• Title/Summary/Keyword: System security

Search Result 9,746, Processing Time 0.037 seconds

A Performance Improvement Scheme for a Wireless Internet Proxy Server Cluster (무선 인터넷 프록시 서버 클러스터 성능 개선)

  • Kwak, Hu-Keun;Chung, Kyu-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.415-426
    • /
    • 2005
  • Wireless internet, which becomes a hot social issue, has limitations due to the following characteristics, as different from wired internet. It has low bandwidth, frequent disconnection, low computing power, and small screen in user terminal. Also, it has technical issues to Improve in terms of user mobility, network protocol, security, and etc. Wireless internet server should be scalable to handle a large scale traffic due to rapidly growing users. In this paper, wireless internet proxy server clusters are used for the wireless Internet because their caching, distillation, and clustering functions are helpful to overcome the above limitations and needs. TranSend was proposed as a clustering based wireless internet proxy server but it has disadvantages; 1) its scalability is difficult to achieve because there is no systematic way to do it and 2) its structure is complex because of the inefficient communication structure among modules. In our former research, we proposed the All-in-one structure which can be scalable in a systematic way but it also has disadvantages; 1) data sharing among cache servers is not allowed and 2) its communication structure among modules is complex. In this paper, we proposed its improved scheme which has an efficient communication structure among modules and allows data to be shared among cache servers. We performed experiments using 16 PCs and experimental results show 54.86$\%$ and 4.70$\%$ performance improvement of the proposed system compared to TranSend and All-in-one system respectively Due to data sharing amount cache servers, the proposed scheme has an advantage of keeping a fixed size of the total cache memory regardless of cache server numbers. On the contrary, in All-in-one, the total cache memory size increases proportional to the number of cache servers since each cache server should keep all cache data, respectively.

Comparative Analysis on Cloud and On-Premises Environments for High-Resolution Agricultural Climate Data Processing (고해상도 농업 기후 자료 처리를 위한 클라우드와 온프레미스 비교 분석)

  • Park, Joo Hyeon;Ahn, Mun Il;Kang, Wee Soo;Shim, Kyo-Moon;Park, Eun Woo
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.4
    • /
    • pp.347-357
    • /
    • 2019
  • The usefulness of processing and analysis systems of GIS-based agricultural climate data is affected by the reliability and availability of computing infrastructures such as cloud, on-premises, and hybrid. Cloud technology has grown in popularity. However, various reference cases accumulated over the years of operational experiences point out important features that make on-premises technology compatible with cloud technology. Both cloud and on-premises technologies have their advantages and disadvantages in terms of operational time and cost, reliability, and security depending on cases of applications. In this study, we have described characteristics of four general computing platforms including cloud, on-premises with hardware-level virtualization, on-premises with operating system-level virtualization and hybrid environments, and compared them in terms of advantages and disadvantages when a huge amount of GIS-based agricultural climate data were stored and processed to provide public services of agro-meteorological and climate information at high spatial and temporal resolutions. It was found that migrating high-resolution agricultural climate data to public cloud would not be reasonable due to high cost for storing a large amount data that may be of no use in the future. Therefore, we recommended hybrid systems that the on-premises and the cloud environments are combined for data storage and backup systems that incur a major cost, and data analysis, processing and presentation that need operational flexibility, respectively.

Recommendations of the Korean Society for Health Education and Promotion for Developing the Korean Credentialing Policy of Health Education Specialist (보건교육사 제도정립의 방향)

  • Kim, Kwang-Kee;Kim, Keon-Yeop;Kim, Young-Bok;Kim, Hye-Kyeong;Park, Kyoung-Ok;Park, Chun-Man;Lee, Moo-Sik
    • Korean Journal of Health Education and Promotion
    • /
    • v.25 no.2
    • /
    • pp.73-89
    • /
    • 2008
  • Objectives: This research was conducted to suggest a recommendation for the Korean credentialing policy of health education specialist as the primary human resource in community health promotion activities from the special group perspective of the Korean Society for Health Education and Promotion. Methods: This research was conducted by the professional focus group discussion and descriptive literature review on health education and promotion. Results: This draft recommendation for Korean credentialing system development of health education specialist was based on the four background reasons for modifying health promotion related acts, for developing better policy of health education credentialing, for keeping the public and ethical responsibilities as the competitive professional society, and for improving health promotion activities in Korea. Theoretical background of the four reasons was Ottawa Charter. We classified three credentialing levels of health education specialist based on health education own competencies, coordiating competencies with environmental factors, and research competencies. Furthermore, we developed 10 major roles and categorized 53 sub-roles based on these competencies above. We recommended 10 classes required to take to become Health Education Specialist. These 10 classes were developed based on the credentialing systems in the United States and Japan. These 10 classes were about health education and promotion methods and strategies not health intervention topics. We also built the draft plan for continuing education to keep KCHES based on the NCHEC in the United States. Conclusions: Further research should be conducted to build better health education specialist credentialing systems modifing current communtiy-based health promotion activities in terms of modifying public regulation, developing KCHEC examination system, protecting job security both in public and private sectors, and creating professionalism in KCHEC.

Medical Information Privacy Concerns in the Use of the EHR System: A Grounded Theory Approach (의료정보 프라이버시 염려에 대한 근거이론적 연구: 전자건강기록(EHR) 시스템을 중심으로)

  • Eom, Doyoung;Lee, Heejin;Zoo, Hanah
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.217-229
    • /
    • 2018
  • Electronic Health Record (EHR) systems are widely adopted worldwide in hospitals for generating and exchanging records of patient information. Recent developments are moving towards implementing interoperable EHR systems that enable information to be shared seamlessly across healthcare organizations. In this context, this paper explores the factors that cause medical information privacy concerns, identifies how people react to privacy invasion and what their perceptions are towards the acceptance of the EHR system. Interviews were conducted to draw a grounded theory on medical information privacy concerns in the use of EHRs. Medical information privacy concerns are caused by perceived sensitivity of medical information and the weaknesses in security technologies. Trust in medical professionals, medical institutions and technologies plays an important role in determining people's reaction to privacy invasion and their perceptions on the use of EHRs.

Hierarchical Image Encryption System Using Orthogonal Method (직교성을 이용한 계층적 영상 암호화)

  • Kim, Nam-Jin;Seo, Dong-Hoan;Lee, Sung-Geun;Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.3
    • /
    • pp.231-239
    • /
    • 2006
  • In recent years, a hierarchical security architecture has been widely studied because it can efficiently protect information by allowing an authorized user access to the level of information. However, the conventional hierarchical decryption methods require several decryption keys for the high level information. In this paper, we propose a hierarchical image encryption using random phase masks and Walsh code having orthogonal characteristics. To decrypt the hierarchical level images by only one decryption key, we combine Walsh code into the hierarchical level system. For encryption process, we first perform a Fourier transform for the multiplication results of the original image and the random phase mask, and then expand the transformed pattern to be the same size and shape of Walsh code. The expanded pattern is finally encrypted by multiplying with the Walsh code image and the binary phase mask. We generate several encryption images as the same encryption process. The reconstruction image is detected on a CCD plane by a despread process and Fourier transform for the multiplication result of encryption image and hierarchical decryption keys which are generated by Walsh code and binary random phase image. Computer simulations demonstrate that the proposed technique can decrypt hierarchical information by using only one level decryption key image and it has a good robustness to the data loss such as random cropping.

Police security measures for foreign criminals : Focusing on Suwon (외국인범죄자에 대한 경찰의 치안대책 : 경기도 수원시를 중심으로)

  • Park, Chanhyeok;Seo, Bongsung
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.622-633
    • /
    • 2015
  • With recent news reports on violent crimes committed by foreigners, public hatred toward foreign criminals and fear about such crimes are growing, calling into question public safety measures implemented by the police and the immigration system. At the same time, due to globalization and structural changes in the labor market, it is certain that the influx of migrant workers will continue to increase. Against this backdrop, this paper seeks to examine the current status of foreign nationals staying in Korea and their criminal records focusing on Suwon city, and propose public safety measures the police could take with regard to crimes committed by foreigners. Also, the paper looks into public safety measures of the Korea Immigration Service and Suwon city, and suggests short- and long-term measures to prevent crimes committed by foreigners. The paper begins by examining the current public safety measures of the police and Suwon City concerning crimes committed by foreign nationals residing in Korea. Based on such examination, it points out insufficient patrol and investigation personnel as problems, and recommends short- and long-term measures for future improvement. This paper maintains that for the Korean society to successfully deal with the increasing number of foreigners in Korea, the current immigration system and public safety measures of the police will have to change. While the police alone cannot reduce the crime rates at local and national levels, nonetheless, proactive measures by the police are needed given the growing number of migrant workers and immigrants in Korea. Also important are mindset changes not only of relevant authorities, but also of the public. The paper recommends a set of short-and long-term public safety measures the police should institute to efficiently deal with crimes committed by foreigners.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Producing Firefighting Vulnerability Maps Using GIS - A Case Study of Dalseo-gu, Daegu - (GIS를 이용한 화재진압 취약성 지도 제작 - 대구광역시 달서구를 사례로 -)

  • KIM, Sung-Jae;CHOI, Gap-Yong;CHANG, Eun-Mi;SONG, Wan-Young
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.3
    • /
    • pp.11-20
    • /
    • 2015
  • Fire incidents, which occur every year, cause huge damage to properties and humans. Significant time and costs have been invested in minimizing and responding to such accidents. With the recent advances in the development of spatial information, in the firefighting field, studies have been conducted to effectively bring fires under control using GIS(Geographic Information System). Most of such studies, however, focused on individual analyses of firefighting-related factors, but comprehensive research on the vulnerability factors in fire control activities, a major part of firefighting activity, has yet to be done. This study sought to pinpoint and analyze the factors that obstruct fire controlling, and to gather relevant data and create GIS-based databases. Based on such database, GIS-based overlay analysis was conducted to produce a fire control vulnerability map. The findings of this study will enable a quantitative analysis of firefighting obstruction factors to assist the personnel engaging in firefighting in rational decision-making, such as in formulating a firefighting operation plan for securing golden time.

A Study on the Liability of Air Carrier for Damages of the Third Parties (지상제삼자(地上第三者)의 손해(損害)에 대한 공중운송인(空中運送人)의 책임(責任)에 관한 고찰(考察))

  • Park, Heon-Mok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.163-191
    • /
    • 1989
  • The accident of the midair collision, passengers' falling or goods' dropping occurs or supersonic aircraft make a sonic boom during their conveying passengers or goods to the destination. The accident in transmit damages the their parties on the surface or their properties. In these cases, the third parties who were harmed to their lives or properties have the right to claim damages against the air carrier who caused them. These matters have become one of the important things since aircraft conveyed passengers and goods. Therefore, it is a great concern to settle these matters by law. But the Safety of the present aircraft has been much increased and the aircraft have become larger in size. Its flight altitude became higher than before. So the relationship of the aircraft to the third parties is much different from that of the earlier aircraft. The air transport is now indispensable to our life. It is not so easy to control these matters. In the early part of 20th century, when the third parties suffered the damage, many European countries made laws on the basis of the principle of liability without fault. But each country had a variety of its own law, and different kinds of difficulties have been brought about. Accordingly, the Rome Convention on Surface Damage (1933, 1952, 1978) has been made and revised. In spite of being revised, it contains many problems, and is not carried into effect world-wide. On the other hand, there are no regulations about the compensation of the third parties damaged in Korean existing laws. In case the damage is brought about to them, it is obviously true that the settlement of the liability of compensation for damage should be made by the general principle on the tort in domestic laws. At this point, it is urgent that we make a special law though the domestic legislation as a preliminary measure before we sign the international convention to save third damaged. It is desirable that we should, for the responsibility of the air carriage for the demage of the third parties on the surface, bring in the theory of the absolute liability in view of the legislation of many conutries. As the aircraft fly in the sky, their flight always contains some danger. It is very difficult to prove the fault, and the operator should suffer the principle of liability without fault or the similiar one. In case the liability without fault will be imposed upon the operator for the damage of the third parties, it is necessary to bring in the liability protection system for the protection and up upbringing of the air carriage. The Burden of danger of the air carriage will be reduced by introducing the system. A domestic legislation measure should be necessarily taken as soon as possible as a legal security measure on these matters.

  • PDF

A Study on Prevention of Accidents of Carbon Monoxide Leak from Gas Boilers (가스보일러 일산화탄소 누출사고 경감에 관한 연구)

  • Song, Jaechang;Kwon, Hweeung;Lee, Younghee;Moon, Il
    • Korean Chemical Engineering Research
    • /
    • v.50 no.2
    • /
    • pp.277-281
    • /
    • 2012
  • This work is concerned with a plan for preventing accidents of CO gas leak from gas boilers, involving the enforcement of installations of both CO alarm system and condensing boilers, and financial support of government grants. If amongst 1,460,000 beneficiaries of basic livelihood security, one million households in use of gas boilers receive 3-year support of 200,000 won, the difference of prices between common and condensing boilers, the government grants would be 2,000 billion won. If 3 million common householders are in 3-year support of 100,000 won, government grants would be 3,000 billion won. Therefore, 3-year grand total of government grants would be 5,000 billion won. Finance for government grants can be purveyed from energy saving; yearly 2,000 billion won of energy saving by enforcing to replace one million existing boilers with condensing boilers, leading to 2 trillion won of energy saving for 10 years. In this way, 6,000 billion won of 3-year grand total of government grants for CO alarm system and condensing boilers can be purveyed. The rest amount would be fundraised for energy savings. We claim that our proposal can make an achievement of more than 50% reduction of CO leak accidents during 10 years.