• Title/Summary/Keyword: Secure Execution

Search Result 119, Processing Time 0.023 seconds

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

Design of Translator for generating Secure Java Bytecode from Thread code of Multithreaded Models (다중스레드 모델의 스레드 코드를 안전한 자바 바이트코드로 변환하기 위한 번역기 설계)

  • 김기태;유원희
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.148-155
    • /
    • 2002
  • Multithreaded models improve the efficiency of parallel systems by combining inner parallelism, asynchronous data availability and the locality of von Neumann model. This model executes thread code which is generated by compiler and of which quality is given by the method of generation. But multithreaded models have the demerit that execution model is restricted to a specific platform. On the contrary, Java has the platform independency, so if we can translate from threads code to Java bytecode, we can use the advantages of multithreaded models in many platforms. Java executes Java bytecode which is intermediate language format for Java virtual machine. Java bytecode plays a role of an intermediate language in translator and Java virtual machine work as back-end in translator. But, Java bytecode which is translated from multithreaded models have the demerit that it is not secure. This paper, multhithread code whose feature of platform independent can execute in java virtual machine. We design and implement translator which translate from thread code of multithreaded code to Java bytecode and which check secure problems from Java bytecode.

  • PDF

An Effective Employment and Execution Performance Improvement Method of Mobile Web Widget Resources Based on the OMTP BONDI (OMTP BONDI 기반 모바일 웹 위젯 리소스의 효율적 운용 및 구동 성능 개선 기법 연구)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.153-170
    • /
    • 2011
  • OMTP (Open Mobile Terminal Platform) is a global forum made by telecommunications providers to promote user-oriented mobile services and data business. Devised by OMTP, BONDI is a browser-based application or a mobile web run-time platform to help widgets make good use of functions of mobile devices in a secure way. BONDI enables applications programmed with web standard technologies such as HTML, JavaScript, CSS, and AJAX to reach the internal functions of mobile devices. Since BONDI, which is not just a simple network application, can reach the internal resources of devices in standard ways, it enables the application and widgets to be developed regardless of tile OS or platform. Web browser-based widgets are vulnerable to the network environment, and their exeeution speed can be slowed as the operations of the widgets or applications become heavy. However, those web widgets will be continuously used thanks to the user-friendly simple interface and the faster speed in using web resources more than the native widgets inside the device. This study suggested a method to effectively operate and manage the resource of OMTP BONDI web widget and then provided an improved result based on a running performance evaluation experiment. The experiment was carried to improve the entire operating time by enhancing the module-loading speed. In this regard, only indispensable modules were allowed to be loaded while the BONDI widget was underway. For the purpose, the widget resource list, able to make the operating speed of the BONDI widget faster, was redefined while a widget cache was employed. In addition, the widget box, a management tool for removed widgets, was devised to store temporarily idle widgets.

A Study on the E-Document Encrypted using the Effective key Management Method (효율적 키 관리 방식 적용을 통한 전자문서 암호화에 관한 연구)

  • Kim, Tae-Wook;Sung, Kyung-Sang;Oh, Hae-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.5
    • /
    • pp.1000-1008
    • /
    • 2009
  • It also increases the competitive power of the nation. With all these merits of electronic documents, there exist threats to the security such as illegal outflow, destroying, loss, distortion, etc. Currently, the techniques to protect the electronic documents against illegal forgery, alteration or removal are not enough. Until now, various security technologies have been developed for electronic documents. However, most of them are limited to prevention of forgery or repudiation. Cryptography for electronic documents is quite heavy that direct cryptography is not in progress. Additionally, key management for encryption/decryption has many difficulties that security has many weak points. Security has inversely proportional to efficiency. It is strongly requested to adopt various cryptography technologies into the electronic document system to offer more efficient and safer services. Therefore, this paper presents some problems in cryptography technologies currently used in the existing electronic document systems, and offer efficient methods to adopt cryptography algorithms to improve and secure the electronic document systems. To validate performance of proposed method compare with the existing cryptographies, critical elements have been compared, and it has been proved that the proposed method gives better results both in security and efficiency.

A Study of Model on the Optimal Allocation of Budget for the Efficiency of the University Evaluation (대학 평가개선을 위한 예산 최적화 배분 Model 연구)

  • Choi, Bum Soon;Lim, Wang Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.7
    • /
    • pp.165-174
    • /
    • 2013
  • Recently, many universities in Korea have been faced with critical crisis such as the decrease in the number of freshmen, the pressure for tuition cuts, M&A between universities and so on. Nobody has expected that universities will have this kind of difficulties. The universities are making attempts to innovate the quality of education to secure high level of education and to meet social needs to overcome these internal and external environment of crisis. For this innovation, the universities have sought to reduce the budget as well as conducted the self-evaluation to figure out their relative positions annually. Innovations cannot have having the limitation without education funds. Budget spent in universities have influences directly or indirectly on the structural improvement of the finance and on the growth of universities. The purpose of this study is to explore the decision-making method to find the optimal budget allocation so as to minimize the execution budget and to maximize the management evaluation by taking the advantage to analyse the relationship between the evaluation and the budget. Therefore, in this paper, we implement the development of the mathematical model for the University Evaluation and Budget Allocation Optimization in the form of the linear programming.

Special Judicial Police for Enhancing Administrative Power A Study on the Expansion of Jobs: Based on the results of 10 years' operation of Seoul Metropolitan Police Judicial Police Team (행정의 집행력 강화를 위한 특별사법경찰 직무확대에 관한 연구 - 서울특별시 민생사법경찰단 운영 10년 분석 결과를 바탕으로 -)

  • Yang, Jae Yeol;Kim, Sang Su
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.59-80
    • /
    • 2019
  • Recently, our company has entered the modern knowledge company, government policy and regulation has a big influence on people's lives. Also, unlike in the past, I am hoping for administrative intervention as a problem peculiar to the environment, such as environmental housing problems, urban transportation problems, misuse problems, etc. and corporate pending issues. In this study, through the 10th year of the Seoul Special Citizen Judicial Police Force, if the local autonomy is a special envoy, it will try to present the correctness in the organization luck. As a measure to secure the nature of administrative action, the method of investigation was through the study of the execution process of administrative penalty and its result based on the statistical data of Seoul City. Therefore, we will analyze the process and operation of the 10-year organizational change of the Seoul Metropolitan Government's police force and examine how the police force of the people's livelihoods, which is a special investigation organization, is expanding its duties in order to strengthen the enforcement power of the administration. Also, we will make future-oriented suggestions to encourage the readjustment of the current relevant laws, such as the Ministry of Patriots and Veterans Affairs, and to actively accommodate the expected changes of the special law police organization in charge of the enforcement of the police system.

A Study on the Legal Nature of the Duty to Arrange Spill Clean-up Equipment and the Issue on the Justification of Its Privatization (방제선 등 배치의무의 법적 성질 및 민간개방의 정당성에 관한 연구)

  • Lee, Jung Won
    • Ocean policy research
    • /
    • v.33 no.2
    • /
    • pp.83-119
    • /
    • 2018
  • Under the Korean Marine Environment Management Act (hereunder, the KMEMA), the duty to arrange spill clean-up equipments, including spill clean-up vessels, required by the article 67 of the KMEMA is in essence the provision of public goods since it is a precautionary or preventive measure for the efficient performance of oil spill cleaning up. Also the obligation to control marine pollution and the duty to arrange of anti-pollution measures imposed on polluters is the obligation imposed by the public law in accordance with "the Polluter-Pays Principle". Therefore, the execution of such obligations shall be accompanied by the minimum legal and institutional arrangements. On the other hand, judging whether to form the roles of the public and private sectors in providing public goods is basically a matter of policy decision. However, even if the private sector is allowed to participate in the provision of public goods, it is imperative that a minimum requirement be provided to secure the public interest. Although major countries allows polluters to conclude a preliminary contract with a civil anti-pollution management company, these civilian institutions are in principle constituted by the owners of oil storage facilities. Additionally it is worth noting that it operates as a non-profit organization. In particular, if the practitioner performs pollution control for commercial purposes, their profitability may depend on the size of the pollution, the period spent on pollution control, the size of the equipment and manpower mobilized in the pollution control, and so on. Considering the above problems, caution should be taken to allow marine environmental management companies to be un-limitedly entrusted with the responsibility of arranging measures such as pollution control. In order to allow the marine environmental management contractor to be entrusted for the assignment of duty to protect the marine environment, the marine environment management business should be expanded so that the marine pollutant management capacity satisfies the statutory control capacity. For this purpose, it is necessary to manage and supervise the maintenance and improvement of the control capability of the marine environment management business. It is also necessary to discuss the introduction of the grading system for the control ability of the civil control companies alike in major countries.

Development of Risk Evaluation Checklist for In-Situ Production of Precast Concrete Members (기성콘크리트 부재의 현장생산 리스크 평가를 위한 체크리스트 개발)

  • Lim, Jeeyoung;Jeong, Hee Woong;Kim, Dae Young
    • Journal of the Korea Institute of Building Construction
    • /
    • v.21 no.5
    • /
    • pp.445-457
    • /
    • 2021
  • In previous studies, it was confirmed that through the in-situ production of precast concrete members, costs could be reduced by 14.5-39.4% compared to in-plant production. In particular, it was confirmed that the factory owner did not make a contract if it did not earn more than 20% of the production cost. If precast concrete members are produced in-situ under the same conditions, the quality equivalent to that of factory production can be secured. As it is advantageous in terms of cost and quality, precast concrete members must be produced in-situ. However, it is difficult to produce all quantities in-situ due to time and various other constraints. This is because in-situ production is avoided due to anticipated risks during the project management process. However, if the risk factors are analyzed before performing in-situ production of precast concrete members, it will increase the opportunity for in-situ production. Therefore, this study develops a checklist for evaluating the risk of in-situ production of precast concrete members. By applying the checklist to one case site, it was verified that risk factors can be evaluated easily and quickly. As a result, it was analyzed that sites with a high building coverage ratio are classified as high-risk sites because it is difficult to secure usable area for production and storage. The developed checklist efficiently evaluates the risk factors of in-site production, and makes it possible for the operator to determine the risk factors, which can change frequently during project execution, and respond according to the situation.

Evaluating Teacher Policy of Park Geun-hye Government (박근혜정부의 교원정책 평가)

  • Shin, Hyun-Seok;Yonn, Ji Hee
    • (The)Korea Educational Review
    • /
    • v.23 no.4
    • /
    • pp.101-133
    • /
    • 2017
  • This Study aims to evaluate teacher policy in the Park Administration and to suggest tasks based on the results. To attain the aim, it describes overall teacher policy process in Park Administration and evaluates teacher policy based on the criteria which was driven from the CIPP model. The conclusions are summarized as follows. First, the environmental suitability of the situation assessment was met in general. The reason for this was that the teacher policy of the Park Geun-hye government was introduced reflecting changes in the environment and demands of policy stakeholders. The validity and feasibility of the policy objective of the input evaluation were not satisfied. There were deficiencies in the objectives of the policy measures. The objectives of the measures were not linked to the policy objectives. The budget necessary for policy enforcement were not secured. In future policy design, efforts should be made to examine whether the policy goals are valid, to secure resources necessary for policy implementation and to increase the feasibility of policies. The procedural rationality of the process evaluation and the suitability of the means were not met. Discussion with the interest group was omitted, it was not clear whether the implementation of the policy was linked to the policy goal. In the future, it will be necessary to focus on procedures such as communication and collaboration with stakeholders, to make immediate revisions in case of problems. The effectiveness and satisfaction of the output evaluation were low. Because the validity of the policy objectives, the suitability of the means, and procedural rationality were not satisfied. In the future, it will be necessary to systematically design policies and communicate with stakeholders in the execution process to prevent policy failures and actively.