• Title/Summary/Keyword: Policy-based Framework

Search Result 690, Processing Time 0.027 seconds

A Framework and Policy Scenarios of Policy-based Mobile IP Networks (정책기반 이동 IP 네트워크의 프레임워크와 정책 시나리오)

  • 강승완;김태경;이정환;유상조
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.105-108
    • /
    • 2003
  • Because of increasing the notebook computer and PDA, users' requirement with respect to mobility is growing more and more. However, current IP protocol is not changed IP address and can not deliver IP packets on new location of host in case moving another network. To solve this problem, the IETF has proposed mobile IP. The network management for maintaining stable and efficient environment is more difficult according to being various by complicated network environment and requirements of provided service and user. The recent rises concern about policy-based network technology. Therefore, this paper proposed a framework of policy-based network and developed policy scenarios using the presented policy language of mobile IP.

  • PDF

Policy-based Network Security with Multiple Agents (ICCAS 2003)

  • Seo, Hee-Suk;Lee, Won-Young;Yi, Mi-Ra
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1051-1055
    • /
    • 2003
  • Policies are collections of general principles specifying the desired behavior and state of a system. Network management is mainly carried out by following policies about the behavior of the resources in the network. Policy-based (PB) network management supports to manage distributed system in a flexible and dynamic way. This paper focuses on configuration management based on Internet Engineering Task Force (IETF) standards. Network security approaches include the usage of intrusion detection system to detect the intrusion, building firewall to protect the internal systems and network. This paper presents how the policy-based framework is collaborated among the network security systems (intrusion detection system, firewall) and intrusion detection systems are cooperated to detect the intrusions.

  • PDF

A Policy Framework for the Long-term Preservation of Authentic Digital Records: Based on InterPARES Studies (진본 전자기록의 장기보존을 위한 정책프레임워크: InterPARES 성과물에 기초하여)

  • Lee, Yoon-Ju;Lee, So-Yeon
    • The Korean Journal of Archival Studies
    • /
    • no.19
    • /
    • pp.193-249
    • /
    • 2009
  • The present study aims at developing a policy framework for the long-term preservation of authentic digital records. To accomplish this, the study analyzed the main research outcomes from InterPARES(International Research on Permanent Authentic Records in Electronic System: IP). It has (1) selected major outcomes from IP project, (2) disassemble principles and guidelines suggested by IP into individual concepts and components, (3) rearranged them into a conceptual framework, which has been used as a basis for the policy framework, and finally (4) developed a policy framework for the long-term preservation of authentic digital records. The policy framework suggested here could serve as a basis for either establishing national or institutional policy or developing standards and guidelines for long-term preservation of authentic digital records.

Policy Suggestions for Fostering Teacher ICT Competencies in Developing Countries: An ODA Project Case in Peru

  • SO, Hyo-Jeong;SEO, Jongwon
    • Educational Technology International
    • /
    • v.21 no.2
    • /
    • pp.217-247
    • /
    • 2020
  • Many developing countries consider ICT as a key enabler to improve their educational systems and teachers are viewed as change agents. This paper aims to present policy suggestions concerning how to foster teachers' ICT competencies in developing countries based on the outcomes of an ODA project case in Peru. This study was conducted through three stages: Literature survey, site visit, and policy suggestions. To draw relevant policy suggestions, we employed the framework of the 'macro-meso-micro' level of teacher professional development. The following policy suggestions are discussed: (a) macro level: to develop the national framework of teacher ICT competencies and competency-based teacher training, (b) meso-level: to promote teacher communities of practices and school-based research programs, and (c) micro-level: to redesign teacher professional development programs to help teachers better understand the complex relationships between content, pedagogy, and technology, beyond learning about basic ICT literacy skills. This study contributes to the understanding of how ODA projects can approach the issue of teacher ICT capacity building at multiple levels.

Modes of Combinative Innovation: Case of Samsung Electronics

  • Hong, Yoo Soo
    • Asian Journal of Innovation and Policy
    • /
    • v.1 no.2
    • /
    • pp.219-239
    • /
    • 2012
  • In this age of convergence, a combinative nature of innovation is in need of revisiting. The innovation based on combination is named "combinative innovation" and defined operationally as the innovation that combines different modes of combinations. Five modes are characterized and the framework is applied to the case of CDMA mobile phone development of Samsung Electronics Company in the 1990s. The case study demonstrates the usefulness of the framework and the future direction of further elaboration of the framework.

Information Analysis Framework for Supporting Evidence-based Research and Development Policy: Practical Considerations for Rationality in the Policy Process (증거기반 연구개발 정책 지원을 위한 정보 분석 프레임워크에 대한 연구: 정책과정의 합리성 제고에 관한 실무적 고찰)

  • Lee, Do-Yeon;Kim, Keun-Hwan
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.77-93
    • /
    • 2021
  • This study is based on a review of how and in which stages evidence can be used, in practice, in the policy process and proposes an information analysis framework capable of inducing continuous interaction among stakeholders and an operation procedure that allows experts to reconcile conflicts through the analyzed information. In particular, it focuses on the strategic planning process carried out in the policy formation stage of the R&D policy process, which promotes the creation of knowledge related to science and technology required to improve national competitiveness and solve social and environmental problems. Conflicts are negotiated and resolved by ensuring rationality in the policy process, following the operation procedure and inducing communication between the stakeholders participating in national R&D strategic planning related to the issue of population aging throughout utilizing the provided useful information. Our results showed that the proposed operating procedures and information analysis framework had a positive effect on the communication-oriented shift. Thus, in order to promote conflict management, an agreed operating procedures and information analysis framework should be established between stakeholders, thereby reducing a conflict of opinions in advance. This article realizes the true meaning of movement of evidence-based policies. In addition, the framework is helping support evidence-based R&D policies by strengthening rational behavior.

An Amendment Suggestion on the Radio Wave Act for Horizontal Regulatory Framework Based on a Master Plan for Radio Wave Promotion of 2019 (제3차 전파진흥기본계획에 따른 수평적 규제체계로의 전파법 개정 제안)

  • Oh, Byoung-Cheol
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.6
    • /
    • pp.427-437
    • /
    • 2019
  • In January, 2019, the Ministry of Science and ICT announced the third edition of Master Plans for Radio Wave Promotion, effective from 2019 to 2023. The focus of this plan is to implement market based radio wave policy and horizontal regulatory framework. Although it appears to be past due, such change in the radio wave policy is not only fair and structured, but also unprecedented and ground breaking in legality. In order to successfully implement market based radio wave policy and horizontal regulatory framework, we must implement identical radio wave license based on license with consideration and time-limited usage. Through this, efficient distribution of finite radio wave resource may come to reality. Furthermore, there must be an effort to include life style regulation on license into radio wave act in the future.

An Interdisciplinary Approach to Industry-Based Complex Problem-Solving: Sustainable Policy Solutions to the Malaysian Water Crisis

  • Richards, Cameron;Padfield, Rory
    • Asian Journal of Innovation and Policy
    • /
    • v.5 no.1
    • /
    • pp.55-77
    • /
    • 2016
  • This paper focuses on how an integrated or systemic approach is needed to both investigate and connect different kinds of interdisciplinary inquiry and knowledge within and beyond universities to encourage more productive collaboration with the other three ‘macro stakeholders’ - government, business, and the wider community. In this way universities can and should provide a greater leadership role in sustainability, innovation and policy studies. Such a framework is needed to also help to change the view of many that academics should just play a supporting role of providing specialised technical expertise only to the other macro stakeholders. The interdisciplinary and collaborative framework developed here is applied to the on-going water crisis in Malaysia - an exemplary complex problem-solving basis for seeking sustainable policy solutions to diverse challenges. As further discussed, this was applied also in practice to a multi-stakeholder seminar on addressing the difficult policy challenges of the Malaysian water industry and sector.

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.

A Policy-based Resource Management Framework for QoS Improvement of Mobile Terminals in heterogeneous Network (이종망에서 이동 단말기의 QoS를 향상시키는 정책기반 자원관리 프레임워크)

  • Lee, Kye-Im;Jung, Soon-Gi;Lee, Jong-Chan;Park, Sang-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.125-133
    • /
    • 2010
  • A policy based resource management framework is proposed, that supports the optimal QoS by applying resources management function which is changed according to the status of mobile terminal and heterogeneous connections to hand-over process of mobile terminals based on heterogeneous network. To assess the performance of policy based resource management framework proposed in this thesis, in case of applying weighted policy for selecting optimal cell in hand-over occurring among duplicated heterogeneous connections, the transmission delay was remarkably enhanced as the number of multimedia sessions increased. This means, in case of QoS deterioration of multimedia session occurring in service connection, hand-over was executed with the optimal connection.