• Title/Summary/Keyword: Protection in Network Environment

Search Result 195, Processing Time 0.024 seconds

Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment (네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

Optimization of Air Quality Monitoring Networks in Busan Using a GIS-based Decision Support System (GIS기반 의사결정지원시스템을 이용한 부산 대기질 측정망의 최적화)

  • Yoo, Eun-Chul;Park, Ok-Hyun
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.23 no.5
    • /
    • pp.526-538
    • /
    • 2007
  • Since air quality monitoring data sets are important base for developing of air quality management strategies including policy making and policy performance assessment, the environmental protection authorities need to organize and operate monitoring network properly. Air quality monitoring network of Busan, consisting of 18 stations, was allocated under unscientific and irrational principles. Thus the current state of air quality monitoring networks was reassessed the effect and appropriateness of monitoring objectives such as population protection and sources surveillance. In the process of the reassessment, a GIS-based decision support system was constructed and used to simulate air quality over complex terrain and to conduct optimization analysis for air quality monitoring network with multi-objective. The maximization of protection capability for population appears to be the most effective and principal objective among various objectives. The relocation of current monitoring stations through optimization analysis of multi-objective appears to be better than the network building for maximization of population protection capability. The decision support system developed in this study on the basis of GIS-based database appear to be useful for the environmental protection authorities to plan and manage air quality monitoring network over complex terrain.

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.

A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks (DDoS 공격에 대한 선제적 침입 탐지·차단 방안)

  • Kim, Dae Hwan;Lee, Soo Jin
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.157-167
    • /
    • 2016
  • Task environment for enterprises and public institutions are moving into cyberspace-based environment and structing the LTE wireless network. The applications "App" operated in the LTE wireless network are mostly being developed with Android-based. But Android-based malwares are surging and they are the potential DDoS attacks. DDoS attack is a major information security threat and a means of cyber attacks. DDoS attacks are difficult to detect in advance and to defense effectively. To this end, a DMZ is set up in front of a network infrastructure and a particular server for defensive information security. Because There is the proliferation of mobile devices and apps, and the activation of android diversify DDoS attack methods. a DMZ is a limit to detect and to protect against DDoS attacks. This paper proposes an information security method to detect and Protect DDoS attacks from the terminal phase using a Preemptive military strategy concept. and then DDoS attack detection and protection app is implemented and proved its effectiveness by reducing web service request and memory usage. DDoS attack detection and protecting will ensure the efficiency of the mobile network resources. This method is necessary for a continuous usage of a wireless network environment for the national security and disaster control.

Analysis of regulatory action for environmental protection in International Commerce (국제교역에 있어 환경보호를 위한 규제조치의 내용 분석)

  • Lee, Jae-Young
    • International Commerce and Information Review
    • /
    • v.11 no.1
    • /
    • pp.379-403
    • /
    • 2009
  • The Purpose of this study is to research the problems of trade restriction for an environment protection. Environmental regulation relate to trade are Convention on International Trade in Endangered Species of Wild Fauna & Flora, Montreal Protocol on Substances that Deplete the Ozone Layer, Kyoto Protocol to the UN Framework Convention on Climate Change, Basel Convention on the Control of Transboundary Movements of Hazardous Wastes & Their Disposal, Cartagena Protocol on Biosafty and WTO Agreement. Regulatory action for environmental protection has economics instrument, command & control, liablity, damage compensation, voluntary agreement. In the case of our country, impact of regulatory action for environmental protection is low. Because is recognized position of developing country yet. For in the balance rules of trade and enviroment, First must satisfy WTO's basic principles and principle of quantitative restrictions prohibition, Second, operation of protection action must reasonable and objective standards Third, must satisfy GATT article 20 (b) clause and (g) protestation each essential factor To grow for environment advanced country, we should do i) using of FTA ii) international cooperation strengthening for developing country position iii) construction of environment information network

  • PDF

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF

A Study of Virtual Home Environment Implementation Scenario for Subscriber Privacy (가입자 정보보호를 위한 Virtual Home Environment 시나리오 보안 취약점 분석)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of Industrial Technology
    • /
    • v.21 no.A
    • /
    • pp.117-122
    • /
    • 2001
  • Currently, the VHE (suggested for global roaming user to provide personal service environment) implementation scenario is being proposed to realize 3G network requirements. However, developing VHE scenarios are focused on signal flow between node and network, and network and network. this case may result in weakness to protect subscriber's privacy in 3G network which commonly uses visited network. In this paper, we reanalyze a several VHE implementation scenarios for user profile protection, indicate a problem concerning user privacy, and finally, design a procedure to cope with vulnerability in VHE implementation scenario.

  • PDF

German Policies on Soil Protection and Remediation of Contaminated Sites

  • Lepke, Thomas
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2003.10a
    • /
    • pp.28-57
    • /
    • 2003
  • Germany as a densely populated and heavily industrialised country has a long and broad experience in handling contaminated sites. With this presentation we want to describe some main aspects of the soil protection policies and the remediation of contaminated sites in Germany. Due to the history of working on contaminated sites in Germany the Federal Soil Protection Act came into force in 1998. A lot of programmes and network in Germany and in Europe, funded by the State or the European Union, helped developing new measures and techniques for remediation and also for implementing regulations for the involved authorities. Questions like 'who is responsible?' and 'who has to pay for measurements and the remediation?' became more and more important. In the near future there will be an official European Soil Protection Policy (is expected in June 2004). Besides the contaminated sites also other soil protection policies as 'Reducing the land consumption' are pursued and an indicator is developed.and an indicator is developed.

  • PDF

Forecasting Fish Communities in River Networks

  • Rashleigh, Brenda;White, Denis;Ebersole, Joe L.;Barber, Craig;Boxall, George;Brookes, Allen
    • Korean Journal of Ecology and Environment
    • /
    • v.45 no.2
    • /
    • pp.150-157
    • /
    • 2012
  • Fish communities in river networks provide significant ecosystem services that will likely decline under future land use and climate change. We developed a model that simulates the consequences to multiple populations of one or more fish species-a meta-community-from multiple stressors across a river network. The model is spatially-explicit and age-structured, with three components: habitat suitability; population dynamics, including species interactions; and movement across a spatial network. Although this model is simple, it can form the basis of fisheries assessments and may be incorporated into an integrated modeling system for watershed management and prediction.