• Title/Summary/Keyword: Active Security

Search Result 680, Processing Time 0.022 seconds

Design of the Network Computer Architecture based on a Web Browser (웹 브라우저 기반의 네트워크 컴퓨터 아키텍쳐 설계)

  • Song, Min-Gyu
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.607-616
    • /
    • 2008
  • By the advancement of computer & network technology, the paridigm of 'Network Computer' has been realizing`. In what is called network computer, computer system and computing resource is incomparably seem to be expanded compared with conventional network technology[1]. Network connected computer system consitute a massive virtual computer, it is possible for people to use an enourmous amout of computing resource distributed widely through the network. It is also possible that we make client lightweight by the use of computer system & all shared computing resources on the network in our computer processing and we call this type of client system as thin-client. Thin-client and network computer are on and the same network paradigm in that both paradigm featuring the active use of computer system and resource on the network[2]. In network computer paragem, network itself is regarded as a basic platform for the transfer of application, so it is possible that client access remote serve system to run remote applications through the network[3]. In this paper, we propose the system architecture for the implementation of network computer by the use of Web browser, X window system and Pyjamas. By the use of network computer proposed in this paper, it is possible for people to run application on the server system as if he run local application, and it is expected to improve the security and maintenance efficiency.

  • PDF

Research on legal improvement measurements on drone use

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.147-153
    • /
    • 2017
  • The main subject of year 2016 Davos forum was "The 4th Industrial Revolution." Recently, interests and investment in drone market, so called industrial revolution in the sky is growing in many countries around the world. Before, drone was used for military purpose such as reconnaissance or attacking but today, it is used in various private sectors such as unmanned delivery service, agriculture, leisure activities, etc. Presently, many major countries in the world are already involved in the 'war without gunfire' to be dominant in this drone industry. Korean government also has announced an extreme relaxation of regulations for growing drone industry by opening a conference with Ministers related to economics. During the conference, business scope of drone which was limited to agriculture, photographing, and observation was expanded to all the fields except for cases hindering national safety and security. In terms of shooting purpose drone its process of receiving approval for flight and shooting is simplified to online registration. What is more, drone delivery service will be allowed in island areas such as Goheung, Yeongwol, etc from first term of year 2017. Finding the way to apply drone in criminal investigation is also speeding up. Recently, Public Safety Policy Research Center in Korean National Police University has inquired for research service and its result will be out around November. Likewise, although more and stronger foundation for supporting drone industry is made but there are still, some opinions saying that we should take a careful approach in consideration to the side effect such as abuse in crime. One may also try terror by placing a dangerous substance. If drone falls, it may hurt any civilians. Moreover, if shopping purpose drone is hacked, it may result in violation of privacy. Compared to America, Europe, and China, we are at the very beginning stage of drone industry and it is necessary to reorganize legal issues to grow this industry. This can be thought from two perspectives; first, the growth of drone industry is blocked by difficult regulations on Aviation Law and Radio Regulation Law. The second issue is the safety and privacy that are required for operating drone. For the advanced technologies to make human life more profitable, more active and proactive actions are required by criminal law side. In preparation to the second mechanical era where man and machines should go together, I hope that responsible preparation is required in all fields including the criminal law.

A Study for Satisfaction of Chinese Tourists in Korea (중국소비자의 한국관광 만족을 위한 탐색적 연구)

  • Koo, Hye-Gyoung;Kim, Young-Seen;Choi, Ara;Wang, Sujie
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.117-128
    • /
    • 2017
  • This study aims to propose measures to consistently induce Chinese tourists who represent the largest percentage of inbound tourism from foreign countries, utilizing raw data of 2015 Korea International Visitor Survey conducted by the Korea Culture & Tourism Institute under the Ministry of Culture, Sports and Tourism. Differences and influence factors for overall satisfaction on travel in Korea, intention to revisit Korea, and intention to recommendation were analyzed by demographic characteristics and tourism characteristics of Chinese consumers. As a result of analysis study, it came out that there are differences between overall satisfaction on travel in Korea and intention to revisit Korea by age and job of demographic characteristics. Among the tourism characteristics, there are differences in intention to revisit Korea depending on purpose of travel, intention to revisit Korea and recommendation according to route of travel information search, and there are differences in all three categories according to type of travel. The most important factor of all three category was identified as 'Food' factor and the second most influential factors were immigration procedures, security, and tourist attractiveness. It is suggested that more active research and improvement efforts are needed in the government, industry, and academia in order to attract Chinese tourists in the future.

Comparative study of acute in vitro and short-term in vivo triiodothyronine treatments on the contractile activity of isolated rat thoracic aortas

  • Lopez, Ruth Mery;Lopez, Jorge Skiold;Lozano, Jair;Flores, Hector;Carranza, Rosa Angelica;Franco, Antonio;Castillo, Enrique Fernando
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.24 no.4
    • /
    • pp.339-348
    • /
    • 2020
  • We aimed to characterize the participation of rapid non-genomic and delayed non-genomic/genomic or genomic mechanisms in vasoactive effects to triiodothyronine (T3), emphasizing functional analysis of the involvement of these mechanisms in the genesis of nitric oxide (NO) of endothelial or muscular origin. Influences of in vitro and in vivo T3 treatments on contractile and relaxant responsiveness of isolated rat aortas were studied. In vivo T3-treatment was 500 ㎍·kg-1·d-1, subcutaneous injection, for 1 (T31d) and 3 (T33d) days. In experiments with endothelium-intact aortic rings contracted with phenylephrine, increasing concentrations of T3 did not alter contractility. Likewise, in vitro T3 did not modify relaxant responses induced by acetylcholine or sodium nitroprusside (SNP) nor contractile responses elicited by phenylephrine or angiotensin II in endothelium-intact aortas. Concentration-response curves (CRCs) to acetylcholine and SNP in endothelium-intact aortic rings from T31d and T33d rats were unmodified. T33d, but not T31d, treatment diminished CRCs to phenylephrine in endothelium-intact aortic rings. CRCs to phenylephrine remained significantly depressed in both endothelium-denuded and endothelium-intact, nitric oxide synthase inhibitor-treated, aortas of T33d rats. In endothelium-denuded aortas of T33d rats, CRCs to angiotensin II, and high K+ contractures, were decreased. Thus, in vitro T3 neither modified phenylephrine-induced active tonus nor CRCs to relaxant and contractile agonists in endothelium-intact aortas, discarding rapid non-genomic actions of this hormone in smooth muscle and endothelial cells. Otherwise, T33d-treatment inhibited aortic smooth muscle capacity to contract, but not to relax, in an endothelium- and NO-independent manner. This effect may be mediated by delayed non-genomic/genomic or genomic mechanisms.

Sampling based Network Flooding Attack Detection/Prevention System for SDN (SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템)

  • Lee, Yungee;Kim, Seung-uk;Vu Duc, Tiep;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.24-32
    • /
    • 2015
  • Recently, SDN is actively used as datacenter networks and gradually increase its applied areas. Along with this change of networking environment, research of deploying network security systems on SDN becomes highlighted. Especially, systems for detecting network flooding attacks by monitoring every packets through ports of OpenFlow switches have been proposed. However, because of the centralized management of a SDN controller which manage multiple switches, it may be substantial overhead that the attack detection system continuously monitors all the flows. In this paper, a sampling based network flooding attack detection and prevention system is proposed to reduce the overhead of monitoring packets and to achieve reasonable functionality of attack detection and prevention. The proposed system periodically takes sample packets of network flows with the given sampling conditions, analyzes the sampled packets to detect network flooding attacks, and block the attack flows actively by managing the flow entries in OpenFlow switches. As network traffic sampler, sFlow agent is used, and snort, an opensource IDS, is used to detect network flooding attack from the sampled packets. For active prevention of the detected attacks, an OpenDaylight application is developed and applied. The proposed system is evaluated on the local testbed composed with multiple OVSes (Open Virtual Switch), and the performance and overhead of the proposed system under various sampling condition is analyzed.

A meta analysis of the climate change impact on rice yield in South Korea (기후변화가 국내 쌀 생산량에 미치는 영향에 대한 메타분석)

  • Shin, Deok Ha;Lee, Mun Su;Park, Ju-Hyun;Lee, Yung-Seop
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.2
    • /
    • pp.355-365
    • /
    • 2015
  • As the global climate has dramatically changed over the past decades, there has been active research on evaluating its effects on food security, which has been recognized as one of the most important issues in the field. In this study, we analyzed the impact of the climate change on the Korean agriculture using meta-analysis methods. Especially, our research focus is on estimating the effect of CO2 concentration and two adaptations (planting-date and cultivar adjustments)on rice that accounts for a larger proportion of the Korean domestic agriculture. Unlike traditional general meta-analysis methods that use summary statistics of effects of interest, meta analysis specific to the agriculture literature was conducted by integrating the data on rice yield that were generated under various CO2 emission scenarios and general circulating models of the 6 collected individual studies. As a modeling approach, the rice yield change ratio was set as the dependent variable and the main and interaction effects of CO2 concentration and adaptation were considered as independent variables in a regression model, As a result, CO2 is estimated to have opposite effects on rice yield depending on whether any of the two adaptations is applied or not; decreasing effect without adaptation and increasing effect with adaptation. In addition, it turns out that the cultivar adjustment has a higher increasing effect on rice yield than the planting-date adjustment. The results of the study are expected to be used as basic quantitative data for establishing responsive polices to the future climate changes.

A Study of Partial Preview Control Method of ePUB-based eBook DRM (ePUB 기반 전자책 DRM의 부분열람 제어 방법에 관한 연구)

  • Kim, Eun-Bum;Kim, Kyung-Il;Kim, Tae-Hyun;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.249-256
    • /
    • 2012
  • ePUB is one of the most pervasive eBook formats since it was announced as a 2009 standard in IDPF(International Digital Publishing Forum). ePUB is compressed as a ZIP Archive format and structured as a standard format of OCF. Domestically and internationally, eBook services applying DRM into ePUB have currently been active, while it does not satisfy various needs from business because it does not support preview service which is due to the encryption of the whole ePUB as a single key. This study suggests a way to apply diverse business models by providing eBook content based on ePUB multiple key encryption method, not by encrypting it simply as a single key. The encryption method which applies a multiple key encryption method is suggested as a practically appliable form together with licence issuing and delivery method and decryption method in eBook readers. The multiple key encryption method suggested in this study will make it possible to support partial preview services of ePUB based eBook content. It will be applied to diverse service models and enhance the security level better then single key based encryption method.

A Comparative Study on the Compliance Program(CP) of Strategic Export Control System between Korea and Japan (전략물자 수출통제 자율준수제도(CP)에 관한 한.일 비교 연구)

  • Shim, Sang-Ryul;Shao, Dan;Joo, E-Wha
    • International Commerce and Information Review
    • /
    • v.13 no.4
    • /
    • pp.297-321
    • /
    • 2011
  • Under the UN Security Council Resolution 1540/1810 in 2004 to restrict the proliferation of WMD (weapons of mass destruction) and their means of delivery, many countries have taken great efforts to, control the export of strategic items, thereby preventing the transfer of ABCM (atomic, biological, chemical weapons, missiles) and technologies and goods related to conventional weapons or dual-use items, Compliance Program (CP) in Korea or Internal Compliance Program(ICP) in Japan refers to a company's internal system or rules to comply with the export control laws and regulations, and is to prevent the unintentional illegal export of strategic items. This paper analyzes the Compliance Program (CP) of strategic export control system between Korea and Japan. Both countries have very similar legal frameworks under the guiding principles of multilateral export control regimes. However, there are some differences in actual procedures, classification service, supporting system, export license, sanctions for illegal exporters, etc. Korea should take more active and customer-oriented measures to promote the Compliance Program (CP) into Korean export companies for better awareness and positive attitude, practical information and education, smoothy government-firm communication, closer cooperation between Korea and Japan, etc.

  • PDF

Accidents resulting in disability in vulnerable populations and their consequences: A study of vulnerable worker groups in South Korea (취약계층의 사고 후 장애 발생으로 인한 결과: 한국사회의 취약한 노동계층 중심으로)

  • Pak, Haeyong;Bahk, Jinwook;Paek, Domyung;Lee, Eun-Hee;Pak, Yun-Suk
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.225-232
    • /
    • 2017
  • This study aimed to identify worker groups that are to accidents and to track the changes in their socioeconomic status there after. We analyzed the Korean Labor and Income Panel Study (KLIPS) database(2001-2006) were recorded according to the participant's economic activity status at the beginning of follow-up, and economic activity status was. During the follow-up period, the unemployed group experienced more accidents that resulted in disability than the economically active group. Interestingly, the unemployed group also had the highest industrial accident rate. Among the employed, daily and unpaid family workers were more vulnerable to disabilities. After the accidents, the participants tended to become economically inactive or unemployed. Compared to other worker groups, the economically inactive, unemployed, and daily and unpaid family workers experienced higher rates of accidents and faced graver conditions as a result. Although they constitute a significantly large part of society, these vulnerable workers are not currently covered by any social security measures, such as accident surveillance, training, and accident insurance. Social policy should therefore be directed toward protecting these vulnerable worker groups.

A Study on the Privacy Awareness through Bigdata Analysis (빅데이터 분석을 통한 프라이버시 인식에 관한 연구)

  • Lee, Song-Yi;Kim, Sung-Won;Lee, Hwan-Soo
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.49-58
    • /
    • 2019
  • In the era of the 4th industrial revolution, the development of information technology brought various benefits, but it also increased social interest in privacy issues. As the possibility of personal privacy violation by big data increases, academic discussion about privacy management has begun to be active. While the traditional view of privacy has been defined at various levels as the basic human rights, most of the recent research trends are mainly concerned only with the information privacy of online privacy protection. This limited discussion can distort the theoretical concept and the actual perception, making the academic and social consensus of the concept of privacy more difficult. In this study, we analyze the privacy concept that is exposed on the internet based on 12,000 news data of the portal site for the past one year and compare the difference between the theoretical concept and the socially accepted concept. This empirical approach is expected to provide an understanding of the changing concept of privacy and a research direction for the conceptualization of privacy for current situations.