• Title/Summary/Keyword: Shared Service Control

Search Result 94, Processing Time 0.025 seconds

A Study on the Policy Tasks for the Development of National Fire Service - Redesigning Institutional and Organizational Improvement for the Establishment of the National Fire Service Agency - (한국소방발전을 위한 정책과제 연구 - 소방청 신설에 대응하는 제도·조직개선 구상 -)

  • Choi, Byoung-Hahk;Kim, Hak-Soo
    • The Korean Journal of Emergency Medical Services
    • /
    • v.6 no.1
    • /
    • pp.185-197
    • /
    • 2002
  • Today, the basic problem of functional safe management of Korean Disaster Control system was separately administrated 33 acts that are relating to safe management in 13 ministries. Because of the facts that the fire service is not provided practically, the control system and risk management for safe administration are not operated, the information can not be shared with each other, and the various laws have the lacks of linkage, the National Safe System was appeared unsteady. The roles and functions of fire service have started with restriction to operate structurally and institutionally, which operational structure of fire service is becoming weak. As a result, the federal and local fire organizations have not reached yet to the institutionalization and the local fire service agencies have bias with the task regarding the fire service because of the relation between organizational structure and the local fire agency. With the enforcement of the federal and local fire system, professionality and autonomy for making policy, and dealing with changes of fire service positively, the national fire service on the policy performance can be established. Promotion of research and development and education training to strengthen innovation in technology and competition in fire industry will contribute to the firmly establishment of control system to prevent from fire, flood, terror and national disaster. This article proposed that (a) the established law and administration, agency are required efforts to effectively operate fire service system; (b) the national fire service agency, national college of fire, national institute of science fire, and national fire service hospital should be early established to make firmly policy to operate effectively and practically. These kinds of innovational acts are known the best ways of operating solid policy of national fire service system.

  • PDF

An Access Control using Reputation Information in P2P File Sharing System (P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어)

  • Shin Jung-Hwa;Shin Weon;Rhee Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.493-498
    • /
    • 2005
  • P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.

The Directory Service System for Efficient Shared-Object Access in Collaborative-Authoring (공동저작에서의 효율적인 공유객체 액세스를 위한 디렉토리 서비스 시스템)

  • 전재우;오삼권
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10b
    • /
    • pp.233-235
    • /
    • 1999
  • 공동저작 관리 시스템은 효율적인 공동저작을 위해 공유객체관리기능, 세션관리기능, 텔리포인팅(telepointing) 기능, 그리고 공동저작 인지(collaboration awareness) 기능들을 제공해야 한다. 이 중 공유객체관리기능은 저작자로 하여금 등록된 공유객체들을 편리하게 액세스 할 수 있도록 하고 저작에 필요한 공유객체들을 등록, 변경, 그리고 삭제할 수 있도록 함으로써 작업효율을 증대시킬 수 있는 핵심기능이다. 최근의 연구는 주로 등록된 공유객체의 변경 및 불필요한 정보전송으로 인한 작업지연, 그리고 공유객체 액세스 권한의 효율적인 관리를 위한 플로어 제어(floor control)에 그 초점을 맞추고 있으나 공유객체관리를 위한 기법이나 구조에 관한 연구는 미흡하다. 편리한 공동저작을 위해서는 분산환경의 특징상 가 저작자들의 시스템에 자연스럽게 분산되어 있는 공유객체들을 저작자나 공유객체들의 실제 위치에 상관없이 액세스할 수 있도록 하고, 저작자로 하여금 공유객체의 등록 시에 유일명 부여(unique naming)를 가능하게 하여 필요한 공유객체를 쉽게 검색할 수 있도록 해야 한다. 이를 위해 본 논문은 공유객체 디렉토리 서비스(shared-object directory service)를 제안한다. 공유객체 디렉토리 서비스는 일반 디렉토리(normal directory)와 세션 디렉토리(session directory)를 저작자에게 제공하여 공유객체의 등록시에 유일명 부여를 가능하게 하고 필요한 공유객체 검색을 용이하게 한다.

  • PDF

A Shared-Route Decision Algorithm for Efficient Multicast Routing (효율적인 멀티캐스트 라우팅을 위한 경로 지정 방법)

  • Cho, Kee-Seong;Jang, Hee-Seon;Kim, Dong-Hui
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.34 no.3
    • /
    • pp.289-295
    • /
    • 2008
  • The shared-route decision algorithms in multicasting communications networks to provide the internet-based services such as IPTV, remote education/health, and internet broadcasting are presented. The three main measures of maximum delay, average delay and estimated delay between each node and member are adopted. Under the Mesh network with the uniform random cost between each node, the algorithm's performance is compared to the optimal solution with the minimum cost by all enumeration. The simulation results show that the algorithm using the estimated delay outperforms the other two methods.

Load-based Dynamic Backoff Algorithm in Contention-based Wireless Shared Medium (단일 경쟁 매체에서의 새로운 로드 기반 동적 매체 접속 제어 백오프 알고리즘)

  • Seo Chang-Keun;Wang Weidong;Yoo Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.406-415
    • /
    • 2005
  • The standards which use shared medium like IEEE 802.11 wireless LAN have transmission opportunity by contention in contention period. If there are collisions in contention period, medium access control protocol may solve problem by using backoff algorithm. Backoff algorithm is important part in medium access control, but legacy backoff method which is used under IEEE 802.11 standards is not adjusted when load is heavy because of increasing collisions. In this paper, we propose a new load-based dynamic backoff algorithm in contention-based wireless shared medium to improve throughput of medium and to reduce the number of collisions. Proposed backoff algorithm can increase the network utilization about $20\%$ higher than that of binary exponential backoff algorithm.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

A Constructivist Science Learning Environment Survey for Korean Pre-service Elementary School Teachers (교육대학교 학생의 구성주의 과학 학습 환경에 대한 인식 조사)

  • Kwon, Sunggi
    • Journal of Korean Elementary Science Education
    • /
    • v.32 no.2
    • /
    • pp.198-205
    • /
    • 2013
  • For assessing classroom environment, numerous instruments were developed and reported the survey results for science students in science education. In this study I translated Constructivist Learning Environment Scales (CLES) were into Korean versions for elementary school teachers, and measured the reliability. The subjects were randomly selected from three departments of an University of Education in a metropolitan city. All of them were 110 students, who would be elementary school teachers. According to the survey results, pre-service teachers for elementary school have recognized constructivistly for learning environments in an actual forms. In a scale of student negotiation they have most constructivistly recognized learning environment, and moderately in scales of relevance, uncertainty and critical view while they have seldom constructivistly recognized in a scale of shared control. Also Korean version CLES would be an reliable instruments for constructivist assessing learning environments.

Shared-medium Access Control Protocol for the ATM Access Network - Part II : Performance Analysis of the DMR-II Protocol - (ATM 액세스망을 위한 공유매체 접속 제어 프로토콜 - II부 : DMR-II 프로토콜의 성능분석-)

  • 황민태;김장경;이정태
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.3
    • /
    • pp.389-399
    • /
    • 1998
  • The DMR-II shared-medium access control protocol was developed for the ATM access network users to supper the isochronous traffic and the non-isochronous traffic simultaneously under the bandwidth-skating environment. In this paper we analyze the performance of the DMR-II protocol by using both the analytical analysis and the simulation method. Under the ATM access network environment, the performance analysis result shows that the DMR-II protocol maintains the delay variation of the isochronous traffic beyond the threshold value, and satisfies the delay time criteria of the non-isochronous traffic by supporting the priority service. Moreover the result shows high network utilization over 130% due to the destination release mechanism of the DMR-II protocol.

  • PDF

Cross-Layer Architecture for QoS Provisioning in Wireless Multimedia Sensor Networks

  • Farooq, Muhammad Omer;St-Hilaire, Marc;Kunz, Thomas
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.178-202
    • /
    • 2012
  • In this paper, we first survey cross-layer architectures for Wireless Sensor Networks (WSNs) and Wireless Multimedia Sensor Networks (WMSNs). Afterwards, we propose a novel cross-layer architecture for QoS provisioning in clustered and multi-hop based WMSNs. The proposed architecture provides support for multiple network-based applications on a single sensor node. For supporting multiple applications on a single node, an area in memory is reserved where each application can store its network protocols settings. Furthermore, the proposed cross-layer architecture supports heterogeneous flows by classifying WMSN traffic into six traffic classes. The architecture incorporates a service differentiation module for QoS provisioning in WMSNs. The service differentiation module defines the forwarding behavior corresponding to each traffic class. The forwarding behavior is primarily determined by the priority of the traffic class, moreover the service differentiation module allocates bandwidth to each traffic class with goals to maximize network utilization and avoid starvation of low priority flows. The proposal incorporates the congestion detection and control algorithm. Upon detection of congestion, the congested node makes an estimate of the data rate that should be used by the node itself and its one-hop away upstream nodes. While estimating the data rate, the congested node considers the characteristics of different traffic classes along with their total bandwidth usage. The architecture uses a shared database to enable cross-layer interactions. Application's network protocol settings and the interaction with the shared database is done through a cross-layer optimization middleware.