• Title/Summary/Keyword: Protect Management Information System

Search Result 305, Processing Time 0.023 seconds

Design and Implementation of Kernel Resource Management Scheme (커널 자원 관리 기법 설계 및 구현)

  • Kim, Byung-Jin;Baek, Seung-Jae;Kim, Keun-Eun;Choi, Jong-Moo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.3
    • /
    • pp.181-190
    • /
    • 2009
  • Module is an object file that can be loaded into operating system dynamically and has complete privileged access to all resources in kernel. Therefore trivial misuses in a module may cause critical system halts or deadlock situations. In this paper, we propose Kernel Resource Protector(KRP) scheme to reduce the various problems caused by module. KRP provides protections of a variety of kernel resources such as memory, major number and work queue resource. We implement the scheme onto linux kernel 2.6.18, and experimental results show that our scheme can protect kernel resources effectively.

A USB DLP Scheme for Preventing Loss of Internal Confidential Files (내부 기밀파일 유출 방지를 위한 USB DLP 기법)

  • Shin, Gyu Jin;Jung, Gu Hyun;Yang, Dong Min;Lee, Bong Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2333-2340
    • /
    • 2017
  • Recently industry is suffering severe losses of important internal information, and most of the leaks result from the insiders. Thus, various technological counter measures are being studied in order to protect private organization information. In this paper, among various internal information leakage path protection mechanisms, we propose a technique for preventing files which are defined as confidential from being copied or moved through USB. The implemented confidential file loss prevention system is composed of both signature insert manager and confidential file detect manager. The signature insert manager allows a system administrator to insert a special pattern specifying a classified confidential file, while the confidential file detect manager protects confidential file leakage when a user attempts to move or copy a confidential file to the USB memory. This results would be contributed to reducing the damage caused by leakage of confidential files outside of the company via USB.

A Study on Design for Efficient Personal Policy of Service based RBAC (서비스 기반 RBAC의 효율적인 개인별 정책 설계에 관한 연구)

  • Mun, Hyung-Jin;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.191-196
    • /
    • 2016
  • The organizations and companies establish personal information protection policy under the law and guidelines. They carry out access control without consideration for distinctiveness of the information although the damage degree varies when the information is leaked. Considering the distinctiveness, a policy needs to be made for individuals to protect his personal information. However, he is not able to write the policy because of lack of understanding the system. To write his own policy efficiently, the system that authorizes ones according to service list provided by organizations is necessary. This paper suggests the model and method that write personal policy for his information protection based on the service list provided by organizations. Through this model, fine-grained authorization and policy change are easily made and ultimately the access control customized according to one's own information is possible.

Design of Security Agent System to Provide Ubiquitous Service (유비쿼터스 서비스를 위한 보안 에이전트 시스템 설계)

  • Kim, Seok-Soo;Park, Gil-Cheol;Song, Jae-Gu
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.101-106
    • /
    • 2007
  • Recently, Ubiquitous innovation is being promoted so that they can support the uHealthcare provide management to human's health. It is thus necessary to conduct such research on the medical care environment where there is a high demand for utilization of status information. In the current situation, there is a lack of research on measures of security processing and monitoring patient status information produced from rapid growth of infra within Medical environment. This study suggests a solution of using RFID to gather patient information such as inpatient information, location of treatment room, progress of patient, humidity, temperature, and diagnostic status, after which the information are protect and processed using security level method.

  • PDF

Study of the Improvement of Information Management System on Subcontracted Service Results (하도급 용역실적 정보관리체계 개선 연구)

  • Kim, SeongJin;Kim, NamGon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6870-6876
    • /
    • 2014
  • Construction subcontracted services are conducted without clear systems, but to establish a sound trading order between the contractors and subcontractors, the government recently complemented a relevant system to legalize and systematically manage subcontracted services. This study prepared a system for managing the subcontracted construction service result after providing the optimal alternative plan through a related persons' interview, such as the ordering agency and the service company. Towards this end, the management system is provided to integrate subcontracted services and contracted services based on the system managing Construction Technology Service Result. The study findings can be shortened by more than 90% of the performance certification issuing work, and used to formulate measures to protect subcontractors, such as the prevention of low-priced subcontracts, by managing an objective and reliable subcontracted service result.

Implementation and Evaluation of Secure VoIP Conference System (DTLS 기반의 안전한 VoIP 컨퍼런스 시스템 구현 및 평가)

  • Kang, Seong-Ku;Kim, Kyou-Young;Kim, Joong-Man;Won, Yoo-Jae;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.45-57
    • /
    • 2009
  • In this paper, we implemented the conference system based on DTLS for saving securely the VoIP, which is served sprightly in the latest, securely and tested (and also analyzed) the system. As VoIP technology development, demand of conference system is increased and the related technologies are growed. But Security protocol to protect conference service is getting late than conference technology. In this paper, we studied based on DTLS protocol that can provide function of signaling, channel security, media channel security and application of group key and apply to VoIP conference system based UDP unchanged. In this paper, we searched suggested security protocols based on DTLS can apply to conference system and implement and apply the protocol to conference system. And we tested (and also alayzed) overhead of encryption and key management mechanism.

Performance Analysis of Operation Strategy of Dual Virtual Cell-based System under The Overlay Convergent Networks of Cognitive Networking (인지 네트워킹 기반 중첩 융합 네트워크에서 이중 가상 셀 운영방안의 성능분석)

  • Choi, Yu-Mi;Kim, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6B
    • /
    • pp.483-488
    • /
    • 2012
  • With the fast growing data traffic, the performance of the convergent overlay network environment under the cognitive networking environment is crucial for the implementation of the efficient network structure. In order to achieve high capacity and reliable link quality in wireless communication of the overlay convergent networks with the cognitive networking based on the advanced capability of the mobile terminal, a Distributed Wireless Communication System (DWCS) can provide the capability of ambient-aware dual cell system's operation. This paper has considered virtual cell: the Dual Virtual Cell (DVC), and also proposes DVC employment strategy based on DWCS network. One is the Active Virtual Cell which exists for user's actual data traffic and the other is the Candidate Virtual Cell which contains a set of candidate antennas to protect user's link quality from performance degradation or interruption. The considered system constructs DVC by using cognitive ability of finding useful virtual signals. Also, for multi-user high-rate data transmission, the DWCS system exploits Space-Time Trellis Codes. The effects of changing environments on the system performance has been investigated thereafter.

Real-time Audio Watermarking System Considering Audio Source and User (음원 및 사용자를 고려한 실시간 오디오 워터마킹 시스템)

  • Cho, Jung-Won;Jeong, Seung-Do
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3213-3217
    • /
    • 2009
  • Distribution, duplication and manipulation of the digital contents are very easy due to the characteristics of the digital contents. Thus, damages of invasion of property right rapidly increase due to infringement of copyright for the digital contents. To prevent illegal use and to settle conflict about ownership of the digital contents, continuous efforts with enormous expense are devoted. In this paper, we design and implement real-time audio watermarking system to protect ownership and copyright for the digital contents. The proposed system also clarifies where the responsibility about the illegal distribution lies. The system has convenient user interface so that general administrator without an expert knowledge of the protection of copyright can use easily. In addition, unlike the traditional watermarking system, our system has merit to offer information about the illegal distribution for clear post-management.

Improvement on Development Permit System after the Abolition of the Regulation against Continuous and Adjacent Development (연접개발제한 폐지 이후 개발행위허가 심의제도 개선방안)

  • Kim, Young-Woo;Yoon, Jeong-Joong
    • Land and Housing Review
    • /
    • v.3 no.2
    • /
    • pp.159-167
    • /
    • 2012
  • The regulation of continuous and adjacent development was introduced to prevent unplanned and improper development and to protect environment in green zone and non-urban area that was deficient in infrastructure. Though it has been effective, it was repealed in 2011 by disorderly development problem caused by crafty tricks around restrictions. Alternatively, the Urban Planning Commission is now deliberating on the development permit, but there are still much to be resolved such as improper committee formation and abuse of power, insufficient green corridor preservation, a lack of use of planning information system, discordance between landscape management guidelines in laws, etc. Therefore, we suggest several ideas for improvement of development permit system as follows; intensive deliberation system in the Urban Planning Commission, integrated commission for green corridor prevention, early establishment of urban planning information system, making a development permission guideline to minimize discretional act of the Urban Planning Commission, etc.

A Study on Similar Trademark Search Model Using Convolutional Neural Networks (합성곱 신경망(Convolutional Neural Network)을 활용한 지능형 유사상표 검색 모형 개발)

  • Yoon, Jae-Woong;Lee, Suk-Jun;Song, Chil-Yong;Kim, Yeon-Sik;Jung, Mi-Young;Jeong, Sang-Il
    • Management & Information Systems Review
    • /
    • v.38 no.3
    • /
    • pp.55-80
    • /
    • 2019
  • Recently, many companies improving their management performance by building a powerful brand value which is recognized for trademark rights. However, as growing up the size of online commerce market, the infringement of trademark rights is increasing. According to various studies and reports, cases of foreign and domestic companies infringing on their trademark rights are increased. As the manpower and the cost required for the protection of trademark are enormous, small and medium enterprises(SMEs) could not conduct preliminary investigations to protect their trademark rights. Besides, due to the trademark image search service does not exist, many domestic companies have a problem that investigating huge amounts of trademarks manually when conducting preliminary investigations to protect their rights of trademark. Therefore, we develop an intelligent similar trademark search model to reduce the manpower and cost for preliminary investigation. To measure the performance of the model which is developed in this study, test data selected by intellectual property experts was used, and the performance of ResNet V1 101 was the highest. The significance of this study is as follows. The experimental results empirically demonstrate that the image classification algorithm shows high performance not only object recognition but also image retrieval. Since the model that developed in this study was learned through actual trademark image data, it is expected that it can be applied in the real industrial environment.