• Title/Summary/Keyword: Object-based Policy

Search Result 194, Processing Time 0.027 seconds

The Implementation of Policy Management Tool Based on Network Security Policy Information Model (네트워크 보안 정책 정보 모델에 기반한 정책 관리 도구의 구현)

  • Kim, Geon-Lyang;Jang, Jong-Soo;Sohn, Sung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.775-782
    • /
    • 2002
  • This paper introduces Policy Management Tool which was implemented based on Policy Information Model in network suity system. Network security system consists of policy terror managing and sending policies to keep a specific domain from attackers and policy clients detecting and responding intrusion by using policies that policy server sends. Policies exchanged between policy server and policy client are saved in database in the form of directory through LDAP by using Policy Management Tool based on network security policy information model. NSPIM is an extended policy information model of IETF's PCIM and PCIMe, which enables network administrator to describe network security policies. Policy Management Tool based on NSPIM provides not only policy management function but also editing function using reusable object, automatic generation function of object name and blocking policy, and other convenient functions to user.

Updating Policy of Indoor Moving Object Databases for Location-Based Services: The Kalman Filter Method (위치기반서비스를 위한 옥내 이동객체 데이터베이스 갱신전략: 칼만 필터 방법)

  • Yim, Jae-Geol;Joo, Jae-Hun;Park, Chan-Sik;Gwon, Ki-Young;Kim, Min-Hye
    • The Journal of Information Systems
    • /
    • v.19 no.1
    • /
    • pp.1-17
    • /
    • 2010
  • This paper proposes an updating policy of indoor moving object databases (IMODB) for location-based services. our method applies the Ka1man filter on the recently collected measured positions to estimate the moving object's position and velocity at the moment of the most recent measurement, and extrapolate the current position with the estimated position and velocity. If the distance between the extrapolated current position and the measured current position is within the threshold, in other words if they are close then we skip updating the IMODB. When the IMODB needs to know the moving object's position at a certain moment T, it applies the Kalman filter on the series of the measurements received before T and extrapolates the position at T with the estimations obtained by the Kalman filter. In order to verify the efficiency of our updating method, we performed the experiments of applying our method on the series of measured positions obtained by applying the fingerprinting indoor positioning method while we are actually walking through the test bed. In the analysis of the test results, we estimated the communication saving rate of our method and the error increment rate caused by the communication saving.

Security Improvement of File System Filter Driver in Windows Embedded OS

  • Seong, Yeon Sang;Cho, Chaeho;Jun, Young Pyo;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.834-850
    • /
    • 2021
  • IT security companies have been releasing file system filter driver security solutions based on the whitelist, which are being used by several enterprises in the relevant industries. However, in February 2019, a whitelist vulnerability was discovered in Microsoft Edge browser, which allows malicious code to be executed unknown to users. If a hacker had inserted a program that executed malicious code into the whitelist, it would have resulted in considerable damage. File system filter driver security solutions based on the whitelist are discretionary access control (DAC) models. Hence, the whitelist is vulnerable because it only considers the target subject to be accessed, without taking into account the access rights of the file target object. In this study, we propose an industrial device security system for Windows to address this vulnerability, which improves the security of the security policy by determining not only the access rights of the subject but also those of the object through the application of the mandatory access control (MAC) policy in the Windows industrial operating system. The access control method does not base the security policy on the whitelist; instead, by investigating the setting of the security policy not only for the subject but also the object, we propose a method that provides improved stability, compared to the conventional whitelist method.

(A Modelling of Policy Based Network Management Object with Active Properties) (능동 특성을 갖는 정책기반 망 관리 객체의 모델링)

  • 최은복
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1189-1198
    • /
    • 2002
  • Policy base management system that can satisfy various user's request in distributed system environment recently and manage network resources efficiently is required. Described policy base management information consisted of ECA(Event-Condition-Action) rules so that efficient management of various communication network and consistent management policy may be available in this paper. Policy is consisted of Event, Condition and Actions to achieve when condition is satisfied. And we can present formality of dynamic function of management object as applying policy to ATM congestion control model been applying in real environment.

  • PDF

Efficient Management of Proxy Server Cache for Video (비디오를 위한 효율적인 프록시 서버 캐쉬의 관리)

  • 조경산;홍병천
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.2
    • /
    • pp.25-34
    • /
    • 2003
  • Because of explosive growth in demand for web-based multimedia applications, proper proxy caching for large multimedia object (especially video) has become needed. For a video object which is much larger in size and has different access characteristics than the traditional web object such as image and text, caching the whole video file as a single web object is not efficient for the proxy cache. In this paper, we propose a proxy caching strategy with the constant-sized segment for video file and an improved proxy cache replacement policy. Through the event-driven simulation under various conditions, we show that our proposal is more efficient than the variable-sized segment strategy which has been proven to have higher hit ratio than other traditional proxy cache strategies.

  • PDF

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

Real-Time Object Tracking Algorithm based on Minimal Contour in Surveillance Networks (서베일런스 네트워크에서 최소 윤곽을 기초로 하는 실시간 객체 추적 알고리즘)

  • Kang, Sung-Kwan;Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.337-343
    • /
    • 2014
  • This paper proposes a minimal contour tracking algorithm that reduces transmission of data for tracking mobile objects in surveillance networks in terms of detection and communication load. This algorithm perform detection for object tracking and when it transmit image data to server from camera, it minimized communication load by reducing quantity of transmission data. This algorithm use minimal tracking area based on the kinematics of the object. The modeling of object's kinematics allows for pruning out part of the tracking area that cannot be mechanically visited by the mobile object within scheduled time. In applications to detect an object in real time,when transmitting a large amount of image data it is possible to reduce the transmission load.

Real-Time Object Tracking Algorithm based on Adaptive Color Model in Surveillance Networks (서베일런스 네트워크에서 적응적 색상 모델을 기초로 한 실시간 객체 추적 알고리즘)

  • Kang, Sung-Kwan;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.183-189
    • /
    • 2015
  • In this paper, we propose an object tracking method using the color information of the image in surveillance network. This method perform a object detection using of adaptive color model. Object contour detection plays an important role in application such as object recognition. Experimental results demonstrate successful object detection over a wide range of object's variation in color and scale. In applications to detect an object in real time, when transmitting a large amount of image data it is possible to find the mode of a color distribution. The specific color of an object is modified at dynamically changing color in image. So, this algorithm detects the tracking area information of object within relevant tracking area and only tracking the movement of that object.Through experiments, we show that proposed method is more robust than other methods under certain ideal situations.

A Case Study on Statistic-Based Policy: Use of the Housing Purchase Price Indices (통계기반 정책사례 연구: 주택가격지수 통계의 구축, 개선, 활용을 중심으로)

  • Park, Jin-Woo
    • The Korean Journal of Applied Statistics
    • /
    • v.22 no.3
    • /
    • pp.635-651
    • /
    • 2009
  • Democratization and advancement of a society requires the Government's commitment to evidence-based policy. Though statistic is known as one of the best available evidence, there has been only a few case studies to tell real stories about using statistics for policy making. The object of this study is to suggest some real stories about using the Housing Purchase Price Survey for some property policies. By reviewing the origin and development of the survey, we evaluate the design and analysis strategies adopted in the survey. In addition, we describe how the Housing Purchase Price Indices have been used by the Government for some property policies.

Study on 3D Object (Building) Update and Construction Method for Digital Twin Implementation (디지털 트윈 구현을 위한 3차원 객체(건물) 갱신 및 구축 방안 연구)

  • Kwak, Byung-Yong;Kang, Byoung-Ju
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.186-192
    • /
    • 2021
  • Recently, the demand for more precise and demand-oriented customized spatial information is increasing due to the 4th industrial revolution. In particular, the use of 3D spatial information and digital twins which based on spatial information, and research for solving social problems in cities by using such information are continuously conducted. Globally, non-face-to-face services are increasing due to COVID-19, and the national policy direction is also rapidly progressing digital transformation, digitization and virtualization of the Korean version of the New Deal, which means that 3D spatial information has become an important factor to support it. In this study, physical objects for cities defined by world organizations such as ISO, OGC, and ITU were selected and the target of the 3D object model was limited to buildings. Based on CityGML2.0, the data collected using a drone suitable for building a 3D model of a small area is selected to be updated through road name address and building ledger, which are administrative information related to this, and LoD2.5 data is constructed and urban space. It was intended to suggest an object update method for a 3D building among data.