• Title/Summary/Keyword: Multi-level security

Search Result 217, Processing Time 0.034 seconds

Implications of Multi-swarm Events Safety Management of Foreign Police (외국경찰의 대규모 행사 안전관리로 본 시사점)

  • Kim, Sang-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.462-469
    • /
    • 2016
  • This study researched police intervention to ensure the safety of Multi-swarm events. And this study researched best practices of foreign countries. This study propose a solution. It used the situation to police intervention and domestic Multi-swarm events leading research and safety management systems. Safety management for multi-swarm events did ministry of public safety and security, local government, police department, fire department etc. Activities of Safety management for multi-swarm events was checked the risk level, safety management, safety planning and training, safety management in accordance with the Manual. But, safety management of police had Manual maintenance is necessary for the police forces and take advantage of, it is necessary to clarify the mission, it is necessary to configure the risk of a step-by-step checklist for police safety tips in detail. This study for solve the problem proposed the United States, United Kingdom, Germany, France, Australia, the case of the Japanese.

Optimal Operation of Multi-Microgrid Systems Considering Privacy of Customer Information (고객 정보의 개인 정보 보호를 고려한 멀티 마이크로그리드 시스템의 최적 운영)

  • Hussain, Akhtar;Bui, Van-Hai;Kim, Hak-Man
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.461-463
    • /
    • 2016
  • Information security and preservation of customer's data privacy are key factors for further wide spread adoption of microgrid (MG) technology. However, strong coupling between the operation cost of multi-microgrid (MMG) system and privacy of customer data makes it more challenging. A nested energy management system (EMS) has been proposed in this paper. The surplus/shortage information from the inner level MGs is included in processing the optimal operation of outer level MGs. This type of optimization ensures a layered privacy-preservation to customer at each MG level. The proposed EMS architecture is a better trade-off architecture between the operation cost of the MMG system and customer privacy-preservation at each level of MG.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

Designing on Scenario-based Drone Platform to Enhancement Security (보안성 향상을 위한 시나리오 기반 드론 플랫폼 설계 연구)

  • Kim, Yanghoon;Hong, Chan-Ki
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.78-83
    • /
    • 2021
  • The new industry drone research is increasing through convergence between 4th industrial revolution technology. In particular, the government indicates the D.N.A platform as a countermeasure of 4th industrial revolution. So, the research topics are remarkable which are using D.N.A platform. On the other hand, the drone for industrial and research has spatial factor based on sequential because, they performance scenario-based mission through control operation. When the drone flights as a control operation, they have necessity apply multi-dimensional methods to improve the security level. So, this study researched a scenario based drone platform to improve the security level. As a result, the space classified as a ground control system, drone, drone data server and designed the application method based on scenario security technology.

Multi-Frame Face Classification with Decision-Level Fusion based on Photon-Counting Linear Discriminant Analysis

  • Yeom, Seokwon
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.332-339
    • /
    • 2014
  • Face classification has wide applications in security and surveillance. However, this technique presents various challenges caused by pose, illumination, and expression changes. Face recognition with long-distance images involves additional challenges, owing to focusing problems and motion blurring. Multiple frames under varying spatial or temporal settings can acquire additional information, which can be used to achieve improved classification performance. This study investigates the effectiveness of multi-frame decision-level fusion with photon-counting linear discriminant analysis. Multiple frames generate multiple scores for each class. The fusion process comprises three stages: score normalization, score validation, and score combination. Candidate scores are selected during the score validation process, after the scores are normalized. The score validation process removes bad scores that can degrade the final output. The selected candidate scores are combined using one of the following fusion rules: maximum, averaging, and majority voting. Degraded facial images are employed to demonstrate the robustness of multi-frame decision-level fusion in harsh environments. Out-of-focus and motion blurring point-spread functions are applied to the test images, to simulate long-distance acquisition. Experimental results with three facial data sets indicate the efficiency of the proposed decision-level fusion scheme.

A Study on Multi-Level Correlation Technique extended Security Alert Verification (보안경보 검증을 확장한 다단계 상호연관 분석에 관한 연구)

  • Choi, Dae-Soo;Lee, Yong-Kyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1059-1062
    • /
    • 2005
  • 보안위협은 갈수록 심각해지고 다양한 정보보호시스템들을 통합하는 통합보안관리시스템에 관한 연구 개발도 활발히 진행 중이다. 이기종 정보보호시스템에서 발생하는 다량의 경보와 이벤트를 효과적으로 수집, 통합하고 상호연관 분석할 수 있는 방법이 절실하다. 현재 연구되고 있는 상호연관분석 방법들에 대해서 조사 분류하고 각 분류별로 장단점을 분석하여 이기종 통합보안관리에 적합한 상호연관분석 방법을 제안한다. 보안 경보 검증과정과 분산화된 경보처리방법으로 실시간 상호연관분석이 가능하도록 설계하였다.

  • PDF

The Design of LSM-Based Extended RBAC Security System (리눅스 보안 모듈 기반의 확장된 역할 기반 접근 제어 보안 시스템 설계)

  • 박신혜;예흥진;김동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.628-630
    • /
    • 2003
  • 오늘날의 규모가 매우 크고 복잡한 시스템 및 네트워크 환경 하에서 컴퓨터 시스템의 보안 관리는 매우 중요하다. 역할기반 접근제어 (RBAC : Role-Based Access Control)는 시스템 상의 역할을 기반으로 하는 접근제어 메커니즘으로 복잡한 접근정책을 기술하고, 시스템 관리상의 에러와 비용을 줄일 수 있다. 본 논문은 리눅스 커널에 보안 강화를 지원하는 리눅스 보안 모듈(LSM: Liunx Security Module) 프레임워크 상에서 확장된 역할기반 접근제어 보안 시스템 (LSM-Based Extended RBAC Security Module)을 제안한다. 본 고에서 제안된 시스템은 보안의 강화를 위하여 원 타임 패스워드 (One-Time Password)의 강화된 인증 방식과 부분적 다중 계층 보안 (Partial Multi-Level Security), 임의적 접근 제어(Discretionary Access Control) 및 감사 정보를 통한 보안 정책 오류 검사 및 대응 (Security Policy Validation and Response) 기능을 지원한다.

  • PDF

A Multi-level Analysis of Factors Affecting Participation in Health Screenings in Korea: A Focus on Household and Regional Factors

  • Park, So Yoon;Shin, Young-jeon
    • Journal of Preventive Medicine and Public Health
    • /
    • v.55 no.2
    • /
    • pp.153-163
    • /
    • 2022
  • Objectives: This study divided the factors that affect participation in health screenings into individual, household, and regional levels and conducted a multi-level analysis to identify the factors related to participation in health screenings. Methods: Participants from the 2017 Community Health Survey were classified into 2 groups (under 40 and 40 or older). A multi-level logistic regression analysis was conducted to identify the factors that affected participation in health screenings. Results: The screening rate of the participants was 69.7%, and it was higher among participants aged 40 and older (80.3%) than it was among participants younger than 40 (49.8%). At the individual level, the factors that influenced participation in health screenings included age, economic activity, smoking status, physician-diagnosed hypertension, and a moderate or high physical activity level. At the household level, the odds ratio of participation in health screenings was high for participants who lived in single-person households, lived with a spouse, earned a high monthly household income, and were not beneficiaries of national basic livelihood security. At the regional level, the odds ratio at the 95% confidence interval level of participation in health screenings was high for participants who had trust in the local community and lived in an area with a proportionally high social welfare budget. Conclusions: This study analyzed nationalwide data and confirmed that individual, household, and regional characteristics affected participation in health screenings. Therefore, policies that prioritize the improvement of regional level factors and especially household level factors are likely to be the most effective for improving the screening rate.

A Design of Role-Based Access Control Model (직무기반 접근제어 모델 설계)

  • Lee, Ho;Chung, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.1
    • /
    • pp.60-66
    • /
    • 2001
  • We designed a role-based access control model that can resolve the complicated tasks of control requirements. The designed access control model can control permissions efficiently use of a role-based access control. It guarantees the confidentiality integrity and availa information making use of identity-based and rule-based access controls. It can also centre information flow. Our access control model protects resources from unauthorized accesses b multi-level security policies such as role, security level, integrity level and ownership.

  • PDF

A Low-Power Clustering Algorithm Based on Fixed Radio Wave Radius in WSN (WSN에서 전파범위 기반의 저 전력 클러스터링 알고리즘)

  • Rhee, Chung Sei
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.75-82
    • /
    • 2015
  • Recently, lot of researches on multi-level protocol have been done to balance the sensor node energy consumption of WSN and to improve the node efficiency to extend the life of the entire network. Especially in multi-hop protocol, a variety of models have been studied to improve energy efficiency and apply it in real system. In multi-hop protocol, we assume that energy consumption can be adjusted based on the distance between the sensor nodes. However, according to the physical property of the actual WSN, it's hard to establish this. In this paper, we propose low-power sub-cluster protocol to improve the energy efficiency based on the spread of distance. Compared with the previous protocols, the proposed protocol is energy efficient and can be effectively used in the wireless sensing network.