• Title/Summary/Keyword: Integrity Check

Search Result 154, Processing Time 0.024 seconds

The Model of Appraisal Method on Authentic Records (전자기록의 진본 평가 시스템 모형 연구)

  • Kim, Ik-Han
    • The Korean Journal of Archival Studies
    • /
    • no.14
    • /
    • pp.91-117
    • /
    • 2006
  • Electronic Records need to be appraised the authenticity as well as the value itself. There has been various kinds of discussion about how records to be appraised the value of themselves, but there's little argument about how electronic records to be appraised the authenticity of themselves. Therefore this article is modeling some specific authenticity appraisal methods and showing each stages those methods should or may be applied. At the Ingest stage, integrity verification right after records creation in the organization which produced the records, quality and integrity verification about the transferred in the organization which received the records and integrity check between SIP and AIP in the organization which received and preserved the records are essential. At the Preservation stage, integrity check between same AIPs stored in different medium separately and validation of records where or not damaged and recovery damaged records are needed. At the various Processing stages, suitability evaluation after changing the record's management control meta data and changing the record's classification, integrity check after records migration and periodical validation and integrity verification about DIPs are required. For those activities, the appraisal methods including integrity verification, content consistency check, suitability evaluation about record's meta data, feasibility check of unauthorized update and physical status validation should be applied to the electronic records management process.

A Study on Intrusion Protection Techniques against Linux Kernel Backdoor (리녹스 커널 백도어 침업에 대한 차단 기법 연구)

  • Kim, Jin-Taek;Kho, Jeong-Ho;Hong, Min-Seok;Son, Choul-Woong;Park, Beom;Lee, Do-Won;Lee, Geuk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.201-207
    • /
    • 2009
  • As the existing backdoor worked at user mode, which is application mode, it was possible to check the existence of backdoor by the integrity check of system file. However, for the backdoor using kernel module, it is impossible to check its existence by the integrity check of system file. Even various programs were presented to protect this LKM Kernel backdoor, there is limitation in protection as they examine the changes on the system Call Table. This study, recognizing the danger of invasion through such LKM Kernel backdoor, will provide alternative for the limitation which the existing integrity check couldn't prevent intrusion through Kernel backdoor.

  • PDF

A Rule-Based Database Verification System Based on the Integrity Constranints (무결성 제약에 기초한 규칙 기반 데이타베이스 검증 시스템)

  • Ryu, Myeong-Chun;Park, Chang-Hyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.77-86
    • /
    • 1996
  • In managing a certain database, the integrity of data is very important. The important. The integrity constrains thus should be considered carefully when a database is designed and, after the database is created, it is required for a database manager to check continuously if some data contained in the database violate the integrity constraints considered. It is however not easy to check the violateion of integrity constraints when the size and the complexity of database are increased. This paper suggests a rule-based database verification system to relax the difficulty of checking the integrity violation, in which a database is coupled with a rule-based system including the knowledge about the integrity constraints. The rule-database verification system suggested accepts the model descriptions of an application domain, generates the knowledge base consisting of rules and facts by analyzing the model description and proceeds the verification process to check the integrity of the database.

  • PDF

Development of a simple laboratory-made radioactive source to check the integrity of a gamma spectrometry system with HPGe detector (HPGe 검출기를 사용한 감마분광분석계의 점검선원 개발)

  • Lee, Mo Sung
    • Journal of Radiation Protection and Research
    • /
    • v.38 no.2
    • /
    • pp.119-123
    • /
    • 2013
  • A simple laboratory-made radioactive source to check the integrity of a gamma spectrometry system with HPGe detector was developed. The check source consists of radium-riched soil which was ground in size of less than 0.154mm and contained in air tight cylinderical vial, and provides photons with 12 distinct energies. The spectra of the check source were measured once a month during one year, analyzed the charactreictics of their peaks. When the gamma spectrometry system was in normal state, the areas and FWHMs of the gamma rays with more than 3% gamma emission rate in radium and its decay products was constant within standard deviation 2% and 3%, respectively, except 77 keV peak. And it was found that this check source can play a sufficient role to check the integrity of a gamma spectrometry system using 10 peaks in the range of 77 to 2202 keV.

Code Generation for Integrity Constraint Check in Objectivity/C++ (Objectivity/C++에서 무결성 제약조건 확인을 위한 코드 생성)

  • Kim, In-Tae;Kim, Gi-Chang;Yu, Sang-Bong;Cha, Sang-Gyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.416-425
    • /
    • 1999
  • 복잡한 무결성 제약 조건을 효율적으로 확인하기 위해 제약 조건들을 룰 베이스(rule base)에 저장하고 별도의 룰 관리 시스템과 제약 조건 관리 시스템을 통해 제약 조건을 확인하는 기법이 많은 연구자들에 의해 연구되고 발표되었다. 그러나 제약 조건 관리 시스템이 실행시간에 응용 프로그램을 항상 모니터링하고 있다가 데이타의 수정이 요청될 때마다 개입하여 프로세스를 중단시키고 관련 제약 조건을 확인하는 기존의 방법들은 처리 시간의 지연을 피할 수 없다. 본 논문은 컴파일 시간에 제약 조건 확인 코드를 응용 프로그램에 미리 삽입할 것을 제안한다. 응용 프로그램 자체 내에 제약 조건 확인 코드가 삽입되기 때문에 실행 시간에 다른 시스템의 제어를 받지 않고 직접 제약 조건의 확인 및 데이타베이스의 접근이 가능해져서 처리 시간의 지연을 피할 수 있을 것이다. 이를 위해 어떤 구문이 제약 조건의 확인을 유발하는 지를 추적하였고, 컴파일러가 그러한 구문을 어떻게 전처리 과정에서 검색하는지 그리고 그러한 구문마다 어떻게 해당 제약 조건 확인 코드를 삽입할 수 있는 지를 객체지향1) 데이타베이스 언어인 Objectivity/C++에 대해 gcc의 YACC 코드를 변경함으로써 보여 주었다.Abstract To cope with the complexity of handling integrity constraints, numerous researchers have suggested to use a rule-based system, where integrity constraints are expressed as rules and stored in a rule base. A rule manager and an integrity constraint manager cooperate to check the integrity constraints efficiently. In this approach, however, the integrity constraint manager has to monitor the activity of an application program constantly to catch any database operation. For each database operation, it has to check relevant rules with the help of the rule manager, resulting in considerable delays in database access. We propose to insert the constraints checking code in the application program directly at compile time. With constraints checking code inserted, the application program can check integrity constraints by itself without the intervention of the integrity constraint manager. We investigate what kind of statements require the checking of constraints, show how the compiler can detect those statements, and show how constraints checking code can be inserted into the program, by modifying the GCC YACC file for Objectivity/C++, an object-oriented database programming language.

Anti-interference Methods using Vector-based GPS Receiver Mode

  • Viet, Hoan Nguyen;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.5
    • /
    • pp.545-557
    • /
    • 2018
  • The Global Positioning System (GPS) has become popular and widely used in many fields from military to civilian applications. However, GPS signals are suffered from interference due to its weak signal over wireless channel. There are many types of interference, such as jamming, blocking multipath, and spoofing, which can mislead the operation of GPS receiver. In this paper, vector-based tracking loop model with integrity check is proposed to detect and mitigate the harmful effect of interference on GPS receiver operation. The suggested methods are implemented in the tracking loop of GPS receiver. As a first method, integrity check with carrier-to-noise ratio (C/No) monitoring technique is applied to detect the presence of interference and prevent contaminated channels out of tracking channels to calculate position. As a second method, a vector-based tracking loop using Extended Kalman Filter with adaptive noise covariance according to C/No monitoring results. The proposed methods have been implemented on simulated dataset. The results demonstrates that the suggested methods significantly mitigate interference of Additive White Gaussian Noise (AWGN) and improve position calculation by 44%.

Evaluation of the Structural Stability of Platform Screen Door (PSD) due to Train Wind Pressure (열차 진입 시 풍압에 의한 완전 밀폐형 승강장 스크린 도어(PSD)시스템의 구조 안정성 평가)

  • Lee, Jae-Youl;Ryu, Bong-Jo;Kim, Dong-Hyun;Lee, Eun-Kyu;Shin, Kwang-Bok
    • Journal of the Korean Society for Railway
    • /
    • v.9 no.5 s.36
    • /
    • pp.594-600
    • /
    • 2006
  • In this study, transient and quasi-static analysis were done for the evaluation of structural integrity of the platform screen door due to train wind pressure. Fluent 6.0 was used to calculate the train wind pressure, and Ansys 10.0 was used to evaluate the structural stability of platform screen door due to train wind pressure. Transient analysis was used to check the design requirements of platform screen door, and quasi-static analysis was introduced to save the calculating time and check quickly structural performances when compared to those of transient analysis. The results show that structural stability of the platform screen door under train wind pressure is proven and quasi-static analysis can quickly check the structural integrity of platform screen door.

Network Defense Mechanism Based on Isolated Networks (격리 네트워크를 활용한 네트워크 방어 기법)

  • Jung, Yongbum;Park, Minho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1103-1107
    • /
    • 2016
  • Network assets have been protected from malware infection by checking the integrity of mobile devices through network access control systems, vaccines, or mobile device management. However, most of existing systems apply a uniform security policy to all users, and allow even infected mobile devices to log into the network inside for completion of the integrity checking, which makes it possible that the infected devices behave maliciously inside the network. Therefore, this paper proposes a network defense mechanism based on isolated networks. In the proposed mechanism, every mobile device go through the integrity check system implemented in an isolated network, and can get the network access only if it has been validated successfully.

Multiple UART Communications Using CAN Bus (CAN 버스를 이용한 다중 UART 통신)

  • Kang, Tae-Wook;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.1184-1187
    • /
    • 2020
  • This paper proposes an in-vehicle network controller fully exploiting the advantages of UART (Universal Asynchronous Receiver/Transmitter) and CAN (Controller Area Network). UART is used in 1-to-1 communication and it exploits parity bit for data integrity check. The proposed in-vehicle network controller converts UART into CAN, which enables multiple communications along with 1-to-1 communication. Also, the proposed in-vehicle network controller exploits CRC (cyclic redundancy check) for data integrity check, which increases communication reliability. CAN is controlled by microprocessor, but the proposed in-vehicle network controller can be controlled by any devices compliant with RS-232, RS-422, and RS-485.

Commitability and Integrity Verification of Workflow Specification with Petri Nets (페트리넷을 이용한 워크플로우 명세의 완료가능성 및 무결성 검증)

  • Ceong, Hee-Taek;Lee, Do-Heon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2028-2040
    • /
    • 2000
  • A study on workflow as an automated business processing system is done recently. This appear proposes a method to verify commitability and integrity of workflow specifications, which include various dependencies between parallel tasks, using petri nets. For this, firstly, e describe briefly workflow specification method using workflow graphs. Secondly, we propose a method to convert a workflow graph into a petri net to verify workflow specifications. Thirdly, we suggest the commitability verification method using petri nets to check whether workflow specifications can commit or not and the integrity verification method to check whether invalid components exist or not. Lastly, we implement the proposed verification method and propose a defect extraction method.

  • PDF