• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.036 seconds

Design of a Simulation Model for Integrated Access Control (통합 접근 제어를 위한 시뮬레이션 모델 설계)

  • Lee Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.49-54
    • /
    • 2004
  • Rule-based access control can not completely be replaced by identity-based access control. Neither can role-based access control be a merger of identity-based access control and rule-based access control, but can be used complementarily for each other. In this paper, is proposed a simulation model designed for a new integrated access control method that has been created by means of integrating the existing access control methods. The integrated access control method is equipped with security, integrity and flow control and can easily accomodate the requirements for access control from role-based corporate bodies. The simulation model proposed in this paper can be applied for real working system designs.

  • PDF

Design of Network Security Model using Contract Net Protocol (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계)

  • 서경진;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.11a
    • /
    • pp.23-28
    • /
    • 2002
  • 최근에 분산 시스템과 같이 이기종의 컴퓨팅 환경을 효율적으로 통합하는 방법에 관한 다양한 연구가 진행되고 있다. 네트워크 보안에서는 각 보안 시스템들이 효율적인 침입탐지와 차단을 위해서 분산화되고 있으며 분산된 보안 시스템들을 조정하고 통합하기 위해서 분산인공지능(Distributed Artificial Intelligence)의 개념을 도입하고 있다. 본 논문에서는 분산침입탐지 시스템(Distributed Intrusion Detection System)과 침입차단 시스템(firewall)이 계약망 프로토콜(Contract Net Protocol)에 의해 상호 연동하여 외부 네트워크에서 유입된 패킷의 정보를 통해 침입을 탐지하고 차단하는 네트워크 보안 모델을 설계하였다. 본 연구진이 구성하고 있는 시뮬레이션 환경에서는 네트워크에 존재하는 다양한 보안 모델들을 계층적으로 구성하기 위해 DEVS 방법론을 사용하였다. 보안 시스템의 연동은 계약망 프로토콜에 의해 이루어지는데 네트워크에 분산되어 있는 각각의 전문성을 가진 침입탐지 에이전트들이 중앙 콘솔에 비드(bid)글 제출하고 중앙 콘솔은 최상의 비드를 제출한 에이전트를 선택하여 침입을 탐지하게 된다. 그리고 탐지된 정보를 참조하여 침입차단 시스템은 능동적으로 침입을 차단하게 된다. 이와 같은 모델의 설계를 통해서 기존의 침입탐지 시스템들이 탐지하지 못한 침임을 탐지하게 되고 보안시스템에서의 오류발생빈도를 감소시키며 탐지의 속도를 향상시킬 수 있다.

  • PDF

Design of Fuzzy-Controller for Agent Selection in CNP-applied Security Models (계약망 프로토콜을 적용한 보안 모델에서 에이전트 선택을 위한 퍼지 컨트롤러의 설계)

  • 이진아;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.20-24
    • /
    • 2004
  • 광범위한 네트워크의 연결과 이를 이용하는 조직이나 개인의 증가로 인터넷은 정보를 교환하고 거래를 수행하는 주요한 수단이 된 반면에 해커나 바이러스의 침입 또한 증가하여 공격에 쉽게 노출되어있다. 이러한 보안상의 문제점을 해결하기 위하여 컴퓨터나 네트워크 시스템의 활동을 감시할 수 있는 침입 탐지 시스템(IDS)과 같은 보안 요소를 도입하였으며, 탐지에 대한 성능을 향상시키기 위하여 네트워크를 기반으로 하는 다중 침입 탐지 시스템을 응용하여 네트워크에 분산된 에이전트들 중에서 발생된 침입에 알맞은 에이전트를 선택하도록 하여 침입 탐지를 효과적으로 할 수 있게 하였다. 본 연구에서는 보안 시스템의 연동을 위하여 계약망 프로토콜을 적용하였다. 계약망 프로토콜은 분산된 에이전트들 중에서 입찰과정을 통하여 최상의 에이전트를 선택하는데 이때, 에이전트를 선택하는 과정에 있어서 퍼지 규칙 기반 시스템을 적용한 퍼지 컨트롤러를 설계하여 시뮬레이션 한다.

  • PDF

Current Status of the 2nd Generation of Intact Stability: Investigation of the Pure Loss of Stability and Parametric Roll Mode

  • Chung, Jaeho;Shin, Dong Min;Kim, Won-Don;Moon, Byung Young
    • Journal of Ocean Engineering and Technology
    • /
    • v.34 no.2
    • /
    • pp.55-65
    • /
    • 2020
  • A review of the 2nd generation of intact stability by the International Maritime Organization is performed. The main issues with the new stability criteria are reviewed. In particular, the physical background and related mathematical formulations of the pure loss of stability and parametric roll are summarized. Based on a literature review, benchmark calculation results for 17 different types of ships are discussed, and the final results are in excellent agreement with our physical expectations. Some relatively serious design problems are found in the application of the new stability criteria to sample ships built in Korea, and possible technical solutions are proposed, which have to be improved in the coming years.

A Study on the architectural planning through the analysis between the Behavior character of Dementia patient (채매환자의 행태특성 분석을 통한 건축계획에 관한 연구 -시.도립 치매 전문병원 사례를 중심으로-)

  • Kim, Jong-Whan;Kim, Myoung-Keun
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.6 no.2
    • /
    • pp.55-63
    • /
    • 2006
  • The purpose of this study is to analyze the problems in assumption of the distinguished behaviors of hospitalized dementia patients- which can be easily emerged and recognized in senile dementia patients and their distinctive behavior characters in different physical environment per person. Furthermore, it is to suggest a fundamental data to improve physical environment of the different facilities and the design guidelines for reconstruction in terms of the new and therapeutic function of the dementia specialized department. For planning on the dementia specialized hospital, considerablely, security and safety, comfortableness, personal identification of the facility, emotional stability and the proper stimulation for the patients are emphasized according to the research on the frequent and major issues of the patients from their own dwelling place.

  • PDF

A RF-ID System for Movement Data Collection under Drive (주행 중인 차량 운행 data 수집을 위한 RF-ID System)

  • Kim, Yong-Sang;Kim, Sang-Wook;Kim, Yang-Mo
    • Proceedings of the KIEE Conference
    • /
    • 2004.04a
    • /
    • pp.217-219
    • /
    • 2004
  • In recent years, the smart card is wifely applied for wireless communication, tracking, transportation logistics, diagnostic monitoring, access control and security. RF-ID system is universally applicable. Passive RF-ID system consists from reader and passive tag. The reader transmits energy and simple information to a tag by wireless and the power from the reader is transformed for controller, FRAM and Bluetooth module. in this paper, an analysis and design of smart card for the transmission of the car movement data is presented.

  • PDF

A Electrical Characteristic Simulation and Test for the Steady and Transient State in the 22.9kV HTS Cable Distribution System. (22-9kV배전계통에 대한 초전도케이블의 정상 및 과도상태에 대한 전기적 특성 시험 및 시뮬레이션 결과 검토)

  • Lee, Geun-Joon;Hwnag, Si-Dol;Yang, Byeong-Mo;Lee, Hyun-Chul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.12
    • /
    • pp.2316-2321
    • /
    • 2009
  • With rapid development of world economics, electricity demand in metropolitan area has been increased dramatically. HTS(High Temperature Superconducting) cable is one of most promising technology to solve the bottleneck of electric network. However, HTS cable is not considered as matured technology yet to power system planners because of its different characteristics with conventional metal conductors. This paper suggests the comparison results of HTS cable simulation and experiment on steady state operation, also give the simulation results on transient characteristics of HTS cable components. This results could devote not only to discuss the security of HTS cable operation, but also to design power system oriented HTS cable.

The Installable Maximum DG Capacity Considering LDC Parameters of ULTC and SVR in Distribution Systems (ULTC 와 SVR 이 설치된 배전계통에서 LDC Parameters 을 고려한 최대 DG 용량 산정)

  • Kim, Mi-Young;Hara, Ryoichi;Kita, Hiroyuki
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.27-28
    • /
    • 2008
  • For stable and sustainable energy supply, distributed generator (DG) has become an essential and indispensable element from environmental and energy security perspectives. However, installation of DG in distribution systems may cause negative affects on feeders because power outputs of DG could be changed irregularly. One of major negative affects is variation in voltage profile. In general, voltage regulation devices such as under load tap changer (ULTC) at distribution substation and step voltage regulator (SVR) along feeder in distribution system are used to maintain customers' receiving voltage within a predetermined range. These regulators are controlled by line drop compensation (LDC) method which calls for two parameters; the equivalent impedance and the load center voltage. Therefore, consideration of DG outputs in the LDC parameter design procedure may give large impact on the installable DG capacity. This paper proposes a method that estimates maximum Installable DG capacity considering LDC parameters of ULTC and SVR. The proposed algorithm is tested with model network.

  • PDF

Study on Optimum Design for constitution part of Composite Insulator (Composite Insulator 구성 부품에 대한 최적 설계 연구)

  • Chung, Young-Soo;Choi, Sung-Man;Jang, Yoon-Ki;Lee, Dong-Woen;Kim, Jeong-Bae
    • Proceedings of the KSME Conference
    • /
    • 2008.11a
    • /
    • pp.1181-1186
    • /
    • 2008
  • Insulators which are used in the domestic electrical industries are mostly depended on importation from some advance countries. Even though insulators which are made of ceramic material have been mostly used domestically, the ratio of usage on composite insulators is recently being increased because of difficulties in manufacturing and high cost regarding ceramic stuffs. In this research, we are trying to develop the composite insulators which are very efficient in insulation regardless of the matter of weight. Even though the technique of manufacturing composite insulator are quite generalized worldwide at the moment, one of the most important issue is to keep security on the know-how that an ingredient of insulated material named 'SF6 gas' is included. Therefore, The aim of this paper is to improve the bonding force and air tight property between two components of composite insulator, Flange and FRP Tube.

  • PDF

Hardware Implementation of A Cryptographic System for Contents Protection (콘텐츠 보호용 암호가속카드의 설계 및 구현)

  • Lee Wan-Bok;Roh Chang-Hyun;Kim Joo-Han
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.543-547
    • /
    • 2005
  • Implementing a hardware cryptographic system is strongly required to assure high Qualify contents security. Not only because the many of the prevalent cryptographic algorithms require much computation time but also software implementations of cryptographic systems do not guarantee high performance, we need to design a hardware cryptographic system with a dedicated crypto-chip. This paper describes a case study of implementing a PCI cryptographic card which supports cryptographic algorithms such as 3DES, AES, SEED.

  • PDF