• Title/Summary/Keyword: 보호제공시간

Search Result 359, Processing Time 0.028 seconds

An effegive round-robin packet transmit scheduling scheme based on quality of service delay requirements (지연 서비스품질 요구사항을 고려한 효과적인 라운드 로빈 패킷 전송 스케쥴링 기법)

  • 유상조;박수열;김휘용;김성대
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.10
    • /
    • pp.2191-2204
    • /
    • 1997
  • An efficient packet transmit scheduling algorithm should be able to allocate the resource to each connection fairly based on the bandwidth and quality of service requirements negotiated during the call admission procedure and it should be able to isolate the effects of users that are behaving badly. In this paper, we propose an effective round-robin packet transmit scheduling mechanism, which we call the delay tolerant packet reserving scheme (DTPRS) based on delay QoS requirments. The proposed scheme can not only provide fairness and but also reduce delay, delay variation, and packet loss rate by reserving output link time slots of delay tolerant packets and assigning the reserved slotsto delay urgent packets. Our scheme is applicable to high speed networks including ATM network because it only requires O(1) work to process a packet, and is simple enough to implement.

  • PDF

A Formal Specification of Role Graph Model Increasing Integrity (무결성이 강화된 역할 그래프 모델의 정형적 명세)

  • Choi EunBok;Lee HyeongOk
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1620-1629
    • /
    • 2004
  • The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control(RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, We present the role graph model which enhanced flexibility and integrity to management of many access permission. Also, In order to represent those rule and constraints clearly, formal descriptions of role assignment rule and constraints in Z language are also given.

  • PDF

U-Bulguksa: Real-Time and Online Early Fire Detection Systems (U-불국사 : 실시간 온라인 화재조기감지시스템)

  • Joo, Jae-Hun;Yim, Jae-Geol
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.3
    • /
    • pp.75-93
    • /
    • 2007
  • This paper presents real-time online early fire warning systems developed for preserving cultural properties of Bulguksa which is a world heritage designated by UNESCO. The system is based on the ubiquitous sensor network employing 900MHz and 2.4GHz bands. In this paper, we analyze requirements that should be considered in building effective management systems of cultural heritages by using wireless sensor network. Finally, we introduce the architecture, sensor and network design, and software design of the fire warning systems which is an initial version of U-Bulguksa. The current version of systems has been operating in Bukguksa for a few months. U-Bukguksa project sponsored by National Information Society Agency is ultimately aimed at developing an integrated system of U-cultural heritage management and U-tourism. The former aims to conserve and manage intangible cultural properties by providing a variety of environmental information such as erosion, crack, and gradient as well as fire which are important causes of loss and damage in real-time and online. The latter refers to the intelligent tourism information and guidance systems allowing tourists to get the personalized content on cultural heritages and help guidance with mobile devices in Bulguksa.

  • PDF

Policies of Broadcasting and Telecommunication In Smart Media Convergence Age: Focus on the Policy Paradigm and Public Relations Strategies for Dynamic Quality of Life (스마트미디어융합시대 방송통신정책: 삶의 질을 위한 정책 패러다임과 정책 PR을 중심으로)

  • Park, Sung-Ho
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.99-111
    • /
    • 2011
  • Nowadays, the rapid progress and worldwide use of smart-media(SNS) has resulted in coming of the smart media convergence age. In practice, however, the effectiveness of smart media convergence society is limited by the difficulties of using it, which include accessibility, waiting for loading, clutter, old information, privacy risks, expensive communication, etc. The conquest of these difficulties must be policy target of broadcasting and telecommunication for high quality of communication life. From this perspective, this paper proposes a new policy of broadcasting and telecommunication based on the dynamic quality of life for the smart media convergence society. This smart convergence policy will not promote only the development and production of smart media contents but also its stable supply and it will secure the accessibility and privacy. In conclusion, this paper reveals that the components of quality of life are important elements of broadcasting and communication policies which will eventually lead to the popular use of smart media and enhance its quality.

A Study on the method of existing system migration for Cloud computing (클라우드 컴퓨팅 환경을 위한 기존 시스템의 이전 방안 연구)

  • Park, Sung-Hee;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.271-282
    • /
    • 2014
  • Cloud computing technology will provide application that needs many resources and various services to customers without any restriction of time and place. So, many of companies are now adopting cloud computing technology to this business and this trend is now increasing. However, cloud technology adoption rate is low because of security, compatibility, loss of control, security, data protection, performance and uptime, to the risk of vendor lock-in Cloud computing services, and compatibility with existing systems and anxiety. Now, many people are interest on the migration of existing systems but there are many study on this issue. So, more of study on this issue should be needed. This paper will show you the method that how to adopt cloud computing to their business and also show you evolution of cloud computing for existing system.

A System of Authentication and Security threat solution for N-screen services (N-스크린을 위한 인증 및 보안 위협 해결 시스템)

  • Hwang, Deuk-Young;Moon, Jeong-Kyung;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.775-781
    • /
    • 2013
  • N-screen is a Service that can be provide for One Service Multi Device. If the network is changed or if the device is changed after authentication the device fits seamlessly send footage. Security threats that occur here have a problem with user authentication. In this paper proposes available in a multi-device the authentication system. Homomorphic Encryption Algorithm of authentication scheme used. Among the authentication mechanism that already exists is a simple and lightweight authentication mechanism. In addition, N-screen service that uses multiple devices is simple authentication process of the device. Review the results of proposed authentication protocol, encryption algorithm to process a small storage capacity and is easy to work in low processor. And was suitable for use with multiple devices.

RFID Security Authentication Protocol for the Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Choi, Shin-Hyeong;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2007
  • On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.

  • PDF

Analysis of Cryptography Technique on Application Layer based on WAP (WAP 기반의 Application Layer 암호화 기법 분석)

  • 황영철;최병선;이성현;이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.748-751
    • /
    • 2004
  • In this paper, we discuss about wireless Internet security. The past few years have seen unprecedented growth in the number of wireless user, applications, and network access technologies. Wireless Internet is similar to wired internet, but it has some constrained wireless environment. So many internet technologies for wireless are developing now. There are WAP(Wireless Application Protocol) and WPKI. WAP(now version 2.0) is a protocol specification for wireless communication networks. it provides an application framework and network protocols for wireless devices such as mobile telephones, PDAs and internet technologies. In this paper some analysis of security(e.g. digital signature or encryption) for wireless internet are performed.

  • PDF

A Design of the Smart Control System for Industrial Automation Equipment (산업용 자동화 장비를 위한 스마트 제어 시스템 설계)

  • Kim, Bo-Hun;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.677-684
    • /
    • 2017
  • Smart devices are used in a variety of industries, because applications for them are easy to develop and portable. However, industrial equipment can cause security problems for information and accidents when controlling the actuator of the equipment at a remote location. In this paper, we studied methods of solving these problems and the advantages of applying smart control systems to industrial equipment. We propose a manual manipulation method using queries and a smart control access procedure for controlling equipment using a smart device. In addition, we propose a data transmission method employing multiple encryption protocols and a user authentication method using unique information from the smart device and Q & A as the communication data protection and user authentication methods, respectively. In order to evaluate its performance, an operation test of the smart control system and user authentication comparison experiment were performed. In order to understand the advantages of applying the smart control system to the equipment, we conducted a comparative experiment with a teach pendant and evaluated its reaction time in case of error.

Improvement of Satellite Ocean Information Service for Offshore Marine Industry (연근해 해양산업을 위한 위성해양 정보 서비스 개선방안)

  • Cho, Bo-Hyun;Lee, Gun-Wook;Kim, Dong-Chun;Yang, Keum-Cheol;Kim, SG;Yo, Seung-jae
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.85-91
    • /
    • 2018
  • In this study, we design a marine environmental information service system with satellite images based on satellite images to reduce the damage caused by changes in the marine environment. The system provides satellite oceanographic information such as water temperature, chlorophyll, float, etc. as hierarchical texts, which is implemented as a unit module Web service so that it can be expanded in OpenAPI environment. And stability of system plug-in portability, service hours, data extraction precision and speed are used as a basis for diagnosing service stability. By securing the function and performance of the service system implemented in this study, it can be expanded to a complex technology that can customize the users by group by adding not only general services of existing systems operated by location but also information about a specific interested areas. Especially, various other items of interest including marine environment information are developed in modules, so we expect to be able to expand and service the system by plugging into the system and to spread it in technical linkage with the related institution information system.

  • PDF