• Title/Summary/Keyword: 망관리 정책

Search Result 323, Processing Time 0.031 seconds

Several Concepts of Industrial Innovation Policy and their Weights in Diverse Countries: Policy Implications for Korea (산업혁신정책의 주요 담론들과 그 정책목표의 국제 비교: 한국에의 시사점)

  • Keun Lee;Joonyup Kim
    • Journal of Technology Innovation
    • /
    • v.31 no.2
    • /
    • pp.1-27
    • /
    • 2023
  • This study first reviews the evolving literature on industrial innovation policy and thereby identifies three main goals of such policy. The first goal is traditional industrial policy aiming growth of existing and future industries, the second goal is sustainable development and quality of life, and third goal encompasses the issues related to supply chain and economic security. Then, the paper evaluates industrial innovation policy goals of the five economies (United States, China, Germany, Japan, and Taiwan) in terms of the relative weights given to each goal by each economy, and derives implications for Korea. The United States emphasizes economic security and supply chain stability amid its rivalry with China. In contrast, China focuses more on traditional industrial policies but has recently begun to consider supply chain and economic security. Germany and Japan tend to give similar weights to each of the three goals. Taiwan follows this trend with a new and additional emphasis on economic security given the rising threats from China. For Korea, economic security may not be the top priority, unlike the two super-powers. Instead, it seems more appropriate for Korea to follow Germany or Japan to prioritize supply chain stability and technology sovereignty, and, at the same time, fostering future growth industries must be still an important goal. Further, the concept of economic security for Korea should include promotion of defense industry and food security.

Active PDP Discovery for PBNM in MANETs (MANETs에서 정책기반 망 관리를 위한 Active PDP Discovery)

  • Lee Kyung-Jin;Song Wang-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.390-396
    • /
    • 2006
  • Policy-based Network Management(PBNM) in the Mobile Ad-hoc network(MANETs) requires additional, reliable and efficient mechanism over PBNM in wired network. Thus, it is important that the management system in MANETs should cluster the moving nodes and manage their movements in an effective manner. In this thesis, I propose a mechanism for the policy-based management in ad hoc networks in which I consider several methods to discover the Policy Decision Point(PDP), set the management area, and manage the movements of Policy Enforcement Point(PEP) nodes in the PBNM system. Moreover, COPS-PR is extended for the mechanism. Finally, I analyze and validate the results through simulations.

A Role-Based Access Control Model of Managed Objects in Distributed System Environments (분산시스템 환경에서 관리 객체에 대한 역할기반 접근제어 모델)

  • Choi Eun-Bok
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.75-86
    • /
    • 2003
  • In this paper, we extended hierarchial structure of managed object class to support Role-Based Access Control, and described constraint conditions that have support dynamic temporal function as well as statical temporal function established by management process. And we defined about violation notifications should report to manager when rules violate constraint conditions. Also we presented system architecture that support RBAC with MIB(Management Information Base) of ITU-T recommendation. By access control enforcement and decision function, constraint conditions and activated translation procedure of each roles are described, our system presents dynamic temporal property systematically.

  • PDF

The Access Control System of Network Management Information Base (망관리 정보베이스 접근 제어 시스템)

  • Kim, Jong-Duk;Lee, Hyung-Hyo;Noh, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1246-1256
    • /
    • 1998
  • MIB(Management Information Base), one of the key components of network management system, is a conceptual repository for the information of the various managed objects. MIB stores and manages all the structural and operational data of each managed resources. Therefore, MIB should be protected properly from inadvertant user access or malicious attacks. International standard ISO/IEC 10164-9 describes several managed object classes for the enforcement of MIB security. Those managed object classes described access control rules for security policy. But the exact authorization procedures using those newly added managed object classes are not presented. In this paper, we divide managed object classes into two groups, explicit and implicit ones, and describe the access authorization procedure in Z specification language. Using Z as a description method for both authorization procedure and GDMO's action part, the behaviour of each managed object class and access authorization procedure is more precisely and formally defined than those of natural language form.

  • PDF

Analysis of groundwater recharge based groundwater level monitoring data by administrative districts in Korea (국내 행정구역 별 관측 지하수위 기반 지하수 함양량 분석)

  • Lee, Jae Beom;Kim, Dong Geon;Lee, Won Young;Yang, Jeong Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.452-452
    • /
    • 2022
  • 수문순환의 측면에서 지하수는 지속적인 하천의 흐름을 유지하고, 국내 물 이용의 측면에서 가용수량을 만족할 수 있는 취수량을 확보하기가 어려운 중·소규모 하천 유역에서 필요한 농업 및 생활용수 등 각종 용수를 확보할 수 있는 중요한 수원으로써의 역할을 하고 있다. 기존의 수자원 정책은 하천에서의 취수량 확보를 위한 수공 구조물의 설치 및 운영을 통한 용수 확보의 형태로 입안되었으나, 최근 2012~2018 한반도 가뭄 사태로 대표되는 강수 패턴의 변화로 인하여 하천에서의 취수량 부족 사태에 대응하기 위하여 지표수-지하수 연계를 고려한 수원 확보에 대한 정책적·공학적 관심과 요구가 증가하고 있다. 지하수의 효율적 운영과 안정적 관리를 위해서 지하수 이용에 대한 관리도 중요하나, 강수 사상의 발생 시 지하수 함양량을 정량적으로 평가하는 것 또한 매우 중요하다. 지하수 함양량은 강수량이나 하천유량 및 수위 등과 같이 정확한 양을 관측하기 어렵기 때문에 지하수 함양량을 산정하는 방법은 매우 다양하게 제시되어 있다. 본 연구에서는 지하수 함양량 산정 방법 중 비교적 간단한 방식의 지하수위 변동법(Water Table Fluctuation Method, WTF Method)를 이용하여 전국 행정구역 별 지하수 함양량을 분석하였다. 지하수위 변동법의 경우 신뢰도 있는 지하수위 관측 자료의 확보가 매우 중요한 단계이기 때문에 국가지하수관측망 및 농촌지하수 관측망, 해수침투관측망 등 공공기관에서 제공하고 있는 지하수위 관측 자료를 수집하여 적용하였다. 수집된 자료를 바탕으로 지하수 함양량을 산정하고, 최근 국내의 강수패턴의 변화와의 비교 분석을 통해 강수와 지하수 함양 간의 관계를 정량적으로 제시하였다. 본 연구의 연구 결과는 안정적인 지하수 개발 및 관리를 위한 기초적인 정책적 판단 근거로써 제시될 수 있고, 추후 연구에서 지하수위 회복 및 지하수자원 관리 방안 적용에 따른 효과 분석 연구에 활용 될 수 있을 것으로 기대된다.

  • PDF

Integrated Management of OSI network and TCP/IP interned with Delegation and Security Features (위임과 보안 성질을 통한 OSI망과 TCP/IP 인터네트의 통합관리)

  • Kim, Tae-Yeon;Seo, Jae-Hyeon;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.6
    • /
    • pp.891-902
    • /
    • 1995
  • To integrate both the OSI network and the TCP/IP internet, the application gateway that have the powerful and flexible paradigms has been used, but due to the micro-managements of the gateway produce the high costs and the long delay of communication in the case of emergency. The mechanism that maps the access control policies between two domains using the different security policies is needed. These problems are caused by integrating both domains with the different standards. In this paper, the application gateway that delegating to an agent the powerful and flexible services of the CMIP as well as the management functions were proposed. A proposed algorithm that delegates he management script to an gateway safely by capitalizing on the Diffie-Hellman's distribution method, and presents the security mechanism mediating the security policies for guaranteeing the secure communication between two domains using the different security policies.

  • PDF

SDN-Based Middlebox Management Framework in Integrated Wired and Wireless Networks (유무선 통합망에서의 SDN 기반 미들박스 관리 프레임워크)

  • Lee, Giwon;Jang, Insun;Kim, Wontae;Joo, Sukjin;Kim, Myungsoo;Pack, Sangheon;Kang, Chul-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.379-386
    • /
    • 2014
  • Recently, middleboxes play a key role in many network settings such as firewalls, VPN gateways, proxies, intrusion detection and prevention systems, and WAN optimizers. However, achieving the performance and security benefits that middleboxes offer is highly complex, and therefore it is essential to manage middleboxes efficiently and dynamically. In this respect, Software-Defined Networking (SDN) offers a promising solution for middlebox policy enforcement by using logically centralized management, decoupling the data and control planes, and providing the ability to programmatically configure forwarding rules. Also, cloud computing and distributed Network Function Virtualization (NFV) can enable to manage middleboxes more easily. We introduce SDN-based middlebox management framework in integrated wired and wireless networks and discuss the further issues.

QoS Management Scheme for LTE-Advanced Networks (LTE-Advanced 망을 위한 QoS 관리 방안)

  • Lee, Moon-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.209-212
    • /
    • 2015
  • LTE-Advanced 망을 형성하는 리소스 및 망의 형상(대역, 에러율 등)들은 가변적으로 변하기 때문에 기존 음성 서비스에 적용된 절차적이고, 인위적이고, 정적인 제어방식으로는 제어가 불가능한 것으로 인식되고 있다. 본 연구에서는 정책 제어를 기반으로 서비스 연속성을 효과적으로 지원하기 위한 QoS 관리 체계를 제안하고자 한다. 제안되는 QoS 관리 체계에서는 가입자 단말기는 자신의 현재 상태 및 주변 기지국 정보를 수집하고, 기지국은 내부 및 인접한 기지국 모니터링으로 정보를 수집한다. 또한 이와 같은 관련 제어 데이터를 공유하고 이를 종합 분석하여 서비스 연속성을 자체적으로 제어할 수 있게 한다.

  • PDF

A Study on the Supplementation of the Korea's National Information Security Manual from the Perspective of Cyber Supply Chain Security (사이버 공급망 보안 관점의 국가 정보보안 기본지침 개선방안 연구)

  • You, Young-in;Bae, Sunha;Kim, So Jeong;Kim, Dong Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.309-327
    • /
    • 2022
  • As ICT convergence is progressing in all industrial fields and creating the global ecosystem of the supply chain is accelerating, supply chain risk related with cyber area are also increasing. In particular. the supply chain of ICT products is very complex in terms of technical and environmental factors to be managed, so it is vert difficult to transparently manage the entire life cycle. Accordingly, the US, UK, and EU, etc. are conducting and establishing cyber supply chainsecurity-related research and policies for ICT product supply chains. Korea also has the plan to establish management system to secure the supply chain of major ICT equipment as a task in the basic plan of the national cybersecurity strategy announced in 2019, but there is no concrete policy yet. So, In this paper, we review the cyber supply chain security management system in the United States and present a supplementary way to the National Information Security Manual in Korea from the perspective of cyber supply chain security. It is expected that this will serve as a reference material for cyber supply chain measures that can be introduced in domestic information security field.

Analysis of the Impact of Smart Grids on Managing EVs' Electrical Loads (스마트그리드를 통한 전기자동차의 전력망 영향 관리 효과)

  • Park, Chan-Kook;Choi, Do-Young;Kim, Hyun-Jae
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.767-774
    • /
    • 2013
  • The electricity demand and supply could be off balance if several electric vehicles(EVs) were charged at the same time or at peak load times. Therefore, smart grids are necessary to flatten the EVs' electricity demand and to enable EVs to be used as distributed storage devices as electricity demand from EV-charging increases. There are still few quantitative studies on the impact of smart grids on managing EVs' electrical loads. In this study, we analyzed the quantitative impact of smart grids on managing EVs' electrical loads and suggested policy implications. As a result, it is identified that smart grids can manage effectively EVs' impact on electrical grids. The electricity market structure and regulatory framework should support the demonstration and commercialization of smart grid technologies.