• Title/Summary/Keyword: target system access control

Search Result 70, Processing Time 0.035 seconds

Development of BPM System using EPICS (1) (EPICS 를 이용한 BPM시스템 개발 (1))

  • Lee, Eun-H.;Yun, Jong-C.;Lee, Jin-W.;Choi, Jin-H.;Hwang, Jung-Y.;Nam, Sang-H.
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2325-2327
    • /
    • 2002
  • 포항 가속기연구소(PAL)에서는 포항방사광가속기(PLS)가 가동을 시작한 1994년 이후 현재까지 사용되어 온 기존의 제어 시스템을 새로운 환경인 EPICS(Experimental Physics and Industrial Control System) 시스템으로 개발하고 있다. EPICS 시스템의 구성은 IOC(Input/Ouput Controller) 와 OPI(Operator Interface)의 2-Layer로 구성되며 이는 MIU(Machine Interfaces Unit), SCC(Subsystem Computer Control System) 그리고 HMI(Human Machine Interface)로 이어지는 기존의 3-Layer 단계 중 SCC단계를 줄여 2-Layer로 구성된다. 이들 두 계층간의 통신은 Client(OPI)/Server(IOC) 구조의 Channel Access를 통해서 이루어진다. 개발중인 EPICS 시스템은 Open Architecture 구조로 IOC와 OPI 각 부분에서 개발시에 사용된 운영체제나 Hardware 를 사용하지 않고 다른 운영체제나 Hardware를 사용하더라도 하나의 공통부분 즉, Channel Access만 있으면 이를 통해 서로 다른 Subsystem IOC의 데이터를 Access할 수 있다. 전체 EPICS 제어시스템 중 저장링 운전의 핵심이 되는 BPM(Beam Position Monitoring) 및 MPS(Magnet Power Supply) 시스템은 IOC부분에 MVME5100(Target Machine) 보드와 vxWorks(Operating System)를 이용하고 OPI부분에는 SUN Workstation(Host Machine)와 Solaris(Operating System)을 사용하여 개발하고 있다. 본 논문에서는 IOC 및 OPI의 설치 절차와 설치 방법에 대해 기술하였다.

  • PDF

Multiple Layer File Format for Safe Collaborative Design (안전한 협업 디자인 작업을 위한 다중 레이어 파일 포맷)

  • Kim, Kichang;Yoo, Sang Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.45-65
    • /
    • 2013
  • A design file can get larger in size as the complexity of the target object increases. A large design file may reside in a large parallel computing system, such as cloud computing systems, and many designers may work concurrently on the same design file. In such a case, it is obvious that we need some kind of protection mechanism so that each user can access only the area of the file he or she is entitled to. Two approaches can be taken for this problem: one is the traditional access control mechanisms and the other encryption techniques. We take the latter approach to ensure the safety of the file even in public domain such as clouding systems, and in this paper, we suggest an encryption scheme for a file where the file is encrypted in multi-layer so that each user is allowed to access the file only at the layer for which the user has the proper access right. Each layer of the file is encrypted with different keys and these keys are exposed only to those who have the right access permit. The paper explains the necessary file format to achieve this goal and discusses the file manipulation functions to handle this new file format.

Improving the Protection and Security System Outside the National Assembly Building (국회 외곽 경호·경비시스템 발전방향에 관한 연구)

  • Choi, O-Ho
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.113-135
    • /
    • 2019
  • Despite being one of the most important national facilities, the National Assembly building of the Republic of Korea has become increasingly vulnerable to potential terrorist attacks, and the instances of demonstrations occurring around and banned items taken into the building are continuing to rise. In addition, promoting the idea of "open assembly" has led to increased visitors and weakened access control. Furthermore, while there is a significant symbolic value attached to attacking the National Assembly building, the level of security management is relatively very low, making it a suitable target for terrorism. In order to address such vulnerability, an appropriate access control system should be in place from the areas surrounding the building. However, the National Assembly Security Service which oversees security around the building is scheduled to disband in June 2020 following the abolition of the conscripted police force in 2023. Therefore, there needs to be an alternative option to bolster the security system outside the facility. In this research, the perceptions of 114 government officials in charge of security at the National Assembly Secretariat toward the protection and security system of the areas surrounding the National Assembly building were examined. Results showed that the respondents believed it was highly likely that risky situations could occur outside the building, and the use of advanced technologies such as intelligent video surveillance, intrusion detection system, and drones was viewed favorably. Moreover, a mid- to long-term plan of establishing a unified three-layer protection system and designating a department in charge of the security outside the building were perceived positively. Lastly, the participants supported the idea of employing private police to replace the National Assembly Security Service for the short term and introducing parliamentary police for the mid- to long-term.

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Park, Gee-Yong;Kwon, Kee-Choon;Lee, Dong-Young;Lee, Cheol-Kwon
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.637-652
    • /
    • 2013
  • Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security.. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.

Design and Running of a Surveying Ship for Bathymetry of The Manned and Unmanned Control System (유.무인운용 가능한 수심측량을 위한 측량선 설계 및 구현)

  • Choi, Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.16-21
    • /
    • 2011
  • Bathymetry which is mainly used on the earth or the sea can be surveyed directly by a person who is on a surveying ship or in a way one estimates the target through a surveying ship. However, the surveying ship which is being used now is divided into a manned and unmanned system and it's difficult to deal with it appropriately according to the water depth or the condition of weather. Therefore, this study will invent the surveying ship that can measure the water depth with the unmanned remote control system in the place where it's difficult to for man access because of a bad weather or a vast area. There are two methods in the control system of the manned and unmanned surveying ship which has been developed in this study. One is an automatic control which moves on the path set by the user in advance and the other is the optimized passive control in which the control station can manage the direction and speed of a surveying ship directly.

Implementation of Efficient Keyboard-hacking prevention and Authentication Systems using a Smart Card (스마트카드를 이용한 효율적인 키보드 해킹 방지 및 인증 시스템 구현)

  • 황선태;박종선
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.191-194
    • /
    • 2003
  • In this paper, we describe the effective way of keyboard-hacking prevention and authentication system using a Smart Card. These days the securing information matters for pc-users are becoming more important as the internet business grows rapidly, and the ubiquitous computing environment is open tot everyone. Therefore, PC authentication is necessary to handle the access control to the target PC. Also, the keyboard-inputting information is necessary to be protected properly against the malicious attack. In this paper, we propose the keyboard-hacking protect systems and authentication system using a Smart Card, and show the conveniency and efficiency in the results.

  • PDF

Grout Injection Control using AI Methodology (인공지능기법을 활용한 그라우트의 주입제어)

  • Lee Chung-In;Jeong Yun-Young
    • Tunnel and Underground Space
    • /
    • v.14 no.6 s.53
    • /
    • pp.399-410
    • /
    • 2004
  • The utilization of AS(Artificial Intelligence) and Database could be considered as an useful access for the application of underground information from the point of a geotechnical methodology. Its detailed usage has been recently studied in many fields of geo-sciences. In this paper, the target of usage is on controlling the injection of grout which more scientific access is needed in the grouting that has been used a major method in many engineering application. As the proposals for this problem it is suggested the methodology consisting of a fuzzy-neural hybrid system and a database. The database was firstly constructed for parameters dynamically varied according to the conditions of rock mass during the injection of grout. And then the conceptional model for the fuzzy-neural hybrid system was investigated fer optimally finding the controlling range of the grout valve. The investigated model applied to four cases, and it is found that the controlling range of the grout valve was reasonably deduced corresponding to the mechanical phenomena occurred by the injection of grout. Consequently, the algorithm organizing the fuzzy-neural hybrid system and the database as a system can be considered as a tool for controlling the injection condition of grout.

Review of the Cervical Cancer Burden and Population-Based Cervical Cancer Screening in China

  • Di, Jiangli;Rutherford, Shannon;Chu, Cordia
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.17
    • /
    • pp.7401-7407
    • /
    • 2015
  • Cervical cancer continues to be a serious public health problem in the developing world, including China. Because of its large population with geographical and socioeconomic inequities, China has a high burden of cervical cancer and important disparities among different regions. In this review, we first present an overview of the cervical cancer incidence and mortality over time, and focus on diversity and disparity in access to care for various subpopulations across geographical regions and socioeconomic strata in China. Then, we describe population-based cervical cancer screening in China, and in particular implementation of the National Cervical Cancer Screening Program in Rural Areas (NACCSPRA) and the challenges that this program faces. These include low screening coverage, shortage of qualified health care personnel and limited funds. To improve prevention of cervical cancer and obtain better cancer outcomes, the Chinese government needs to urgently consider the following key factors: reducing disparities in health care access, collecting accurate and broadly representative data in cancer registries, expanding target population size and increasing allocation of government funding for training of personnel, improving health education for women, enhancing quality control of screening services and improving a system to increase follow up for women with positive results.

An Ontology-based Knowledge Management System - Integrated System of Web Information Extraction and Structuring Knowledge -

  • Mima, Hideki;Matsushima, Katsumori
    • Proceedings of the CALSEC Conference
    • /
    • 2005.03a
    • /
    • pp.55-61
    • /
    • 2005
  • We will introduce a new web-based knowledge management system in progress, in which XML-based web information extraction and our structuring knowledge technologies are combined using ontology-based natural language processing. Our aim is to provide efficient access to heterogeneous information on the web, enabling users to use a wide range of textual and non textual resources, such as newspapers and databases, effortlessly to accelerate knowledge acquisition from such knowledge sources. In order to achieve the efficient knowledge management, we propose at first an XML-based Web information extraction which contains a sophisticated control language to extract data from Web pages. With using standard XML Technologies in the system, our approach can make extracting information easy because of a) detaching rules from processing, b) restricting target for processing, c) Interactive operations for developing extracting rules. Then we propose a structuring knowledge system which includes, 1) automatic term recognition, 2) domain oriented automatic term clustering, 3) similarity-based document retrieval, 4) real-time document clustering, and 5) visualization. The system supports integrating different types of databases (textual and non textual) and retrieving different types of information simultaneously. Through further explanation to the specification and the implementation technique of the system, we will demonstrate how the system can accelerate knowledge acquisition on the Web even for novice users of the field.

  • PDF

The Detection System for Hosts infected Malware through Behavior information of NAC post-connect (NAC 의 post-connect에서 행위정보를 사용한 악성코드 감염 호스트 탐지 시스템)

  • Han, Myung-Mook;Sun, Jong-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.6
    • /
    • pp.91-98
    • /
    • 2010
  • NAC(Network Access Control) has been developed as a solution for the security of end-point user, to be a target computer of worm attack which does not use security patch of OS and install Anti-Virus, which spreads the viruses in the Intra-net. Currently the NAC products in market have a sufficient technology of pre-connect, but insufficient one of post-connect which detects the threats after the connect through regular authentication. Therefore NAC users have been suffered from Zero-day attacks and malware infection. In this paper, to solve the problems in the post-connect step we generate the normal behavior profiles using the traffic information of each host, host information through agent, information of open port and network configuration modification through network scanner addition to authentication of host and inspection of policy violation used before. Based on these we propose the system to detect the hosts infected malware.

  • PDF