• Title/Summary/Keyword: Security Assurance

Search Result 230, Processing Time 0.023 seconds

A Novel Dynamic Optimization Technique for Finding Optimal Trust Weights in Cloud

  • Prasad, Aluri V.H. Sai;Rajkumar, Ganapavarapu V.S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2060-2073
    • /
    • 2022
  • Cloud Computing permits users to access vast amounts of services of computing power in a virtualized environment. Providing secure services is essential. There are several problems to real-world optimization that are dynamic which means they tend to change over time. For these types of issues, the goal is not always to identify one optimum but to keep continuously adapting to the solution according to the change in the environment. The problem of scheduling in Cloud where new tasks keep coming over time is unique in terms of dynamic optimization problems. Until now, there has been a large majority of research made on the application of various Evolutionary Algorithms (EAs) to address the issues of dynamic optimization, with the focus on the maintenance of population diversity to ensure the flexibility for adapting to the changes in the environment. Generally, trust refers to the confidence or assurance in a set of entities that assure the security of data. In this work, a dynamic optimization technique is proposed to find an optimal trust weights in cloud during scheduling.

The Influence of E-commerce Logistics Service Quality on Customer Engagement Behavior

  • Dongxu ZHANG;Zhuoqi TENG;Mufeng LI;Renhong WU
    • The Journal of Economics, Marketing and Management
    • /
    • v.11 no.2
    • /
    • pp.1-11
    • /
    • 2023
  • Purpose: With the rapid development of e-commerce, logistics services, as an important part of e-commerce shopping, have gradually attracted people's attention. Customer engagement behavior is a new topic in marketing, and its connotation is still being explored. The purpose of this paper is to study the relationship between logistics service quality and customer engagement behavior. Research design, data and methodology: This study employed the method of online questionnaire survey, with Chinese e-commerce platform users as the survey objects, 248 valid survey sample data were collected, and the method of factor analysis and structural equation model analysis was used to verify the research hypothesis model constructed in this paper. Results: The four dimensions of e-commerce logistics service quality have different influences on customer satisfaction, and the influence of availability on customer satisfaction is not significant. Convenience, assurance, and security have a significant positive impact on customer satisfaction; Customer satisfaction has a significant positive impact on the three dimensions of customer engagement behavior: customer repeat purchase behavior, online word-of-mouth, and customer referrals. Conclusion: The results of this study will provide useful reference for the managers of e-commerce companies to improve customer engagement behavior by improving the logistics service quality.

An innovative BRB with viscoelastic layers: performance evaluation and numerical simulation

  • Zhou, Ying;Gong, Shunming;Hu, Qing;Wu, Rili
    • Structural Monitoring and Maintenance
    • /
    • v.5 no.2
    • /
    • pp.205-229
    • /
    • 2018
  • Energy induced by minor earthquake and micro vibration cannot be dissipated by traditional buckling-restrained braces (BRBs). To solve this problem, a new type of hybrid passive control device, named as VE-BRB, which is configured by a BRB with high-damping viscoelastic (VE) layers, is developed and studied. Theoretical analysis, performance tests, numerical simulation and case analysis are conducted to study the seismic behavior of VE-BRBs. The results indicate that the combination of hysteretic and damping devices lead to a multi-phased nature and good performance. VE-BRB's working state can be divided into three phases: before yielding of the steel core, VE layers provide sufficient damping ratio to mitigate minor vibrations; after yielding of the steel core, the steel's hysteretic deformations provide supplemental dissipative capacity for structures; after rupture of the steel core, VE layers are still able to work normally and provide multiple security assurance for structures. The simulation results agreed well with the experimental results, validating the finite element analysis method, constitutive models and the identified parameters. The comparison of the time history analysis on a 6-story frame with VE-BRBs and BRBs verified the advantages of VE-BRB for seismic protection of structures compared with traditional BRB. In general, VE-BRB had the potential to provide better control effect on structural displacement and shear in all stages than BRB as expected.

Employment Policy & Strategy of Irregular Workers in Hospital (병원의 비정규직 고용정책과 경영전략)

  • Moon, Young-Jeon;Ahn, In-Whan
    • Korea Journal of Hospital Management
    • /
    • v.13 no.4
    • /
    • pp.119-145
    • /
    • 2008
  • The objectives of this study were to inspect how the law effected on hospital employment system and which policy and strategy are needed to cope with the present situation as the law regarding irregular workers law has enacted for a year. To grasp the changes of employment style in hospital, 56 hospitals among 311 general hospitals were questioned in this study. And employment policy and strategy were developed by referencing examples of developed nations and other industries. The survey showed that the wage and welfare level of irregular workers in hospitals was improved compared to that in the other industries. But there were still much discrimination between regular and irregular workers. The policy direction of government is, first of all, to follow the principle of equal treatment to equal value of labour. The first feasible policy is to enforce social security. The second one is an employment promotion policy which reduces or exempts hospitals employing irregular workers from tax and insurance fee. The third one is to extend employment contract period to 3 years. and finally there are policies to permit more dispatched jobs and to expand the social insurance coverage. The strategies to solve the problem of irregular workers are as follows; 1) performance wage system, 2) guaranteeing employment by unlimited contract, 3) creating new category of workers, 4) the wage system of management by object, 5) the method of job classification. This study has a meaning in the point that it was studied on hospital which is special industrial part and analyzed the changes after enacting irregular workers law and presented management strategy for countermeaure program. In this study, it was expected to contribute to decisions-making in hospital management, especially when using human resources.

  • PDF

Design and Implementation of Role Assignment Protocol for Active Role Assignment and Passive Role Assignment (능동적 역할 할당과 수동적 역할 할당을 수행하는 역할 할당 프로토콜의 설계 및 구현)

  • 나상엽;김점구
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.111-117
    • /
    • 2004
  • In distributed-computing environments, there is a strong demand for the authentication and the access control of distributed-shared resources. I have presented role-based access control (RBAC) concept that is in the spotlight recently. RBAC model shows the standardized access control of complicated organization's resources. In RBAC, senior role has junior role's permission by virtue of role hierarchy. But, junior role cannot perform the permission, which is granted to the senior or other role groups. Inheritances of permissions in role hierarchies are static. In order to tackle this problem, I propose a dynamic role assignment, which classified into passive role assignment and active role assignment, and design dynamic role assignment protocol and implement role assignment server.

  • PDF

The Present State of Domestic Alert Systems for Cyber Threats (사이버 위협에 대한 국내 경보 체계 현황)

  • 이도훈;백승현;오형근;이진석
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.251-257
    • /
    • 2004
  • Todays, the more information technologies(IT) like internet is developed, the more main facilities of individuals and social organizations get deeply involved in IT. Also, the trend of cyber threats such as internet worms and viruses is moving from local pc attacks to IT infrastructure attacks by exploiting inherent vulnerabilities of IT. Social organizations has a limit to response these attacks individually, and so the systematic coordinate center for social organizations is necessary. To analyze and share cyber threat information is performed prior to the construction of the coordinate center. In this paper, we survey domestic alert systems for cyber threats of related organizations and companies, and then classify them into two categories by the range of threat assessment: global alert systems for global If infrastructure and individual alert systems for each threat. Next, we identify problems of domestic alert systems and suggest approaches to resolve them.

  • PDF

Design and Implementation of Internet Worm Spreading Prevention System (인터넷 웜 확산방지 시스템의 설계 및 구현)

  • 최양서;서동일
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.327-331
    • /
    • 2004
  • The new cyber world has created by Internet that is prosperous rapidly. But with the expansion of Internet the hacking and intrusion are also increased very much. Actually there were many incidents in Internet, but the damage was restricted within a local area and local system. However, the Great 1.25 Internet Disturbance has paralyzed the national wide Internet environment. It because the Slammer Worm. The worm is a malformed program that uses both of the hacking and computer virus techniques. It autonomously attacks the vulnerability of Windows system, duplicates and spreads by itself. Jus like the Slammer Worm, almost every worms attack the vulnerability of Windows systems that installed in personal PC. Therefore, the vulnerability in personal PC could destroy the whole Internet world. So, in this paper we propose a Internet Worm Expanding Prevention System that could be installed in personal PC to prevent from expanding the Internet Worm. And we will introduce the results of developed system.

  • PDF

An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment (디지털 컴퓨팅 환경의 디지털 증거화를 위한 침해 데이터보증 메커니즘)

  • Jang, Eun-Gyeom
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.129-141
    • /
    • 2010
  • In digital computing environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

Architecture Evaluation Utilizing CBAM and AHP (생체인식 소프트웨어의 품질 평가모듈에 관한 연구)

  • Yang, Hae-Sool;Lee, Man-Ho;Yoon, Young-Mi
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.699-708
    • /
    • 2006
  • The latest biometric field have marched fast with security technology of IT. As importance of present biometrics is realized, internal and external biometrics software market is trend that is soaring. Accordingly, high reliability of biometric software and request of high quality software are enlarged. Evaluation items and criteria must be established for biometric software quality assurance. In this paper, we development the evaluation module for biometric software test based on ISO/IEC 12119 that is the standard about software quality requirement and test, and ISO/IEC 9126 that is standard about evaluation of software product, and ISO/IEC 14598-6 that is the standard about construction of the evaluation module. Constituents of biometric software products(product descriptor, user document program and data) is subject to the quality evaluation module that we developed in this paper, we can expect improvement in the quality of software by using with a standard such as ISO/IEC 9126-3 that can be used in software development process.

History of Guard System during the Period of Military Rule in the Goryeo Dynasty (고려 무신집권기 호위제도의 경호학적 고찰)

  • Lee, Sung-Jin;Cho, Sung-Jin
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.233-258
    • /
    • 2013
  • In the early days of the Goryeo Dynasty, the royal guard was comprised of the central regular army in the 2-gun-6-wi system, and Nasungeomgun was in charge of the security inside the palace. However, the military system became disorganized during the period of military rule and the royal guard had to rely on military subjects. The military officials suppressed the civil ministers centering on Jungbang, the guarding organization close to the King to incapacitate the royal authority and control the state affairs. When the rule of the three leaders of the military rule became short-lived and Dae-seung Gyeong is raised to the ruler, he organized a do-or-die squad comprised of a hundred and more people for his personal safety, and this became the first dobang. Dobang was disassembled after Dae-seung Gyeong died of disease, but under the rule of Chung-heon Choe, Dae-seung Gyeong's dobang was revived and reinforced into 'Yukbeon Dobang' to provide the ruler with personal protection and intensify the ruling system, and it was quite a large organization with more refined system. Yukbeon Dobang was expanded and reinforced into Naeoedobang under the rule of Woo Choe, the son of Chung-heon Choe, and it was enhanced even more into Dobang Samsipyukbeon System under the rule of the grandson, Hang Choe. Dobang can be considered as the guard organization in modern sense, and it collected information and surveyed the area where guarding is required and house troops that belonged to Naedobang eliminated the risks that may follow afterwards to make assurance doubly sure for guarding. The Choe's regime established Mabyeolcho as a private guard organization in addition to dobang, and this formed the cavalry and infantry units with dobang. Yabyeolcho organized by Woo Choe in the reign of King Gojong was divided into Joabyeolcho and Ubyeolcho, and later Sineuigun was integrated with them to form Sambyeolcho. Originally, Yabyeolcho was established under the rule of Woo Choe to prevent crime in the evening, but after Sineuigun was organized with the ones who were captured by Mongolian army but escaped, in other words when Sambyeolcho was organized, the organization displayed much broader influence by covering military and police affairs as well as punishment and imprisonment. The guarding organization during the Period of Military Rule in the Goryeo Dynasty did not have strict distinction between official guard and personal guard. The private guard in modern days which is the equivalent of personal guard is characterized by its commerciality, however, house troops and the members of dobang did not seem to pursued profit. The guard organization during the period of military rule started from dobang which was organized for personal safety but gradually developed publicness through the participation of civil ministers and expansion, and later it played the pivotal role for social security serving official purpose up to the level where the distinction between official and private activities was blurred during the period of Sambyeolcho.

  • PDF