• 제목/요약/키워드: Access Security System

검색결과 1,039건 처리시간 0.03초

보건의료체계에 대한 전문가 인식 분석 (Analysis of Experts' Views on Health Care: A Survey)

  • 정영호;고숙자
    • 보건행정학회지
    • /
    • 제16권4호
    • /
    • pp.86-111
    • /
    • 2006
  • Either ways of understanding health care as a commodity or public work are at opposite ends of health care spectrum. These two rival conceptions reflected by viewpoint(ideology) would lead to different directions in policy-making for health care reform. The purpose of this study is to access the value differences of experts' policy views about health care issues by analyzing the extent of consensus among experts in the field of health care. Using primary data obtained through a mail survey of 558 experts in the field of health care, we analyzed the differences of experts' opinions about characteristics of health care market, policy issues and values Gdeology). The study represents from 50-50 split analysis, entropy index, and factor analysis that the wide spread disagreements over health policy, which is a major barriers to effective policy-making, could be caused by the ideological perception differences among experts. This implies that, if values play an important role in policy-making, we should identify the differences in value and seek ways to balance among the diverse values such as efficiency, equity, freedom, and security. For this, the policy issues debated on differences in values should be reconciled for narrowing gaps of experts' perceptions through various ways.

에이전트 코드와 상태 추적을 통한 이동에이전트의 보호 기법 (Mobile Agent Protection Scheme through Execution Tracing of Agent Code and Status)

  • 정창렬;고진광
    • 한국통신학회논문지
    • /
    • 제28권7C호
    • /
    • pp.743-750
    • /
    • 2003
  • 컴퓨터 기술의 확산과 더불어 분산 컴퓨팅 환경에서 이동에이전트 코드의 이동성은 유연성이 있어 인터넷상에서 분배된 애플리케이션들을 설치하는데 사용되고 있다. 동시에, 이동에이전트의 이동코드를 전송하고 멀리 떨어진 곳의 호스트로부터 수신할 수 있는 능력을 가지고 있어서 에이전트가 실행되는 호스트 시스템의 실행 환경은 에이전트의 코드와 이를 실행할 수 있는 실행 환경에 접근을 해야 함으로 악의적인 행위들로부터 에이전트의 위조, 변조, 잘못된 실행을 방지하기가 매우 어렵다. 따라서 본 논문은 암호화된 에이전트의 코드와 상태 추적을 통하여 여러 악의적인 행위로부터 에이전트를 보호할 수 있도록 하는 메카니즘을 제안한다 제안한 메카니즘을 통해 이동에이전트가 보호되는 과정을 통해서 안전성을 증명하였다.

Biologically Inspired Node Scheduling Control for Wireless Sensor Networks

  • Byun, Heejung;Son, Sugook;Yang, Soomi
    • Journal of Communications and Networks
    • /
    • 제17권5호
    • /
    • pp.506-516
    • /
    • 2015
  • Wireless sensor networks (WSNs) are generally comprised of densely deployed sensor nodes, which results in highly redundant sensor data transmissions and energy waste. Since the sensor nodes depend on batteries for energy, previous studies have focused on designing energy-efficient medium access control (MAC) protocols to extend the network lifetime. However, the energy-efficient protocols induce an extra end-to-end delay, and therefore recent increase in focus on WSNs has led to timely and reliable communication protocols for mission-critical applications. In this paper, we propose an energy efficient and delay guaranteeing node scheduling scheme inspired by biological systems, which have gained considerable attention as a computing and problem solving technique.With the identification of analogies between cellular signaling systems and WSN systems, we formulate a new mathematical model that considers the networking challenges of WSNs. The proposed bio-inspired algorithm determines the state of the sensor node, as required by each application and as determined by the local environmental conditions and the states of the adjacent nodes. A control analysis shows that the proposed bio-inspired scheme guarantees the system stability by controlling the parameters of each node. Simulation results also indicate that the proposed scheme provides significant energy savings, as well as reliable delay guarantees by controlling the states of the sensor nodes.

전자무역의 분쟁해결방안에 관한 연구 (A Study on the on-line Dispute Resolution for the E-Trade)

  • 이상옥
    • 한국중재학회지:중재연구
    • /
    • 제13권2호
    • /
    • pp.425-457
    • /
    • 2004
  • This study is to approach e-Trade issues and how to settle the dispute for e-Trade according to on-line Alternative Dispute Resolution (ADR) process. Most on-line systems operate on a limited access basis. The increasing use of the internet to do business brings to light at least important concerns to persons who engage in commerce on-line, or e-Trade. There is some concern about the limits of current internet technology to guarantee the security of e-Trade. The new technology has transformed society and is defining new years of doing business. This revolution in technology has even changed the nature of many of the goods and services that are the subjects of e-Trade. There is also concern about the limits of the legal framework to guarantee the enforcement of e-Trade. A significant issue is how the law should be adapted to reflect business practices regarding such cyberspace agreements as Web site click-on agreements, e-data interchange, and on-line sales. The principal benefits of on-line ADR should typically be faster and less expensive than traditional conciliation arbitration. The on-line ADR system has the several significances, decreasing inappropriate cost as time and burden of ADR, providing an approachable measure of relief and more efficient tool for the settle of dispute. Therefore, on-line ADR could be used as an adjunct resolution process in large class actions where each single claim is small, but varies somewhat, thus requiring some individual fact determination.

  • PDF

이동성 관리를 지원하는 경량 홈 네트워크 미들웨어 보안 기술 (Lightweight Home Network Middleware Security Mechanism supporting Mobility Management)

  • 고광만;현호재;홍주희;한선영
    • 정보처리학회논문지C
    • /
    • 제13C권3호
    • /
    • pp.375-382
    • /
    • 2006
  • 다양한 종류의 임베디드 시스템이 폭넓게 사용됨에 따라, 임베디드 정보 가전에 접근하고 제어할 수 있는 홈 네트워크 미들웨어에 관한 연구가 활발히 진행 중이다. 그러나 제한된 저장 공간과 낮은 컴퓨팅 능력은 홈 네트워크 기술을 임베디드 시스템에 적용했을 때 심각한 문제를 발생시킨다. 본 논문에서는 홈 네트워크 미들웨어의 실제 성능을 강화하기 위해 이동성 관리를 지원하는 경량 미들웨어를 제시한다. 이동성 관리는 애니캐스트 기술을 적용하여 구현하였으며, IP 기반의 홈 네트워크는 서비스(디바이스)가 노출되어 있기 때문에 사용자의 신원을 확인하는 인증과 정근에 관한 보안 기술을 제안한다.

Self-Encoded Spread Spectrum and Turbo Coding

  • Jang, Won-Mee;Nguyen, Lim;Hempel, Michael
    • Journal of Communications and Networks
    • /
    • 제6권1호
    • /
    • pp.9-18
    • /
    • 2004
  • Self-encoded multiple access (SEMA) is a unique realization of random spread spectrum. As the term implies, the spreading code is obtained from the random digital information source instead of the traditional pseudo noise (PN) code generators. The time-varying random codes can provide additional security in wireless communications. Multi-rate transmissions or multi-level grade of services are also easily implementable in SEMA. In this paper, we analyze the performance of SEMA in additive white Gaussian noise (AWGN) channels and Rayleigh fading channels. Differential encoding eliminates the BER effect of error propagations due to receiver detection errors. The performance of SEMA approaches the random spread spectrum discussed in literature at high signal to noise ratios. For performance improvement, we employ multiuser detection and Turbo coding. We consider a downlink synchronous system such as base station to mobile communication though the analysis can be extended to uplink communications.

전압안정도 여유를 고려한 수송능력산정 알고리즘의 개발에 관한 연구 (A Study on Development of Power Transfer Capability Calculation Algorithm Considering Voltage Stability Margin)

  • 김용하;이범;문혁기;정현성;조성린
    • 조명전기설비학회논문지
    • /
    • 제17권3호
    • /
    • pp.18-24
    • /
    • 2003
  • 전력산업구조 개편 시 변화된 전력계통 환경하에서 효율적인 계통운용 및 계획을 위해서는 계통의 수송능력(Power Transfer Capability)을 산정하는 작업이 필수적이다. 또한 송전망의 자유로운 접근(Open Access)과 같은 전력정책의 변화로 인하여 전력계통은 더욱더 고부하상태에서 운전될 가능성이 높아지게 되었다. 전력계통의 부하가 증가하면 전압안정도 여유가 감소하므로 전력계통은 전압붕괴와 같은 전압안정도 문제를 야기시킬 수 있다. 본 연구에서는 전력계통의 수송능력 산정문제에 대해 전압안정도여유 제약을 고려 할 수 있는 수송능력산정 알고리즘 개발에 연구의 목적을 두고 있다. 이를 위해 본 연구에서는 전압안정도 여유제약식을 정식화한 다음 이를 수송능력 산정문제에 반영할 수 있는 방법을 제안하였다. 그리고 이를 시험계통에 적용하여 본 연구의 타당성을 검증하고 유응한 정보를 도출하였다.

자바 가상 머신에서 클래스 로딩에 관한 연구 (A Study on Class Loading in Java Virtual Machine)

  • 김기태;이갑래;유원희
    • 한국콘텐츠학회논문지
    • /
    • 제3권2호
    • /
    • pp.39-45
    • /
    • 2003
  • 자바의 동적인 클래스 로딩은 자바 플랫폼에서 실행시간에 소프트웨어 컴포넌트를 동적으로 로딩하기 위한 강력한 메커니즘이다. 다른 시스템에서도 동적 로딩과 링킹을 제공하지만 지연 로딩, 타입안전 링크, 사용자 정의 로딩정책, 다중 이름 공간 등은 자바가 가진 중요한 특징들이다. 클래스 로딩에서 핵심은 타입 안전을 보장하는 것이다. 타입 안전은 자바 보안에서 아주 중요한 부분을 차지한다. 하지만 자바 가상 머신에서 타입 안전에 대한 메커니즘은 매우 복잡하고, 접근이 명확하지 않아서 지금 까지 많은 버그가 발생하여 타입 안전에 문제가 되었다. 본 논문은 자바 가상 머신에서 동적인 클래스 로더의 동작을 분석하고, 연산적 의미론(operational semantics)으로 추상화하고 현재 로드되어진 클래스와 추가된 제한 등을 이용하여 이전에 제시되었던 타입 안전에 대한 문제를 분석한다.

  • PDF

The Relationship Between Financial Literacy and Public Awareness on Combating the Threat of Cybercrime in Malaysia

  • ISA, Mohd Yaziz Bin Mohd;IBRAHIM, Wan Nora Binti Wan;MOHAMED, Zulkifflee
    • 산경연구논집
    • /
    • 제12권12호
    • /
    • pp.1-10
    • /
    • 2021
  • Purpose: Cyber criminals have affected various markets and the banking system has encountered various kinds of cyberattacks. The purpose of this study is to analyze cybercrime that is an emerging threat and investigate the significant contribution of financial literacy and public awareness on cybercrimes. To understand the security issues and the need for corrective steps, the techniques and strategies used by cyber fraudsters in obtaining unauthorized access and use the financial information for purpose of fraud need to be understood. Research design, data and methodology: A sample of 123 banks employees from 12 commercial banks in Malaysia was surveyed. This study differs from previous studies as it surveyed the employees' awareness, and this approach fills in the gap in existing literature. Results: The financial literacy and public awareness have positive impact on organizational performance effectiveness to combat threat of cybercrime. Some recommendations are also proposed from research findings, for banking industry and government regulations. Conclusion: The present study focuses on banking sector so its findings cannot be generalized to other sectors. Linking these topics has created a new study in combating threat of cybercrimes generally, and specifically in Malaysia. The present study enhances the understanding of customers' role to combat the impact of cybercrimes on performances of banking industry.

Boosting the Face Recognition Performance of Ensemble Based LDA for Pose, Non-uniform Illuminations, and Low-Resolution Images

  • Haq, Mahmood Ul;Shahzad, Aamir;Mahmood, Zahid;Shah, Ayaz Ali;Muhammad, Nazeer;Akram, Tallha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3144-3164
    • /
    • 2019
  • Face recognition systems have several potential applications, such as security and biometric access control. Ongoing research is focused to develop a robust face recognition algorithm that can mimic the human vision system. Face pose, non-uniform illuminations, and low-resolution are main factors that influence the performance of face recognition algorithms. This paper proposes a novel method to handle the aforementioned aspects. Proposed face recognition algorithm initially uses 68 points to locate a face in the input image and later partially uses the PCA to extract mean image. Meanwhile, the AdaBoost and the LDA are used to extract face features. In final stage, classic nearest centre classifier is used for face classification. Proposed method outperforms recent state-of-the-art face recognition algorithms by producing high recognition rate and yields much lower error rate for a very challenging situation, such as when only frontal ($0^{\circ}$) face sample is available in gallery and seven poses ($0^{\circ}$, ${\pm}30^{\circ}$, ${\pm}35^{\circ}$, and ${\pm}45^{\circ}$) as a probe on the LFW and the CMU Multi-PIE databases.