• Title/Summary/Keyword: Agents Security

Search Result 211, Processing Time 0.021 seconds

Relationship between Internal Service Quality and Internal Customer Satisfaction, Management Outcome in Airport Private Security Agents (공항 특수경비조직의 내부서비스품질과 내부고객만족 및 경영성과의 관계)

  • Kim, Chan-Sun;Lee, Ji-Eun;Jo, Byung-Hae
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.4
    • /
    • pp.426-437
    • /
    • 2012
  • The purpose of this study is to investigate the relationship between internal service quality, internal customer satisfaction and management outcome of airport security agents. This study had selected special securities from Incheon airport of October, 2011 for population. Using judgment sampling method, 282 samples were drawn and were used for the final analysis. Questionnaire used in study is composed of total 43 questions and using SPSSWIN 18.0, frequency analysis, factor analysis, reliability analysis, multiple regression analysis and path analysis were performed. Cronbach's ${\alpha}$ value which shows the reliability of the survey came out to be over .686. The conclusion is following: First, internal service quality of airport security agents affects internal customer satisfaction. That is, as corporality, responsiveness and empathy increase, internal supply satisfaction and job satisfaction also increase. Second, internal service quality of airport security agent affects job performance. That is, as corporality, reliability and responsiveness increase, non-financial performance and financial performance also increase. However, when empathy is not activated well, financial performance is decreased. Third, airport security agent…s internal customer satisfaction affects job performance. That is, as activation of internal supply satisfaction increases, nonfinancial performance and financial performance are increased. Fourth, airport special security agent…s inside quality of service exerts direction indirect effect in inside customers satisfaction and management result. That is, inside customers satisfaction is an important variable that mediate inside quality of service and management result.

Modeling and simulation of CNP-applied network security models with application of fuzzy rule-based system (퍼지를 적용한 계약망 프로토콜 기반의 네트워크 보안 모델의 설계 및 시뮬레이션)

  • Lee Jin-ah;Cho Tae-ho
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.1
    • /
    • pp.9-18
    • /
    • 2005
  • Attempts to attack hosts in the network have become diverse, due to crackers developments of new creative attacking methods. Under these circumstances the role of intrusion detection system as a security system component gets considerably importance. Therefore, in this paper, we have suggested multiple intrusion detection system based on the contract net protocol which provides the communication among multiple agents. In this architecture, fuzzy rule based system has been applied for agent selection among agents competing for being activated. The simulation models are designed and implemented based on DEVS formalism which is theoretically well grounded means of expressing discrete event simulation models.

  • PDF

CADRAM - Cooperative Agents Dynamic Resource Allocation and Monitoring in Cloud Computing

  • Abdullah, M.;Surputheen, M. Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.95-100
    • /
    • 2022
  • Cloud computing platform is a shared pool of resources and services with various kind of models delivered to the customers through the Internet. The methods include an on-demand dynamically-scalable form charged using a pay-per-use model. The main problem with this model is the allocation of resource in dynamic. In this paper, we have proposed a mechanism to optimize the resource provisioning task by reducing the job completion time while, minimizing the associated cost. We present the Cooperative Agents Dynamic Resource Allocation and Monitoring in Cloud Computing CADRAM system, which includes more than one agent in order to manage and observe resource provided by the service provider while considering the Clients' quality of service (QoS) requirements as defined in the service-level agreement (SLA). Moreover, CADRAM contains a new Virtual Machine (VM) selection algorithm called the Node Failure Discovery (NFD) algorithm. The performance of the CADRAM system is evaluated using the CloudSim tool. The results illustrated that CADRAM system increases resource utilization and decreases power consumption while avoiding SLA violations.

The Strategic Plan for Preparedness and Response to Bioterrorism in Korea (우리나라의 생물테러 대비 및 대응방안)

  • Hwang, Hyun-Soon
    • Journal of Preventive Medicine and Public Health
    • /
    • v.41 no.4
    • /
    • pp.209-213
    • /
    • 2008
  • Following the Anthrax bioterrorism attacks in the US in 2001, the Korean government established comprehensive countermeasures against bioterrorism. These measures included the government assuming management of all infectious agents that cause diseases, including smallpox, anthrax, plaque, botulism, and the causative agents of viral hemorrhagic fevers (ebola fever, marburg fever, and lassa fever) for national security. In addition, the Korean government is reinforcing the ability to prepare and respond to bioterrorism. Some of the measures being implemented include revising the laws and guidelines that apply to the use of infectious agents, the construction and operation of dual surveillance systems for bioterrorism, stockpiling and managing products necessary to respond to an emergency (smallpox vaccine, antibiotics, etc.) and vigorously training emergency room staff and heath workers to ensure they can respond appropriately. In addition, the government's measures include improved public relations, building and maintaining international cooperation, and developing new vaccines and drugs for treatments of infectious agents used to create bioweapons.

Design of Intelligent Intrusion Detection System Based on Distributed Intrusion Detecting Agents : DABIDS (분산 임칩 탐지 에이전트를 기반으로 한 지능형 침입탐지시스템 설계)

  • Lee, Jong-Seong;Chae, Su-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.5
    • /
    • pp.1332-1341
    • /
    • 1999
  • Rapid expansion of network and increment of computer system access cause computer security to be an important issue. Hence, the researches in intrusion detection system(IDS)are active to reduce the risk from hackers. Considering IDS, we propose a new IDS model(DABIDS : Distributed Agent Based Intelligent intrusion Detection System) based on distributed intrusion detecting agents. The DABIDS dynamically collects intrusion behavior knowledge from each agents when some doubtable behaviors of users are detected and make new agents codes using intrusion scenario data base, and broadcast the detector codes to the distributed intrusion detecting agent of all node. This DABIDS can efficiently solve the problem to reduce the overhead for training detecting agent for intrusion behavior patterns.

  • PDF

Coordination among the Security Systems using the Blackboard Architecture (블랙보드구조를 활용한 보안 모델의 연동)

  • 서희석;조대호
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.4
    • /
    • pp.310-319
    • /
    • 2003
  • As the importance and the need for network security are increased, many organizations use the various security systems. They enable to construct the consistent integrated security environment by sharing the network vulnerable information among IDS (Intrusion Detection System), firewall and vulnerable scanner. The multiple IDSes coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (Blackboard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (Blackboard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete Event system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses to these detection information.

A Study on Women's Casino Security Employees (여성 카지노 시큐리티 종사원에 관한 연구)

  • Kim, Hyeong-seok
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.135-158
    • /
    • 2020
  • In casinos, security personnel who manage the safety of customers and employees play a very important role. In particular, there is a high percentage of female employees in casinos, and because the ratio of female and male employees is similar, the probability of female customers or female employees experiencing accidents may be similar to or higher than that of males. Women's security agents who handle women's case accidents can provide female customers and employees with a security service that only women can do. However, most of the agents doing security work at casinos are male, and the proportion of women is very low. Therefore, this research is about employees who are currently working as women in casinos and conducted qualitative research to find out about various experiences they experienced while working in the casino. A total of five study participants were interviewed three times to analyze and categorize the data collected. The first question is the professor's recommendation, his personal information search and his acquaintance's recommendation. The second question, the factors behind the necessary skills at work, are various athletic skills, good physical conditions and foreign language skills. In the third question, the satisfaction factors of the task are the scarcity value of the work, the satisfaction of the pay, the suitability of the individual and the expectation of the future, and the unsatisfactory factors of the work are the risk of the work, the stress on the customer, the discrimination against the sex, the gaze around, the tiredness of the shift work. In the fourth question, factors on the need for female casino security agents are providing differentiated services to female customers, protecting female employees and providing opportunities for women in related majors. The results of this study were interviewed by an expert of more than 20 years in the casino security business, and female casino security agents said that since it is a necessary requirement, they should seek a direction for development through institutional and cognitive improvement.

Performance Comparison of Security System with Various Collaboration Architecture (다양한 연동 구조를 통한 보안 시스템의 성능 비교)

  • 김희완;서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.235-242
    • /
    • 2004
  • As e-business being rapidly developed the importance of security is on the rise in network. Intrusion detection systems which are a core security system detect the network intrusion trial. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network and the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. Each agent cooperates through the BBA (Black Board Architecture) and CNP (Contract Net Protocol) for detecting intrusions. In this paper, we propose the effective method comparing the blackboard architecture to contract net protocol.

  • PDF

Security of Service Location Protocol using MobileAgents (모바일 에이전트를 이용한 SLP 보안)

  • 황영덕;조인휘
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.352-354
    • /
    • 2004
  • 현재의 사용자 컴퓨팅 환경은 점점 방대해지고 복잡해지고 있으며, 이동 중에 업무를 신속하게 처리해야하는 경우가 많아지면서, 이동 컴퓨팅환경에 대한 편리성과 신뢰성의 요구가 증가하고 있다. 사용자는 언제 어디서나 필요한 서비스를 제공받을 수 있어야 한다. 이 논문에서는 서비스와 자원탐색을 자동으로 해주는 SLP(Service Location Protocol), 필요한 코드와 데이터를 원격으로 보내 처리하는 모바일에이전트(Mobile Agents) 기술의 문제점을 해결하고 상호 연동하여 보완한다. 이 기술의 보편화를 저해하는 보안에 대한 문제점을 분석하여 이것을 해결할 하나의 모델을 제시함으로써 편리하고 안정적인 응용을 보이고자 한다.

  • PDF

Design on Security Protocols Reflecting Collaboration in Workflow Management Systems (협업 기반 워크플로우 관리시스템의 보안 프로토콜 설계)

  • Choi, Myeong-Gil;Lee, Dong-Ho;Hwang, Won-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1271-1278
    • /
    • 2008
  • As the collaboration of WFMS(workflow management systems) in enterprises increases, security protocols could be considered a critical factor affecting secure operation of WMFS. The security protocol of WFMS could not reflect the nature of collaboration in WFMS, resulting to collaboration of WFMS on Internet causing the operation problems of WFMS. This study suggests collaboration based security protocols based on the collaboration of WFMS on Internet. To reflect the nature of collaboration in WFMS, this study analyzes security requirements for WFMS. Based on security requirements, this study suggests a security architecture and security protocols for WFMS using security agents.