• 제목/요약/키워드: Security Rules

검색결과 324건 처리시간 0.023초

해상 및 항공물류보안의 법규 및 정책에 관한 연구 (A study on the rules and policy of the maritime and aviation supply chain security)

  • 최병권
    • 무역상무연구
    • /
    • 제42권
    • /
    • pp.247-274
    • /
    • 2009
  • The supply chain security programs are designed to prevent terrorist attacks on world transit system, and to help protect the passengers and workers who use these systems on a daily basis. as evidenced by the train bombings in London and Madrid in recent years, the threats to America's transit systems are real. After 9 11 terrors in 2001, security problem is appearing to every nations and international organizations main pending issue than any problem and various countermeasure is prepared. Security is the major issue in international trade, with significant potential costs and economic impact. So, We need to ensure that supply chain security does not become a new non-tariffs barrier. The aim of this study is to examine the international maritime and aviation law on the supply chain security. Also I review the supply chain security in U.S. and other countries.

  • PDF

TCAM을 이용한 패킷 분류를 위한 효율적인 갱신 알고리즘 (An Efficient Update Algorithm for Packet Classification With TCAM)

  • 정해진;송일섭;이유경;권택근
    • 한국통신학회논문지
    • /
    • 제31권2A호
    • /
    • pp.79-85
    • /
    • 2006
  • 고성능 라우터, 스위치 및 네트워크 보안 장비에서 패킷 포워딩 기능을 고속으로 수행하기 위해서는 효과적인 패킷 분류 기술이 필수적인데, 최근에는 TCAM과 검색엔진 등, 고속의 컨텐트 기반 검색 하드웨어를 이용하는 방법들이 사용되고 있다. 패킷 분류 시에는 트래픽 차단, 트래픽 모니터링 등의 목적을 위해서 많은 규칙들이 사용될 수 있고, 삽입과 삭제가 시스템 운용 중에 발생할 수 있다. 특히, 고속의 네트워크 환경에서 패킷 포워딩의 성능을 저하시키지 않기 위해서는 동적으로 변화하는 규칙들을 효과적으로 갱신하는 방법이 필요하다. 본 논문에서는 TCAM을 이용한 패킷 분류시 효과적인 갱신이나 재배치를 위해서 순서화된 부분 정렬 알고리즘을 제안하고, 실험을 통하여 TCAM의 이용률이 70$\%$까지 높은 상황에서도 갱신으로 인한 재배치가 거의 일어나지 않도록 하여 재배치로 인한 패킷 처리의 지연을 줄일 수 있다는 결과를 보인다.

토픽 모델링을 이용한 한국 무역규범 연구동향 분석 : 2000년~2022년 (Korea's Trade Rules Analysis using Topic Modeling : from 2000 to 2022)

  • 임병호;장정인;김태한;한하늘
    • 무역학회지
    • /
    • 제48권1호
    • /
    • pp.55-81
    • /
    • 2023
  • 본 연구의 목적은 한국 무역의 주요 이슈와 동향을 분석하고 향후 무역규범 연구에 대한 시사점을 도출하는데 있다. 분석자료로서 Korean Journal Citation Index 데이터베이스에서 2000년부터 2022년 7월까지 'Trade Rules'로 검색된 영문 키워드로 총 476개의 학술지를 분석하였다. 분석 방법으로는 동시발생네트워크와 텍스트마이닝 방법의 하나인 토픽트렌드 분석이 있다. 분석 결과, 최근 한국 무역을 대표하는 키워드는 연구 저널 수가 급증한 카테고리인 Topic 4(투자조약), Topic 7(무역안보), Topic 8(중국 보호무역주의), Topic 11(무역결제) 4가지로 나타났다. 이들 주제의 주요 배경은 기존의 국제무역 체제를 위협하는 미국과 중국 간의 무역마찰이며, 중국의 보호주의, 무역 안보 시스템의 변화, 새로운 투자 협정, 지불 방법의 변화에 대한 상세한 연구는 가까운 장래에 도전 과제가 될 것이다.

규칙 적용 성능을 개선하기 위한 다중 패턴매칭 기법 (A Multiple Pattern Matching Scheme to Improve Rule Application Performance)

  • 이재국;김형식
    • 정보보호학회논문지
    • /
    • 제18권3호
    • /
    • pp.79-88
    • /
    • 2008
  • 인터넷 환경에서 내부 네트워크를 보호하기 위하여 침입탐지시스템이 광범위하게 사용되고 있다. 침입탐지시스템은 비정상 패킷의 특성을 분석하여 규칙을 생성하고 이 규칙들을 이용하여 패킷들을 필터링함으로써 내부 시스템들을 보호한다. 최근 공격 사례가 많아지고, 공격 형태가 구조화되면서 이를 탐지하는 규칙의 수도 지속적으로 증가하고 있다. 이에 따라 침입탐지시스템이 규칙을 적용하는 과정에서의 성능 하락 정도도 커지고 있다. 본 논문은 규칙을 적용하는 과정에서 상대적으로 오버헤드가 큰 문자열 검색 성능을 개선하고자 복수개의 부분패턴을 이용한 다중 패턴매칭 기법을 제안한다. 그리고 대표적인 고성능의 다중 패턴매칭 알고리즘인 Wu-Manber 알고리즘과 성능을 비교하고 그 결과를 보인다.

Differentiation of Legal Rules and Individualization of Court Decisions in Criminal, Administrative and Civil Cases: Identification and Assessment Methods

  • Egor, Trofimov;Oleg, Metsker;Georgy, Kopanitsa
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.125-131
    • /
    • 2022
  • The diversity and complexity of criminal, administrative and civil cases resolved by the courts makes it difficult to develop universal automated tools for the analysis and evaluation of justice. However, big data generated in the scope of justice gives hope that this problem will be resolved as soon as possible. The big data applying makes it possible to identify typical options for resolving cases, form detailed rules for the individualization of a court decision, and correlate these rules with an abstract provisions of law. This approach allows us to somewhat overcome the contradiction between the abstract and the concrete in law, to automate the analysis of justice and to model e-justice for scientific and practical purposes. The article presents the results of using dimension reduction, SHAP value, and p-value to identify, analyze and evaluate the individualization of justice and the differentiation of legal regulation. Processing and analysis of arrays of court decisions by computational methods make it possible to identify the typical views of courts on questions of fact and questions of law. This knowledge, obtained automatically, is promising for the scientific study of justice issues, the improvement of the prescriptions of the law and the probabilistic prediction of a court decision with a known set of facts.

국제상업회의소 발간 "ICC Guide to Incoterms(R) 2010" 상의 문제점에 관한 연구 (Some Problems on the Guidebook to Incoterms(R) 2010 published by ICC)

  • 이시환
    • 무역상무연구
    • /
    • 제54권
    • /
    • pp.81-98
    • /
    • 2012
  • The Incoterms(R) 2010 rules take account of the continued spread of customs-free zones, the increased use of electronic communications in business transactions, heightened concern about security in the movement of goods and changes in transport practices. And the Guide to Incoterms(R) 2010 is the authoritative companion work to Incoterms(R) 2010, the ICC rules on the use of domestic and international trade terms. The guide responds to business needs for a better understanding of these ICC rules that are used in countless commercial transactions every day. But, contrary to the previous guidebook, there is many errors and mistake in the Guide to Incoterms(R) 2010 which should be amended. The purpose of this paper is to point out the problems and amend the errors and unify the expression in guidebook.

  • PDF

선적 24시간전 적하목록전송규칙(24 Hours Rules)의 주요내용과 문제점 (The Main Substance and Some Problems of 24 hours Advance Cargo Manifest Declaration Rule)

  • 한상현;엄광열
    • 정보학연구
    • /
    • 제8권1호
    • /
    • pp.95-112
    • /
    • 2005
  • This paper will look into the Main Substance and Some Problems of 24 hours Advance Cargo Manifest Declaration Rule, focuses on the Policy implication of Korea's and counter measures of our parties concerned about 24-hour advance vessel manifest rule. The 24-hour rule requires cargo owners to submit cargo manifest information to U.S. Customs 24 hours before vessel sailing from the final foreign port to a U.S. port. Cargo manifest information must be complete, accurate, and timely. As of February 2, 2003 manifest information can be submitted by paper or electronically. Cargo descriptions must be at a level of detail consistent with Harmonized Tariff Schedule (HTS) codes used by U.S. Customs. HTS codes are 10 digits. Electronic submissions are made via the Automated Manifest System (AMS) run by U.S. Customs.

  • PDF

Bitcoin Algorithm Trading using Genetic Programming

  • Monira Essa Aloud
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.210-218
    • /
    • 2023
  • The author presents a simple data-driven intraday technical indicator trading approach based on Genetic Programming (GP) for return forecasting in the Bitcoin market. We use five trend-following technical indicators as input to GP for developing trading rules. Using data on daily Bitcoin historical prices from January 2017 to February 2020, our principal results show that the combination of technical analysis indicators and Artificial Intelligence (AI) techniques, primarily GP, is a potential forecasting tool for Bitcoin prices, even outperforming the buy-and-hold strategy. Sensitivity analysis is employed to adjust the number and values of variables, activation functions, and fitness functions of the GP-based system to verify our approach's robustness.

Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing

  • Lin, Te-Yuan;Fuh, Chiou-Shann
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.5654-5668
    • /
    • 2018
  • Driven by security and real-time demands of Internet of Things (IoT), the timing of fog computing and edge computing have gradually come into place. Gateways bear more nearby computing, storage, analysis and as an intelligent broker of the whole computing lifecycle in between local devices and the remote cloud. In fog computing, the edge broker requires X-aware capabilities that combines software programmability, stream processing, hardware optimization and various connectivity to deal with such as security, data abstraction, network latency, service classification and workload allocation strategy. The prosperous of Field Programmable Gate Array (FPGA) pushes the possibility of gateway capabilities further landed. In this paper, we propose a software-defined gateway (SDG) scheme for fog computing paradigm termed as Fog Computing Zero-Knowledge Gateway that strengthens data protection and resilience merits designed for industrial internet of things or highly privacy concerned hybrid cloud scenarios. It is a proxy for fog nodes and able to integrate with existing commodity gateways. The contribution is that it converts Privacy-Enhancing Technologies rules into provable statements without knowing original sensitive data and guarantees privacy rules applied to the sensitive data before being propagated while preventing potential leakage threats. Some logical functions can be offloaded to any programmable micro-controller embedded to achieve higher computing efficiency.

취약성 정보를 활용한 정책 기반 보안 시스템 모델링 (Policy-based Security System Modeling using Vulnerable Information)

  • 서희석;김동수;김희완
    • 한국IT서비스학회지
    • /
    • 제2권2호
    • /
    • pp.97-109
    • /
    • 2003
  • As the importance and the need for network security is increased, many organization uses the various security systems. They enable to construct the consistent integrated security environment by sharing the vulnerable information among firewall, intrusion detection system, and vulnerable scanner. And Policy-based network provides a means by which the management process can be simplified and largely automated. In this article we build a foundation of policy-based network modeling environment. The procedure and structure for policy rule induction from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Based) is conducted. It also transforms the policy rules into PCIM (Policy Core Information Model).