• Title/Summary/Keyword: 보안부

Search Result 632, Processing Time 0.026 seconds

A Study on the Enhancement Process of the Telecommunication Network Management using Big Data Analysis (Big Data 분석을 활용한 통신망 관리 시스템의 개선방안에 관한 연구)

  • Koo, Sung-Hwan;Shin, Min-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6060-6070
    • /
    • 2012
  • Real-Time Enterprise (RTE)'s key requirement is that it should respond and adapt fast to the change of the firms' internal and external situations including the change of market and customers' needs. Recently, the big data processing technology to support the speedy change of the firms is spotlighted. Under the circumstances that wire and wireless communication networks are evolving with an accelerated rate, it is especially critical to provide a strong security monitoring function and stable services through a real-time processing of massive communication data traffic. By applying the big data processing technology based on a cloud computing architecture, this paper solves the managerial problems of telecommunication service providers and discusses how to operate the network management system effectively.

A Study on the Encrypted Scheme Using Key Management Method Based on the Random Number Rearrangement for the Effective E-Document Management (효율적인 전자문서 관리를 위한 난수 재배열 기반의 키 관리 방법을 이용한 암호화 기법에 관한 연구)

  • Kim, Tae-Wook;Sung, Kyung-Sang;Kim, Jung-Jae;Min, Byoung-Muk;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.575-582
    • /
    • 2009
  • With all merits of electronic documents, there exist threats to the security such as illegal outflow, destroying, loss, distortion, etc. The techniques to protect the electronic documents against illegal forgery, alteration, removal are strongly requested. Even though various security technologies have been developed for electronic documents, most of them are emphasized to prevention of forgery or repudiation. This paper presents some problems in cryptography technologies currently used in the existing electronic document systems, and offer efficient methods to adopt cryptography algorithms to improve and secure the electronic document systems. To validate performance of the proposed random rearrangement method comparing with the existing cryptographies, basic elements have been compared, and it has been proved that the proposed method gives better results both in security and efficiency.

The Development of Attendance Management System Using the RFID (RFID를 이용한 출석관리 시스템 개발)

  • Park, So-Hee;Moon, Byeong-Cheoul
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.2
    • /
    • pp.139-146
    • /
    • 2007
  • Today, using RFID(Radio Frequency Identification) card is extended in diversity as medical treatment, circulation market, military affairs, manufacture, security, etc. The RFID technology is an automatic identification method, relying on storing and remotely retrieving data for the purpose of identification using radio waves. This advantage of the RFID will be as a replacement for traditional Barcoding. Besides, book-lending system and attendance management system become the center of educational institution in interest. This paper presents a attendance management system using the RFID card which provides directly information of attendance for professors with mobile and students with web. Also, the students only have ID card that embed RFID tag which is recognized attendance through DB that storages to is received a information of student from RFID card Reader. And it is possible management or report for attendance and time table not only for professors by management program but also for students by web program.

  • PDF

Factors Affecting Information Protection Efforts for Preventing Deviant Behavior of Adolescent in Cyber Space (사이버 일탈행위 예방을 위한 개인 정보보호 노력의 영향요인 연구)

  • Um, Myoungyong;Park, Jin-Hee;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.5
    • /
    • pp.31-41
    • /
    • 2005
  • The purpose of this study is to identify the determinants of planned behavior of adolescent, toward information security and cyber crime prevention. A survey methodology was used to investigate a proposed model of influence, and regression analysis was used to analyze the results. The hypothesized model was largely supported by this analysis, and the overall results indicate that the intention to actively participate in information security and cyber crime prevention is mostly influenced by the fear for cyber crime and the perceived usefulness of information security and cyber crime prevention activity. In addition, it was found that the perceived easy of use for information-security related ICT skill, fear for cyber crime, and social norm for information security influence the level of usefulness, but that the prior experience with information leaking was statistically insignificant factor to the level of usefulness and fear for crime. Useful suggestions for promoting information security and cyber crime prevention are also provided.

  • PDF

Stewart Platform-Based Master System for Tele-Operation of a Robot Arm (로봇 팔의 원격제어를 위한 스튜어트 플랫폼 기반의 조작장치)

  • Lee, Sang-Duck;Yu, Hong-Sun;Ahn, Kuk-Hyun;Song, Jae-Bok;Kim, Jong-Won;Ryu, Jae-Kwan
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.39 no.2
    • /
    • pp.137-142
    • /
    • 2015
  • Teleoperation of a robot arm working in hazardous environments has been studied in the field of defense and security. A master system is an essential part that plays an important role in the teleoperation. We developed a master system, which is an essential part in the teleoperation, so that it can operate the slave robot arm intuitively and has excellent mobility and portability compared to conventional master systems. The master system adopted a Stewart platform to minimize the size and weight, and the legs of the Stewart platform are composed of wires to improve the operation range of the system. The experimental validation of the developed master system is conducted with a commercial IMU, and the experimental results show that the proposed master system can perform reliable and dexterous teleoperation.

A Time Constraints Permission Based Delegation Model in RBAC (RBAC을 기반으로 하는 시간제한 권한 위임 모델)

  • Kim, Tae-Shik;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.163-171
    • /
    • 2010
  • RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. Delegation is a mechanism of assigning access rights to a user. RBDM0 and RDM2000 models deal with user-to-user delegation. The unit of delegation in them is a role. However, RBAC does not process delegation of Role or Permission effectively that occurs frequently in the real world. This paper proposes a Time Constraints Permission-Based Delegation Model(TCPBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. TCPBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation with time constraints. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.

CUDA Acceleration of Super-Resolution Algorithm Using ELBP Classifier for Fisheye Images (광각 영상을 위한 ELBP 분류기를 이용한 초해상도 기법과 CUDA 기반 가속화)

  • Choi, Ji Hoon;Song, Byung Cheol
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.10
    • /
    • pp.84-91
    • /
    • 2016
  • Most recently, the technology of around view monitoring(AVM) system or the security systems could provide users with images by using a fisheye lens. The filmed images through fisheye lens have an advantage of providing a wider range of scenes. On the other hand, filming through fisheye lens also has disadvantages of distorting images. Especially, it causes the sharpness of images to degrade because the edge of images is out of focus. The influence of a blur still remains at the end of the range when the super-resolution techniques is applied in order to enhance the sharpness. It degrades the clarity of high resolution images and occurs artifacts, which leads to deterioration in the performance of super-resolution algorithm. Therefore, in this paper we propose self-similarity-based pre-processing method to improve the sharpness at the edge. Additionally, we implement the acceleration in the GPU environment of entire algorithm and verify the acceleration.

An Group-based Security Protocol for Machine Type Communications in LTE-Advanced (LTE-Advanced에서의 Machine Type Communications을 위한 그룹 기반 보안 프로토콜)

  • Choi, Dae-Sung;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.885-896
    • /
    • 2013
  • MTC(Machine Type Communications), providing a variety of services anytime and anywhere by connecting the cellular network to the machine and things without human intervention, is being considered as a major challenge of the next-generation communications. Currently, When a massive MTC devices simultaneously connect to the network, each MTC device needs an independent access authentication process. Because of this process, authentication signaling congestion and overload problems will cause in LTE-Advanced. In this paper, we propose a group-based authentication protocol and a key management protocol. For managing the MTC devices as group units, the proposed protocol elects a group leader and authentications only once with the core network. After the authentication is completed, a group leader manages the rest members and MME(Mobility Management Entity) by constructing a binary tree. Finally, the propose protocol analysis show that the proposed protocol not only can reduces the authentication signaling which generated in between the MTC devices and the core network but also can manages the MTC devices, efficiently.

Parallelization and Performance Optimization of the Boyer-Moore Algorithm on GPU (Boyer-Moore 알고리즘을 위한 GPU상에서의 병렬 최적화)

  • Jeong, Yosang;Tran, Nhat-Phuong;Lee, Myungho;Nam, Dukyun;Kim, Jik-Soo;Hwang, Soonwook
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.2
    • /
    • pp.138-143
    • /
    • 2015
  • The Boyer-Moore algorithm is a single pattern string matching algorithm that is widely used in various applications such as computer and internet security, and bioinformatics. This algorithm is computationally demanding and requires high-performance parallel processing. In this paper, we propose a parallelization and performance optimization methodology for the BM algorithm on a GPU. Our methodology adopts an algorithmic cascading technique. This results in significant reductions in the mapping overheads for the threads participating in the parallel string matching. It also results in the efficient utilization of the multithreading capability of the GPU which improves the load balancing among threads. Our experimental results show that this approach achieves a 45-times speedup at maximum, in comparison with a serial execution.

A Case Study of Mainframe Load Reduction Using The Client and Server Model (클라이언트/서버 모델에 의한 메인프레임 부하 분산 사례연구)

  • 고광병;공승욱;권기목;강창언
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.8
    • /
    • pp.1628-1639
    • /
    • 1994
  • In order to increase the utilization of the computing resources, universities connect a variety of computing resources such as mainframes, workstations, and personal computers via LAN. However, due to management and security reasons, most administrative applications are concentrated on mainframes which is the main cause of large work overload on mainframes for such applications as on-line course registration system where the entire student body must have access to the system during a short period of time. In this study, using a university system as the model and choosing on-line course registration system as the targeted distributed computing. APPC through IBM SNALU 6.2 link is proposed as the most appropriate means of distributed computing for the environment of the model university. In addition, the on-line course registration system is redesigned as client-server model where a mainframe serves as the file server responsible for file input and output and workstations becomes the client. Actual implementation and experiments have shown that the proposed distributed computing system yields a significant reduction in processing time.

  • PDF