• Title/Summary/Keyword: Access Control Software

Search Result 220, Processing Time 0.031 seconds

A Study on the Improvement of Security Enhancement for ZTNA (보안성 강화를 위한 ZTNA운영 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.21-26
    • /
    • 2024
  • The security model in the previous network environment has a vulnerability in which resource access control for trusted users is not properly achieved using the Perimeter model based on trust. The Zero Trust is an absolute principle to assume that the users and devices accessing internal data have nothing to trust. Applying the Zero Trust principle is very successful in reducing the attack surface of an organization, and by using the Zero Trust, it is possible to minimize damage when an attack occurs by limiting the intrusion to one small area through segmentation. ZTNA is a major technology that enables organizations to implement Zero Trust security, and similar to Software Defined Boundary (SDP), ZTNA hides most of its infrastructure and services, establishing one-to-one encrypted connections between devices and the resources they need. In this study, we review the functions and requirements that become the principles of the ZTNA architecture, and also study the security requirements and additional considerations according to the construction and operation of the ZTNA solution.

Improvement Plan of NFRDI Serial Oceanographic Observation (NSO) System for Operational Oceanographic System (운용해양시스템을 위한 한국정선해양관측시스템 발전방향)

  • Lee, Joon-Soo;Suh, Young-Sang;Go, Woo-Jin;Hwang, Jae-Dong;Youn, Seok-Hyun;Han, In-Seong;Yang, Joon-Yong;Song, Ji-Young;Park, Myung-Hee;Lee, Keun-Jong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.16 no.3
    • /
    • pp.249-258
    • /
    • 2010
  • This study seeks to improve NFRDI Serial Oceanographic observation (NSO) system which has been operated at current observation stations in the Korean Seas since 1961 and suggests the direction of NSO for practical use of Korean operational oceanographic system. For improvement, data handling by human after CTD (Conductivity-Temperature-Depth) observation on the deck, data transmission, data reception in the land station, and file storage into database need to be automated. Software development to execute QA/QC (Quality Assurance/Quality Control) of real-time oceanographic observation data and to transmit the data with conversion to appropriate format automatically will help to accomplish the automation. Inmarsat satellite telecommunication systems with which have already been equipped on board the current observation vessels can realize the real-time transmission of the data. For the near real-time data transmission, CDMA (Code Division Multiple Access) wireless telecommunication can provide efficient transmission in coastal area. Real-time QA/QC procedure after CTD observation will help to prevent errors which can be derived from various causes.

A Study on Automatic Precision Landing for Small UAV's Industrial Application (소형 UAV의 산업 응용을 위한 자동 정밀 착륙에 관한 연구)

  • Kim, Jong-Woo;Ha, Seok-Wun;Moon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.27-36
    • /
    • 2017
  • In almost industries, such as the logistics industry, marine fisheries, agriculture, industry, and services, small unmanned aerial vehicles are used for aerial photographing or closing flight in areas where human access is difficult or CCTV is not installed. Also, based on the information of small unmanned aerial photographing, application research is actively carried out to efficiently perform surveillance, control, or management. In order to carry out tasks in a mission-based manner in which the set tasks are assigned and the tasks are automatically performed, the small unmanned aerial vehicles must not only fly steadily but also be able to charge the energy periodically, In addition, the unmanned aircraft need to land automatically and precisely at certain points after the end of the mission. In order to accomplish this, an automatic precision landing method that leads landing by continuously detecting and recognizing a marker located at a landing point from a video shot of a small UAV is required. In this paper, it is shown that accurate and stable automatic landing is possible even if simple template matching technique is applied without using various recognition methods that require high specification in using low cost general purpose small unmanned aerial vehicle. Through simulation and actual experiments, the results show that the proposed method will be made good use of industrial fields.

A Development of the Unified Object-Oriented Analysis and Design Methodology for Security-Critical Web Applications Based on Object-Relational Database - Forcusing on Oracle11g - (웹 응용 시스템 개발을 위한 보안을 고려한 통합 분석·설계 방법론 개발 - Oracle11g를 중심으로 -)

  • Joo, Kyung-Soo;Woo, Jung-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.169-177
    • /
    • 2012
  • In the development process of application systems, the most important works are analysis and design. Most of the application systems are implemented on database system. So, database design is important. Also, IT System are confronted with more and more attacks by an increase interconnections between IT systems. Therefore security-related processes belong to a very important process. Security is a complex non-functional requirement that can interaction of many parts in the system. But Security is considered in the final stages of development. Therefore, Their increases the potential for the final product to contain vulnerabilities. Accordingly, Early in development related to security analysis and design process is very important. J2EE gives a solution based on RBAC((Role Based Access Control) for security and object-relational database also has RBAC for security. But there is not a object-oriented analysis and design methodology using RBAC of J2EE and object-relational database for security. In this paper, the unified object-oriented analysis and design methodology is developed for security-critical web application systems based on J2EE and object-relational database. We used UMLsec and RBAC of object-relational database and J2EE for this methodology.

A research on the Construction and Sharing of Authority Record-focusing on the Case of Social Networks and Archival Context Project (전거레코드 구축 및 공유에 관한 연구 SNAC 프로젝트 사례를 중심으로)

  • Lee, Eun Yeong
    • The Korean Journal of Archival Studies
    • /
    • no.71
    • /
    • pp.49-89
    • /
    • 2022
  • This study suggests the necessity and domestic application plan a national authority database that promotes an integrated access, richer search, and understanding of historical information sources and archival resources distributed among cultural heritage institutions through the "Social Networks and Archive Context" project case. As the SNAC project was transformed into an international cooperative organization led by NARA, it was possible to secure a sustainable operating system and realize cooperative authority control. In addition, SNAC authority records have the characteristics of providing richer contextual information about life and history and social and intellectual network information compared to libraries. Through case analysis, First, like SNAC, a cooperative body led by the National Archives and having joint ownership of the National Library of Korea should lead the development and expand the scope of participating institutions. Second, in the cooperative method, take a structure in which divisions are made for each field with special strengths, but the main decision-making is made through the administrative team in which the two organizations participate. Third, development of scalable open source software that can collect technical information in various formats when constructing authority data, designing with the structure and elements of archival authority records, designing functions to control the quality of authority records, and building user-friendly interfaces and the need for a platform design reflecting content elements.

The research and Development trends of Telecommunications of the End of the 20th Century(Present) and the Beginning of the 21st Century(Future) (20세기 말과 21세기 초의 전기통신의 연구개발동향)

  • 조규심
    • Journal of the Korean Professional Engineers Association
    • /
    • v.29 no.2
    • /
    • pp.15-23
    • /
    • 1996
  • With the ever-increasing importance of high-speed information in society as we move towards the 21 st century, telecommunication laboratories of advanced nations are pressing forward with research and development aimed at implementing its W & P(Visual Intelligent and Personal) services and construction of a new network to support them. In legals to the former, based on a long-term view of technological and market trends, those laboratories are researching and developing services that will make possible an effective progression from the development of services that answer to potential needs towards the full-scale implementation of VI & P services. In regards to the latter, these laboratories are responding in a flexible manner to the increasing diversity and disposal of the communications environment by separating the network into a transmission system and a versatile information control/conversion -ion system and laboratories are working at enhancing the performance of both. Within these board aims, the laboratories are currently focusing our attention in three areas : the technology for a high-speed broadband transmission system featuring optical frequency multiplexing and ATM techniques, network and software technologies for advanced information control and conversion, and technology for constructing a new access network that can provide a comprehensive range of multimedia services. This article describes the laboratories' concept of how VI & P services will develop in the future, and the latest trends in the field of communications. It also describes the ideal configuration of the new network and discusses the important technological aspects of how it is to be constructed. Finally, it presents the results of the laboratories'recent research which include some innovative work, point out the areas requiring future investigation.

  • PDF

Monitoring of Mythimna separata Adults by Using a Remote-sensing Sex Pheromone Trap (원격감지 성페로몬트랩을 이용한 멸강나방(Mythimna separata) 성충 예찰)

  • Jung, Jin Kyo;Seo, Bo Yoon;Cho, Jum Rae;Kim, Yong
    • Korean journal of applied entomology
    • /
    • v.52 no.4
    • /
    • pp.341-348
    • /
    • 2013
  • We desinged and evaluated a remote-sensing sex pheromone trap for real-time monitoring of Mythimna separata (Lepidoptera: Noctuidae), a migratory insect in Korea. The system consisted of a modified cone-trap with a sex pheromone lure, a sensing module based on light interruption, a signal transmission module based on code division multiple access, a main electronic board for system control, a power supply based on a solar collector, a stainless steel-pole supporting the system, and a signal collection and display system based on an internet web page. The ratio (>92%) of the actual number of insects to the signal number in the remote-sensing trap was improved by sensing only within a limited period at night on the basis of the insect's circadian rhythm, control of signal sensitivity on the basis of sensing software programming, 1-h interval for signal transmission, and adjustment of the signal transmission program. The signal occurrence pattern in the remote-sensing trap was conclusively similar (correlation coefficient, >0.98) to the actual pattern of adult occurrence in the trap. The result indicated that the remote-sensing trap based on the attraction of the sex pheromone lure for M. separata has a promising potential for practical use. Occurrence of M. separata adults was observed several times in 2011 and 2012, and the peaks were sharp.

DEVELOPMENT OF THE READOUT CONTROLLER FOR INFRARED ARRAY (적외선검출기 READOUT CONTROLLER 개발)

  • Cho, Seoung-Hyun;Jin, Ho;Nam, Uk-Won;Cha, Sang-Mok;Lee, Sung-Ho;Yuk, In-Soo;Park, Young-Sik;Pak, Soo-Jong;Han, Won-Yong;Kim, Sung-Soo
    • Publications of The Korean Astronomical Society
    • /
    • v.21 no.2
    • /
    • pp.67-74
    • /
    • 2006
  • We have developed a control electronics system for an infrared detector array of KASINICS (KASI Near Infrared Camera System), which is a new ground-based instrument of the Korea Astronomy and Space science Institute (KASI). Equipped with a $512{\times}512$ InSb array (ALADDIN III Quadrant, manufactured by Raytheon) sensitive from 1 to $5{\mu}m$, KASINICS will be used at J, H, Ks, and L-bands. The controller consists of DSP(Digital Signal Processor), Bias, Clock, and Video boards which are installed on a single VME-bus backplane. TMS320C6713DSP, FPGA(Field Programmable Gate Array), and 384-MB SDRAM(Synchronous Dynamic Random Access Memory) are included in the DSP board. DSP board manages entire electronics system, generates digital clock patterns and communicates with a PC using USB 2.0 interface. The clock patterns are downloaded from a PC and stored on the FPGA. UART is used for the communication with peripherals. Video board has 4 channel ADC which converts video signal into 16-bit digital numbers. Two video boards are installed on the controller for ALADDIN array. The Bias board provides 16 dc bias voltages and the Clock board has 15 clock channels. We have also coded a DSP firmware and a test version of control software in C-language. The controller is flexible enough to operate a wide range of IR array and CCD. Operational tests of the controller have been successfully finished using a test ROIC (Read-Out Integrated Circuit).

Implementation of User-friendly Intelligent Space for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 사용자 친화적 지능형 공간 구현)

  • Choi, Jong-Moo;Baek, Chang-Woo;Koo, Ja-Kyoung;Choi, Yong-Suk;Cho, Seong-Je
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.443-452
    • /
    • 2004
  • The paper presents an intelligent space management system for ubiquitous computing. The system is basically a home/office automation system that could control light, electronic key, and home appliances such as TV and audio. On top of these basic capabilities, there are four elegant features in the system. First, we can access the system using either a cellular Phone or using a browser on the PC connected to the Internet, so that we control the system at any time and any place. Second, to provide more human-oriented interface, we integrate voice recognition functionalities into the system. Third, the system supports not only reactive services but also proactive services, based on the regularities of user behavior. Finally, by exploiting embedded technologies, the system could be run on the hardware that has less-processing power and storage. We have implemented the system on the embedded board consisting of StrongARM CPU with 205MHz, 32MB SDRAM, 16MB NOR-type flash memory, and Relay box. Under these hardware platforms, software components such as embedded Linux, HTK voice recognition tools, GoAhead Web Server, and GPIO driver are cooperated to support user-friendly intelligent space.

A Security SoC embedded with ECDSA Hardware Accelerator (ECDSA 하드웨어 가속기가 내장된 보안 SoC)

  • Jeong, Young-Su;Kim, Min-Ju;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1071-1077
    • /
    • 2022
  • A security SoC that can be used to implement elliptic curve cryptography (ECC) based public-key infrastructures was designed. The security SoC has an architecture in which a hardware accelerator for the elliptic curve digital signature algorithm (ECDSA) is interfaced with the Cortex-A53 CPU using the AXI4-Lite bus. The ECDSA hardware accelerator, which consists of a high-performance ECC processor, a SHA3 hash core, a true random number generator (TRNG), a modular multiplier, BRAM, and control FSM, was designed to perform the high-performance computation of ECDSA signature generation and signature verification with minimal CPU control. The security SoC was implemented in the Zynq UltraScale+ MPSoC device to perform hardware-software co-verification, and it was evaluated that the ECDSA signature generation or signature verification can be achieved about 1,000 times per second at a clock frequency of 150 MHz. The ECDSA hardware accelerator was implemented using hardware resources of 74,630 LUTs, 23,356 flip-flops, 32kb BRAM, and 36 DSP blocks.