• Title/Summary/Keyword: 관리정책

Search Result 7,653, Processing Time 0.035 seconds

유비쿼터스 홈네트웍크 산업 해외기술정책 동향 및 기술개발정책연구

  • Choe, Seong
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.387-397
    • /
    • 2005
  • 본 논문에서는 홈네트워크 기술을 통해 원격의료 원격진료 원격검침 원격제어 등 편리한 생활이 가능하고, 대화형 TV VOD(Video On Demand) 온라인 게임 등의 각종 오락을 가정에서 편리하게 즐길 수 있어 여가 시간을 효율적으로 활용 가능하게 하여 즐거운 가정을 이룰 수 있다. 방범 방재 안전한 개인 정보 관리 등을 통해 개인 및 가정의 프라이버시를 보장받고, 도난 재난 등을 24시간 방지하여 안전한 생활을 보장받을 수 있을 뿐 아니라, 양방향 홈쇼핑 홈뱅킹 에너지 관리 등 개인의 경제 활동을 가정에서 처리하고 전기 가스 등의 공공 자원을 외부에서 효율적으로 관리함으로써 윤택한 가정을 누릴 수 있는 국내외 홈네트워크 기술 동향 및 국내 기술개발 정책에 대해 연구하였다.

  • PDF

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

A Mechanism for Policy-based QoS Control on COPS Interface in NGN (NGN 에서 COPS 를 이용한 정책(Policy) 기반 QoS 제어 메커니즘)

  • Song, Sung-Han;Kim, Yang-Jung;Lee, Dong-Kyu;Chong, Il-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1342-1345
    • /
    • 2007
  • 현재 NGN 망에서 강조되는 QoS 보장 기술은 인터넷에서 QoS(Quality of Service) 제공을 위해 해당 응용 서비스 마다 자원을 예약하거나 할당하는 기능을 수행하며, 이 때, 효율적인 종단간의 QoS 보장을 위해서는 전체적으로 자원관리를 할 필요가 생긴다. 정책(Policy) 기반 QoS 기술 관리는 이 경우에 수행이 된다. NGN 망에서의 정책 기반 QoS 기술을 위해서는 정책 기반 QoS 관리 기술 구조 및 프로토콜에 대한 총괄적인 이해가 우선되어야 한다. 즉, 정책 결정 및 정책 실행과 관련한 정책 기반 QoS 관리 기술 구조와 프로토콜 관련한 COPS(Common Open Policy Service)와 LDAP(Light Weight Directory Access Protocol)을 중심으로 이해가 되어야 하고, 이를 토대로 해서 정책 기반 QoS 관리 기술 서비스가 제공 될 수 있다.

An empirical study on information management policy between korea and northern countries (대북방 과학기술정보관리정책에 관한 연구)

  • 곽동철
    • Journal of the Korean Society for information Management
    • /
    • v.14 no.2
    • /
    • pp.47-83
    • /
    • 1997
  • The purpose of this study is to present scientific and technical information management policy for efficient support for technical cooperation with Russia and China. Bearing this purpose in mind, the main function, of Korea's scientific and technical information managing organizations related to Russia and China and the status of information management were examined, then the realities of, and controversial points on, technical cooperation have been investigated and analyzed. On the basis of this, this paper tried to present measures concerning the establishment of scientific and technical information managing policy, the securing of budget, the enforcement of scientific and technical information managing operations and the promotion of a comprehensive organization for scientific and technical information management.

  • PDF

Analysis of Policy Network for Participatory Agricultural Water Management in Korea: in Comparison with LID in Japan (한국의 참여형 농업용수 관리를 위한 정책네트워크 분석: 일본 '토지개량구' 사례와 비교하여)

  • Kim, Bo-Ram;Park, Sung-Je;Yi, Young-Kune
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.450-455
    • /
    • 2012
  • 본 연구에서는 한국 농업용수 관리의 효율성을 높이는 방안을 모색하기 위하여 현재 농민 참여형 농업용수 관리를 실시하고 있는 일본의 토지개량구 사례를 우리나라와 비교하였다. 이러한 비교 분석을 위하여 정책네트워크 이론을 사용하여 농업용수 관리 정책에 있어서 각 행위자들과 그들 간의 관계 및 상호작용을 설명하였다. 그러나 농업용수 관리에 있어서 농업인의 참여는 효율적인 농업용수 관리를 위한 필요조건이지 충분조건은 아니다. 현대의 농업 분야가 점차 규모화 과학화되면서 농업용수 관리에 있어서도 전문성이 요구되고, 이러한 현상과 함께 수혜자로서 농업인의 비용부담 문제 또한 함께 고려되어야 할 것이다.

  • PDF

Design and Implementation of a Management Framework for Ubiquitous Sensor Networks Based on Clustering (클러스터링 기반 유비쿼터스 센서 네트워크 관리 프레임워크의 설계 및 구현)

  • Lee, Jong-Eon;Cha, Si-Ho;Cho, Kuk-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4B
    • /
    • pp.174-183
    • /
    • 2008
  • In this paper we design and implement a sensor network management framework(SNMF) for ubiquitous sensor networks(USNs). The SNMF employs the policy-based management approach for the autonomous and energy-efficient management of USNs. Moreover, a new light-weight policy distribution protocol called TinyCOPS-PR is designed and USN PIB for low-level policy is also defined. This allows the high-level policies defined by an administrator to translate into the specific low-level policies. The low-level policies are executed on sensor nodes so it can fulfill the proper management actions. The sensor nodes that receive some policies from an administrator perform local management actions according to those policies. SNMF can therefore realize small energy consumption and bring long network lifetime. It can also manage USNs automatically with a minimum of human interference.

FRM: Foundation-policy Recommendation Model to Improve the Performance of NAND Flash Memory

  • Won Ho Lee;Jun-Hyeong Choi;Jong Wook Kwak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.1-10
    • /
    • 2023
  • Recently, NAND flash memories have replaced magnetic disks due to non-volatility, high capacity and high resistance, in various computer systems but it has disadvantages which are the limited lifespan and imbalanced operation latency. Therefore, many page replacement policies have been studied to overcome the disadvantages of NAND flash memories. Although it is clear that these policies reflect execution characteristics of various environments and applications, researches on the foundation-policy decision for disk buffer management are insufficient. Thus, in this paper, we propose a foundation-policy recommendation model, called FRM for effectively utilizing NAND flash memories. FRM proposes a suitable page replacement policy by classifying and analyzing characteristics of workloads through machine learning. As an implementation case, we introduce FRM with a disk buffer management policy and in experiment results, prediction accuracy and weighted average of FRM shows 92.85% and 88.97%, by training dataset and validation dataset for foundation disk buffer management policy, respectively.

Proposal of Network Security Management architecture using Programmable Network Technology (프로그래머블 네트워크 기술을 이용한 네트워크 보안 관리 구조 제안)

  • 김명은;오승희;김광식;남택용;손승원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10C
    • /
    • pp.1033-1044
    • /
    • 2003
  • In this paper, we propose security management architecture that manages efficiently security systems that are produced by different companies and programmable middleware that can reduce the load of management traffic. The proposed architecture applies programmable networks technology to policy based network management (PBNM). The proposed architecture manages and cooperates various security systems using security policy. Also, the programmable middleware provides convenience of management and reduces the overhead of a policy server by translating security policy into execution command. In addition, using programmable middleware, an administrator can manage various security systems that are produced by different companies. We showed that the programmable middleware could reduce the load of management traffic by comparing processing time for enforcing and transferring of policies/messages between the proposed architecture and PBNM architecture.