• Title/Summary/Keyword: Security Enhancement

Search Result 354, Processing Time 0.031 seconds

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

Research of Detection performance enhancement from portable radiation detection platform based on Cortex-A9 (Cortex-A9 기반 휴대용 방사선 검출장치에서의 검출성능 향상을 위한 연구)

  • Kwon, Tae-Kyung;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1488-1493
    • /
    • 2014
  • Shipping and logistics safety, security system is strengthening worldwide, the development of shipping and logistics safety security core technology for national security logistics system construction has been carried out. Interest in portable radiation detection device capable detecting gamma rays nuclides is increasing. In this paper, I would like to propose the study of resolution enhancement for accurate analysis of nuclides in the platform of the radiation detector portable with Cortex-A9.

Research of Resolution enhancement from portable radiation detection platform based on Cortex-A9 (Cortex-A9 기반 휴대용 방사선 검출장치에서의 분해능 향상을 위한 연구)

  • Kwon, Tae-Kyung;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.373-376
    • /
    • 2014
  • Shipping and logistics safety, security system is strengthening worldwide, the development of shipping and logistics safety security core technology for national security logistics system construction has been carried out. Interest in portable radiation detection device capable detecting gamma rays nuclides is increasing. In this paper, I would like to propose the study of resolution enhancement for accurate analysis of nuclides in the platform of the radiation detector portable with Cortex-A9.

  • PDF

A Study for Effectiveness of Preliminary Security Assessment on Online Game Service Domain (온라인게임 서비스 분야에 정보보호 사전진단 적용시 효과성에 관한 연구)

  • Yoo, Dong-Young;Seo, Dong-Nam;Kim, Huy-Kang;Choi, Jin-Young
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.293-308
    • /
    • 2011
  • The preliminary security assessment is an information security process to analyze security weaknesses before beginning of services. Discovering security weakness through preliminary security assessment is highly required because it costs much when security incident occur in the middle of service operation. However, this assessment is not widely spread in the online game service domain yet. In this paper, we summarize the security risk existed in the online game service, and we classify the security requirements related to the each risk. Also, through the case study, we evaluated the effectiveness of preliminary security assessment in this domain. In addition, we suggest checklists that should be reviewed once in game-client side, network-side and game-server side for the purpose of security enhancement.

Blending of Contrast Enhancement Techniques for Underwater Images

  • Abin, Deepa;Thepade, Sudeep D.;Maitre, Amulya R.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.1-6
    • /
    • 2022
  • Exploration has always been an instinct of humans, and underwater life is as fascinating as it seems. So, for studying flora and fauna below water, there is a need for high-quality images. However, the underwater images tend to be of impaired quality due to various factors, which calls for improved and enhanced underwater images. There are various Histogram Equalization (HE) based techniques which could aid in solving these issues. Classifying the HE methods broadly, there is Global Histogram Equalization (GHE), Mean Brightness Preserving HE (MBPHE), Bin Modified HE (BMHE), and Local HE (LHE). Each of these HE extensions have their own pros and cons and thus, by considering them we have considered BBHE, CLAHE, BPDHE, BPDFHE, and DSIHE enhancement algorithms, which are based on Mean Brightness Preserving HE and Local HE, for this study. The performance is evaluated with non-reference performance measures like Entropy, UCIQE, UICM, and UIQM. In this study, we apply the enhancement algorithms on 300 images from the UIEB benchmark dataset and then apply the techniques of cascading fusion on the best-performing algorithms.

A Study on the Enhancement of Maritime Security in Korea Maritime Jurisdiction

  • Lee Eun-Bang;Yun Jong-Hwui
    • Journal of Navigation and Port Research
    • /
    • v.29 no.7
    • /
    • pp.619-625
    • /
    • 2005
  • The security vulnerabilities in Korea maritime domain were mentioned and analysed with the static data of crimes relating to maritime security. The counterterrorism and initiatives to reduce the security risk and to minimize the damage are introduced and evaluated. The maritime security strategy and the near term initiatives to enhance the non-military security at Korean sea and ports are proposed in order to response maritime security threats economically, efficiently and safely.

Improvements of Legal System for Security Enhancement of Korean National Assembly' Attending System (국회 방청제도의 보안강화를 위한 법·제도 개선방안)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.81-88
    • /
    • 2017
  • The purpose of this study is to analyze any hinderance factors for successful attending system of Korean National Assembly and to provide improvement plans of legal systems to ensure security of National Assembly. First, the conceptualization and functions of Korean National Assembly attending system were discussed and related regulations and laws were also examined. Second, hinderance factors, such as sharp increase in 1) illegal behaviors, 2) bring in prohibited items, and 3) possibility of National Assembly terror, for successful attending systems were analysed. Third, improvements of legal system for security enhancement of National Assembly Attending System were discussed: 1) new legislation for providing National Assembly's security officers with special judicial police power is needed to deal with criminal behaviors and to protect human rights, and 2) legal reforms are required to provide right to command to National Assembly's Security Planning Office rather than National Assembly security office under Seoul Metropolitan Police Agency in order to unify commanding system.

A Study on Assumptions for Operational Environment of OS Security Enhancement System

  • Kim, Tai-Hoon;Kim, Min-Chul;Baik, Nam-Kyun;Kim, Jae-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2093-2096
    • /
    • 2003
  • Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. Trusted operating systems have been developed since the early 1980s and began to receive National Security Agency (NSA) evaluation in 1984. The researches about trusted OS are proceeding over the world, and new product type using the loadable security kernel module (LSKM) or dynamic link library (DLL) is being developed. This paper proposes a special type of product using LSKM and specific conditions for operational environment should be assumed.

  • PDF