• Title/Summary/Keyword: 임무모델

Search Result 321, Processing Time 0.028 seconds

Methods of User-Role Assignment for Static Separation of Duty (정적 임무분리를 만족하는 사용자-역할 할당 방안)

  • 윤희정;전준철;김용석;전진우;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.451-453
    • /
    • 2004
  • 오래 전부터 많은 컴퓨팅 시스템에서 기분적으로 제공되어지는 원리인 임무분리는 중대한 업무를 둘 이상의 사용자에게 나누어줌으로써 단독 사용자가 시스템을 손상시키는 것을 막도록 하는 것이 목적이다. 역할기반 접근통제에서 임무분리 원리를 제공하는 종류로는 정적 임무분리, 동적 임무분리, 기능적 임무분리, 객체기반 임무분리 등이 있다. 여기서 우리는 정적 임무분리를 만족시키는 모델로서 상호 배제 역할 쌍을 이용한 모델과 역할유형을 이용한 모델 그리고 상호 무관 역할 쌍을 이용한 모델을 제안한다

  • PDF

Permission-Based Separation of Duty Model on Role-Based Access Control (역할기반 접근제어 환경에서 접근권한 기반의 임무분리 모델)

  • Oh Se-Jong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.725-730
    • /
    • 2004
  • Separation of Duty(SOD), with delegation, is one of important security principles in access control area. The role-based access control model adopts SOD principle, but it has some problems; SOD concept is inconsistent with role hierarchy, permissions that have no relation with SOD may be restricted, and delegation may violate SOD. We propose permission-based SOD model on role-based access control. We establishes SOD as a set of permissions instead of role level SOD. Furthermore we propose a principle of role activation. It solves SOD problems of RBAC and supports easy implementation of SOD policy.

An Integrated Management Model of OS-RBAC and Separation Of Duty Policy (OS-RBAC과 임무분리 정책의 통합 관리 모델)

  • Byun, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.167-175
    • /
    • 2010
  • Like most large organizations, there are business rules such as 'separation of duty' and 'delegation' which should be considered in access control. From a SOD point of view, previous SOD models built on the (Administrative) Role-Based Access Control model cannot present the best solution to security problems such as information integrity by the limited constituent units such as role hierarchy and role inheritance. Thus, we propose a new integrated management model of administration role-based access control model and SOD policy, which is called the OS-SoDAM. The OS-SoDAM defines the authority range in an organizational structure that is separated from role hierarchy and supports a decentralized security officer-level SOD policy in which a local security officer can freely perform SOD policies within a security officer's authority range without the security officer's intervention.

A study of mission implement model in sensor networks (센서망에서 임무 수행 모델 연구)

  • Park, Sangjoon;Lee, Jongchan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.379-380
    • /
    • 2022
  • In this paper, we propose the model of sensor network group to implement mission of several hazard area. Especially it should be considered that the wireless system take the next mission method not to single mission but to sequence mission implement in group mission conduction. That is, not the completion by a node system, the implement property should be presented during transferring mission of next node.

  • PDF

An Asset-Mission Dependency Model Adaptation and Optimized Implementation for Efficient Cyber Mission Impact Assessment (효율적인 임무 피해 평가를 위한 자산-임무 의존성 모델 적용 및 최적화된 구현)

  • Jeon, Youngbae;Jeong, Hyunsook;Han, In sung;Yoon, Jiwon
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.10
    • /
    • pp.579-587
    • /
    • 2017
  • Cyber Mission Impact Assessment is one of the essential tasks which many militaries and industrial major companies should perform to effectively achieve their mission. The unexpected damage to an organization's assets results in damage to the whole system's performance of the organizations. In order to minimize the damage, it is necessary to quantify the available capacity of the mission, which can be achieved only with the remaining assets, and to immediately prepare a new second best plan in a moment. We therefore need to estimate the exact cyber attack's impact to the mission when the unwanted damage occurs by modeling the relationship between the assets and the missions. In this paper, we propose a new model which deals with the dependencies between assets and missions for obtaining the exact impact of a cyber attack. The proposed model distinguishes task management from asset management for an efficient process, and it is implemented to be optimized using a vectorized operation for parallel processing and using a buffer to reduce the computation time.

Implementation of Mission Service Model and Development Tool for Effective Mission Operation in Military Environment (전장공간의 효율적 임무수행을 위한 임무서비스 모델 및 개발도구 구현)

  • Song, Seheon;Byun, Kohun;Lee, Sangil;Park, JaeHyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.6
    • /
    • pp.285-292
    • /
    • 2017
  • There are technological, operational and environmental constraints at tactical edge, which are disconnected operation, intermittent connectivity, and limited bandwidth (DIL), size, weight and power (SWaP) limitations, ad-hoc and mobile network, and so on. To overcome these limitations and constraints, we use service-oriented architecture (SOA) based technologies. In our research, we propose a hierarchical mission service model that supports service-oriented mission planning and execution in order for a commander to operate various SW required for mission in battlefield environment. We will also implement development tools that utilize the workflow technology and semantic capability-based recommendation and apply them to combat mission scenarios to demonstrate effectiveness.

Multi-UAV Mission Allocation and Optimization Technique Based on Discrete-Event Modeling and Simulation (이산 사건 모델링 및 시뮬레이션 기반의 다수 무인기 임무 할당 및 최적화 기법)

  • Lee, Dong Ho;Jang, Hwanchol;Kim, Sang-Hwan;Chang, Woohyuk
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.2
    • /
    • pp.159-166
    • /
    • 2020
  • In this paper, we propose a heterogenous mission allocation technique for multi-UAV system based on discrete event modeling. We model a series of heterogenous mission creation, mission allocation, UAV departure, mission completion, and UAV maintenance and repair process as a mathematical discrete event model. Based on the proposed model, we then optimize the number of UAVs required to operate in a given scenario. To validate the optimized number of UAVs, the simulations are executed repeatedly, and their results are analyzed. The proposed mission allocation technique can be used to efficiently utilize limited UAV resources, and allow the human operator to establish an optimal mission plan.

A Study of the Situation Based Disaster Response Model from the Damage of Storm and Flood Field Manual (풍수해 현장조치 행동매뉴얼 분석을 통한 상황 기반 재난 대응 모델 연구)

  • Lee, Chang Yeol;Park, Gil Joo;Kim, Twehwan;Lee, Hyeon Sung
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.4
    • /
    • pp.617-625
    • /
    • 2019
  • Purpose: The fields manuals which is managed by the each disaster types are the integrated guideline. When the disaster occurred, all kinds of SOPs which are described in the manual does not need. Therefore, the person in charge is confused which SOP is executed. In this study, we propose the disaster response process model based on the specific disaster situation case. Method: Firstly, we define the disaster situation cases which is mentioned in the field manual, and then, we develop the disaster response process model including indispensible SOPs for the specific disaster situation case. As a verification and feedback process, we apply the model to Safety Korea Exercise scenario. Result: We developed SOP model and disaster response process model reflecting the concept of the disaster situation case. Conclusion: Safety Kore Exercise scenario reflecting the developed model may continuously upgrade the field manual.

A Study on Mission Analysis in Consideration of Effectiveness Measurement of UAV System Operations (UAV 체계운용효과도를 고려한 임무분석 연구)

  • Choi, Kwan-Seon;Jeong, Ha-Gyo;Park, Tae-Yoo;Jeon, Je-Hwan
    • Journal of the military operations research society of Korea
    • /
    • v.37 no.1
    • /
    • pp.119-128
    • /
    • 2011
  • This paper deals with a study on mission analysis considering the effectiveness measurement of UAV system operations. This mission analysis process is composed of 5 steps; (1) creation of a base model in MANA, (2) design of input parameter set using experiment design, (3) mapping input parameter set to the MANA scenario file, (4) data farming and model run in batch process, and (5) statistical analysis of the simulation result. In the result of this study, the effect of input parameter to the dependent parameter was shown to decrease in the order classification range, sweep width, height, speed, FOV(Field of view), and classification probability. The study also shows that the operational effectiveness of an improved scenario proposed can increase 10.2% from the base scenario.

Integrated Scenario Authoring Method using Mission Impact Analysis Tool due to Cyber Attacks (사이버공격에 의한 임무영향 분석 도구를 이용한 통합시나리오 저작 방법)

  • Yonghyun Kim;Donghwa Kim;Donghwan Lee;Juyoub Kim;Myung Kil Ahn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.107-117
    • /
    • 2023
  • It must be possible to assess how combat actions taking place in cyberspace affect the military's major mission systems and weapon systems. In order to analyze the mission impact caused by a cyber attack through cyber M&S, the target mission system and cyber warfare elements must be built as a model and a scenario for simulation must be authored. Many studies related to mission impact analysis due to cyber warfare have been conducted focusing on the United States, and existing studies have authored separate scenarios for physical battlefields and cyber battlefields. It is necessary to build a simulation environment that combines a physical battlefield model and a cyber battlefield model, and be able to integrate and author mission scenarios and cyber attack/defense scenarios. In addition, the physical battlefield and cyber battlefield are different work areas, so authoring two types of scenarios for simulation is very complicated and time-consuming. In this paper, we propose a method of using mission system information to prepare the data needed for scenario authoring in advance and using the pre-worked data to author an integrated scenario. The proposed method is being developed by reflecting it in the design of the scenario authoring tool, and an integrated scenario authoring in the field of counter-fire warfare is being performed to prove the proposed method. In the future, by using a scenario authoring tool that reflects the proposed method, it will be possible to easily author an integrated scenario for mission impact analysis in a short period of time.