• Title/Summary/Keyword: ITS Security

Search Result 3,160, Processing Time 0.035 seconds

Construction of Security MIB for EDI System

  • Park Tae-Kyou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.1
    • /
    • pp.23-37
    • /
    • 1998
  • This paper considers the design and management of security MIB for EDI system. EDI system has to establish various securety wervices and mechanisms to protect against security threats. Hence, the EDIsystem requires appropriate security management to monitor and control the security obhects for its security services and mechanisms. In this paper, I identify security objects for management of secueity services defined in the EDIsystem, and propose the design of a security MIB and describe the use of SNMPnetwork management protocol in its management.

Separation of Concerns Security Model of Component using Grey Box (그레이박스를 사용한 컴포넌트의 관심사 분리 보안 모델)

  • Kim, Young-Soo;Jo, Sun-Goo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.163-170
    • /
    • 2008
  • As the degree of dependency and application of component increases, the need to strengthen security of component is also increased as well. The component gives an advantage to improve development productivity through its reusable software. Even with this advantage, vulnerability of component security limits its reuse. When the security level of a component is raised in order to improve this problem, the most problematic issue will be that it may extend its limitation on reusability. Therefore, a component model concerning its reusability and security at the same time should be supplied. We suggest a Separation of Concerns Security Model for Extension of Component Reuse which is integrated with a wrapper model and an aspect model and combined with a reuse model in order to extend its security and reusability by supplying information hiding and easy modification, and an appropriate application system to verify the model's compatibility is even constructed. This application model gives the extension of component function and easy modification through the separation of conceits, and it raise its security as doll as extends its reusability.

  • PDF

The Main Negative Factors of Military Influence on the Economic Environment of the Region and its Financial and Economic Security

  • Sytnyk, Yosyf;Havrychenko, Dmytro;Staverska, Tetiana;Primush, Roman;Erfan, Vitalii
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.241-245
    • /
    • 2022
  • The main purpose of the study is to determine the main factors influencing the economic environment of the region and its financial and economic security. Ukraine aspires to become a full member of the European Union, but the events of 2022 have changed everything. Full-scale military operations on the territory of Ukraine significantly affect its socio-economic situation Today, the issue of studying the negative impact of military operations on the economic environment is very relevant. Based on the results of the study, we have identified the main negative factors of the military impact on the economic environment of the region and its financial and economic security.

Chinese Naval Power Build-up and Measures for Regional Maritime Cooperation (중국의 해군력 발전과 지역 해양안보 협력 방안)

  • Park, Chang-Hee
    • Strategy21
    • /
    • s.40
    • /
    • pp.162-189
    • /
    • 2016
  • This research deals with the PLAN's capabilities and its implication for regional security, and suggests some measures for maritime security cooperation among regional states. China has began to focus its national strategy more on 'rising as a new maritime power' since the 18th Party Convention in November 2012. Chinese new strategy aims at building a strong navy, contributing economic prosperity and national security, and thus elevating its prestige in international society. Most of all, building a strong navy is the foremost task at this time, and that is why the PLAN has the priority for military modernization. Chinese new maritime strategy could cause naval arms race in East Asia and aggravate maritime territorial disputes among concerned parties. It is the time for regional states to discuss some measures to build confidence, such as arms control of naval weapons, establishment of multilateral maritime security mechanism, and foundation of regional security regime, thus enhancing regional maritime cooperation.

A Security Platform based on CORBA and its Application (CORBA 기반의 보안 플렛폼과 그 응용)

  • Na, Jung-Chan;Kim, Yeong-Gyun;Kim, Gyeong-Beom;Kim, Myeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3278-3288
    • /
    • 1999
  • This paper proposes a security platform, called SCAP(Security platform for CORBA based APplication), to cope with potential threats in a distributed object system. SCAP supports CORBA security specification announced by OMG. SCAP is comprised of four functional blocks, which co-work with ORB to provide security services: Authentication Block, Association Block, Access Control Block, and Security Information Management Block. It is designed to support Common Secure Interoperability Functionality Level 2, which is useful for large-scale intra-, or inter-network based applications. Actual security services, which are dependent on supporting security technology, will be provided as external security service for replace ability. Implementation issues such as how to simulate an interceptor mechanism using a commercial ORB product without source code, and how to extend Current object required for security services are also described. At the end of the paper, the SCAP applied to the web environment is described to show its practical utilization.

  • PDF

A Study on the ITS integrated airport security system (ITS 통합 공항 보안시스템에 관한 고찰)

  • Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.2
    • /
    • pp.339-344
    • /
    • 2013
  • Airport security activities to ensure the airport's facilities and assets from crime, such as theft, to prevent. security systems that support these activities efficiently so you can be called. security center systems, CCTV systems, access control systems, intrusion detection systems, security communication systems, warning broadcasting system, network security systems, perimeter intrusion detection systems, search systems, and information security systems for the security system will be examined.

Maritime Security of the Republic of Korea: year 1998 and year 2018 (한국의 해양안보: 1998년과 2018년)

  • Jung, Ho-Sub
    • Strategy21
    • /
    • s.43
    • /
    • pp.57-88
    • /
    • 2018
  • Security situations are fundamentally and rapidly changing on the Korean Peninsula. Above all, as North Korea(NK) is heightening its nuclear and missile capabilities, Republic of Korea(ROK) is facing an existential threat. At the same time, as China's economic, diplomatic and military power is quickly rising, the balance of power is shifting and strategic competition between the Unite States(US) and China is accelerating in the Asia-Pacific region. Under the pressure of development of these situations, ROK seems to face allegedly the most serious crisis in its national security since the end of the Korean War. In the current grim geopolitical situation, maritime security may become the most difficult security challenge for ROK in the years to come. The purpose of this paper is to compare major changes in maritime security affairs of the ROK during last twenty years from 1998 until now(2018). 1998 was when this journal 『Strategy 21』 was published for the first time by the Korea Institute for Maritime Strategy. Then, this paper tries to identify challenges and risks with which this country has to deal for its survival and prosperity, and to propose some recommendations for the government, the Navy, and the Coast Guard as they are responsible for the maritime security of the country. The recommendations of this paper are as follows: strengthen ROK-US alliance and expand security cooperation with regional powers in support of the maintenance of the current security order in the region; building-up of maritime security capacity in preparation for crisis on the maritime domain with the navy targeting to acquire 'a non-nuclear, balance-of-terror capability, to improve interoperability with the Coast Guard based on 'a national fleet,' and to actively pursue innovation in naval science and technology. Finally, this paper proposes that naval capability the country needs in another twenty years depends on how effectively and rigorously the navy put its utmost efforts towards building 'a strongest navy' today.

A Study on the Security Mechanism to Reduce Authentication Time in Wireless LAN(IEEE 802.11) (Wireless LAN(IEEE 802.11)에서 인증시간 단축을 위한 보안 메커니즘에 관한 연구)

  • Hong, Kyung-Sik;Seo, Jong-Soo;Ko, Kwang-Yong;Jung, Jun-Ha;Lee, Choul-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.6
    • /
    • pp.112-120
    • /
    • 2009
  • Both security enhancement in wireless and fast access for mobility are required to employ wireless LAN in ITS (Intelligent Transportation Systems). However, for the case of employing IEEE 802.11i security standard, it is known that the user authentication procedure of IEEE 802.1x and 4-way handshake procedure for stronger security enforcement may not be suitable for ITS due to its large delay. In this paper, we propose fast authentication method to resolve the above authentication delay problem, and verify its performance via simulation analysis.

  • PDF

The Study on Education and Training System for the Special Security Guards' Specialization (특수경비원 전문화를 위한 교육훈련제도 개선방향)

  • Kim, Jong-Woong;Lee, Sang-Chul
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.69-89
    • /
    • 2008
  • As year passes, terrorism is gradually increasing. Its target has becom various and arbitary, and recently, terrorists are aiming for national major facilities wich include multiplex facilities. Although special security guards took charge of its defence system from 2002, they have failed to establish its system firmly due to some institutional inertia. And 'Professionalism' appeared to be the mattter, according to the spot-probe and interviews. The purpose of this essay is to devise measures to develop sepecial security system including its specialization through investigating current educational training system. In order to attain professionalism, establishment of new proffessional school, division of current education system(into common education and full-course education), and reinforcement of substantial inspection activity should be preceded. Moreover, inspection activity should include standards for engaging instructors, establishment of compilation committee for editorial supervision, and establishment of clear educational policy. I hope the developmental measures in this essay to be speedily actualized with endeavor from police, security association, academic circles.

  • PDF

The Use of Internet of Things and Innovation of the Private Security (사물인터넷의 활용과 민간시큐리티의 혁신)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.101-109
    • /
    • 2017
  • The Internet of things is a system that connects and communicates all sorts of things such as people, objects, and data. It's to create and share information by its own each other. It can be used to enhance the function of private security and has brought about innovative development of private security. The Internet of things is a system that allows devices connected to the Internet to communicate independently of people-objects, objects-objects connected to the Internet. That and can be used in many industries, especially in the private security sector, its value is high. The use of the Internet of things to private security sector can reinforce security zones with always-on surveillance systems, also be enhanced by its own preparedness and response to the situation. However, this study will discusse the application and development of private security in the Internet of things. The practical application of the virtual space is an immediate task and it is also an essential factor in securing security.