• Title/Summary/Keyword: ID management system

Search Result 197, Processing Time 0.032 seconds

The Development of a Management System for the Safe Handling of Chemicals and Health Protection Using Reporting Data under the Chemical Control Act (화학물질관리법 조사·보고자료를 활용한 화학물질취급 안전보건관리에 대한 효율적인 체계 마련)

  • Jeon, DaYoung;Hwang, ManSik;Im, JiYoung;Ryu, JiSung;Kim, YoungHo;Lee, JiHo
    • Journal of Environmental Health Sciences
    • /
    • v.46 no.2
    • /
    • pp.232-244
    • /
    • 2020
  • Objectives: The purpose of this study is to develop a management system for the safe handling of chemicals and related health management based on reporting under the Chemical Control Act (CCA). It is used to search handling information by constructing data linked to the name of companies, chemicals, products, etc. Methods: Due to the differences in submission periods for each reporting regulation of the Chemical Control Act, the data used is as follows: A statistical survey collected 26,222 companies in 2014 and 2016, Pollutant Release Transfer Registers (PRTR) collected 4,234 companies in 2015-2017, performance reports by handlers of hazardous chemical substances collected 14,658 companies in 2016-2018, and declarations for import of toxic chemicals collected 892 companies in 2016-2017. The total information on 36,080 companies is standardized based on company ID, name, business registration number, address, and more. The data were classified into information such as company, chemical, and product name and amounts handled and released, and then extracted according to criteria to establish relationships among classified information. Results: A search service was developed for handling information on chemical substances for reporting data by linking four reporting data: statistical survey, PRTR, performance report by handler of hazardous chemical substances, and declaration for import of toxic chemicals under the CCA. It was composed of five menus to search by regulation type, reporting regulation, companies and chemicals, and system management. Conclusion: It is necessary to use data linked by company, region, and chemical to respond and to prevent chemical accidents. In addition, these items can be utilized to perform handling and safety management of chemicals according to whether regulations under the CCA may be implemented.

A Study on CVE Improvement Plans to improve Cloud Service Security (클라우드 서비스 보안성 향상을 위한 CVE 개선 방안 연구)

  • Kim Taekyung;Jung Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.2
    • /
    • pp.39-46
    • /
    • 2023
  • The rise in popularity of cloud services has brought about a heightened concern for security in the field of cloud computing. As a response, governments have implemented CSAP(Cloud Security Assurance Program) to ensure the security of these services. However, despite such measures, the emergence of various security vulnerabilities persists, resulting in incidents related to cloud security breaches. To address this, the utilization of Common Vulnerabilities and Exposures (CVE) has been proposed as a means to facilitate the sharing of vulnerability information across different domains. Nevertheless, the unique characteristics of cloud services present challenges in assigning CVE IDs to the diverse range of vulnerabilities within the cloud environment. In this study, we analyzed how CVE can be effectively employed to enhance cloud security. The assignment of a CVE ID is contingent upon the fulfillment of three rules in the Counting Decision and five rules in the Inclusion Decision. Notably, the third rule in the Inclusion Decision, INC3, clashes with the nature of cloud services, resulting in obstacles in assigning CVE IDs to various cloud vulnerabilities. To tackle this issue, we suggest the appointment of designated individuals who would be responsible for overseeing specific areas of cloud services, thereby enabling the issuance of CVE IDs. This proposed approach aims to overcome the challenges associated with the unique characteristics of cloud services and ensure the seamless sharing of vulnerability information. Information sharing regarding vulnerabilities is crucial in the field of security, and by incorporating cloud vulnerabilities into the CVE system, this method can contribute to enhancing the security of cloud services.

Construction of Design Pattern Retrieval System using Pattern Information (패턴 정보를 이용한 설계패턴 검색 시스템 구축)

  • 김귀정;송영재
    • The KIPS Transactions:PartD
    • /
    • v.8D no.1
    • /
    • pp.88-98
    • /
    • 2001
  • in this paper, we imlemented design pattern retrieval system for efficient managemant and reusability of design patterns. Pattern is conssisted of property information and meta information id used for similarity measurement on classification and retrieval of patterns.Meta information od used for UML modeling of patterns. We classified design patterns with the empirical scope in addition to Gamma's basic classification. also we used E-SARM for retrieval represented UML diagram with pattern meta information, and simulated the environment so as to obtain best result on applying to retrieval of design pattern. This system is able ro resister new patterns through pattern viewer and manages these patterns with property informaiton and meta information. Thus this system supports efficient management of patterns, UML modeling, priority pattern retrieval, higher reusability and reduces pattern selection cost.

  • PDF

Performance Modeling of an EPC Information Service System

  • Kim, So-Jung;Kang, Yong-Shin;Son, Kyung-Won;Lee, Yong-Han;Rhee, Jong-Tae;Hong, Sung-Jo
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.3
    • /
    • pp.285-293
    • /
    • 2010
  • To obtain visible and traceable information from the supply chain, HW/SW standards for the EPC global network, which process electronic product code (EPC) data read from Radio frequency identification (RFID) tags, are regarded as the de facto industry standard. Supply chain participants install information service systems and provide logistics information to partners by following the EPCglobal architecture framework. Although quality of service (QoS) is essential for providing dependable and scalable services as pointed out by Auto-ID Lab, only a few models for the performance analysis of QoS-related work have been developed in the context of EPC information service systems. Specifically, doing so allows alternative design choices to be tested in an easy and cost-effective manner and can highlight potential performance problems in designs long before any construction costs are incurred. Thus, in this study we construct a model of an EPC information service system for the purposes of performance analysis and designing a dependable system. We also develop a set of building blocks for analytical performance models. To illustrate how the model works, we determine the characteristics of an EPC information service system and then select a combination of these proven modeling concepts. We construct a performance model that considers the response time and shows how to derive meaningful performance values. Finally, we compare the analytical results to measurements of the EPC information service system.

A Study on the Establishment of the Comprehensive Academic Contents Linking System: Focusing on KISTI (학술 콘텐츠 종합링킹체제 구축에 관한 연구 - KISTI를 중심으로 -)

  • Kim, Juseop;Jeon, Yerin;Kim, Suntae
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.493-519
    • /
    • 2021
  • The purpose of this study is to propose a plan to implement the comprehensive linking system centered on identifiers in order to provide seamless academic information services to researchers. To achieve this goal, interviews were conducted with 17 researchers from five centers and one secretariat belonging to KISTI. The contents of the interview are about the establishment and management status of the identifier of the academic information service DB. As a result of the interview, it was found that the identification rate for identifiers such as KOI was high in the case of domestic articles DB, but the identification rate for global identifiers such as ORCID was low in the case of foreign articles DB except for DOI. To solve this problem, this study proposes the council for joint use of a comprehensive linking system to build the comprehensive linking system model centered on identifiers. The joint use council will be organized around domestic academic information distribution institutions, and the council is expected to discover and implement new services through ID linkage by collecting foreign identifiers.

An Authentication Scheme for Emergency Vehicle Priority Transit Service in VANET (VANET 기반의 긴급 차량 우선통과 서비스를 위한 인증 기법)

  • Yoon, Young-Kyun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10C
    • /
    • pp.749-757
    • /
    • 2008
  • In this paper, we propose an authentication scheme for EVPT (Emergency Vehicle Priority Transit) service in Vehiclar Ad-hoc Networks (VANET) enable a variety of vehicle comfort services, traffic management applications, and infotainment services. These are the basis for a new generation of preventive and active safety functions. By intelligently controlling signalling at intersections, providing additional information to the driver and warning the driver in critical situations. we therefore focus on vehicle-to-infrastructure communication for the authentication between emergency vehicles and traffic lights system. This authentication process should identify the vehicle, and provide privacy protection.

User Authentication Based on Keystroke Dynamics of Free Text and One-Class Classifiers (자유로운 문자열의 키스트로크 다이나믹스와 일범주 분류기를 활용한 사용자 인증)

  • Seo, Dongmin;Kang, Pilsung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.42 no.4
    • /
    • pp.280-289
    • /
    • 2016
  • User authentication is an important issue on computer network systems. Most of the current computer network systems use the ID-password string match as the primary user authentication method. However, in password-based authentication, whoever acquires the password of a valid user can access the system without any restrictions. In this paper, we present a keystroke dynamics-based user authentication to resolve limitations of the password-based authentication. Since most previous studies employed a fixed-length text as an input data, we aims at enhancing the authentication performance by combining four different variable creation methods from a variable-length free text as an input data. As authentication algorithms, four one-class classifiers are employed. We verify the proposed approach through an experiment based on actual keystroke data collected from 100 participants who provided more than 17,000 keystrokes for both Korean and English. The experimental results show that our proposed method significantly improve the authentication performance compared to the existing approaches.

Development of Management System for the Distribution Facilities using RFID (RFID를 이용한 공가시설물 관리시스템 구현)

  • Lim, Yong-Hoon;Ju, Seong-Ho;Choi, Moon-Suk;Park, Jae-Yeon
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.594-595
    • /
    • 2007
  • RFID(Radio Frequency IDentification)는 사물에 ID태그를 부착하여 정보를 제공하는 것을 기능으로 하여 점차적으로 센싱 기능을 추가하여 발전하고 있다. 본 연구에서는 배전 공가설비인 통신케이블을 관리하기 위하여 RFID를 이용하여 감시 및 순시 정보를 기록, 관리하며 봉인을 위한 지그비 센서태그를 이용하여 무단으로 설치되는 통신케이블을 실시간으로 감시할 수 있는 공가관리시스템을 구현하였다. 570만 전주에 달하는 공가설비를 관리하는 것은 안정적인 전력 공급을 위하여서도 필요하며 공가설비 관리의 IT화를 도모하여 RFID 비즈니스 모델로 활용할 수 있을 것으로 기대된다. 본 연구에서는 이를 위해 전주나 통신케이블에 전자태그를 부착하여 RFID 미들웨어를 통해 데이터를 수집하고 정보시스템에 접속하여 실시간으로 공가시설물 정보를 취득할 수 있는 정보시스템을 구축함으로써 무단 공가설비 설치 감시 및 공가설비 순회 점검 결과를 관리할 수 있도록 데이터베이스에 반영하여 현장의 공가설비내역과 정보시스템의 데이터베이스를 동기화시켜 실시간으로 현황을 파악할 수 있도록 개발하였다.

  • PDF

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

A climbing movement detection system through efficient cow behavior recognition based on YOLOX and OC-SORT (YOLOX와 OC-SORT 기반의 효율적인 소 행동 인식을 통한 승가 운동 감지시스템)

  • LI YU;NamHo Kim
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.18-26
    • /
    • 2023
  • In this study, we propose a cow behavior recognition system based on YOLOX and OC-SORT. YOLO X detects targets in real-time and provides information on cow location and behavior. The OC-SORT module tracks cows in the video and assigns unique IDs. The quantitative analysis module analyzes the behavior and location information of cows. Experimental results show that our system demonstrates high accuracy and precision in target detection and tracking. The average precision (AP) of YOLOX was 82.2%, the average recall (AR) was 85.5%, the number of parameters was 54.15M, and the computation was 194.16GFLOPs. OC-SORT was able to maintain high-precision real-time target tracking in complex environments and occlusion situations. By analyzing changes in cow movement and frequency of mounting behavior, our system can help more accurately discern the estrus behavior of cows.