• Title/Summary/Keyword: Space Security

Search Result 976, Processing Time 0.03 seconds

The System of DHCPv6 for Secure Packet Transition in IPv6 Environment (IPv6 환경에서의 Secure Packet 전송을 위한 DHCPv6 시스템 개발)

  • Yoon, Yoon Sang;Chung, Jin Wook
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.1-6
    • /
    • 2003
  • The IPv6 was suggested as an ultimate solution of problems that IPv4 protocol maintains limitations to apply to new technology of data service and the lack of IPv4 address space. So it is expected to transfer IPv4 to IPv6 gradually. In the Ipv6 environment, it is easier to apply security policies and transmits a secure packet applied the security policies, with the content in the Header itself. By this reason, this paper describes about the implementation of DHCPv6 server to perform a connection of IPv6 network and IPv4 network, and the application of secure packet with the security policies for clients. Further, it performs the process of the massages inside the DHCPv6 server to be used in the IPv6 environment in the future.

  • PDF

Effects of Security Lighting Lamps on Discomfort Glare to Indoor Occupants

  • Lee, Yoon Jeong;Kim, Jeong Tai
    • KIEAE Journal
    • /
    • v.15 no.4
    • /
    • pp.21-28
    • /
    • 2015
  • Purpose: Although security lights are used to secure pedestrian visibility and safety at nighttime, they can generate light trespass in the neighboring residential space. To prevent this, standards for acceptance limits on vertical illuminance and light pollution by the windows of residential buildings are presented. Method: This study thus representatively selected three types of lamps and, through an evaluation and analysis of the physical and subjective discomfort glare per lamp, proposed a discomfort glare index for each lamp. The evaluation and analysis according to the lamps were conducted through experiments. The variables were the security lights' lamps (NH 100W, MH 70W, LED 50W), installation angles ($0^{\circ}$, $20^{\circ}$), and installation distances (3m, 5m, 7m, 9m). Result: According to the results of the discomfort glare evaluation depending on the angles and distances of the security lights, the following minimum standards are proposed: for NH 100W, a discomfort glare index of 30 and an installation distance of 4m; for MH 70W, a discomfort glare index of 32 and an installation distance of 4m; and, for LED 50W, a discomfort glare index of 31 and an installation distance of 6m, respectively. In addition, this paper recommends the use of MH 70W, when the road width is 4m-6m, and LED 50W, when the road width is over 6m, respectively.

Designing on Scenario-based Drone Platform to Enhancement Security (보안성 향상을 위한 시나리오 기반 드론 플랫폼 설계 연구)

  • Kim, Yanghoon;Hong, Chan-Ki
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.78-83
    • /
    • 2021
  • The new industry drone research is increasing through convergence between 4th industrial revolution technology. In particular, the government indicates the D.N.A platform as a countermeasure of 4th industrial revolution. So, the research topics are remarkable which are using D.N.A platform. On the other hand, the drone for industrial and research has spatial factor based on sequential because, they performance scenario-based mission through control operation. When the drone flights as a control operation, they have necessity apply multi-dimensional methods to improve the security level. So, this study researched a scenario based drone platform to improve the security level. As a result, the space classified as a ground control system, drone, drone data server and designed the application method based on scenario security technology.

Paradigm of the Transformation of Potential-Forming Space Under the Impact of Intellectual-Innovation Determinants

  • Khanin, Semen;Derhaliuk, Marta;Stavroyany, Serhii;Kudlasevych, Olga;Didkivska, Lesia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.340-346
    • /
    • 2022
  • The article examines the formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants. Based on the study of different scientific views on the nature and properties of potential-forming space through the study of approaches to understanding the concept of "space" clarified the complexity and multifaceted nature of the phenomenon and found that its characteristics are relevant to the industrial development model. It is revealed that the leading modern trends related to the spread of globalization and regionalization, rapid development of information and communication technologies, diffusion of innovations accompany the transition from industrial to post-industrial development and its development, which leads to new development: changes production, nature and relations between business entities, etc. It is proved that under such conditions, the region as a key element of the economic system, acquires a leading role in achieving sustainable and balanced development. These processes significantly affect the potential-forming space of the regional economy under the influence of intellectual and innovative determinants, leading to the need for its transformation and change in accordance with modern realities, which is reflected in thorough research on the formation of scientific paradigm based on the formation of its theoretical foundations and methodological basis. This study reveals the essence, role, functions, structure, process of formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants. It is proved that the formation of the modern scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants occurs in the context of building a post-industrial model of development, accompanied by consideration of the region as a spatial object territories from the physical plane to the spatial environment in which the development of human capital, innovation and self-development of the region. Taking into account the above, the article outlines the prerequisites and factors of formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants.

CONTINUITY OF AN APPROXIMATE JORDAN MAPPING

  • Lee, Young-Whan
    • Communications of the Korean Mathematical Society
    • /
    • v.20 no.3
    • /
    • pp.505-509
    • /
    • 2005
  • We show that every $\varepsilon-approximate$ Jordan functional on a Banach algebra A is continuous. From this result we obtain that every $\varepsilon-approximate$ Jordan mapping from A into a continuous function space C(S) is continuous and it's norm less than or equal $1+\varepsilon$ where S is a compact Hausdorff space. This is a generalization of Jarosz's result [3, Proposition 5.5].

TORSION IN THE HOMOLOGY OF THE DOUBLE LOOP SPACES OF COMPACT SIMPLE LIE GROUPS

  • Choi, Young-Gi;Yoon, Seong-Hee
    • Journal of the Korean Mathematical Society
    • /
    • v.39 no.1
    • /
    • pp.149-161
    • /
    • 2002
  • We study the torsions in the integral homology of the double loop space of the compact simple Lie groups by determining the higher Bockstein actions on the homology of those spaces through the Bockstein lemma and computing the Bockstein spectral sequence.

COMPARISON OF TOPOLOGIES ON THE FAMILY OF ALL TOPOLOGIES ON X

  • Kim, Jae-Ryong
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.31 no.4
    • /
    • pp.387-396
    • /
    • 2018
  • Topology may described a pattern of existence of elements of a given set X. The family ${\tau}(X)$ of all topologies given on a set X form a complete lattice. We will give some topologies on this lattice ${\tau}(X)$ using a fixed topology on X and we will regard ${\tau}(X)$ a topological space. Our purpose of this study is to comparison new topologies on the family ${\tau}(X)$ of all topologies induced old one.

A Study Privacy and Security in Ubiquitous City Environment (Focous on Computing Values Analysis of Personal Information) (유비쿼터스 도시 환경에서 프라시버시 보호 방안에 관한 소고 - 경쟁하는 개인정보가치 분석을 중심으로 -)

  • Jung Chang-Duk;Kang Jang-Mook
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.249-254
    • /
    • 2006
  • As the concept of Ubiquitous City has become an important issue, we need to have a voice in the field of privacy. The Ubiquitous Computing revolution, it is achieved a physical space and an intelligent union of cyber space in the space where an off-line space was integrated with on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. According to the recent papers and studies, Privacy or Personal Information sector is mentioned as a major problem for Ubiquitous Computing Society. Therefore, this paper checks Ubiquitous City, the present privacy concept and situation of currently proceeding Ubiquitous computing environment. Also, The main purpose of this paper is to analyze the concepts privacy, personal information. Thus this paper treated the analysis of case, technological or social issue, problem and solution, competing values of privacy and so on.

  • PDF

A study of Effect of Information Security Management System [ISMS] Certification on Organization Performance (정보보호관리체계[ISMS] 인증이 조직성과에 미치는 영향에 관한 연구)

  • Bae, Young-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4224-4233
    • /
    • 2012
  • As Internet usage is rapidly spreading, tasks that were only possible offline are now available in cyber space but at the same time, new security threats such as hacking and viruses have also increased. For that reason, Comprehensive and methodical information security systems are therefore required in enterprises and organizations. Consequently, the Information Security Management System certification system has been in effect in Korea since July 2001. As of December 2012, 130 enterprises have been certified, and more than 120 ISO27001 certifications have been issued. As such, since the introduction of the ISMS certification system in Korea, the demand for the certification has been steadily increasing, and it is now recognized as an integral part of maintaining the competitiveness in an enterprise. However, the qualitative aspects of certification regarding the effectiveness of ISMS have been continuously questioned by actual customers. In order to clarify the situation and remove such doubts, this study will substantiate the fact that development and certification of ISMS positively affect the business performance of enterprises so that they will recognize the effect of obtaining ISMS certification and eventually prevent security accidents and improve their business performance by developing ISMS.

Adaptive Multi-Layer Security Approach for Cyber Defense (사이버 방어를 위한 적응형 다중계층 보호체제)

  • Lee, Seong-kee;Kang, Tae-in
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.1-9
    • /
    • 2015
  • As attacks in cyber space become advanced and complex, monotonous defense approach of one-one matching manner between attack and defense may be limited to defend them. More efficient defense method is required. This paper proposes multi layers security scheme that can support to defend assets against diverse cyber attacks in systematical and adaptive. We model multi layers security scheme based on Defense Zone including several defense layers and also discuss essential technical elements necessary to realize multi layers security scheme such as cyber threats analysis and automated assignment of defense techniques. Also effects of multi layers security scheme and its applicability are explained. In future, for embodiment of multi layers security scheme, researches about detailed architecture design for Defense Zone, automated method to select the best defense technique against attack and modeling normal state of asset for attack detection are needed.