• 제목/요약/키워드: Hierarchical Security

검색결과 269건 처리시간 0.024초

정보통신 분야 종사자의 내부마케팅노력이 서비스품질에 미치는 효과 (The Relationship between Internal Marketing and Service Quality in Telecommunication Sector)

  • 안관영
    • 한국품질경영학회:학술대회논문집
    • /
    • 한국품질경영학회 2007년도 춘계학술대회
    • /
    • pp.439-443
    • /
    • 2007
  • This paper is to investigate the relationship between international marketing and service quality, and the moderating effect of gender in that relationship. The data to make an empirical analysis were gathered from 269 workers in telecommunication sector. Multiple regression analysis revealed that (1) education was positively related with tangibility, reliability, responsiveness, empathy, assurance, and (2) internal communication was positively related with tangibility, reliability, responsiveness, assurance, and (3) delegation of authority was positively related with assurance. Hierarchical multiple regression analysis revealed that (4) compensation was more positively related with reliability in woman, and (5) employment security was more positively related with assurance in man.

  • PDF

콘텐츠 중심 네트워킹의 콘텐츠 이름 인코딩 기법 (A Content-Name Encoding Scheme for CCN)

  • 김대엽
    • 한국멀티미디어학회논문지
    • /
    • 제17권6호
    • /
    • pp.697-705
    • /
    • 2014
  • For enhancing network efficiency, content-centric networking (CCN) allows network nodes to temporally cache a transmitted response message(Data) and then to directly respond to a request message (Interest) for previously cached contents. Also, CCN is designed to utilize a hierarchical content-name for transmitting Interest/Data instead of a host identity like IP address. This content-name included in Interest/Data reveals both content information itself and the structure of network domain of a content source which is needed for transmitting Interest/Data. To make matters worse, This content-name is human-readable like URL. Hence, through analyzing the content-name in Interest/Data, it is possible to analyze the creator of the requested contents. Also, hosts around the requester can analyze contents which are asked by the requester. Hence, for securely implementing CCN, it is essentially needed to make the content-name illegible. In this paper, we propose content-name encoding schemes for CCN so as to make the content-name illegible and evaluate the performance of our proposal.

EMS를 중추로 한 급전종합자동화 시스템

  • 김영한;이강완
    • 전기의세계
    • /
    • 제35권11호
    • /
    • pp.699-709
    • /
    • 1986
  • 전력계통 운용상 점차 고도의 기술이 요구됨에 따라 급전제어소에 설치되는 컴퓨터시스템도 많은 자료를 빠른 시간내에 처리할 수 있도록 대용량의 고속용 계산기가 채용되고 있으며, 이용기술면에서도 온라인 조류계산을 기본으로한 여러가지 진보된 응용기능을 갖추어 가고 있다. 1960년대말 디지탈컴퓨터시스템이 전력계통운용의 자동화를 위하여 특수하게 설계되어 이용된 이래 비약적인 발전을 거듭하면서 최근에는 안전제어(Security Control), 협조계획(Interactive Planning) 그리고 계층제어(Hierarchical Control) 등의 다양한 기능에 의해 전체 전력계통의 안전운용과 효율적운용을 기할 수 있도록 에너지관리시스템(EMS: Energy Management System)이 개발되었으며 세계적으로 많은 전력회사들이 종래에 사용해 오던 AGC/SCADA기능위주의 시스템에서 이 시스템으로 교체해 가고 있다. 우리나라의 한국전력공사에서도 최신기술의 EMS를 도입하기 위한 사업이 1987년 중반기를 준공목표로 1986, 10월말 현재 전체공정의 약 85%가 추진되고 있는데, 여기에서는 이에 관련하여 먼저 EMS의 기술동향과 설계방법에 관해 살펴보고 다음에 한전 EMS의 특징에 대하여 소개하고자 한다.

  • PDF

SAHCA에 관한 연구 (A Study on Single Attractor Hierarchical Cellular Automata)

  • 조성진;최언숙;황윤희;김한두;김석태
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 춘계학술발표대회
    • /
    • pp.513-516
    • /
    • 2005
  • 셀룰라 오토마타가 비트단위로 데이터가 처리되는데 비하여 계층적 셀룰라 오토마타는 바이트 단위 또는 그 이상의 단위로 데이터를 처리할 수 있다. 본 논문에서는 GF($2^p$) 위에서의 유한체 성질을 이용하여 한 개의 트리로 구성되는 계층적 비그룹 셀룰라 오토마타인 SAHCA의 성질에 대하여 분석한다. 또한 기본경로를 이용한 선형 SAHCA의 상태전이 그래프를 구성하는 방법과 선형 SAHCA의 상태전이 그래프를 이용하여 비선형인 여원 SAHCA의 상태전이 그래프를 구성하는 알고리즘을 제안한다.

  • PDF

Mobile Ad - hoc Network에서 CP - SVM을 이용한 침입탐지 (Intrusion Detection Algorithm in Mobile Ad-hoc Network using CP-SVM)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제8권2호
    • /
    • pp.41-47
    • /
    • 2012
  • MANET has vulnerable structure on security owing to structural characteristics as follows. MANET consisted of moving nodes is that every nodes have to perform function of router. Every node has to provide reliable routing service in cooperation each other. These properties are caused by expose to various attacks. But, it is difficult that position of environment intrusion detection system is established, information is collected, and particularly attack is detected because of moving of nodes in MANET environment. It is not easy that important profile is constructed also. In this paper, conformal predictor - support vector machine(CP-SVM) based intrusion detection technique was proposed in order to do more accurate and efficient intrusion detection. In this study, IDS-agents calculate p value from collected packet and transmit to cluster head, and then other all cluster head have same value and detect abnormal behavior using the value. Cluster form of hierarchical structure was used to reduce consumption of nodes also. Effectiveness of proposed method was confirmed through experiment.

MANET에서 규칙을 기반으로 한 계층형 침입 탐지에 관한 연구 (The Study of Hierarchical Intrusion Detection Based on Rules for MANET)

  • 정혜원
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.153-160
    • /
    • 2010
  • MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.

Differential Game Based Air Combat Maneuver Generation Using Scoring Function Matrix

  • Park, Hyunju;Lee, Byung-Yoon;Tahk, Min-Jea;Yoo, Dong-Wan
    • International Journal of Aeronautical and Space Sciences
    • /
    • 제17권2호
    • /
    • pp.204-213
    • /
    • 2016
  • A differential game theory based approach is used to develop an automated maneuver generation algorithm for Within Visual Range (WVR) air-to-air combat of unmanned combat aerial vehicles (UCAVs). The algorithm follows hierarchical decisionmaking structure and performs scoring function matrix calculation based on differential game theory to find the optimal maneuvers against dynamic and challenging combat situation. The score, implying how much air superiority the UCAV has, is computed from the predicted relative geometry, relative distance and velocity of two aircrafts. Security strategy is applied at the decision-making step. Additionally, a barrier function is implemented to keep the airplanes above the altitude lower bound. To shorten the simulation time to make the algorithm more real-time, a moving horizon method is implemented. An F-16 pseudo 6-DOF model is used for realistic simulation. The combat maneuver generation algorithm is verified through three dimensional simulations.

MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구 (A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제9권1호
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.

An Architecture for Key Management in Hierarchical Mobile Ad-hoc Networks

  • Rhee, Kyung-Hyune;Park, Young-Ho;Gene Tsudik
    • Journal of Communications and Networks
    • /
    • 제6권2호
    • /
    • pp.156-162
    • /
    • 2004
  • In recent years, mobile ad-hoc networks have received a great deal of attention in both academia and industry to provide anytime-anywhere networking services. As wireless networks are rapidly deployed, the security of wireless environment will be mandatory. In this paper, we describe a group key management architecture and key agreement protocols for secure communication in mobile ad-hoc wireless networks (MANETs) overseen by unmanned aerial vehicles (UAVs). We use implicitly certified public keys method, which alleviates the certificate overhead and improves computational efficiency. The architecture uses a two-layered key management approach where the group of nodes is divided into: 1) Cell groups consisting of ground nodes and 2) control groups consisting of cell group managers. The chief benefit of this approach is that the effects of a membership change are restricted to the single cell group.

보안시스템을 위한 비용 기반 계층적 결함허용모텔 (Cost based Hierarchical Fault Tolerence Model for Security System)

  • 정유석;박눌;홍만표
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2002년도 가을 학술발표논문집 Vol.29 No.2 (1)
    • /
    • pp.460-462
    • /
    • 2002
  • 시스템 침입은 정보통신기술의 비약적인 발전에 따른 정보화의 역기능으로, 이론 해결하기 위한 다양한 방법들이 제안되어 왔다. 그러나 최근 침입 패러다임의 변화로 인해 기존 방법으로 해결하지 못하는 공격이 발생했으며, 그중 보안 시스템 우회나 보안 시스템 자체에 대한 공격은 기존 보안 도구를 무력화시킬 수도 있다. 본 논문에서는 이를 해결하기 위한 방법으로 고전적인 결함허용 기법을 응용한 결함허용 기능을 정의하고 이를 이용한 계층적 시스템 모델을 제안한다. 또한, 보안 시스템의 특성에 맞는 결함 허용 기능 선택을 위한 기준으로 비용 기반 선택 모델을 제안한다.

  • PDF