• Title/Summary/Keyword: 접근점제어

Search Result 215, Processing Time 0.02 seconds

A Study on Considerations in KCR4 through Changes of Cataloging Rules from AACR2 to RDA (AACR2에서 RDA로 목록규칙 변화에 따른 KCR4의 고려사항에 관한 연구)

  • Lee, Mi-Hwa
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.1
    • /
    • pp.23-42
    • /
    • 2011
  • This study is to compare the descriptive cataloging rules between AACR2 and RDA, and then to find a direction of future cataloging and KCR 4. RDA is new cataloging rules that embody the International Cataloging Principles(2009), FRBR and FRAD. It is a structure of bibliographic control of all kinds of resources, and the rules can be flexibly applicable in the international cataloging community. It is critical to embody RDA in KCR 4 because RDA is likely to affect the future cataloging through its collocation function and relation function to construct semantic web of OPAC. This study analyzed the descriptive rules of work, expression, and manifestation based on RDA draft(2008) of JSC for Development of RDA. It analyzed the changes in the cataloging rules from AACR2 to RDA in such descriptive areas as title, type of resources, statement of responsibility, edition, publication, physical description and series in the manifestation level, and the preferred access points in both expression and work levels. The findings of this study will provide implications in revising KCR4.

New Approaches to the Control of Pathogenic Oral Bacteria (바이오필름을 생성하는 병원성 구강 세균을 제어하는 새로운 접근법)

  • Cho, Soo Jeong
    • Journal of Life Science
    • /
    • v.31 no.1
    • /
    • pp.100-108
    • /
    • 2021
  • In the oral cavity, there are hundreds of microbial species that exist as planktonic cells or are incorporated into biofilms. The accumulation and proliferation of pathogenic bacteria in the oral biofilm can lead to caries and periodontitis, which are typical oral diseases. The oral bacteria in the biofilm not only can resist environmental stress inside the oral cavity, but also have a 1,000 times higher resistance to antibiotics than planktonic cells by genes exchange through the interaction between cells in the oral biofilm. Therefore, if the formation of oral biofilm is suppressed or removed, oral diseases caused by bacterial infection can be more effectively prevented or treated. In particular, since oral biofilms have the characteristic of forming a biofilm by gathering several bacteria, quorum sensing, a signaling system between cells, can be a target for controlling the oral biofilm. In addition, a method of inhibiting biofilm formation by using arginine, an alkali-producing substrate of oral bacteria, is used to convert the distribution of oral microorganisms into an environment similar to that of healthy teeth or inhibit the secretion of glucosyltransferase by S. mutans to inhibit the formation of non-soluble glucans. It can be a target to control oral biofilm. This method of inhibiting or removing the oral biofilm formation rather than inducing the death of pathogenic bacteria in the oral cavity will be a new strategy that can selectively prevent or therapeutic avenues for oral diseases including dental caries.

An Efficient ECU Analysis Technology through Non-Random CAN Fuzzing (Non-Random CAN Fuzzing을 통한 효율적인 ECU 분석 기술)

  • Kim, Hyunghoon;Jeong, Yeonseon;Choi, Wonsuk;Jo, Hyo Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1115-1130
    • /
    • 2020
  • Modern vehicles are equipped with a number of ECUs(Electronic Control Units), and ECUs can control vehicles efficiently by communicating each other through CAN(Controller Area Network). However, CAN bus is known to be vulnerable to cyber attacks because of the lack of message authentication and message encryption, and access control. To find these security issues related to vehicle hacking, CAN Fuzzing methods, that analyze the vulnerabilities of ECUs, have been studied. In the existing CAN Fuzzing methods, fuzzing inputs are randomly generated without considering the structure of CAN messages transmitted by ECUs, which results in the non-negligible fuzzing time. In addition, the existing fuzzing solutions have limitations in how to monitor fuzzing results. To deal with the limitations of CAN Fuzzing, in this paper, we propose a Non-Random CAN Fuzzing, which consider the structure of CAN messages and systematically generates fuzzing input values that can cause malfunctions to ECUs. The proposed Non-Random CAN Fuzzing takes less time than the existing CAN Fuzzing solutions, so it can quickly find CAN messages related to malfunctions of ECUs that could be originated from SW implementation errors or CAN DBC(Database CAN) design errors. We evaluated the performance of Non-Random CAN Fuzzing by conducting an experiment in a real vehicle, and proved that the proposed method can find CAN messages related to malfunctions faster than the existing fuzzing solutions.

A Sanitizer for Detecting Vulnerable Code Patterns in uC/OS-II Operating System-based Firmware for Programmable Logic Controllers (PLC용 uC/OS-II 운영체제 기반 펌웨어에서 발생 가능한 취약점 패턴 탐지 새니타이저)

  • Han, Seungjae;Lee, Keonyong;You, Guenha;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.65-79
    • /
    • 2020
  • As Programmable Logic Controllers (PLCs), popular components in industrial control systems (ICS), are incorporated with the technologies such as micro-controllers, real-time operating systems, and communication capabilities. As the latest PLCs have been connected to the Internet, they are becoming a main target of cyber threats. This paper proposes two sanitizers that improve the security of uC/OS-II based firmware for a PLC. That is, we devise BU sanitizer for detecting out-of-bounds accesses to buffers and UaF sanitizer for fixing use-after-free bugs in the firmware. They can sanitize the binary firmware image generated in a desktop PC before downloading it to the PLC. The BU sanitizer can also detect the violation of control flow integrity using both call graph and symbols of functions in the firmware image. We have implemented the proposed two sanitizers as a prototype system on a PLC running uC/OS-II and demonstrated the effectiveness of them by performing experiments as well as comparing them with the existing sanitizers. These findings can be used to detect and mitigate unintended vulnerabilities during the firmware development phase.

A Study on Multi-Media Contents Security Using Android Phone for Safety Distribution (멀티미디어 콘텐츠의 안전한 유통을 위한 안드로이드 폰에 기반을 둔 보안에 관한 연구)

  • Shin, Seung-Soo;Kim, Yong-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.231-239
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

A Technique to Efficiently Place Sensors for Three-Dimensional Robotic Manipulation : For the Case of Stereo Cameras (로봇의 3차원 작업을 위한 효율적 센서위치의 결정기법 : 스테레오 카메라를 중심으로)

  • Do, Yong-Tae
    • Journal of Sensor Science and Technology
    • /
    • v.8 no.1
    • /
    • pp.80-88
    • /
    • 1999
  • This paper deals with the position determination problem of stereo camera systems used as a sensor for 3D robotic manipulation. Stereo cameras having parallel rays of sight and been set up on the same baseline are assumed. The distance between the sensor and the space measured is determined so as to get insensitive parameters to the uncertainty of control points used for calibration and to satisfy the error condition set by considering the repeatability of the robot. The baseline width is determined by minimizing the mutual effect of 3D positional error and stereo image coordinate error. Unlike existing techniques, the technique proposed here is developed without complicated constraints and modelling process of the object to be observed. Thus, the technique of this paper is more general and its effectiveness is proved by simulation.

  • PDF

A study on the functions of headings (표목의 기능에 관한 연구)

  • 김태수
    • Journal of the Korean Society for information Management
    • /
    • v.12 no.2
    • /
    • pp.9-35
    • /
    • 1995
  • Locating function of a particular item is more of added entry than a main entry heading. This function was expanded especially in the machine readable cataloging by introducing the control number and standard bibliographic number. Assembling function of the main entry heading is on a level with that of cross reference and notes, added entries, uniform headings. Links among all variant forms of a heading in hypercatalog will be made for collocating of all publications of a given author. The link of bibliographic records in this catalog can be freed from the dependence on standardized heading form. The function of the catalog is not affected even though by abandoning the concept of main entry heading. Further efforts should be made to raise users' finding opportunities through expansion of acces points and linking devices among related records.

  • PDF

Supporting Effective Collaborative Workspaces over Moodle (Moodle에서의 효과적인 협업 워크스페이스 지원)

  • Jin, Jae-Hwan;Lee, Hong-Chang;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2657-2664
    • /
    • 2012
  • Web-based learning receives much attention as an effective learning method because users can use the learning service at any time from any space. A learning management system(LMS) provides online educational environment among teachers and students, supporting various facilities to deliver educational contents. Since most of the existing LMSs support one-way or limited two-way teaching services among teachers and students, there are a lot of difficulties in performing collaboration among students and/or collaboration among teachers and students. In this paper, we describe the development of collaborative workspaces which provides effective collaborative educational environment on Moodle which is widely accepted as a typical LMS. Through the provided various types of collaborative workspaces, users can easily perform group activities, sharing educational with appropriate access control mechanism.

Analysis of trends in RDA on-the-job training and its application model in Korea (RDA 교육훈련 동향 분석 및 국내 적용 모형 개발에 관한 연구)

  • Baek, Ji-Won
    • Journal of Korean Library and Information Science Society
    • /
    • v.44 no.3
    • /
    • pp.379-403
    • /
    • 2013
  • This study aims to 1) analyse the current RDA application and training and 2) develop an on-the-job training model for Korean library and information professionals. For this purpose, this study collected and analysed comprehensively RDA on-the-job training programs in the major foreign national libraries, consortium, college libraries, etc. Then, this study presented application methodology of the devised training model to the National library of Korea depending on the RDA application process. Also, the significant consideration for the RDA implementation by type of libraries was suggested.

A Study on Multi-Media Contents Security Using Android Phone (안드로이드 폰을 이용한 멀티미디어 콘텐츠 보안에 관한 연구)

  • Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.19-25
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.