• Title/Summary/Keyword: 확장식별자

Search Result 82, Processing Time 0.027 seconds

A Comparative Study on Off-Path Content Access Schemes in NDN (NDN에서 Off-Path 콘텐츠 접근기법들에 대한 성능 비교 연구)

  • Lee, Junseok;Kim, Dohyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.12
    • /
    • pp.319-328
    • /
    • 2021
  • With popularization of services for massive content, the fundamental limitations of TCP/IP networking were discussed and a new paradigm called Information-centric networking (ICN) was presented. In ICN, content is addressed by the content identifier (content name) instead of the location identifier such as IP address, and network nodes can use the cache to store content in transit to directly service subsequent user requests. As the user request can be serviced from nearby network caches rather than from far-located content servers, advantages such as reduced service latency, efficient usage of network bandwidth, and service scalability have been introduced. However, these advantages are determined by how actively content stored in the cache can be utilized. In this paper, we 1) introduce content access schemes in Named-data networking, one of the representative ICN architectures; 2) in particular, review the schemes that allow access to cached content away from routing paths; 3) conduct comparative study on the performance of the schemes using the ndnSIM simulator.

Study on Zero Trust Architecture for File Security (데이터 보안을 위한 제로 트러스트 아키텍처에 대한 연구)

  • Han, Sung-Hwa;Han, Joo-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.443-444
    • /
    • 2021
  • Security threats to information services are increasingly being developed, and the frequency and damage caused by security threats are also increasing. In particular, security threats occurring inside the organization are increasing significantly, and the size of the damage is also large. A zero trust model has been proposed as a way to improve such a security environment. In the zero trust model, a subject who has access to information resources is regarded as a malicious attacker. Subjects can access information resources after verification through identification and authentication processes. However, the initially proposed zero trust model basically focuses on the network and does not consider the security environment for systems or data. In this study, we proposed a zero trust-based access control mechanism that extends the existing zero trust model to the file system. As a result of the study, it was confirmed that the proposed file access control mechanism can be applied to implement the zero trust model.

  • PDF

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

A Trustworthiness Improving Link Evaluation Technique for LOD considering the Syntactic Properties of RDFS, OWL, and OWL2 (RDFS, OWL, OWL2의 문법특성을 고려한 신뢰향상적 LOD 연결성 평가 기법)

  • Park, Jaeyeong;Sohn, Yonglak
    • Journal of KIISE:Databases
    • /
    • v.41 no.4
    • /
    • pp.226-241
    • /
    • 2014
  • LOD(Linked Open Data) is composed of RDF triples which are based on ontologies. They are identified, linked, and accessed under the principles of linked data. Publications of LOD data sets lead to the extension of LOD cloud and ultimately progress to the web of data. However, if ontologically the same things in different LOD data sets are identified by different URIs, it is difficult to figure out their sameness and to provide trustworthy links among them. To solve this problem, we suggest a Trustworthiness Improving Link Evaluation, TILE for short, technique. TILE evaluates links in 4 steps. Step 1 is to consider the inference property of syntactic elements in LOD data set and then generate RDF triples which have existed implicitly. In Step 2, TILE appoints predicates, compares their objects in triples, and then evaluates links between the subjects in the triples. In Step 3, TILE evaluates the predicates' syntactic property at the standpoints of subject description and vocabulary definition and compensates the evaluation results of Step 2. The syntactic elements considered by TILE contain RDFS, OWL, OWL2 which are recommended by W3C. Finally, TILE makes the publisher of LOD data set review the evaluation results and then decide whether to re-evaluate or finalize the links. This leads the publishers' responsibility to be reflected in the trustworthiness of links among the data published.

Using 3-Dimensional Simulation for Environmently Friendly Road (친환경적도로에 대한 3차원시뮬레이션 적용)

  • Oh Il-Oh;Choi Hyun;Kang In-Joon
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2006.04a
    • /
    • pp.425-429
    • /
    • 2006
  • 본 연구는 VGIS(Virtual Geographic Information System)을 이용, 환경친화적인 도로건설을 위해 실제 좌표를 사용하므로 3차원 도로의 선형과 구조물을 설계하였다. 그리고 시공 중에 발생 할 수 있는 민원문제 및 설계변경 시 효율적인 의사결정 할 수 있도록 하였다. 대상지역은 전라남도 장흥군의 최대 역점사업인 관광을 테마로 한 정남진 가는 길을 컨셉으로 한 '가고 싶은 길', '보고싶은 다리', 기억하고픈 터널'을 주제로 설계하였으며 명실공히 남도의 새로운 관광명소가 될 자연관광도로가 될 것으로 기대된다. 기존의 3차원 설계에서는 평면적인 선형과 구조물의 형상을 이해하는데 상당한 시간이 소요되었지만, 구조물을 3차원으로 설계함으로써, 비전문가라도 구조물을 쉽게 파악 할 수 있었다. 그리고 3차원 설계는 기존 구조물과 신설될 구조물 사이에 공사 중 발생할 수 있는 환경 및 민원문제를 사전에 파악할 수 있었다. 또한, 실제와 같이 구현된 도로와 구조물의 시뮬레이션을 통하여 기존의 각종 의사 결정에 있어 보다 시각적 효과를 증진시켜 효율적인 의사결정을 가능하게 하였다. 본 연구에서는 실제 평면 설계에 쓰이는 좌표값을 3차원설계에 적용하였다. 도로 노선 및 경관분석에 많은 도움이 될 것으로 보이며 VGIS를 이용하므로 도시계획, 식물, 토양. 수로 또는 도로형태, 홍수계획 등 많은 일들이 평가에 사용된다. 여기서는 구조물 3차원 설계에 관한 기초적인 연구를 시행하였으며, 3차원설계를 통해 의사결정시 효율적인 판단을 할 수 있었고, 환경 친화적 시공 및 설계에 대한 연구가 이루어져야 될 것으로 판단된다.안전관리를 위해 채석장에 안전표지판을 설치하여야 하며, 실내가공 작업장의 자동이동시스템을 작업별로 채색하여 식별을 용이하게 하여야 하겠다. 또한 이 연구 결과를 영세사업장의 산업간호프로그램인 'Clean 3D'사업에서 적용하여 우리나라 채석사업장 근로자 건강관리를 발전시켜야 하겠다. 확장기 혈압에서 RZS와 DAD의 일치도와 평균을 중심으로 더 넓게 퍼져있어 낮은 일치도를 보였으며 또 DAD와 RMS의 혈압치는 숫자 선호도를 볼 수 있는데 특히 RMS는 더 뚜렷하게 나타났는데 확장기 혈압의 최빈치(30.6)는 100mmHg이었다. 혈압치들이 가장 가까이 "0"점으로 치우쳐져 있었다. RZS의 Central tendency는 DAD와 RMS보다 뚜렷하였다. 결론적으로 RZS는 이 연구목적으로 가장 적절함을 보여준다.청소년들의 학교급식에 대한 만족도를 높이기 위해서 다음과 같은 제언을 하고자 한다. 먼저, 학교급식에 대한 식단 작성 시 학생들이 학교에서 제공되기 원하는 식단에 대한 의견을 받고 그 의견에 대한 결과를 게시하여 학생들이 제공되기 원하는 식단을 급식 시 제공하여 학생들이 식단선택에 동참할 수 있는 기회를 주는 것이 바람직하겠다. 또한 영양사는 학급의 반대표와의 정기적인 모임을 가짐으로서 학생들의 불만사항 및 개선 요구사항에대해 서로 의견을 교환하여 설문지조사가 아닌 직접적인 대화를 하여 문제점을 파악하고자 하는 적극적인 자세가 필요하겠다. 특히 아침식사의 결식 빈도가 높았고 이는 급식성과에 부정적인 영향을 줄 뿐 아니라 학교에서 제공하는 음식의 섭취정도에도 영향을 주고 있으므로 학생들에게 학부모와 전담교사 및 학교영양사는 학생들

  • PDF

Image Quality Analysis According to the of a Linear Transducer (선형 탐촉자에서 관심 시각 영역 변화에 따른 화질 분석)

  • Ji-Na, Park;Jae-Bok, Han;Jong-Gil, Kwak;Jong-Nam, Song
    • Journal of the Korean Society of Radiology
    • /
    • v.16 no.7
    • /
    • pp.975-984
    • /
    • 2022
  • Since a linear transducer has an area of interest equal to the length of the transducer, the area of interest can be expanded using the virtual convex function installed in the device.However, it was thought that the change in the direction of the ultrasonic sound velocity according to the change in the visual area of interest would affect the image quality, so this was objectively confirmed. For this study, image evaluation and SNR·CNR of the phantom for ultrasound quality control were measured. As a result, in the phantom image evaluation, both images were able to identify structures in functional resolution, grayscale, and dynamic range. However, it was confirmed that the standard image was excellent in the reproducibility of the size and shape of the structure. As a result of SNR·CNR evaluation, SNR·CNR of most trapezoidal images was low, except for structures at specific locations. In addition, through the statistical analysis graph, it was further confirmed that the SNR and CNR for each depth decreased as the size of the cystic structure decreased. Through this study, it was confirmed that the use of the function has the advantage of providing a wide visual area of interest, but it has an effect on the image quality. Therefore, when using the virtual convex function, it is judged that the examiner should use it in an appropriate situation and conduct various studies to acquire high-quality images and to improve the understanding and proficiency of the equipment.

The Status of North Korean Airspace after Reunification (북한 공역의 통일 후 지위)

  • Kwon, Chang-Young
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.287-325
    • /
    • 2017
  • Considering the development of aerospace, military science and technology since the 20th century, the sky is very important for the nation's existence and prosperity. The proverb "Whosoever commands the space commands the world itself!" emphasizes the need for the command of the air. This essay is the first study on the status of airspace after reunification. First, the territorial airspace is over the territory and territorial sea, and its horizontal extent is determined by the territorial boundary lines. Acceptance of the present order is most reasonable, rather than attempting to reconfigure through historical truths about border issues, and it could be supported by neighboring countries in the reunification period. For peace in Northeast Asia, the reunified Korea needs to respect the existing border agreement between North Korea and China or Russia. However, the North Korean straight baselines established in the East Sea and the Yellow Sea should be discarded because they are not available under United Nations Convention on the Law of the Sea. It is desirable for the reunified Korea to redefine the straight baselines that comply with international law and determine the territorial waters up to and including the 12-nautical mile outside it. Second, the Flight Information Region (hereinafter "FIR") is a region defined by the International Civil Aviation Organization (hereinafter "ICAO") in order to provide information necessary for the safe and efficient flight of aircraft and the search and rescue of aircraft. At present, Korea is divided into Incheon FIR which is under the jurisdiction of South Korea and Pyongyang FIR which is under the jurisdiction of North Korea. If North Korea can not temporarily exercise control of Pyongyang FIR due to a sudden change of circumstances, it is desirable for South Korea to exercise control of Pyongyang FIR, and if it is unavoidable, ICAO should temporarily exercise it. In reunified Korea, it is desirable to abolish Pyongyang FIR and integrate it into Incheon FIR with the approval of ICAO, considering systematic management and control of FIR, establishment of route, and efficiency of management. Third, the Air Defense Identification Zone (hereinafter "ADIZ") is a zone that requires easy identification, positioning, and control of aircraft for national security purposes, and is set up unilaterally by the country concerned. The US unilaterally established the Korea Air Defense Identification Area (KADIZ) by the Declaration of Commitment on March 22, 1951. The Ministry of Defense proclaimed a new KADIZ which extended to the area including IEODO on December 13, 2013. At present, North Korea's military warning zone is set only at maritime boundaries such as the East Sea and the Yellow Sea. But in view of its lack of function as ADIZ in relations with China and Russia, the reunified Korea has no obligation to succeed it. Since the depth of the Korean peninsula is short, it is necessary to set ADIZ boundary on the outskirts of the territorial airspace to achieve the original purpose of ADIZ. Therefore, KADIZ of the reunified Korea should be newly established by the boundary line that coincides with the Incheon FIR of the reunified Korea. However, if there is no buffer zone overlapping with or adjacent to the ADIZs of neighboring countries, military tensions may rise. Therefore, through bilateral negotiations for peace in Northeast Asia, a buffer zone is established between adjacent ADIZs.

  • PDF

Design and Performance Evaluation of Open Information Retrieval Service System (개방형 정보검색시스템의 설계 및 성능분석)

  • Kim, Dong-Won;Ryu, Won;Jeon, Kyung-Pyo;Bae, Hyeon-Deok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1812-1821
    • /
    • 1996
  • In this paper, firstly we describe the structure and the performance of our ICPS(Information Communicaion Processing System) which currently provides information retrieval services, and then make a proposal for the construction of the open-networking information communication infra-structure which enables us to fully pre-pare for the emerging information society. In detail, the structure and the methodology needed for the implementation of the billing function on behalf of all information providers by using the user access network number as a user identification number while guaranteeing the equivalent access to the multiple value-added networks, are suggested. Based on the above ideas, the AICPS(Advanced Information Communication Processing System) has been designed and implemented. Final system performance evaluation with the assumption of a poling system as a system model, shows that our system can handle 10,000 user simultaneously who are using V.34 28.8 kbps modems and the processing capacity is 288,000 packet/sec. This result is so far superior to our target performance established during the desingning procedure. Namely, our system was originally designed to accommodate only 960 users at the same time. By taking advantage of this excessive high performance of our system, many other users can easily access the new services which are accessible only throught the ISDN or the Internet.

  • PDF

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Proposal for a Custody and Federated Service Model for the Decentralized Identity (분산 ID 보관 및 연계 서비스 모델 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.513-525
    • /
    • 2020
  • Until today, the personal information of subjects has been centralized in many companies or institutions. However, in recent days, the paradigm has gradually changed in the direction that subjects control their personal information and persue their self-sovereignty. Globally, individual data sovereignty is strengthened by the European Union's General Data Protection Regulation(GDPR) and the US California Consumer Privacy Act(CCPA). In Korea, a few alliances consist of various companies are creating technology research and service application cases for decentralized ID service model. In this paper, the current decentralized ID service model and its limitations are studied, and a improved decentralized ID service model that can solve them is proposed. The proposed model has a function of securely storing decentralized ID to the third party and a linkage function that can be interoperated even if different decentralized ID services are generated. In addition, a more secure and convenient model by identifying the security threats of the proposed model and deriving the security requirements, is proposed. It is expected that the decentralized ID technology will be applied not only to the proof of people but also to the device ID authentication management of the IoT in the future.