• Title/Summary/Keyword: 이중화

Search Result 2,005, Processing Time 0.051 seconds

PC File Protection Scheme using System-Dependent key (시스템 종속적인 키(Key)를 이용한 PC 화일 보호 기법)

  • 박영선;김화수
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1991.11a
    • /
    • pp.185-193
    • /
    • 1991
  • PC 사용의 확산에 따라 PC 화일 보호의 요구가 대두되고 있으나, 기존의 사용자 단일 키에 의한 암호화 제어 기법은 키의 노출이 용이하고, 인가된 사용자에 의한 비밀화일의 불법 도용을 방지하기 어려운 취약점이 있다. 이러한 문제점을 개선하기 위하여 제안하고자 하는 이중키(시스템 종속적인 키와 사용자 키)에 의한 암호화 제어는 사용자 키를 이용하여 입력된 데이타를 암호화하고, 암호화된 데이타를 시스템에 종속적인 키를 이용하여 다시 암호화해서 화일에 저장한다 제안된 기법의 특징은 이중키를 사용함으로서 (i)키 공격에 대한 저항성 증가, (ii)키 노출의 위험성 감소, (iii)인가된 사용자의 불법적인 화일 도용을 방지하는 것이다. 이중키에 의한 암호화 제어 기법은 정보의 비밀성 보호가 크게 요구되는 조직이나 기관에 적용하는 것이 효과적이며, 이중키의 생성 및 관리, 인중 및 접근 제어를 포함한 계층적인 제어를 위한 추가적인 연구가 요구된다.

  • PDF

A Case Study on Improve the availability of the Server Using the Distributed Queue. (Distributed Queue를 이용한 서버 가용성 향상 연구)

  • Park, Bonghee;Choi, Jinyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.105-108
    • /
    • 2014
  • 기업에서 사용하는 시스템에서는 대량의 데이터를 실시간으로 처리해야 하며 또한 시스템 장애로 인한 생산 중단이 발생하지 않도록 하기 위해 서버 이중화 구성에 많은 투자를 하고 있다. 장애를 최소화하기 위해 서버 구성을 Active-Standby 구조로 이중화를 구성하여 사용하고 있으며, 이로 인해 시스템에 대한 많은 비용을 투자하고 있다. 서버 부하 감소 및 서버 가용성 향상을 통한 투자 비용을 절감하기 위해 서버 분산 처리에 대한 방법이 나오고 있다. 그러나 Network 스위치나 라우터 등의 Hardware 적인 분산 시스템을 이용한 방법으로는 특정한 데이터만을 분산하여 처리할 수 없고 Hardware 의 투자 비용 또한 증가하게 된다. 또한 서버의 Active-Standby 구성에서 Standby 서버는 Active 서버의 문제 발생시에만 이용하게 됨으로 인해 서버의 가용성이 떨어지는 불합리가 발생함으로 인해 이를 개선하기 위한 연구를 통해 Active-Active 구성을 통해 서버의 가용성을 확보하고자 한다. 본 논문에서는 서버 가용성 향상을 위한 방법으로 DQ(Distributed Queue)를 이용하여 응용프로그램에서의 데이터 분산을 통한 응용프로그램에서의 부하를 분산하여 서버 내 리소스를 최대한 활용하면서 응용프로그램에서의 부하를 감소화할 수 있는 방법을 검증하고자 한다.

Paper Duplication Method Supported by Task (태스크 기반 이중화 방안)

  • Lee, Jong-Chan;Park, Sang-Joon;Kang, Kwon-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1C
    • /
    • pp.103-111
    • /
    • 2002
  • In RNC of IMT-2000, main control processors such as ASP, ACP and OMP are responsible for call control function, and the high reliability and real-time property should be provided for it. So, the study of real-time fault-tolerant for it is needed. In this paper, we proposes an Task based duplication method, in which Tasks in active side operated on message unit and send the updated data to standby side after operation, log in the message to standby side for recovery during take-over. This scheme decreases the dual down and the complexity of synchronization procedure, and performs the synchronization more exactly because Tasks control the synchronization of system. This paper also proposes the fault detection and the fault handing method for effective implementation of Task based duplication. This scheme focus on increasing the fault detection rate and intercepting originally that fault data is send to standby side.

Synchronization Method Design of Redundant Flight Control Computer for UAV (무인기를 위한 이중화 비행제어컴퓨터의 동기화 설계)

  • Lee, Young Seo;Kang, Shin Woo;Lee, Hee Gon;Ahn, Tae-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.4
    • /
    • pp.273-279
    • /
    • 2021
  • A flight control computer(FLCC) applied to an unmanned aerial vehicle(UAV) is a safety-critical item, and which is designed in a multiple structure to increase the reliability of operation by securing fault tolerance. These FLCC of multiple structure should be designed so that each independent processing/control components can perform the same operation at the same time. And for this reason, a synchronization algorithm for synchronizing the operation between FLCCs should be included in an operational flight program. In this paper, we propose a software design method for synchronization between dual FLCCs applied to UAVs. The proposed synchronization method is designed to synchronize using only the minimum hardware resources to reduce a failure rate. In addition, the proposed synchronization method is designed to minimized synchronization errors due to a timer operation by designing in consideration of operation characteristics of the hardware timer used for the synchronization.

Nationality Deprivation of Double Nationals in France and Securitization (프랑스 이중국적자의 국적박탈 논쟁과 안보화 (securitization))

  • Park, Sunhee
    • Journal of International Area Studies (JIAS)
    • /
    • v.22 no.1
    • /
    • pp.67-90
    • /
    • 2018
  • France has allowed a deprivation of nationality for terrorism since 1996 Law. After then, a series of law revision (1998, 2006 law and 2010, 2015-2015 reform tries) have not only linked an act of terror with nationality deprivation but also put the dual national and their deprivation at the centre of dispute. Both 2010 Immigration Law by Sarkozy and 2015-2016 constitutional amendment by Hollande had been not adopted but have combined immigrants and security issue together by firmly solidifying the relationship between dual national and terrorist. Especially in 2015-2016, the constitutional amendment that failed to be adopted has extended a state of emergency and left the nationality deprivation of dual national as controversial issue. After over 4 months of discussion, the amendment that contains a clause of a state of emergency and extension plan for nationality deprivation was abolished but the dual national issues which had been non-politicized has now become politicized, defined as security issues and finally securitized. It shows very two-stage process of securitization argued by Copenhagen school including Buzan. The importance of securitization notion by Copenhagen school lies on the fact that it scrutinizes the constructive elements of the process of securitization. The concept of securitization allows us to see the problem of the process that defines a non-politicized issue as security one by making it political matter. Applying this process of securitization into the controversy of nationality deprivation of dual nationals in France, we can find out the development of non-controversial and non-politicized dual national issues into social agenda by politicization through speech-act or announcement effect.

Improvement in efficiency and privacy on BCP public key cryptosystem (효율성과 사용자의 프라이버시가 개선된 BCP 공개키 암호시스템)

  • Youn Taek-Young;Park Young-Ho;Lim Jong In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.81-92
    • /
    • 2005
  • A novel public key cryptosystem that provides a double decryption mechanism is proposed at Asiacrypt '03 by Bresson, Catalano and Pointcheval based on the scheme proposed by Clamor and Shoup at Eurocrypt '02. Previous double decryrtion scheme is designed based on $Z_n^2$ where n=pq for two primes p,q. In this paper, we propose an efficient public key scheme with double decryption mechanism based on $Z_p^2_q$ for two primes p,q. Our scheme is more efficient an the previous schemes. Moreover, we review the previous schemes in a privacy point of view and propose a privacy enhanced double decryption scheme.

System Reliability (시스템 信賴性)

  • 김동주
    • The Magazine of the IEIE
    • /
    • v.5 no.1
    • /
    • pp.31-37
    • /
    • 1978
  • The value of a system is highly dependent upon its reliability, Reliability means not merely correctness but means fault tolerance of the system. This paper emphasizes software fault tolerance in design stage especially in case of computer controlled system. The general method of fault tolerance design especially including dual computer system and its advantage and disadvantage was introduced. Finally for example of fault tolerance design we would like to present our GTK-500 EPABX.

  • PDF

Dual Process Linear Protection Switching Method Supporting Node Redundancy (노드 이중화를 위한 이중 프로세스 선형 보호 절체 방법)

  • Kim, Dae-Ub;Kim, Byung Chul;Lee, Jae Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.9
    • /
    • pp.26-37
    • /
    • 2016
  • The core technologies of the current transport network are OAM and protection switching to meet the sub-50ms protection switching time via a path redundancy when a link or node failure occurs. The transport networks owned by public network operators, central/local governments, and major enterprises are individually configured and managed with service resiliency in each own protected sub-network. When such networks are cascaded, it is also important to provide a node resiliency between two protected sub-networks. However, the linear protection switching in packet transport networks, such as MPLS-TP and Carrier Ethernet, does not define a solution of dual node interconnection. Although Ethernet ring protection switching covers the dual node interconnection scheme, a large amount of duplicated data frames may be flooded when a failure occurs on an adjacent (sub) ring. In this paper, we suggest a dual node interconnection scheme with linear protection switching technology in multiple protected sub-networks. And we investigate how various protected sub-network combinations with a proposed linear or ring protection process impact the service resiliency of multiple protected sub-networks through extensive experiments on link and interconnected node failures.

자재업체탐방 - '전진화 식 품질 외고집' 스테인리스강 이중링 조인트 시장에 도전장 내밀다 (주)신한메탈

  • 대한기계설비건설협회
    • 월간 기계설비
    • /
    • s.302
    • /
    • pp.78-81
    • /
    • 2015
  • 다이아몬드표 나사식 관이음쇠로 유명한 (주)신한메탈(대표 전진화)이 최근 SH-조인트로 상표등록 하고 스테인리스 강관 조인트 시장에 본격 진출했다. 최근들어 내식성, 내마모성이 뛰어난 스테인리스강 수요가 크게 늘면서 이중링 조인트 사용이 활발해지자 스테인리스 배관 시장변화에 능동적으로 대처하기 위해서다.

  • PDF