• Title/Summary/Keyword: 통지

Search Result 181, Processing Time 0.022 seconds

A Formal Modeling of Managed Object Behaviour with Dynamic Temporal Properties (동적 시간지원 특성을 지원하는 망관리 객체의 정형적 모델링)

  • Choi, Eun-Bok;Lee, Hyung-Hyo;Noh, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.166-180
    • /
    • 2000
  • Recommendations of ITU-T and ISO stipulate the managerial abstraction of static and dynamic characteristics of network elements, management functions as well as management communication protocol. The current recommendations provide the formal mechanism for the structural parts of managed objects such as managed object class and attributes. But the current description method does not provide the formal mechanism for the behavioral characteristics of managed objects in clear manner but in natural language form, the complete specification of managed objects is not fully described. Also, the behaviour of managed objects is affected by their temporal and active properties. While the temporal properties representing periodic or repetitive internals are to describe managed objects behaviour in rather strict way, it will be more powerful if more dynamic temporal properties determined by external conditions are added to managed objects. In this paper, we added dynamic features to scheduling managed objects, and described, in GDMO, scheduling managed objects that support dynamic features. We also described behaviour of managed objects in newly defined BDL that has dynamic temporal properties. This paper showed that dynamic temporal managed objects provide a systematic and formal method in agent management function model.

  • PDF

Adaptively Flexible Service Discovery and Advertisement for SSDP of UPnP in Wireless Ad-hoc Network (무선 애드 혹 환경에서의 UPnP의 SSDP 기능 향상을 위한 서비스 발견 및 광고 기법)

  • Jung, So-Ra;Youn, Hee-Yong
    • The KIPS Transactions:PartA
    • /
    • v.17A no.5
    • /
    • pp.237-248
    • /
    • 2010
  • UPnP(Universal Plug and Play) is a middleware of DLNA (Digital Living Network Alliance) services a home network. UPnP supports the connections between each other devices in networks and also provides service discovery and advertisement with SSDP(Simple Service Discovery Protocol), which is generally designed for wired networks. SSDP operates on multicasting discovery request and advertisement and unicasting a reply in networks. It is a challenge issue for service discovery protocol such as SSDP to provide a stable and effective service in wireless ad-hoc networks. Wired based service discovery protocol does not consider the dynamics of wireless ad-hoc network. In that case, the nodes are freely in or out. Therefore, this paper proposes a flexible SSDP(fSSDP) which is a peer-to-peer(P2P) discovery protocol adopted for wireless ad-hoc Networks. It is implemented on the extension of SSDP. fSSDP supports a functionality that the broadcast area of service discovery dynamically changes with the periodically updated area of advertisement. It is good for reducing messaging overhead caused from the broadcast flooding of service discovery in wireless ad-hoc network.

A Method for Detection of Private Key Compromise (서명용 개인키 노출 탐지 기법)

  • Park, Moon-Chan;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.781-793
    • /
    • 2014
  • A Public Key Infrastructure (PKI) is security standards to manage and use public key cryptosystem. A PKI is used to provide digital signature, authentication, public key encryption functionality on insecure channel, such as E-banking and E-commerce on Internet. A soft-token private key in PKI is leaked easily because it is stored in a file at standardized location. Also it is vulnerable to a brute-force password attack as is protected by password-based encryption. In this paper, we proposed a new method that detects private key compromise and is probabilistically secure against a brute-force password attack though soft-token private key is leaked. The main idea of the proposed method is to use a genuine signature key pair and (n-1) fake signature key pairs to make an attacker difficult to generate a valid signature with probability 1/n even if the attacker found the correct password. The proposed method provides detection and notification functionality when an attacker make an attempt at authentication, and enhances the security of soft-token private key without the additional cost of construction of infrastructure thereby extending the function of the existing PKI and SSL/TLS.

A Large Scale Distributed Presence Service System by SIP Message Control Session (SIP 메시지 제어 세션에 의한 대용량 분산 프레즌스 서비스 시스템)

  • Jang, Choonseo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.514-520
    • /
    • 2018
  • Presence service provides various information about users such as locations, status of on/offline and network access methods, and number of presence resources required by each users increases largely in mobile environment. Therefore an effective method which can reduce load of presence servers is needed. In this paper, a large scale distributed presence service system which can distribute effectively total presence system load of presence servers using message control session has been presented. This large scale distributed presence service system provides various presence information for massive volumes of users. In this study, a new message control session architecture which can dynamically distribute loads of the presence servers to multiple servers has been presented, and a new presence information data architecture for controlling load of the presence servers has been designed. In this architecture, each presence server can exchange current load level in real time to get variance of the total system load change according to user numbers, and can distribute system load to maintain load level of each server evenly. The performance of the proposed large scale distributed presence service system has been analysed by experiments. The results has been showed that average presence resource subscription processing time reduced from 42.6% to 73.6%, and average presence notification processing time reduced from 37.6% to 64.8%.

Spatial Data Analysis for the U.S. Regional Income Convergence,1969-1999: A Critical Appraisal of $\beta$-convergence (미국 소득분포의 지역적 수렴에 대한 공간자료 분석(1969∼1999년) - 베타-수렴에 대한 비판적 검토 -)

  • Sang-Il Lee
    • Journal of the Korean Geographical Society
    • /
    • v.39 no.2
    • /
    • pp.212-228
    • /
    • 2004
  • This paper is concerned with an important aspect of regional income convergence, ${\beta}$-convergence, which refers to the negative relationship between initial income levels and income growth rates of regions over a period of time. The common research framework on ${\beta}$-convergence which is based on OLS regression models has two drawbacks. First, it ignores spatially autocorrelated residuals. Second, it does not provide any way of exploring spatial heterogeneity across regions in terms of ${\beta}$-convergence. Given that empirical studies on ${\beta}$-convergence need to be edified by spatial data analysis, this paper aims to: (1) provide a critical review of empirical studies on ${\beta}$-convergence from a spatial perspective; (2) investigate spatio-temporal income dynamics across the U.S. labor market areas for the last 30 years (1969-1999) by fitting spatial regression models and applying bivariate ESDA techniques. The major findings are as follows. First, the hypothesis of ${\beta}$-convergence was only partially evidenced, and the trend substantively varied across sub-periods. Second, a SAR model indicated that ${\beta}$-coefficient for the entire period was not significant at the 99% confidence level, which may lead to a conclusion that there is no statistical evidence of regional income convergence in the US over the last three decades. Third, the results from bivariate ESDA techniques and a GWR model report that there was a substantive level of spatial heterogeneity in the catch-up process, and suggested possible spatial regimes. It was also observed that the sub-periods showed a substantial level of spatio-temporal heterogeneity in ${\beta}$-convergence: the catch-up scenario in a spatial sense was least pronounced during the 1980s.

The State of Dangbyongmuye through 『Mangiyoram』 in late Joseon Dynasty (조선후기 『만기요람(萬機要覽)』을 통해 본 단병무예(短兵武藝) 연구)

  • Kwak, Nak-hyun
    • (The)Study of the Eastern Classic
    • /
    • no.43
    • /
    • pp.209-231
    • /
    • 2011
  • This study aims to examine what danmyeongmuye was enforced to military in Hullyeon dogam, Geumweyeong, and Eoyeong-cheong through Siye in chapter gunjeong of Mangiyoram. The conclusions are as in the following. First, the typical type of siye performed to military were jungsun and gwanmujae. magun and bogun were performed separately with chosi as their center and the basic forms of test have wongi and byeolgi in common. Second, there was a special restriction of application in jungsun. applicants in waegeomgyojeonsu must not apply yedo and hyeopdo in duplicate and applicants in yedo and hyeopdo must not do in the same manner. this was a considerate system to the military because they could be a professional through a systematic training of only one kind of danmyeongmuye. Third, one of the special features in gwanmujae was bogun byeolgi. waegeomgyojeon, yedo, hyeopd eonwoldo, jedokgeom, bongukgeom, gichang, deungpae, nangseon, jukjangchang, dangpa, gwonbeop, gonbang, mokjangchang were designated and performed. 13gi except mokjangchang were martial art in muyedobotongji. danmyeongmuye was actually supplied and very helpful to the military. Forth, Siye made the military practice skills and improve martial art ability of their own free will and it was a great reward system to an excellent military at the same time. through this study we can understand the concrete meaning of danmyeongmuye at the central military camp in late Joseon dynasty.

A New Architecture of Instant Message Service with Multiple Servers (다중서버 방식의 새로운 인스턴트메시지 서비스 구조)

  • Jang, Choonseo;Lee, Ky-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.99-106
    • /
    • 2013
  • In Instant message service, the server should process instant messages and request messages which include many presence resources for users. And it also precesses massive notification messages generating from the subscribed presence resources. In this paper a new architecture of instant message service with multiple servers which can distribute loads efficiently as the number of users increases has been suggested. It also provides various functions to users using extended call processing language. The user subscribes presence information and call processing language script which describes user's functions. The server processes instant messages, presence services and call processing language scripts. New extended presence information data structure has been suggested and new call processing language operation tags have been added. Therefore extendability of the system can be increased and various services which combine presence service and call processing can be provided in this system. Furthermore instant message processing module has been integrated in the server to decrease the amount of SIP(Session Initiation Protocol) messages, and it also improves system efficiency, The performance of our proposed system has been analysed by experiments.

Militarization of Space and Arms Control

  • Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.2
    • /
    • pp.443-469
    • /
    • 2018
  • In the sixty year since the first launch of Sputnik 1, it has become impossible to consider economic, political, or scientific human life in the communication field without reference to outer space. But, there is a growing groundswell of public opinion aimed at preventing arms race in space. Therefore it is necessary to establish some institution or mechanism such a code of conduct, international law. But every nation has a different posture on the grounds of national interest, or different levels of space development, the conditions required for the successful negotiation of a comprehensive treaty are not yet ripe. It is hoped that by beginning with soft measures (TCBM, Code of Conduct) for which it is easier to secure voluntary participation it may be possible to build up to a comprehensive treaty. The participation of the Space powers (US, Russia, China) in a dialogue of mutual exchange and shared information would contribute to international peace and give a long term benefit to humankind. It is also necessary to promote partnership through regional and bilateral cooperation. We should guide and shape opinion so that more nations ratify and sign existing international legal covenants in order to contribute to the efficency of Space law. International law needs to enforce PAROS and Space Security.

A Study of the Effectiveness and Status of the Information Security Disclosure System (정보보호 공시제도의 운영실태와 효과성 분석)

  • Baek, Seung Jun;Lee, Hong Joo
    • Knowledge Management Research
    • /
    • v.22 no.1
    • /
    • pp.309-330
    • /
    • 2021
  • The information security disclosure system (ISDS) has been implemented since 2016 to ensure the protection of stakeholders and the right to know, and to promote voluntary investment in information protection by companies. Regarding the information security disclosure system, there have been studies that urge the implementation of the system, but studies that analyze the contents disclosed after the implementation of the system or suggest improvement directions are few. In this study, the contents of the information security disclosure system that had been announced on the information security industry promotion portal until 2019 were analyzed, the current status was summarized, and the direction of system improvement was suggested. In some cases, companies that disclosed information through the disclosure system increased the number of personnel in charge and obtained certifications related to information security, but did not find any effect on the increase/decrease in investment. The current disclosure system has not been activated because it has difficulty in giving individual companies incentives to disclose. Thus, this study suggests the inclusion of ISDS to information security management system (ISMS), which is currently mandatory for certain companies. In the current disclosure system, it is difficult for the company's stakeholders or customers to check the contents of the disclosure. As a way to do this, a method of including in the contents of the personal information processing policy or the notification of the use of personal information was suggested.

A New Instant Messaging System using Extended CPL in SIP Environment (SIP 환경에서의 확장 CPL을 사용한 새로운 인스턴트 메시징 시스템)

  • Jang, Choon-Seo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.9
    • /
    • pp.67-74
    • /
    • 2009
  • The presence informations of users of Instant Messaging System In SIP(Session Initiation Protocol) environment are obtained by presence server, and message waiting indication event package is used to provide various message informations stored in the message server. In this paper, I have proposed a new method in which Extended CPL(Call Processing Language) has been applied to presence service to provide various functions to the users. A user of Instant Messaging System subscribes presence information and CPL scripts which describe his requirements, and presence server executes CPL scripts when instant messaging service is subscribed and notifies presence informations. Several CPL operation tags are added, and therefore various services which combine presence service and call processing can be provided in this system. Furthermore a new method has been proposed in which message server and presence server correlate in Instant Messaging System. When changes of message status informations occur, message server send these informations to the presence server, and presence server provides both presence informations and message status informations in extended format. As this method can be a substitute for message waiting indication event package, the system operating efficiency can be increased. The performance of this proposed system is evaluated by experiments.