• Title/Summary/Keyword: Agent Security

Search Result 343, Processing Time 0.028 seconds

The Consequence Argument and the Supervenience Argument (결과논변과 수반논변)

  • Hong, Ji-Ho
    • Korean Journal of Logic
    • /
    • v.13 no.2
    • /
    • pp.135-165
    • /
    • 2010
  • In this paper, I explore Turner's argument against libertarianism. He claims that libertarians can't be compatible with naturalism, without abandoning the Consequence Argument. In order to support this claim, he proposes the Supervenience Argument. According to him, the Supervenience Argument can't be rejected without abandoning either the Consequence Argument or naturalism. But I show that libertarians don't have to accept his Supervenience Argument, even though they stick to the Consequence Argument, and that even though they accept his Supervenience Argument, they don't have to abandon the freedom of agent. For these reasons, I conclude that Turner's argument against libertarianism turns out a failure.

  • PDF

Study on the Freight Forwarding System of Advanced Shipping Country - A Case of United States of America System - (선진 해운국의 Freight Forwarding System에 관한 연구 - 미국제도를 중심으로 -)

  • Kim, Se-Won
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.20 no.3
    • /
    • pp.416-428
    • /
    • 2008
  • In the end of 2007, Korea Government promulgated the Rule of 'Basic Act of Logistics Policy' for improving international logistics forwarding business. The goals of these rules are to achieve the development of our nation's economics for providing the security and efficiency of logistics system and enforced competition of logistics enterprises. This is established the basic principles of the legal basis for expanding into the Logistics Hub Center of North-east Asia. However In May 1999 new licensing requirements for ocean freight forwarders and NVOCCs operating in the USA were established by the US Federal Maritime Commission(FMC). Due to these regulations, each ocean transportation service provider in the USA acting as ocean freight forwarder, NVOCCs, or NVOCC agent must obtain a license to operate as Ocean Transportation Intermediary(OTI) before it begins operations. Only licensed OTIs may act as US transportation agents or receiving agents of other NVOCCs, on both US exports and imports. In this context, I think this study will be contributes for the development of korean freight forwarding system by analysis and comparing with between the Rule of the Basic Act of Logistics Policy of Korea and OTI freight forwarder & NVOCCs of USA.

Seroprevalence of abortion and stillbirth inducing disease in Hanwoo, in Jeonbuk eastern area (전북 동부지역 한우에서의 유사산 유발 질병 항체가 조사)

  • Song, Ji-Min;Shon, Ku-Rye;Koh, Won-Seok;Lee, Jeong-Won
    • Korean Journal of Veterinary Service
    • /
    • v.37 no.3
    • /
    • pp.179-183
    • /
    • 2014
  • Reproductive losses in a herd can be huge. Fetal reabsorption or undefined infertility often remain undetected. Routine herds monitoring for exposure, controlling the introduction of potential agent carriers, appropriate biosafety procedures, and vaccination where possible are together the best security against abortion and stillbirth inducing disease. For biosecurity of local farms, we performed antibody titers of abortion and stillbirth related diseases such as bovine viral diarrhea virus (BVDV), infectious bovine rhinotracheitis virus (IBRV), Neospora caninum, Toxoplasma gondii and Campylobacter fetus subsp venerealis. The blood samples were collected from 500 female Hanwoo over 1 year old of 100 farms in Jeonbuk eastern area. Champhylobater serological test was evaluated by the standard tube agglutination test (STAT) and other pathogen's antibodies were detected by indirect-enzyme linked immunoassay (I-ELISA). The seroprevalence of abortion and stillbirth inducing disease were BVDV 72.4%, IBRV 13.0%, N. caninum 1.2%, T. gondii 10.4% and C. venerealis 0.6%, irrespectively.

An Authentication Interworking Mechanism between Multiple Wireless LANs for Sharing the Network Infrastructure (망 인프라 공유를 위한 무선랜 시스템들간의 상호 인증 연동 방법)

  • Lee Wan Yeon
    • The KIPS Transactions:PartA
    • /
    • v.11A no.6
    • /
    • pp.451-458
    • /
    • 2004
  • The previous studies focussed on the security problem and the fast re-authentication mechanism during handoffs in a single wireless LAN system. When the multiple wireless LAN systems share their network infrastructure one another, we propose an authentication mechanism allowing the subscriber to Perform the authentication procedure with the authentication server of its own wireless LAN system even in areas of other wireless LAN systems as well as in areas of its own wireless LAN system. In the proposed mechanism, the access point or the authentication server of other wireless LAN systems plays a role of the authentication agent between the subscriber and the authentication server of the subscriber's wireless LAN system. The proposed authentication mechanism is designed on the basis of the 802.1X and EAP-MD5 protocols.

Digital Signature Mechanism by Mobile Agent Security model of JAVA base (JAVA 기반의 이동 에이전트 보안 모델에 의한 전자서명 메카니즘)

  • Choi, Kil-Hwan;Shin, Min-Hwa;Lee, Dae-Young;Bae, Sang-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2177-2180
    • /
    • 2003
  • 현재 이동 에이전트 및 이의 전송과 실행을 위한 이동 에이전트 시스템의 구현에 Java가 많이 사용되고 있지만 Java의 기본적인 보안 모델은 이동 로드의 기능 확장성에 제한을 주는 문제점이 있다. 본 논문에서는 전자서명을 Java 기반의 이동 에이전트에 적용함으로써 시스템의 보안을 유지하면서 이동 에이전트의 기능 확장성을 보장할 수 있음을 보였다. 또한 이동 에이전트의 전자서명과 이의 망 관리로의 적응을 위해서는 망 관리국(NMS:Network Management Station)에서의 서명자 관리나 공개키 관리 등 전자서명과 관련된 기능 외에 망 관리 이동 에이전트의 등록과 전송, 실행 및 실행 관리를 위한 구성이 필요하다. 따라서 이를 위해 작성한 망 관리국과 관리 대상 시스템의 구성 모델을 보였으며, 제안한 구성방식의 동작을 검증하기 위해 망 관리 응용 예를 작성하고 평가하였다. 제안한 구성 방식을 사용하면 전자서명 처리로 인한 속도 저하의 문제가 있지만, 이동 에이전트의 사용으로 인해 얻어지는 부하 분산과 실시간 관리, 망 확장성 증대의 장점 이외에도 관리 기능 및 서비스 추가가 용이한 장점이 있다.

  • PDF

A Direction-Decision RFID System with a Authentication (인증 기능을 갖는 방향 결정 자율이동 RFID 시스템)

  • Park, Chul-Min;Jo, Heung-Kuk;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1032-1038
    • /
    • 2008
  • RFID is applied in various industry area. The purpose of RFID system is authentication of objects. After Tag's certification, RFID system start to process to be wanted. A RFID electric motor recognizes Tag's action and tails. The application of this system is very wide. For example, a cart in shopping Mall follows customer with a proper Tag. Customer may be very convenient if the cart follows customer autonomously as recognizing the direction of Tag. In this parer, we studied about RFID system that follow objects with a Tag. Finally, we experimented and analysed the proposed system, with Tag, Reader, host computer and electric motion motors.

A Study on Control of Access to Internal Network Information and Authority Set Up Management for Client by Class (제한된 내부 네트워크 정보 접근제어와 계층별 클라이언트 권한설정 관리에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.287-293
    • /
    • 2012
  • It has been only few years that various contents information subject for information processing system has been remarkably increased in online. If we say the year 2000 is the technology based year when deluge of information and data such as real time sharing, the time since after 2000 until 2011 has been a period plentiful of application based functions and solutions. Also, as the applicable range of these information process systems extends, individual information effluence has been social issues twice in 2009 and 2010. Thus now there are continuous efforts made to develop technologies to secure and protect information. However, the range problem has been extended from the illegal access from outside to the legal access from internal user and damages by agents hidden in internal information process system and client system. Therefore, this study discusses the necessity for the studies on efficiency based information security by control of access to internal information and authority setting for administrator and internal users. Based on the result of this study, it provides data that can be used from SOHO class network to large scale for information security method.

A Study on Privatization of Traffic Policing (교통경찰업무의 민영화에 관한 연구)

  • Lee, Sang-Hun
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.265-283
    • /
    • 2008
  • Modern society often faces 3Cs:change, competition, and customer. The main issue of today's police science study, therefore, circles around how public police effectively cope with the radically changed environment. As one of the workable and appealing policy tools to reform the police, the privatization has been not only strongly supported in terms of a theoretical study, but also widely used in practice all over the world. However, Policing has been widely regarded as an exclusively public-sector activity conducted by sworn officer, but a large and increasing share of the aggregate demand for public safety and security is being handled by the private sector. This study examines on the very practical one, how contracting out, most widely used as the privatization alternatives, is perceived and put into practiced in the field of traffic police services. This study is intended to examine recent shifts toward privatization of traffic policing. Although some people regard police services as inappropriate for privatization, most everyone else have persuasively considered that many police services are not public goods or, at least, not pure public goods. We can consider that there are three types of privatization with respect to traffic policing, that is, user-financed police services, contracting out, and some degree of service shedding. As society changes, so must traffic policing. And it is needed to enhance the ability of traffic police and private to accomplish their primary mission, to serve and protect the public.

  • PDF

IDS Model using Improved Bayesian Network to improve the Intrusion Detection Rate (베이지안 네트워크 개선을 통한 탐지율 향상의 IDS 모델)

  • Choi, Bomin;Lee, Jungsik;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.5
    • /
    • pp.495-503
    • /
    • 2014
  • In recent days, a study of the intrusion detection system collecting and analyzing network data, packet or logs, has been actively performed to response the network threats in computer security fields. In particular, Bayesian network has advantage of the inference functionality which can infer with only some of provided data, so studies of the intrusion system based on Bayesian network have been conducted in the prior. However, there were some limitations to calculate high detection performance because it didn't consider the problems as like complexity of the relation among network packets or continuos input data processing. Therefore, in this paper we proposed two methodologies based on K-menas clustering to improve detection rate by reforming the problems of prior models. At first, it can be improved by sophisticatedly setting interval range of nodes based on K-means clustering. And for the second, it can be improved by calculating robust CPT through applying weighted-leaning based on K-means clustering, too. We conducted the experiments to prove performance of our proposed methodologies by comparing K_WTAN_EM applied to proposed two methodologies with prior models. As the results of experiment, the detection rate of proposed model is higher about 7.78% than existing NBN(Naive Bayesian Network) IDS model, and is higher about 5.24% than TAN(Tree Augmented Bayesian Network) IDS mode and then we could prove excellence our proposing ideas.

Sampling based Network Flooding Attack Detection/Prevention System for SDN (SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템)

  • Lee, Yungee;Kim, Seung-uk;Vu Duc, Tiep;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.24-32
    • /
    • 2015
  • Recently, SDN is actively used as datacenter networks and gradually increase its applied areas. Along with this change of networking environment, research of deploying network security systems on SDN becomes highlighted. Especially, systems for detecting network flooding attacks by monitoring every packets through ports of OpenFlow switches have been proposed. However, because of the centralized management of a SDN controller which manage multiple switches, it may be substantial overhead that the attack detection system continuously monitors all the flows. In this paper, a sampling based network flooding attack detection and prevention system is proposed to reduce the overhead of monitoring packets and to achieve reasonable functionality of attack detection and prevention. The proposed system periodically takes sample packets of network flows with the given sampling conditions, analyzes the sampled packets to detect network flooding attacks, and block the attack flows actively by managing the flow entries in OpenFlow switches. As network traffic sampler, sFlow agent is used, and snort, an opensource IDS, is used to detect network flooding attack from the sampled packets. For active prevention of the detected attacks, an OpenDaylight application is developed and applied. The proposed system is evaluated on the local testbed composed with multiple OVSes (Open Virtual Switch), and the performance and overhead of the proposed system under various sampling condition is analyzed.