• Title/Summary/Keyword: Multi-Protect Management

Search Result 45, Processing Time 0.039 seconds

A Study on the Models of Internal system users Authentication considering Multi Factors (다중요소 기반의 내부 사용자 인증모델에 관한 연구)

  • Lee, Jae-yun;Shim, Ho-sung;Han, Kyeong-Seok;Choi, Yong-Lak;Kim, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2044-2055
    • /
    • 2015
  • Financial information systems play such a pivotal role in the financial institution services that are provided for a large customers on the basis of various information including the personal information. As for the personal information collected during the transactions in the financial information systems, huge efforts and investment have been made to protect previously them from being inappropriately misused or illegally used if they could be released. Unfortunately, the frequent accidents on the leakage of sensitive personal information have occurred recently not only by external service users but even by internal system users. Therefore, the aim of this study is to suggest a model of advanced two-channel authentication for internal users in order to increase the stability of financial information systems with enhanced security.

Design of a Small Conditional Access System with DRM (DRM을 적용한 소규모 제한수신시스템 설계)

  • Jung, Seok-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10C
    • /
    • pp.1051-1058
    • /
    • 2007
  • Digital Broadcasting Services get abroad from satellite services to terrestrial services and cable services. As broadcasting services become digital from analog, diverse services such as multi-channel, high quality, time-shift function and so on can be possible. It also generates new digital businesses. The Conditional Access System(CAS) is a technology for providing prevention of illegal access to digital contents. It was applied to digital satellite services at Europe and America from the beginning of 90's. In 2002, a domestic digital satellite service provider adopt a CAS system to their broadcasting services. DRM technologies protect intellectual properties and digital rights of digital contents. This paper suggests a design method to construct a CAS system with DRM which can be applied to a CAS for a small digital broadcasting service.

Policies to Manage Drug Shortages in Selected Countries: A Review and Implications (주요국의 수급불안정 의약품 관리제도에 관한 고찰과 한국에의 시사점)

  • Inmyung Song;Sang Jun Jung;Eunja Park;Sang-Eun Choi;Eun-A Lim;Sanghyun Kim;Dongsook Kim
    • Health Policy and Management
    • /
    • v.34 no.2
    • /
    • pp.106-119
    • /
    • 2024
  • Drug shortage is a persistent phenomenon that poses a public health risk worldwide and occurs due to a range of causes. The purpose of this study is to review key policies to prepare for and respond to drug shortages in selected countries, such as the United States, Canada, and some European countries in order to draw implications. This study reviewed the reports and articles derived from search engines and Google Scholar by using keywords such as drug shortage and stock-out. Over the last decade or so, the United States have strengthened requirements on advance notification for disruption and interruption of drug manufacturing, established the Inter-agency Drug Shortages Task Force to promote the communication and coordination of responses, and expedited drug regulatory processes. Similarly, Canada established the Multi-Stakeholder Steering Committee on drug shortages by involving representatives from central and local governments and private sectors. Canada also adopted a tiered approach to the communication of drug shortages based on the assessment of the severity of the shortage problem and released a detailed information guide on communication. In 2019, the joint task force between the European Medicines Agency and the Heads of Medicines Agencies issued guidelines on drug shortage communication in the European Economic Area. The countries reviewed in this paper focus on communication across different stakeholders for the monitoring of and timely response to drug shortages. The efforts to protect public health from the negative impact of the drug shortage crisis would require multi-sectorial and multi-governmental coordination and development of guidelines.

Design and Implementation of Monitoring System for Submarine Optical fiber Cable Work (해저 광케이블 작업을 위한 모니터링 시스템의 설계 및 구현)

  • 이태오;정성훈;임재홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.205-208
    • /
    • 2002
  • When establishing the submarine optical fiber table between international and domestic, marine survey in advance it grasps the submarine geological features which is accurate and a depth of water condition. And the route which is safe for selecting and submarine optical fiber cable laying it is a work which secures an ease one location. If also, the PLGR the submarine of optical fiber table root the sea contamination material (rope, wire and net) it removes in advance and if the submarine of the optical fiber cable ease it does to arrive safely. And it is a work the Plough and ROV laying work hour laying work efficiency improvement and laying equipment it will be able to protect. So, This paper presents the monitoring system of ship information management and operation for marine survey and PLGR work in submarine optical fiber table construction enterprise. In order to achieve these purpose, overall serial multi-port communication modulo of configuration, realtime processing for management and operation of receiving data, realtime graph and a printout are described.

  • PDF

Improving Research Information Security in Academic Institutes through the Analysis of Security Awareness and Activities (보안 인지 및 실천 현황 분석을 통한 대학 연구정보보안 수준 제고 방안)

  • Park, Il-Hyung;Kim, Seong-Woo;Seo, Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.91-108
    • /
    • 2010
  • Universities are one of leading R&D institutes, however, their scarce security investment allows research information to leak outside. This paper proposes methods for improving security level of academic institutes to protect research information by analyzing security awareness and activities. To do that, we verified the current status of information security and awareness level by analyzing the survey which was conducted for a member of Seoul National University. As a result of statistical analysis using correlation, analysis of variance, multi regression and so on, we concluded that it is essential to improve security awareness, activities, professor's security level and management process for research labs. Thus, we suggest the following methods, security awareness and knowledge development through education, security management for research labs through provision, introduction of data protection softwares and physical control of visitors which are to be adopted to improve security level.

LEU+ loaded APR1400 using accident tolerant fuel cladding for 24-month two-batch fuel management scheme

  • Husam Khalefih;Taesuk Oh;Yunseok Jeong;Yonghee Kim
    • Nuclear Engineering and Technology
    • /
    • v.55 no.7
    • /
    • pp.2578-2590
    • /
    • 2023
  • In this work, a 24-month two-batch fuel management strategy for the APR1400 using LEU + has been investigated, where enrichments of 5.9 and 5.2 w/o are utilized in lieu of the conventional 4-5 w/o UO2 fuel. In addition, an Accident Tolerant Fuel (ATF) clad based on the swaging technology is applied to APR1400 fuel assemblies. In this special ATF clad design, both outer and inner SS316 layers protect the conventional zircaloy clad. Erbia (Er2O3) is introduced as a burnable absorber with two-fold goals to lower the critical boron concentration in the long-cycle LEU + loaded core as well as to handle the LEU + fuel in the existing front-end fuel facilities without renewing the license. Two types of fuel assemblies with different loading of gadolinia (Gd2O3) are considered to control both the reactivity and the core radial power distribution. The erbia burnable absorber is uniformly admixed with UO2 in all fuel pins except for the gadolinia-bearing ones. In this study, two core designs were devised with different erbia loading, and core performance and safety parameters were evaluated for each case in comparison with a core design without any burnable absorbers. The core analysis was done using the two-step method. First, cross-sections are generated by the SERPENT 2 Monte Carlo code, and the 3-D neutronic analysis is performed with an in-house multi-physics nodal code KANT.

Study on River Management Plan Considering Ecological Preservation and Flood Control of Riverine Wetland (하도습지의 생태보전 및 치수를 고려한 하천관리 방안 연구)

  • Ann, Byoung-Yun;Kim, Taek-Min;Hong, Seung-Jin;Kim, Gil-Ho;Kim, Soo-Jun;Kim, Jae-Geun;Kim, Hung-Soo
    • Journal of Wetlands Research
    • /
    • v.16 no.4
    • /
    • pp.463-476
    • /
    • 2014
  • The riverine wetlands located in the riverside bring about social conflicts through confrontation between flood control value through flood control project and ecological preservation value of riverine wetland. In this study, we identified the importance of both values through analysis of economic feasibility of flood control and ecological values of riverine wetland, and tried to suggest management plans for riverine wetland considering both of flood control safety and ecological preservation through these results. For this, we calculated the expected annual flood damage of Imjin River using the multi-dimensional flood damage analysis(MD-FDA), and calculated the total value of riverine wetland using the contingent valuation method(CVM) to estimate preservation value of riverine wetland. The result of the analysis shows that the Imjin River needs flood control project and the ecological preservation of riverine wetland is also important. Therefore, the establishment of the management plan for protecting riverine wetland is also needed. As a result, the Imjin riverine wetland was classified as the area where sedimentation continues to take place, and the flood water level to rise. On the basis of the analyzed results, it is judged that the Imjin River needs flood control for public safety and ecological consideration for ecosystem preservation in the river improvement project. So, the stepwise river improvement is desirable to protect riverine wetland and minimize ecosystem disturbance. The results is expected to be made good use as the basic study for establishment of institutional river management plans considering flood control project and riverine wetland preservation in the future.

Estimation of an Occupational Exposure Limit for Multi-Walled Carbon Nanotubes Manufactured in Korea (국내 일부 다중벽탄소나노튜브의 직업노출기준 추정)

  • Kim, Jong Bum;Kim, Kyung Hwan;Choi, Byung-Gil;Song, Kyung Seuk;Bae, Gwi-Nam
    • Journal of Environmental Science International
    • /
    • v.25 no.4
    • /
    • pp.505-516
    • /
    • 2016
  • With the development of nanotechnology, nanomaterials are used in various fields. Therefore, the interest regarding the safety of nanomaterial use is increasing and much effort is diverted toward establishment of exposure assessment and management methods. Occupational exposure limits (OELs) are effectively used to protect the health of workers in various industrial workplaces. This study aimed to propose an OEL for domestic multi-walled carbon nanotubes (MWCNTs) based on animal inhalation toxicity test. Basic procedure for development of OELs was examined. For OEL estimation, epidemiological study and quantitative risk assessment are generally performed based on toxicity data. In addition, inhalation toxicity data-based no observed adverse effect level (NOAEL) and benchmark dose (BMD) are estimated to obtain the OEL. Three different estimation processes (NEDO in Japan, NIOSH in USA, and Baytubes in Germany) of OELs for carbon nanotubes (CNTs) were intensively reviewed. From the rat inhalation toxicity test for MWCNTs manufactured in Korea, a NOAEL of $0.98mg/m^3$ was derived. Using the simple equation for estimation of OEL suggested by NEDO, the OEL of $142{\mu}g/m^3$ was estimated for the MWCNT manufacturing workplace. Here, we used test rat and Korean human data and adopted 36 as an uncertainty factor. The OEL for MWCNT estimated in this work is higher than those ($2-80{\mu}g/m^3$) suggested by previous investigators. It may be greatly caused by different physicochemical properties of MWCNT and their dispersion method and test rat data. For setting of regulatory OELs in CNT workplaces, further epidemiological studies in addition to animal studies are needed. More advanced technical methods such as CNT dispersion in air and liquid should be also developed.

Access Control Policy of Data Considering Varying Context in Sensor Fusion Environment of Internet of Things (사물인터넷 센서퓨전 환경에서 동적인 상황을 고려한 데이터 접근제어 정책)

  • Song, You-jin;Seo, Aria;Lee, Jaekyu;Kim, Yei-chang
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.409-418
    • /
    • 2015
  • In order to delivery of the correct information in IoT environment, it is important to deduce collected information according to a user's situation and to create a new information. In this paper, we propose a control access scheme of information through context-aware to protect sensitive information in IoT environment. It focuses on the access rights management to grant access in consideration of the user's situation, and constrains(access control policy) the access of the data stored in network of unauthorized users. To this end, after analysis of the existing research 'CP-ABE-based on context information access control scheme', then include dynamic conditions in the range of status information, finally we propose a access control policy reflecting the extended multi-dimensional context attribute. Proposed in this paper, access control policy considering the dynamic conditions is designed to suit for IoT sensor fusion environment. Therefore, comparing the existing studies, there are advantages it make a possible to ensure the variety and accuracy of data, and to extend the existing context properties.

A Study on WB(Water-Bubble) Based Highly Secure Flexible Network Section (WB(Water-Bubble) 기반의 강한 보안성을 갖는 탄력적 네트워크 구간에 관한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.737-746
    • /
    • 2017
  • In 2017, amid changes in the security market such as integrated security (IS) and convergence security (CS), a variety of security paradigms in terms of operation and management have been suggested. Rather than changing existing network infrastructure and bringing about fluid, multi-dimensional changes, these solutions and technologies focus entire security capacity on a primary protection, leading to network infrastructure suffering from unexpected inherent violations and problems in a continued manner. Therefore, it is time to propose and develop a flexible network section that can protect from attacks of similar pattern and concentrated traffic attacks by applying a new concept of WB (Water-Bubble) to network infrastructure and analyzing on the basis of experiment and installation. Methodology of the WB-based highly secure flexible network section proposed in this study is expected to provide materials for studies on how to achieve network section security taking into account three major limitations and security standards: fluidity, unpredictability, and non-area scalability by contact point ratio, by changing a network area predicted to be the final target of attack into resonant network section (area) with flexible area changes.