• Title/Summary/Keyword: Secure Execution

Search Result 119, Processing Time 0.024 seconds

A Study of Evaluation Indicators for Amenity and the Activation Plan in Gangneung (강릉시 어메니티 지표선정과 활성화 방안)

  • Kim, Nam-Ho;Jo, Tae-Dong;Lee, Chung-Yoen;Kang, Yun-Hye
    • Journal of Environmental Science International
    • /
    • v.17 no.4
    • /
    • pp.375-384
    • /
    • 2008
  • This research aimed to grasp the recognition of the amenity of the university students residing in Gyo-dong residential area in Gangneung city, the local residents residing in Daehag-ro which is near Jungang-ro in downtown and the public servants related to city development in Gangneung city office and thereby propose a plan to improve the amenity of Gangneung city. Based on the result of the research, the university student group around Gyo-dong residential area mostly recognized the amenity and the local residents around Daehag-ro showed insufficient recognition of the amenity and some of related public servants were found to be ignorant of the term amenity. Also, the priorities of amenity indexes identified from these 3 groups commonly showed aliveness requiring green lands and watercourses on top but 2nd priority of each group tended to be different from each other. Through the research result as above, we would like to propose the plan to improve as follows. First, the recognition of the concept of amenity is necessary. Second, green lands and watercourses that were selected by all of the 3 groups as ranking no. 1 should be secured. Third, the value of amenity resources should be evaluated. Gangneung city is a city where mountains and the sea are harmonized together granting abundant god blessed natural resources. But if Gangneung city would imprudently reclaims the excellent god blessed natural environment under the good title of city and housing lands development, its ranking in city competitiveness evaluations will be expected to continue descending. Therefore, as proposed in this research, the thing that has to be implemented with first priority for amenity Gangneung city is the execution of amenity policy to secure the identity of Gangneung city and the aspect of regulations or systems should also be pursued together with the policy.

Development of the Technology Transfer System In Reservoir operation

  • ITO Kazumasa;IMANISHI Yumi
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.44-51
    • /
    • 2005
  • Water flow in rivers during flood season can be 10 to 100 fold higher than normal seasons (low precipitation) in Japan and predicting flood runoff is essential for operating reservoirs with discharging gates. Abundant experiences and knowledge are requisites for operators to be able to make efficient decisions at work. This research investigated a method to transfer technical knowledge by acquiring skills and knowledge from actual dam operators and by using the information to construct an educational training system. The purpose of the research was to enable the execution of a secure and rational reservoir operation during flood period. The educational training system for reservoir operation was developed with the focuses on acquiring knowledge on hydraulics and hydrology and learning about decision making related to the reservoir operation as well as the timing of control. The system is capable of conducting education that corresponds to individual levels in each location. Of the educational training methods, a lecture method that uses textbooks is effective for the understanding of basic knowledge and concepts while a training method that uses a simulation device is essential for the practice of advanced and specialized procedures in specific fields. Simulation devices are used in operational training for airplane flight and driving cars and trains. The educational system presented here was designed to provide further assistance to those who have acquired basic knowledge and concepts through textbooks and also to at low them to perform the satisfactory operation of dam equipment. Our research proposes a method which can realize a system to acquire technical skills-the skills which are the foundation of technical knowledge and operation.

  • PDF

A Study on the Encrypted Scheme Using Key Management Method Based on the Random Number Rearrangement for the Effective E-Document Management (효율적인 전자문서 관리를 위한 난수 재배열 기반의 키 관리 방법을 이용한 암호화 기법에 관한 연구)

  • Kim, Tae-Wook;Sung, Kyung-Sang;Kim, Jung-Jae;Min, Byoung-Muk;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.575-582
    • /
    • 2009
  • With all merits of electronic documents, there exist threats to the security such as illegal outflow, destroying, loss, distortion, etc. The techniques to protect the electronic documents against illegal forgery, alteration, removal are strongly requested. Even though various security technologies have been developed for electronic documents, most of them are emphasized to prevention of forgery or repudiation. This paper presents some problems in cryptography technologies currently used in the existing electronic document systems, and offer efficient methods to adopt cryptography algorithms to improve and secure the electronic document systems. To validate performance of the proposed random rearrangement method comparing with the existing cryptographies, basic elements have been compared, and it has been proved that the proposed method gives better results both in security and efficiency.

A Conceptual Study for Creating "A Good Quality Startup" by Algorithm-Based Entrepreneurship Education ('질 좋은' 창업의 개념정립과 창업교육 중심의 '질 좋은' 창업육성시스템 구축방안 연구)

  • Yang, Young-Seok;Choi, Jong-In;HwangBo, Yun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.2
    • /
    • pp.141-150
    • /
    • 2012
  • This paper aims at proposing the establishment of concept for qualified startup business and the model of smart incubating business system for qualified startup business creation, which is being government's recent policy paradigm. The result of this paper shows the theoretical setting for the concept of qualified startup business through researching papers precedent and analyzing the startup business education affairs of American universities and proposing the model of requisition for qualified startup business. The core model of requisition for qualified startup business is to secure the essential factors for qualified startup business and the preparation process through compounding the requisites, the execution ecosystem for leading the mixing requisites and supporting. This model has been practiced enormously at business creation education field in American universities. This paper especially propose TEC program of NC State University in U.S.A. by case study.

  • PDF

A LSB-based Efficient Selective Encryption of Fingerprint Images for Embedded Processors (임베디드 프로세서에 적합한 LSB 기반 지문영상의 효율적인 부분 암호화 방법)

  • Moon, Dae-Sung;Chung, Yong-Wha;Pan, Sung-Bum;Moon, Ki-Young;Kim, Ju-Man
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1304-1313
    • /
    • 2006
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting characteristics of fingerprint images. Because the fingerprint sensor is computationally limited, however, such encryption algorithm may not be applied to the full fingerprint images in real-time. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a specific bitplane of each pixel of the fingerprint image. We use the LSB as specific bitplane instead of MSB used to encrypt general multimedia contents because simple attacks can reveal the fingerprint ridge information even from the MSB-based encryption. Based on the experimental results, our proposed algorithm can reduce the execution time of the full encryption by a factor of six and guarantee both the integrity and the confidentiality without any leakage of the ridge information.

  • PDF

Research on Education and Training of the Analyzer for Security Enhancement of SW Vulnerability (SW 취약점의 보안성 강화를 위한 진단원의 교육 양성 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.5
    • /
    • pp.945-950
    • /
    • 2017
  • Due to the vulnerability of the software, there is a hacking attack on the country's cyber infrastructure and real financial assets. Software is an integral part of the operating system and execution system that controls and operates Internet information provision, cyber financial settlement and cyber infrastructures. Analyzing these software vulnerabilities and enhancing security will enhance the security of cyber infrastructures and enhance the security of actual life in the actual country and people. Software development security system analysis and software development Security diagnosis analysis and research for enhancing security of software vulnerability. In addition, we will develop a textbook for the training of software vulnerability diagnosis and maintenance education, develop pilot test problems, pilot test of diagnostic staff, The purpose of this study is to enhance the software security of the cyber infrastructures of national and national life by presenting curriculum and diagnosis guide to train the software vulnerability examiner.

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.

Development of Strategic Environment Assessment Model in Urban Development Plan - In case of Metropolitan Plan - (도시개발 행정계획의 전략환경평가 모델개발 - 광역도시계획에의 사례적용 -)

  • Choi, Hee-Sun;Song, Young-Il
    • Journal of Environmental Impact Assessment
    • /
    • v.19 no.4
    • /
    • pp.381-396
    • /
    • 2010
  • It is essential to consider strategies, spatial planning, and reflection of sustainability for the creation of sound urban spaces. To this end, there is a need for plans that can secure better sustainability through strategic environmental assessment (SEA) of plans. This study examined the literature and available precedent to develop a SEA model for administrative plans for urban development including metropolitan plans, urban master plans and urban management plans. In the course of development of the model, environmental issues associated with the urban plans were analyzed by classifying them into ten categories, including "spatial planning," "conservation planning," "greenbelt systems," "habitats." and etc. according to their rank. Furthermore, those issues were reflected on the development of environmental evaluation indices for the plans. Overall and detailed environmental indices that can be applied to the administrative plans for urban development including metropolitan plans, urban master plans and urban management plans were devised for five stages: (1) Establishment of development goals and strategy, (2) Analysis of current status and characteristics, (3) Conceptualization of spatial structure, (4) Planning for each department, and (5) Execution and management. Sub plans are more detailed and concrete. Criteria based on the evaluation indices, when performing evaluations on plans based on each environmental assessment index in reference to experts and the literature, were used to forecast their effects, i.e. whether they had a positive, negative, or no effect or relationship, or whether their effects was uncertain. Based on the forecasts, this study then presents means to establish more improvable plans. Furthermore, by synthesis of the effects according to each index and integration of the process, plans were analyzed overall. This study reflects the characteristics of the present time period based on issues in the SEA process and techniques in upper level administrative plans being newly established, and presents them according to the stage of each plan. Furthermore, by forecasting the effect of plans by stage, this study presents proposals for improvement, and in this aspect, can be meaningful in promoting plan improvements through SEA.

A Development of the Risk Factor Dictionary for the Private Finance Construction Project (민간투자 건설사업 위험요인사전 개발)

  • Kim, Seon-Gyoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.5
    • /
    • pp.152-160
    • /
    • 2007
  • Recently, the government is very active to secure the financial resources by inducement of the private investment in fulfilling an extension of the SOC facilities. One of the reasons that the private investors hesitate to put money into the private finance projects, however, is the lack of knowledges about various risks to be possibly incurred during the project execution. This research was performed as one of the preparation works in order for a A engineering company to act as a prime contractor of the project management service in the private finance project, and finally developed the risk factor dictionary as a new concept to satisfy the requirement of a A company and overcome a limit of the existing risk checklists. Although the risk factor dictionary looks like the only simplified table to be the risk factors identified in three dimensions, the impacts and response strategies expressed in narrative and multi-items, and the responsible parties indicated, it has great meanings to get a lot of direct and indirect accomplishments over the simplified table during the development process.

An Effective Query Rewriting Method in Secure XML Access Control (안전한 XML 접근제어에서 효율적인 질의 재작성 기법)

  • An, Dong-Chan;Byun, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.127-137
    • /
    • 2006
  • We propose two phase filtering scheme to develop an efficient mechanism for XML databases to control query-based access. An access control environment for XML documents and some techniques to deal with fine-grained authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query-based access. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form through a query optimization technique, which is guaranteed to have no access violations using tree-aware metadata of XML schemas. The scheme can be applied to any XML database management system and has several advantages such as small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

  • PDF