• Title/Summary/Keyword: Protection and Management System

Search Result 1,292, Processing Time 0.032 seconds

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.

A Development of Intrusion Detection and Protection System using Netfilter Framework (넷필터 프레임워크를 이용한 침입 탐지 및 차단 시스템 개발)

  • Baek, Seoung-Yub;Lee, Geun-Ho;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.33-41
    • /
    • 2005
  • Information can be leaked, changed, damaged and illegally used regardless of the intension of the information owner. Intrusion Detection Systems and Firewalls are used to protect the illegal accesses in the network. But these are the passive protection method, not the active protection method. They only react based on the predefined protection rules or only report to the administrator. In this paper, we develop the intrusion detection and protection system using Netfilter framework. The system makes the administrator's management easy and simple. Furthermore, it offers active protection mechanism against the intrusions.

  • PDF

Key Management Server Design in Multiuser Environment for Critical File Protection

  • Sung-Hwa Han
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.2
    • /
    • pp.121-126
    • /
    • 2024
  • In enterprise environments, file owners are often required to share critical files with other users, with encryption-based file delivery systems used to maintain confidentiality. However, important information might be leaked if the cryptokey used for encryption is exposed. To recover confidentiality, the file owner must then re-encrypt and redistribute the file along with its new encryption key, which requires considerable resources. To address this, we propose a key management server that minimizes the distribution of encryption keys when critical files are compromised, with unique encryption keys assigned for each registered user to access critical files. While providing the targeted functions, the server employs a level of system resources comparable to that of legacy digital rights management. Thus, when implemented in an enterprise environment, the proposed server minimizes cryptokey redistribution while maintaining accessibility to critical files in the event of an information breach.

The Importance of Strengthening the Role of the Institutional Review Board and the Human Research Protections Program following the Revision of the Act on the Safety and Support of Advanced Regenerative Medicine and Advanced Biopharmaceuticals ('첨단재생의료 및 첨단바이오의약품 안전 및 지원에 관한 법률' 개정에 따른 '기관생명윤리위원회(Institutional Review Board)' 역할 및 '임상시험 및 대상자보호프로그램(Human Research Protections Program)' 강화의 중요성)

  • Byung Soo Kim
    • The Journal of KAIRB
    • /
    • v.6 no.1
    • /
    • pp.1-4
    • /
    • 2024
  • The strengthening of Institutional Review Board (IRB) and Human Research Protection Program (HRPP) for clinical research on advanced regenerative medicine reflecting the 3 Principles of the Belmont Report (Respect, Beneficence, Justice) is very important. The research institution IRB should naturally be in charge of managing the clinical research process. And it is crucial to reinforce HRPP for the protection of research subjects in institutions conducting advanced regeneration clinical research. So, it is needed to establish a Protection System for Advanced Regenerative Medical Research Subjects composed of clinical research management communication system for advanced regenerative medicine between KAIRB (Korean Association of IRB) of research institutes and National Management Agency for Advanced Regenerative Medical Research. In advanced regenerative medicine clinical research to verify safety and efficacy of the investigational drugs to the subjects with rare and incurable diseases rather than to treat the patients, it is hoped that a management system that guarantees the scientific characteristics of research and the rights of research subjects would be well organized and operated.

  • PDF

IPMP system for a digital contents copyright protection (디지털 콘텐츠 저작권 보호를 위한 IPMP 시스템)

  • Kim, Chang-Su;Yoo, Sung-Jae;Choi, Il-Sun;Song, Jung-Young;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.409-412
    • /
    • 2005
  • A digital content have been utilized extensively without being limited to one territory of communication, computer, broadcasting, Mobile etc. A digital contents industry have been raised to a key point industry of a knowledge information society. An information infra setup of a global unit was processing to the development of Internet therefor copyright protection a digital contents and system for the officer have been desired. Like this, according as digital contents do fetters to MPEG-4 is circulated, copyright problem was risen. So, people had a lot of interests to protect and manage copyright. Hereupon, MPEG of the IS0/IEC established IPMP(Intellectual Property Management and Protection) standard, and supplements and corrects continuously standard. Therefore, existing system does fetters to MPEG-4 need system that process IPMP information. Hereupon. in this paper, designed system module that is processed by IPMP extension standard that progress now, and embodied copyright protection and management system that user can insert and update IPMP information efficiently within whole or specification part of MPEG-4 digital contents.

  • PDF

Delphi Study on the Reduction of Cross-contamination and Improvement of Management System on Firefighting Protection Suit (소방 방화복 교차오염 저감 및 관리체계 개선을 위한 델파이 연구)

  • Kim, Soo Jin;Ham, Seunghon
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.32 no.2
    • /
    • pp.182-194
    • /
    • 2022
  • Objectives: This study evaluates and recommends the priority of policy implementation to improve the fire protection clothing management system used by firefighters and the reduction of cross-contamination from contaminated clothing at the scene of a fire. Methods: It consisted of 7 experts and conducted three interviews and two modified Delphi surveys. Through the results of previous research and interviews with experts, a plan to reduce cross-contamination of fire suits and improve the management system was first derived. An improvement plan was presented in the four areas including resources, management, fire protection related work, and laws and regulations, and the priority of policy implementation was derived by analyzing the importance and practicality of the policy at the same time. Results: As a result of the analysis, the first priority was education on the health effects of pollutants at the disaster scene for firefighters, and the second priority was the addition of SOP for the primary decontamination of on-scene personal protective equipment in preparation for the health effects of the disaster scene, and education for fire suppression and rescue workers. The next step was to improve the management system of personal protective equipment such as fire suits and develop a training course for systematic operation. Conclusions: This findings could be used in the implementation of mid- to long-term firefighting policies for the systematic operation and establishment of a systematic management system for personal protective equipment such as fire protective suits.

Design & Implementation of License-based Digital Rights Management System (라이센스 기반 디지털 저작권 보호 시스템 설계 및 구현)

  • Jeong, Yeon-Jeong;Yoon, Ki-Song;Ryu, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.55-62
    • /
    • 2004
  • The web-based technology allows anybody who has access to the Internet to get all kinds of information from the World Wide Web. It brings about issues regarding intellectual property and copyright threats. After content is downloaded, no further protection is provided on the content that has been accessed. DRM (Digital Right Management) technologies came out to ensure the protection of copyrighted content and information. In this paper, we propose architecture of license-based digital rights management system for protection of contents and principles' rights such as contents creators, providers, distributors, and uses in contents distribution value-chain over Internet. This system makes on-line processing of all value-chain from creator to purchaser possible, compared with existing DRM products only supporting only limited distribution between distributor and purchaser.

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

Improvement of Information Security Management System Evaluation Model Considering the Characteristics of Small and Medium-Sized Enterprises (중소기업의 특성을 고려한 정보보호 관리체계 평가 모델 개선)

  • Kim, Yi Heon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.1
    • /
    • pp.81-102
    • /
    • 2022
  • Although more than 99% of all Korean companies are small and medium-sized enterprises (SMEs), which accounts for a large part of the national economy, they are having difficulties in securing information protection capabilities due to problems such as budget and manpower. On the other hand, as 97% of cyber incidents are concentrated in SMEs, it is urgent to strengthen the information protection management and response capabilities of SMEs. Although the government is promoting company-wide information security consulting for SMEs, the need for supplementing it's procedures and consulting items is being raised. Based on the results of information security consulting supported by the government in 2020, this study attempted to derive improvement plans by interviewing SME workers, information security consultants, and system operators. Through the research results, it is expected to create a basis for SMEs to autonomously check the information security management system and contribute to the reference of related policies.

The Practice and Effect of Water Conservation Legislation in China

  • Liu, Dingxiang;Li, Jianguo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.19-19
    • /
    • 2012
  • After more 60 years' legislative practice of water resources protection, the Chinese government has initially established a legislative system of water resources protection, based on Water Law. From the development course of water resources protection legislation, the paper mainly analyzes the legal framework, main content & management system of water resources protection, and pointed out the improved direction of water resources conservation legislation in China in the future.

  • PDF