• Title/Summary/Keyword: Policy based Management

Search Result 5,870, Processing Time 0.037 seconds

Policy-based Network Security with Multiple Agents (ICCAS 2003)

  • Seo, Hee-Suk;Lee, Won-Young;Yi, Mi-Ra
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1051-1055
    • /
    • 2003
  • Policies are collections of general principles specifying the desired behavior and state of a system. Network management is mainly carried out by following policies about the behavior of the resources in the network. Policy-based (PB) network management supports to manage distributed system in a flexible and dynamic way. This paper focuses on configuration management based on Internet Engineering Task Force (IETF) standards. Network security approaches include the usage of intrusion detection system to detect the intrusion, building firewall to protect the internal systems and network. This paper presents how the policy-based framework is collaborated among the network security systems (intrusion detection system, firewall) and intrusion detection systems are cooperated to detect the intrusions.

  • PDF

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

Application Case of Safety Stock Policy based on Demand Forecast Data Analysis (수요예측 데이터 분석에 기반한 안전재고 방법론의 현장 적용 및 효과)

  • Park, Hung-Su;Choi, Woo-Yong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.3
    • /
    • pp.61-67
    • /
    • 2020
  • The fourth industrial revolution encourages manufacturing industry to pursue a new paradigm shift to meet customers' diverse demands by managing the production process efficiently. However, it is not easy to manage efficiently a variety of tasks of all the processes including materials management, production management, process control, sales management, and inventory management. Especially, to set up an efficient production schedule and maintain appropriate inventory is crucial for tailored response to customers' needs. This paper deals with the optimized inventory policy in a steel company that produces granule products under supply contracts of three targeted on-time delivery rates. For efficient inventory management, products are classified into three groups A, B and C, and three differentiated production cycles and safety factors are assumed for the targeted on-time delivery rates of the groups. To derive the optimized inventory policy, we experimented eight cases of combined safety stock and data analysis methods in terms of key performance metrics such as mean inventory level and sold-out rate. Through simulation experiments based on real data we find that the proposed optimized inventory policy reduces inventory level by about 9%, and increases surplus production capacity rate, which is usually used for the production of products in Group C, from 43.4% to 46.3%, compared with the existing inventory policy.

Direction for the management of air pollutants based on health risk in Korea (위해성을 고려한 대기오염물질의 관리 방향)

  • Kim, Young Ju;Kim, Yong Pyo
    • Particle and aerosol research
    • /
    • v.13 no.2
    • /
    • pp.43-52
    • /
    • 2017
  • Policy direction for the management of air quality in Korea has been on the reduction of the average concentrations of the criteria air pollutants such as sulfur dioxide and fine particles. However, recently, risk based management of air pollutants becomes an important issue. In this study, to develop an effective air quality management policy direction in Korea, (1) the fourth Multiple Air Toxics Exposure Study (MATES IV) carried out in the South Coast Air Quality Management District (SQAQMD) in the USA is reviewed and (2) the results are compared with in these in Seoul and (3) policy directions are suggested. It was found that (1) systematic integrated study comprising of measurement, modeling, emission inventory estimation, and risk assessment was essential to estimate the health risk of air pollutants reliably, (2) cancer risk of diesel particle was dominant over other air pollutants, and (3) health risk based emissions were different from amount based emissions. It was suggested that (1) reducing the exposure from hot spots might important to reduce health risk from air pollutants and (2) an integrated air quality management administration system is important for the efficient management of air pollution.

Variation in hospital length of stay according to the DRG-based prospective payment system in the voluntarily participating providers (DRG(Diagnosis-Related Group)를 이용한 포괄진료비 지불제도의 선택 참여에 따른 재원일수 변화)

  • Choi, Sook-Ja;Kwon, Soon-Man;Kang, Gil-Won;Moon, Sang-Jun;Lee, Jin-Seok
    • Health Policy and Management
    • /
    • v.20 no.2
    • /
    • pp.17-39
    • /
    • 2010
  • This study explored the impact on the DRG(Diagnosis-Related Groups)-based prospective payment system(PPS) operated by voluntarily participation providers. We analyzed whether the provides in the DRG-based PPS and in traditional fee-for-service(FFS) systems showed different the degree of variation in length of stay(LOS), and the providers' behaviors depending on the differences according to the varied participation periods. The study sample included all data 2,061 institutions participated in DRG-PPS in 2007 and all cases 473 FFS institutions which reported fee-for-service claims were reviewed same diagnosized diseases at least 10cases claims during three months We compared the differences of the LOS among health care institutions according to their type, region, and size. For DRGs showing significant differences in LOS, multiple regression analyses were performed to find out factors associated with LOS and interaction effect participation and hospital types or participation periods. The result provide the evidence that the DRG payment system operated by volunteering health care institutions had impact on resources use, which can reduce the institutions' the length of stay. While some DRGs had no correlation between participation periods and LOS, other DRGs, DRG participation period reversely linear relationship with LOS. That is to say, the longer participation year, the less reducing the LOS. These results support the future expansion of the DRG-based PPS plan to all health care services in Korea.

Storage Assignment Policies in Automated Storage/Retrieval Systems

  • Kim, Jeongseob
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.23 no.3
    • /
    • pp.91-108
    • /
    • 1998
  • Automated Storage and Retrieval Systems (AS/RSs) are an important facility for modern material management. The expected benefits of these capital-intensive facilities are gained when their control policies and their physical design parameters are determined simultaneously. In this paper we present several analytical models that capture the impact of the storage assignment policy and of the rack design on the expected storage and retrieval times. Sequential and interleaved service modes are considered for sequencing the storage and retrieval requests. We further investigate the impact of the rack structure on the relative performance of the following storage assignment policies : closest open location (random), full turnover-based policy, and class-based. Our analysis clearly indicates that significant savings in crane travel time are realized when implementing full turnover-based policy, rather than random. These savings become more and more pronounced as the profile of the storage racks approaches the square-in-time shape. Furthermore, it is shown that a class-based policy, with a small number of storage classes, will capture most of these savings and be easier to manage in practice.

  • PDF

Design and Analysis of Role-based Security Management Model for Policy-based Security Management in SNMPv3 Network (SNMPv3 통신망의 정책기반 보안관리를 위한 역할기반 보안관리 모델의 설계 및 분석)

  • Ju, Gwang-Ro;Lee, Hyeong-Ho;No, Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.573-584
    • /
    • 2001
  • Policy-Based Network Management (PBNM) architecture is to meet various needs of network users and to provide effective management facilities in distributed and large scale networks to network managers. In PBNM, network managers perform network management operations by stipulating a set of rules rather than control each network component. On the other hand, providing security services such as authentication, privacy of messages as well as a new flexible and extensible administration framework, SNMPv3 enables network managers to monitor and control the operation of network components more secure way than ever before. Despite of its enhanced security services, SNMPv3 has difficulties in managing distributed, large-scaled network because it does not provide centralized security management facilities. In this paper, we propose a new security model called Role-based Security Management model (RSM) with security management policy to support scalable and centralized security management for SNMP-based networks. Also, the structure and the operation of the security system as well as the efficiency analysis of RSM in terms of security management are also described.

  • PDF

A Study on the Strategic Human Resource Management of Globalization -Focused on Japan.Korea.United States-

  • Lim, Sang-Hyuk
    • International Commerce and Information Review
    • /
    • v.8 no.3
    • /
    • pp.385-396
    • /
    • 2006
  • The successful knowledge and information based companies facilitate to restructure the industry and strengthen the national competitiveness in the future. The advent of information age provides us new challenge because the information breakthrough can play a pivotal role in terms of knowledge transfer in the human resource management. Executive officer must present long term vision in order to expand enterprise continuously and establish long term management goal and strategy which are appropriate for key organizational skills of future management environment (Pfeffer, 1998). Also, long term talent management based on vision, goal and strategy and talent development strategy and employment management must be established (小池, 1994)). American HRM system's reformation cannot be defined without scientific management policy. However, currently widely discussed Japanese HRM system's reformation cannot be defined without organizational commitment focused Japanese employment system. (津田, 1992 ; 太田, 1994). Japan's development of the following policies are behind comparing to Europe : (1)Skill based talent management regardless of age, sex, nationality, race and academic background (2)Consideration of retirement age of 64 (3)Creativity and freedom promoting talent management policy. Also, there are problems to be solved. Solutions will be searched for by establishing new wage policy based on tasks and individuals in the basis of lifetime employment system.

  • PDF

(A Modelling of Policy Based Network Management Object with Active Properties) (능동 특성을 갖는 정책기반 망 관리 객체의 모델링)

  • 최은복
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1189-1198
    • /
    • 2002
  • Policy base management system that can satisfy various user's request in distributed system environment recently and manage network resources efficiently is required. Described policy base management information consisted of ECA(Event-Condition-Action) rules so that efficient management of various communication network and consistent management policy may be available in this paper. Policy is consisted of Event, Condition and Actions to achieve when condition is satisfied. And we can present formality of dynamic function of management object as applying policy to ATM congestion control model been applying in real environment.

  • PDF

A Network Management Architecture Using XML-based PIB (XML기반 PIB를 이용한 네트워크 관리구조)

  • 윤권섭;홍충선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.414-426
    • /
    • 2003
  • XML is being used to describe components and applications in a vendor and language neutral. Therefore it already has a role in distributed system. XML is also being used as a data interchange format between components and applications in loosely coupled large-scale application. Until now, policy is described for specific applications and devices. Its use has been very limited. In current network management system, we can only invoke predefined operations and actions using policy-based network management. The main motivation for the recent interests in policy-based networks is to support dynamic adaptability of behavior by changing policy without recoding or stopping system. For these reasons we present the use of the XML for describing the policy and PIB(Policy Information Base) in COPS-PR. It improves flexibility and interoperability among heterogeneous network systems. It also can add new functionality into network components. In this paper, we propose a dynamically extensible network management architecture using XML-based PIB.