• Title/Summary/Keyword: 환경통제

Search Result 1,395, Processing Time 0.032 seconds

A Design of Mandatory Access Control Mechanism for Firewall Systems (침입차단시스템을 위한 강제적 접근통제 기법 설계)

  • Kim, Jae-Sung;Hong, Ki-Yoong;Kim, Hak-Beom;Sim, Joo-Geol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.967-974
    • /
    • 1998
  • Access control scheme of the firewall systems protects the systems from threats by using the conventional discretionary access control mechanism. The discretionary access control mechanism is insufficient to control secure information flow on the multievel network. Thus, it is necessary to provide the mandatory access control mechanism to the firewall systems for the multilevel security environment. In this paper, we present a design scheme of the security mechanisms concerning the sensitivity label and the mandatory access control for securely processing the multilevel information.

  • PDF

An Analysis of the Implementation of the Maritime Labour Convention, 2006, Through Port State Control (항만국통제를 통한 해사노동협약의 이행실태 분석)

  • Yang, Jinyoung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.1
    • /
    • pp.18-26
    • /
    • 2019
  • The Maritime Labour Convention, 2006, (MLC) aimed to ensure decent working conditions for seafarers and entered into force on August 20, 2013. It was considered as the fourth pillar in the maritime sector. This paper evaluates how the MLC has been implemented in the field and what issues were addressed in the shipping industry. To achieve this, statistical analysis was conducted using inspection data of Port State Control (PSC) carried out by the Paris MOU and the Tokyo MOU during 2010-2012 and 2014-2016 for deficiencies under the MLC and International Labour Organization (ILO) No. 147 Convention. This study compared pre-2013 and post-2013 deficiency data according to ship's age, size (gross tonnage) and type. The results showed that, although the deficiencies reported by the Tokyo MOU during 2014-2016 were nearly double those from 2010-2012, the deficiency share against total deficiencies for the Tokyo MOU remained two thirds of those for the Paris MOU. This study suggests that the Tokyo MOU should strengthen its inspection efforts on MLC and ILO should provide clear references, such as guidelines and a unified interpretation for national discretions under the MLC for the purpose of harmonized PSC inspections. Additionally, it would be desirable to consolidate the deficiency coding system for the MLC by deleting the codes for the ILO No. 147 Convention, which was incorporated into the MLC. It would also be beneficial to add new deficiency codes for social security, including seafarers' leave and repatriation.

Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD (효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석)

  • Lee, Min Choul;Kim, Jeongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.271-282
    • /
    • 2015
  • In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.

Access Control Mechanism based on MAC for Cloud Convergence (클라우드 융합을 위한 MAC 정책 기반 접근통제 메커니즘)

  • Choi, Eun-Bok;Lee, Sang-Joon
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • Cloud computing technology offers function that share each other computer resource, software and infra structure based on network. Virtualization is a very useful technology for operation efficiency of enterprise's server and reducing cost, but it can be target of new security threat when it is used without considering security. This paper proposes access control mechanism based on MAC(Mandatory Access Control) for cloud convergence that solve various problem that can occur in cloud environment. This mechanism is composed of set of state rules, security characteristics and algorithm. Also, we prove that the machine system with access control mechanism and an initial secure state is a secure system. This policy module of mechanism is expected to not only provide the maintenance but also provide secure resource sharing between virtual machines.

A System for Supporting The Cyber Security Control of I&C System (제어계측 시스템 환경에서의 사이버 보안 통제 지원 시스템)

  • Jung, Hyun-Mi;Kim, Seok-Hun;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.442-448
    • /
    • 2013
  • I&C (Instrumentation & Control) system is different from information system and the security design of the two systems are also different. The modeling activity is needed based on the security control guide in order to build I&C system security control. In this paper, the role and by the security control, we designed the relationship (that is, the relation schema) between the documents for 'The system for supporting the cyber security control of I&C system design' based on the security control guide. The designed schema plans 'The system for supporting the cyber security control of I&C system' for observing the security control guide, and is used as the database and content that supports its design and implementation. The process and system of the proposed schema is utilized and designed. The design of the schema and system is intensified in the design phase with the proposed mode and supporting the I&C system cyber security design.

Developing an AR based Command Post eXercise(CPX) Simulator (증강현실 기반 지휘통제훈련 시뮬레이터 개발)

  • Park, Sangjun;Shin, Kyuyoung;Kim, Dongwook;Kim, Tai Hyo;Roh, Hyo Bin;Lee, Wonwoo
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.53-60
    • /
    • 2018
  • As science and technology develops, it is expected that more precise and various weapons will be used in a much more complicate future battlefield environment. C4I is a system that provides the proper and necessary information to commanders and their staffs to recognize the battlefield situation by connecting and visualizing the complex battlefield environment and various weapon systems together. Commanders and staffs perform battle command training based on a computer or paper map to better utilize the C4I system and Command Post eXercise(CPX) is a process of the training. This is the way for them to improve command control and decision making skills. Analyzing of line of sight(LOS), identifying communication fringe area, deploying troop strength, and determining unit maneuver are highly restricted under the 2D based CPX. In recent years, however, three-dimensional (3D) CPX simulators have been developed to overcome these drawbacks. In response to this trend, this paper proposes a multi-user based CPX simulator using augmented reality (AR) glass, which can be used as a practical war game simulator.

  • PDF

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.

금융 어플리케이션을 위한 효율적인 역할추출과 안전한 역할기반 접근통제 적용 방안

  • Jeong, Seong-Min
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.49-61
    • /
    • 2008
  • IT기술의 변화에 따라 금융기관의 정보보호 또한 안정성을 보장하면서도 새로운 비즈니스모델에 적합한 보안대책이 요구되고 있다. 금융 어플리케이션의 보안은 정보의 기밀성, 무결성, 가용성을 만족하는 안전하고 신뢰할 수 있는 시스템과 네트워크, 그리고 보안사고에 큰 비중을 차지하고 있는 내부 사용자에 대한 적절한 권한 부여와 접근통제가 요구되어진다. 정당한 사용자가 접근하여 발생하는 보안 문제, 즉 내부자에 의한 악의적인 행위나 오용, 실수 등에 의한 기업의 피해는 외부자에 의한 의도적인 공격보다 피해 규모가 크다. 따라서 정당한 사용자로 인증을 받았다고 할지라도 업무처리에 있어서 필요한 최소한의 권한만을 부여하는 것이 필요한 것이다. 이를 위해 금융기관에 적합한 접근통제가 필요하다. 역할기반 접근통제는 적용범위가 제한적인 강제적 접근통제와 분산된 보안관리로 중앙에서 통제가 어려운 자율적 접근통제의 단점을 보완하고, 실제 업무처리에 적합한 특성을 갖는다. 하지만 기존 역할기반 접근통제를 금융기관의 다양한 금융 어플리케이션에 적용하면 다음과 같은 문제가 발생할 수 있다. 첫째, 금융 어플리케이션에서 사용되는 역할 추출 및 관리가 어렵다. 둘째, 다양한 비즈니스모델이 원하는 직무분리가 복잡하고 어렵다. 셋째, 악의적인 내부 사용자가 역할을 변조하여 과도한 권한을 가질 수 있다. 따라서 본 논문에서는 기존의 역할기반 접근통제에 인사정보 연동을 통한 효율적인 역할 추출 및 분류방안과 역할관리, 직무분리의 세분화 그리고 역할의 안전한 관리를 위해 X.509기반의 권한관리 기반구조(PMI)를 이용한 권한관리 기술을 금융 어플리케이션 환경에 효율적으로 적용하는 방안을 제시한다.

방송.통신융합 환경에서 저작권 보호를 위한 디지털 콘텐츠관리 및 응용 기술 (저작권보호와 공정사용의 기술적 한계와 제약을 중심으로)

  • Gang, Jang-Muk
    • Broadcasting and Media Magazine
    • /
    • v.14 no.3
    • /
    • pp.58-65
    • /
    • 2009
  • 방송 통신 융합 환경의 도래는 뉴미디어 산업 발전의 기회이며 동시에 저작권의 위기이다. 반면 저작권은 오랜 기간 논의된 문제였음에도, 제도적으로 기술적으로 해결되지 못한 미완의 숙제로 남아있다. 이 글은 저작권 보호와 공정 사용이 문화발전이라는 공동의 목적을 가지고 있음을 논증하고 융합 환경에 대한 구조 분석을 시도한다. 이를 통해 저작권 보호 기술이 가지는 한계와 제약을 검토한다. 또한 OWL로 표현된 관계 기반의 저작물 추적 및 통제 기술을 새롭게 제안한다. 특히 접근 통제 기술인 DRM을 시맨틱하게 설계할 수 있는 저작권 보호 기술의 속성과 특성에 대한 분석을 소개함으로 향후 디지털 콘텐츠 관리 및 응용 기술 구현에 도움을 주고자한다.

Research on Relationship between Drivers' Self-control, Driving Behavior and Driving Stress (운전자의 자기통제력, 운전행동과 운전스트레스의 관련성)

  • Hwang, Do-Yeon;Kim, Hee-Dong;Baek, Ji-Young
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.5
    • /
    • pp.229-238
    • /
    • 2019
  • The aim of the research is to investigate relationship between drivers' self-control, driving behavior and driving stress. 180 people who have driver's licence and have experiences in driving in Gwangju and Jeonnam area participated for the research. The survey was conducted from 29th April 2015 to 24th July 2015 and data was analysed to figure out the relationship between drivers' self-control, driving behavior and driving stress. As a result, Firstly, drivers' self-control affected mistakes, violations, errors of driving behavior, and driving environment, traffic regulations, accident control, time pressure of driving stress. It showed a statistical significant difference and the higher drivers' self-control is, the lower sub construct factor of driving behavior and driving stress. Secondly, those factors of drivers' self-control, driving behavior and driving stress were correlated. The result showed the relationship between drivers' self-control, driving behavior and driving stress. It is also possible to utilize the information to prevent car accidents. Finally, it is expected to do research further by expanding the participants into multiple areas of people.