• Title/Summary/Keyword: assurance level

Search Result 344, Processing Time 0.023 seconds

Hazard Assessment Methodology Based on Target Level of Safety for CNS/ATM System (항행 안전 시스템을 위한 안전 목표 수준 기반 위험 평가 방법론)

  • Lee, Hongseok;Jo, Sanghoon
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.4
    • /
    • pp.285-291
    • /
    • 2016
  • Safety assessment is an essential activity for developing a system in the CNS/ATM domain. Up to now, there are many reference materials, but there is nothing that definitely specifies what to do and how to apply in the CNS/ATM. Another problem is that software assurance level has to be determined for a software under development. But there is nothing that defines a determination scheme of software assurance level. To solve these problems, this paper proposes a method to conduct a hazard assessment based on target level of safety defined in ICAO Doc 9689. To be applied generally in CNS/ATM domain, it mathematically defines procedures of hazard assessment. And it defines severity classification, probability, and safety objective of a system, which are necessary for hazard assessment, and it describes a method to apply event tree analysis process in order to conduct a hazard assessment.

Security Evaluation Criteria for Firewalls in Kirea

  • Lee, Cheol-Won;Hong, Ki-Yoong;Kim, Hak-Beom;Oh, Kyeong-Hee;Kwon, Hyun-Jo;Sim, Joo-Geol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.3
    • /
    • pp.63-78
    • /
    • 1998
  • Recently, to use the evaluated firewall is recognized as a solution to achieve the security and reliability for government and organizarions in Korea. Results of firewall evaluation using ITSEC(Information Technology Security Evaluation Criteria) and CCPP(Common Criteria Protection Peofile)have been announced. Because there are problems to apply ITSECor CCPP for the firewall evaluation in korea environment, korea government and korea Information security Agency (KISA) decided to develop our own security dvaluation critrtia fir firewalls.As a result of the efforts, Korea firewall security evaluation criteria has been published on Feb. 1998. In this paper, we introduce Korea security evaluation criteria for firewalls. The ceiteria consists of functional and assurance requirements that are compatible with CC Evaluation Assurance Levels(EALs)

A Designing Method of Network Quality Assurance Test Bed Design under Next-generation Network Environment (NGN(Next Generation Network)의 네트워크 품질 보증을 위한 테스트베드 모델 설계)

  • Chung, Ji Moon
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.625-629
    • /
    • 2012
  • This paper is presented to prepare NGN quality assurance management process under the quality system test methodology. The process should be drawn for NGN quality measurement framework of multimedia traffic. NGN test bed management process model are QoS measurement metrics, measurement interval meter above, and measuring tools, measuring equipment, measurement methods and measurement results from a series of processes for the analysis and methodology. This model, NGN quality assurance activities should be utilized in the future. Quality target level only when themselves constantly measured and managed, does not guarantee the communication quality of service. It is sensitive to the importance of NGN network technology paradigm for research on quality management in the NGN.

Vibration-based damage alarming criteria for wind turbine towers

  • Nguyen, Cong-Uy;Huynh, Thanh-Canh;Dang, Ngoc-Loi;Kim, Jeong-Tae
    • Structural Monitoring and Maintenance
    • /
    • v.4 no.3
    • /
    • pp.221-236
    • /
    • 2017
  • In this study, the feasibility of vibration-based damage alarming algorithms are numerically evaluated for wind turbine tower structures which are subjected to harmonic force excitation. Firstly, the algorithm of vibration-based damage alarming for the wind turbine tower (WTT) is visited. The natural frequency change, modal assurance criterion (MAC) and frequency-response-ratio assurance criterion (FRRAC) are utilized to recognize changes in dynamic characteristics due to a structural damage. Secondly, a finite element model based on a real wind turbine tower is established in a structural analysis program, Midas FEA. The harmonic force is applied at the rotor level as presence of excitation. Several structural damage scenarios are numerically simulated in segmental joints of the wind turbine model. Finally, the natural frequency change, MAC and FRRAC algorithm are employed to identify the structural damage occurred in the finite element model. The results show that these criteria could be used as promising damage existence indicators for the damage alarming in wind turbine supporting structures.

An Evaluation Method for Security Policy Model Based on Common Criteria (공통평가기준에 의한 보안정책모델 평가방법)

  • 김상호;임춘성
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.57-67
    • /
    • 2003
  • Security Policy Model is a structured representation using informal, semiformal or formal method of security policy to be enforced by TOE. It provides TOE to get an assurance to mitigate security flaws resulted from inconsistency between security functional requirements and functional specifications. Therefore, Security Policy Model has been required under an hish evaluation assurance level on an evaluation criteria such as ISO/IEC 15408(Common Criteria, CC). In this paper, we present an evaluation method for security policy model based on assurance requirements for security policy model in Common Criteria through an analysis of concepts, related researches and assurance requirements for security policy model.

A Framework for Trustworthy Open Shared Authentication Protocol (신뢰적인 개방형 공유 인증 프로토콜 프레임워크)

  • Park, Seung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.389-396
    • /
    • 2011
  • Recently, researches on the shared authentication based on single sign-on have been actively performed so as to solve the problems of current service provider-centric and isolated Internet authentications, including low usability, high cost structure, and difficulty in privacy protection. In order for the shared authentication model, where the authentications of an authentication provider are shared by several Internet service providers, to be accepted in real Internet environment, trustworthiness among users, service providers, and authentication providers on the level of authentication assurance and the level of authentication information protection is necessarily required. This paper proposes a framework for trustworthy and privacy-protected shared authentication protocol based on the user-centric operation and open trust provider network. The proposed framework is differentiated from previous works in the points that it is able to provide interoperable shared authentication services on the basis of open trust infrastructure.

A Minimum Cost Model for Merging Production Process with Final Product Quality Constraints (최종품질제약하의 병합공정을 갖는 생산라인의 최소비용 모형)

  • 이경록;박명규
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.4
    • /
    • pp.169-185
    • /
    • 2003
  • Recently many researchers contributed to the understanding of Quality Control System, but the use of economics in the design of quality assurance system is limited in treatment of the relationship between the average incoming quality level (or average process quality level) of the incoming lot and the average outgoing quality level of this lot. In this study, a traditional concept of sampling inspection plan for the quality assurance system is extended to a consideration of economic aspects in total production system by representing and analyzing the effects between proceeding and succeeding production process including inspection process. This approach recognizes that the decision at each manufacturing process (or assembly process), is to be determined not only by the cost and the average outgoing quality level of that process, but also by the input parameters of the cost and the incoming quality to the succeeding process. By analyzing the effects of the average incoming and outgoing quality, manufacturing or assembly process quality level and sampling inspection plan on the production system, mathematical models and solution technique to minimize the total production cost for a general product manufacturing system with specified average outgoing quality limit are suggested.

Comparative Analysis of Reliability Predictions for Quality Assurance Factors in FIDES (FIDES의 품질 보증 인자에 대한 신뢰도 예측 비교 분석)

  • Cheol-Hwan Youn;Jin-Uk Seo;Seong-Keun Jeong;Hyun-Ung Oh
    • Journal of Aerospace System Engineering
    • /
    • v.18 no.2
    • /
    • pp.21-28
    • /
    • 2024
  • In light of the rapid development of the space industry, there has been increased attention on small satellites. These satellites rely on components that are considered to have lower reliability compared to larger-scale satellites. As a result, predicting reliability becomes even more crucial in this context. Therefore, this study aims to compare three reliability prediction techniques: MIL-HDBK-217F, RiAC-HDBK-217Plus, and FIDES. The goal is to determine a suitable reliability standard specifically for nano-satellites. Furthermore, we have refined the quality assurance factors of the manufacturing company. These factors have been adjusted to be applicable across various industrial sectors, with a particular focus on the selected FIDES prediction standard. This approach ensures that the scoring system accurately reflects the suitability for the aerospace industry. Finally, by implementing this refined system, we confirm the impact of the manufacturer's quality assurance level on the total failure rate.

A Study on Correlation between the CMMI SPs and GPs at Maturity Levels 2 and 3

  • Lee, Min Jae;Rhew, Sung-Yul
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.7 no.1
    • /
    • pp.9-21
    • /
    • 2011
  • Assuming that the Capability Maturity Model Integration for Development v1.2 (CMMI) could be applied to an organization more effectively if the content similarities among practices were improved in terms of structure and composition, this paper presents the analysis of the correlations between the CMMI Specific Practices (SP) and Generic Practices (GP) for the Maturity Level 2 and 3 Process Areas using the Chi-square independence test. According to the analysis, a 22.2% correlation was observed. To minimize the problem of repeatedly applying similarities, 6 GPs that are highly correlated with the SPs were grouped together. Then, three different improvement plans: 1) development of a standard template-based project plan, 2) establishment of a configuration management system based on open source software to control work products and leverage experience, and 3) establishment of project assurance through an independent quality assurance-based organization and intensive review by higher-level management - were defined.

Convergence Security Provider Self-Conformity System (융합보안 공급자 자기 적합성 제도)

  • Baik, Namkyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.53-61
    • /
    • 2019
  • In this paper, we propose 'a self - conformance system of convergence security provider' to provide basic data for security and reliability of convergence industrial technology, system and service. It is difficult to evaluate convergence security systems, limited to information and communication service providers, unable to check convergence security items, burden of submission documents, difficulty in measuring convergence security service level and we will summarize product and service-based requirements that can be integrated and systematically measure the level of convergence security and define renewed life cycle-based convergence security information and content security and assurance requirements. On the basis of this, each convergence security company declares conformity with the standard itself without the certification of the certification body, and introduces the provider conformity certification system which can manufacture and sell. This will enable the company to strengthen its competitiveness through timely launch and implementation of products and services and cost reduction.