan;Byun, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.127-137
    • /
    • 2006
  • We propose two phase filtering scheme to develop an efficient mechanism for XML databases to control query-based access. An access control environment for XML documents and some techniques to deal with fine-grained authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query-based access. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form through a query optimization technique, which is guaranteed to have no access violations using tree-aware metadata of XML schemas. The scheme can be applied to any XML database management system and has several advantages such as small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

  • PDF

Retinoic Acid Potentiates Nitric Oxide-Induced Dedifferentiation through the ERK Pathway in Rabbit Articular Chondrocytes (Retinoic acid의 ERK 신호전달경로를 통한 nitric oxide 유도 연골세포 탈분화 심화 기작)

  • Yu, Seon-Mi;Kim, Song-Ja
    • Journal of Life Science
    • /
    • v.21 no.4
    • /
    • pp.534-541
    • /
    • 2011
  • Retinoic acid (RA), a metabolite of vitamin A, is known to regulate dedifferentiation of rabbit articular chondrocytes. The regulatory mechanism of dedifferentiation by RA is not yet understood. Thus, the effect of RA on the regulation of nitric oxide (NO)-induced dedifferentiation was investigated in rabbit articular chondrocytes. RA caused loss of the differentiated chondrocyte phenotype as demonstrated by inhibition of type II collagen expression and proteoglycan synthesis. RA also accelerated NO-induced dedifferentiation in rabbit articular chondrocytes as detected by expression of type II collagen and Sox-9 using Western blot analysis and production of sulfated proteoglycan using Alcain blue staining. Further, RA potentiated NO-induced activation of ERK. Inhibition of ERK with PD98059 (PD) recovered the expression of type II collagen and Sox-9 and production of sulfate proteoglycan in NO-induced dedifferentiated chondrocytes by RA treatment. Our findings suggest that RA accelerates NO-induced dedifferentiation of rabbit articular chondrocytes via the ERK pathway.

Context-based Web Application Design (컨텍스트 기반의 웹 애플리케이션 설계 방법론)

  • Park, Jin-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.2
    • /
    • pp.111-132
    • /
    • 2007
  • Developing and managing Web applications are more complex than ever because of their growing functionalities, advancing Web technologies, increasing demands for integration with legacy applications, and changing content and structure. All these factors call for a more inclusive and comprehensive Web application design method. In response, we propose a context-based Web application design methodology that is based on several classification schemes including a Webpage classification, which is useful for identifying the information delivery mechanism and its relevant Web technology; a link classification, which reflects the semantics of various associations between pages; and a software component classification, which is helpful for pinpointing the roles of various components in the course of design. The proposed methodology also incorporates a unique Web application model comprised of a set of information clusters called compendia, each of which consists of a theme, its contextual pages, links, and components. This view is useful for modular design as well as for management of ever-changing content and structure of a Web application. The proposed methodology brings together all the three classification schemes and the Web application model to arrive at a set of both semantically cohesive and syntactically loose-coupled design artifacts.

  • PDF