• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.035 seconds

The Economic Security System in the Conditions of the Powers Transformation

  • Arefieva, Olena;Tulchynska, Svitlana;Popelo, Olha;Arefiev, Serhii;Tkachenko, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.35-42
    • /
    • 2021
  • In the article, the authors investigate the economic security system in the conditions of the powers transformation. It is substantiated that economic security acts as a certain system that includes components and at the same time acts as a subsystem of the highest order. It is determined that the economic security system of regions acting as a system has its subsystems, which include: production, financial, environmental, innovation, investment and social subsystems. The parameters of the economic security system include relative economic independence, economic stability and self-development of economic systems, and it is proved that an important feature of economic security in addition to its systemic nature is multi-vector. It is substantiated that the monitoring of ensuring the economic security system of the development of economic systems of different levels in the conditions of the powers transformation should contain the analysis of social, economic and ecological development of regions; spheres of possible dangers of the development of regional economic systems; the nature of the threats; the degree of the possibility of threats; time perspective of economic development threats; possible consequences of losses for economic entities; the impact of threats to the object of the economic entities' activity; possible asymmetry of economic development of regional economic entities. Possible threats as a consequence of the powers transformation have been identified. A PEST analysis of the impact of factors of different nature on economic security and the development of regional economic systems in the powers transformation is carried out. A recurrent ratio is proposed for the economic security system in the conditions of the powers transformation.

Application Design and Execution Framework in Role-Based Access Control Systems (역할기반 접근통제 시스템에서 응용 프로그램의 설계 및 시행지원 프레임워크)

  • Lee, Hyeong-Hyo;Choe, Eun-Bok;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3020-3033
    • /
    • 1999
  • Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RBAC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is needed that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

  • PDF

System Design and Implementation of FLV Move Picture Solution Based on IDC apply to Mini IPTV (IDC기반 FLV동영상 솔루션의 Mini IPTV 적용시스템의설계 및 구현)

  • Kwon, O-Byoung;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.11-17
    • /
    • 2011
  • In this paper, we propose system design and implementation of FLV Move Picture Solution based on IDC apply to Mini IPTV. IDC of energy minimize and Green Data Center design resources make use of maximization, and Mini IPTV of diverse contents service provider and network provider offer Mini IPTV customers to transmit network. at this time implemented on the improve Move Picture of motion blur and compressibility using FLV solution file format and a compression technique, and reduced traffic cost and solved security question. specially, on the web quickly growing a branch of e-Learning wish to be of help.

A New Control Strategy for a Three-Phase PWM Current-Source Rectifier in the Stationary Frame

  • Guo, Qiang;Liu, Heping;Zhang, Yi
    • Journal of Power Electronics
    • /
    • v.15 no.4
    • /
    • pp.994-1005
    • /
    • 2015
  • This paper presents a novel power control strategy for PWM current-source rectifiers (CSRs) in the stationary frame based on the instantaneous power theory. In the proposed control strategy, a virtual resistance based on the capacitor voltage feedback is used to realize the active damping. In addition, the proportional resonant (PR) controller under the two-phase stationary coordinate is designed to track the ac reference current and to avoid the strong coupling brought about by the coordinate transformation. The limitations on improving steady-state performance of the PR controller is investigated and mitigated using a cascaded lead-lag compensator. In the z-domain, a straightforward procedure is developed to analyze and design the control-loop with the help of MATLAB/SISO software tools. In addition, robustness against parameter variations is analyzed. Finally, simulation and experimental results verify the proposed control scheme and design method.

Experimental and numerical studies on seismic performance of hollow RC bridge columns

  • Han, Qiang;Zhou, Yulong;Du, Xiuli;Huang, Chao;Lee, George C.
    • Earthquakes and Structures
    • /
    • v.7 no.3
    • /
    • pp.251-269
    • /
    • 2014
  • To investigate the seismic performance and to obtain quantitative parameters for the requirement of performance-based bridge seismic design approach, 12 reinforced concrete (RC) hollow rectangular bridge column specimens were tested under constant axial load and cyclic bending. Parametric study is carried out on axial load ratio, aspect ratio, longitudinal reinforcement ratio and transverse reinforcement ratio. The damage states of these column specimens were related to engineering limit states to determine the quantitative criteria of performance-based bridge seismic design. The hysteretic behavior of bridge column specimens was simulated based on the fiber model in OpenSees program and the results of the force-displacement hysteretic curves were well agreed with the experimental results. The damage states of residual cracking, cover spalling, and core crushing could be well related to engineering limit states, such as longitudinal tensile strains of reinforcement or compressive strains of concrete, etc. using cumulative probability curves. The ductility coefficient varying from 3.71 to 8.29, and the equivalent viscous damping ratio varying from 0.19 to 0.31 could meet the requirements of seismic design.

Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers

  • Liu, Xiaochen;Gao, Yuanyuan;Sha, Nan;Zang, Guozhen;Wang, Shijie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2204-2224
    • /
    • 2021
  • This paper studies secure wireless transmission from a multi-antenna transmitter to a single-antenna intended receiver overheard by multiple eavesdroppers with considering the imperfect channel state information (CSI) of wiretap channel. To enhance security of communication link, the artificial noise (AN) is generated at transmitter. We first design the robust joint optimal beamforming of secret signal and AN to minimize transmit power with constraints of security quality of service (QoS), i.e., minimum allowable signal-to-interference-and-noise ratio (SINR) at receiver and maximum tolerable SINR at eavesdroppers. The formulated design problem is shown to be nonconvex and we transfer it into linear matrix inequalities (LMIs). The semidefinite relaxation (SDR) technique is used and the approximated method is proved to solve the original problem exactly. To verify the robustness and tightness of proposed beamforming, we also provide a method to calculate the worst-case SINR at eavesdroppers for a designed transmit scheme using semidefinite programming (SDP). Additionally, the secrecy rate maximization is explored for fixed total transmit power. To tackle the nonconvexity of original formulation, we develop an iterative approach employing sequential parametric convex approximation (SPCA). The simulation results illustrate that the proposed robust transmit schemes can effectively improve the transmit performance.

Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm

  • Leihong, Zhang;Yang, Wang;Hualong, Ye;Runchu, Xu;Dawei, Zhang
    • Current Optics and Photonics
    • /
    • v.5 no.6
    • /
    • pp.686-698
    • /
    • 2021
  • A camouflaged encryption scheme based on Hadamard matrix and ghost imaging is proposed. In the process of the encryption, an orthogonal matrix is used as the projection pattern of ghost imaging to improve the definition of the reconstructed images. The ciphertext of the secret image is constrained to the camouflaged image. The key of the camouflaged image is obtained by the method of sparse decomposition by principal component orthogonal basis and the constrained ciphertext. The information of the secret image is hidden into the information of the camouflaged image which can improve the security of the system. In the decryption process, the authorized user needs to extract the key of the secret image according to the obtained random sequences. The real encrypted information can be obtained. Otherwise, the obtained image is the camouflaged image. In order to verify the feasibility, security and robustness of the encryption system, binary images and gray-scale images are selected for simulation and experiment. The results show that the proposed encryption system simplifies the calculation process, and also improves the definition of the reconstructed images and the security of the encryption system.

SEED and ARIA algorithm design methods using GEZEL (GEZEL을 이용한 SEED 및 ARIA 알고리즘 설계 방법)

  • Kwon, TaeWoong;Kim, Hyunmin;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.15-29
    • /
    • 2014
  • Increasing the smart instrument based social and economical activity, problems of electronic business's safety, reliability and user's privacy are be on the rise. so variety standard cryptography algorithms for information security have been developed in korea and How to efficiently implement them in a variety of environments is issued. ARIA and SEED, developed in Korea, are standard block cipher algorithm to encrypt the 128-bit plaintext, are each configured Feistel, SPN structure. In this paper, SEED and ARIA were implemented using the GEZEL language that can be used easily in the software designer because grammar is simple compared to other hardware description language. In particular, in this paper, will be described in detail the characteristics and design method using GEZEL as the first paper that implements 128bits ARIA and SEED and it showed the flexibility and efficiency of development using GEZEL. SEED designed GEZEL is occupied 69043 slice, is operating Maximum frequency 146.25Mhz and ARIA is occupied 7282 slice, is operating Maximum frequency 286.172Mhz. Also, Speed of SEED designed and implemented signal flow method is improved 296%.

Security Criteria for Design and Evaluation of Secure Plant Data Network on Nuclear Power Plants (원전 계측제어계통의 안전 네트워크 설계 및 평가를 위한 보안 기준)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.2
    • /
    • pp.267-271
    • /
    • 2014
  • Nuclear power plant data networks and their associated safety systems are being modernized to include many information technology (IT) networks and applications. Along with the advancement of plant data networks (PDN), instrumentation and control systems are being upgraded with modern digital, microprocessor-based systems. However, nuclear PDN is confronted significant side-effects, which PDN is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in nuclear PDN. Consequently, it should be designed fully ensuring the PDN meet all reliability, performance and security requirements in order to overcome the disadvantages raised from adaption of IT technology. In this paper, we provide technical security criteria should be used in design and evaluation of secure PDN. It is believed PDN, which is designed and operated along with these technical security critera, effectively protect against possible outside cyber threats.

A 3-Party Negotiation Protocol Design for the Security of Self-Organized Storage on Infra-Clouding Environment (인프라 클라우딩(Infra Clouding) 환경에서 자가조직 저장매체의 보안을 위한 3자간 협상 프로토콜 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.10
    • /
    • pp.1303-1310
    • /
    • 2011
  • This paper proposes the design of 3-party negotiation protocol for the security of self_organized storage which consists of the owner node possessing data, the holder node holding the owner's data and the verification node verifying the data of the holder node on infra-cloud environment. The proposed security technique delegating the data verification of the holder node to the verification node increases the efficiency of the self-organized storage. In addition, the encrypt key and certification of the storage created by EC-DH algorithm enhances the security much more. Also, when the self-organized storage is composed, the security technique not only prevents external flooding attack by setting a certification key among three parties, but also prevents internal flooding attack by restricting the number of verification nodes. And The replay attack which can occur in the step of verification is automatically detected by using the created seed value whenever the verification is requested.