• Title/Summary/Keyword: Common Methodology

Search Result 654, Processing Time 0.025 seconds

An Evaluation Method for Security Policy Model Based on Common Criteria (공통평가기준에 의한 보안정책모델 평가방법)

  • 김상호;임춘성
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.57-67
    • /
    • 2003
  • Security Policy Model is a structured representation using informal, semiformal or formal method of security policy to be enforced by TOE. It provides TOE to get an assurance to mitigate security flaws resulted from inconsistency between security functional requirements and functional specifications. Therefore, Security Policy Model has been required under an hish evaluation assurance level on an evaluation criteria such as ISO/IEC 15408(Common Criteria, CC). In this paper, we present an evaluation method for security policy model based on assurance requirements for security policy model in Common Criteria through an analysis of concepts, related researches and assurance requirements for security policy model.

A Study on Phenomenological Application Methodology of Architectonics of Steven Holl - Focus on Architectural Common Ground of Phenomenological Concepts - (스티븐 홀의 현상학적 건축구성방법론에 관한 연구 -현상학적 개념의 건축적 공통부분을 중심으로-)

  • Lim, Ki-Taek
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2013
  • Steven Holl is outstanding architect who has been applied his phenomenological thinking to his works. he has been reported that he had adhered to focus his interest on coherent phenomenological theme and sublimated his architectural concept succesfully. This study focuses on relationship how phenomenological concept has common ground with architectural parts and with the study on phenomenological application methodology of architectonics of Steven Holl. In the case of Holl, with the theme of sense and flesh, he molds phenomenologically sensitive space. His works contains coherent phenomenolgical concepts such as distrust of rationality, synthesis of consciousness, and qeustions of perception. The Methodologies of connection with environment(nature or bridge), regional values, placeness, light and time are considered in his works(books and architectural works) as anchoring, interwining and parallax for phenomenological process in his concepts. His methodologies of enlisted works contain many valuable concepts of phenomenological intuition and would be applicable to contemporary and future architecture for humanism.

A GQM Approach to Evaluation of the Quality of SmartThings Applications Using Static Analysis

  • Chang, Byeong-Mo;Son, Janine Cassandra;Choi, Kwanghoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2354-2376
    • /
    • 2020
  • SmartThings is one of the most popular open platforms for home automation IoT solutions that allows users to create their own applications called SmartApps for personal use or for public distribution. The nature of openness demands high standards on the quality of SmartApps, but there have been few studies that have evaluated this thoroughly yet. As part of software quality practice, code reviews are responsible for detecting violations of coding standards and ensuring that best practices are followed. The purpose of this research is to propose systematically designed quality metrics under the well-known Goal/Question/Metric methodology and to evaluate the quality of SmartApps through automatic code reviews using a static analysis. We first organize our static analysis rules by following the GQM methodology, and then we apply the rules to real-world SmartApps to analyze and evaluate them. A study of 105 officially published and 74 community-created real-world SmartApps found a high ratio of violations in both types of SmartApps, and of all violations, security violations were most common. Our static analysis tool can effectively inspect reliability, maintainability, and security violations. The results of the automatic code review indicate the common violations among SmartApps.

Security System using Protocol-Based Security Module for Secure Data Transmission in Web Environment (웹 환경에서 안전한 데이타 전송을 보장하는 프로토콜 기반의 보안 모듈에 근거한 보안 시스템)

  • 장승주;임동훈
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.635-644
    • /
    • 2002
  • We propose the PBSM(Protocol-Based Security Module) system which guarantees the secure data transmission under web environments. There are two modules in the PBSM architecture. One is Web Server Security Module(WSSM) which is working on a web server, the other is the Winsock Client Security Module(WSCSM) which is working on a client. The WSCSM security module decrypts the encrypted HTML document that is received from the security web server. The decrypted HTML document is displayed on the screen of a client. The WSSM module contains the encryption function for HTML file and the decryption function for CGI(Common Gateway Interface). The formal analysis methodology is imported from format theory for analyzing the data flow of the PBSM system. The formal analysis methodology is based on the order theory.

Improvement of the behaviour of composite slabs: A new type of end anchorage

  • Fonseca, Alexandre;Marques, Bruno;Simoes, Rui
    • Steel and Composite Structures
    • /
    • v.19 no.6
    • /
    • pp.1381-1402
    • /
    • 2015
  • The application of composite steel-concrete slabs with profiled steel sheeting has increased, due to the various advantages in relation to reinforced concrete slabs such as, the reduced thickness, the reduced amount of lost formwork needed, as well as the speed of execution. The loss of longitudinal shear resistance is, generally, the governing design mode for simply supported spans of common lengths. For common distributed loadings, the composite behaviour is influenced by the partial shear connection between the concrete and the steel sheeting. The present research work is intended to contribute to improving the ultimate limit state behaviour of composite slabs using end anchorage. Eurocode 4, Part 1.1 (EN 1994-1-1) provides an analytical methodology for predicting the increase of longitudinal resistance, achieved by using shear studs welded through the steel sheeting as the end anchorage mechanism. The code does not supply an analytical methodology for other kinds of end anchorage so, additional tests or studies are needed to prove the effectiveness of these types of anchorage. The influence of end anchorage mechanisms provided by transverse rebars at the ends of simply supported composite slabs is analysed in this paper. Two experimental programmes were carried out, the first to determine the resistance provided by the new end anchorage mechanism and the second to analyse its influence on the behaviour of simply supported composite slabs.

A Study on the Direction of Modeling Techniques for the Development of Large Scale Software (큰 규모 소프트웨어의 개발을 위한 모델링 기법의 방향성에 대한 연구)

  • Cho, Min-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.1
    • /
    • pp.167-172
    • /
    • 2020
  • The importance of modeling in large-scale software development has already been confirmed. In most of the projects, modeling is done using UML. However, UML is a class-based modeling tool, which is complicated and lacks in modeling common modules, components, processes, and data. To supplement this point, this paper will help the actual industrial field by suggesting the integration of various modeling techniques, including structural methodology and information engineering methodology developed in the computer field. Through this paper, I would like to show that it is useful to use various methodologies instead of using UML to develop software that satisfies customers.

Can irregular bridges designed as per the Indian standards achieve seismic regularity?

  • Thomas, Abey E.;Somasundaran, T.P.;Sajith, A.S.
    • Advances in Computational Design
    • /
    • v.2 no.1
    • /
    • pp.15-28
    • /
    • 2017
  • One of the major developments in seismic design over the past few decades is the increased emphasis for limit states design now generally termed as Performance Based Engineering. Performance Based Seismic Design (PBSD) uses Displacement Based Design (DBD) methodology wherein structures are designed for a target level of displacement rather than Force Based Design (FBD) methodology where force or strength aspect is being used. Indian codes still follow FBD methodology compared to other modern codes like CalTrans, which follow DBD methodology. Hence in the present study, a detailed review of the two most common design methodologies i.e., FBD and DBD is presented. A critical evaluation of both these methodologies by comparing the seismic performance of bridge models designed using them highlight the importance of adopting DBD techniques in Indian Standards also. The inherent discrepancy associated with FBD in achieving 'seismic regularity' is highlighted by assessing the seismic performance of bridges with varied relative height ratios. The study also encompasses a brief comparison of the seismic design and detailing provisions of IRC 112 (2011), IRC 21 (2000), AASHTO LRFD (2012) and CalTrans (2013) to evaluate the discrepancies on the same in the Indian Standards. Based on the seismic performance evaluation and literature review a need for increasing the minimum longitudinal reinforcement percentage stipulated by IRC 112 (2011) for bridge columns is found necessary.

A Study on Development Methodology and Management of Disused Public Assets in Urban Area - Focus on Disused School Site - (도시 미활용 공유재산의 관리 및 개발에 관한 연구 - 유휴 학교부지를 중심으로 -)

  • Lee, Hwa-Ryong;Dong, Jae-Uk;Kim, Jin-Gu
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.13 no.3
    • /
    • pp.5-14
    • /
    • 2013
  • In recent years, the change of urban function and the decrease in birth rate have given rise to merge, abolition and relocation of the existing schools. This study explores the possibilities for various land utilizations of disused school sites, aims to propose the effective asset management and the proper development methodology. Firstly it examines the status of small class school in urban area and the linkage complex development method. Among various methods, it compares the validity between the closed school management and public asset management method. In addition, it analyses the national finance method and public-private partnership investment as a proper development methodology to ensure both the common-benefit and profitable business. As a result of study, it prposes the BTO(build-transfer-operate) method to use effectively the disused school sites in urban area.

Analytical Design Methodology for Recommending VDT Workstation Settings and Computer Accessories Layout

  • Rurkhamet, Busagarin;Nanthavanij, Suebsak
    • Industrial Engineering and Management Systems
    • /
    • v.3 no.2
    • /
    • pp.140-150
    • /
    • 2004
  • Repetitive stress injury at the wrist has been reported as a common injury among visual display terminal (VDT) users (i.e., computer users). Adjusting a VDT workstation (computer table and chair) to maintain a correct seated posture while operating a keyboard is perhaps the most frequently recommended preventive solution. This paper proposes an analytical design methodology based on ergonomic design principles for recommending appropriate VDT workstation settings and layout of individual computer accessories on the computer table. The proposed design methodology consists of two interrelated phases: (1) determination of VDT workstation settings, and (2) design of computer accessories layout. Based on the information about the VDT user, dominant task to be performed, typing skill, and degrees of physical and visual interactions between the user and computer accessories, adjustment and layout solutions are recommended to allow having a correct seated posture while minimizing both physical and visual movements. The results from an experiment show that when adjusting the workstation and locating the computer accessories according to the recommendations given by the proposed design methodology, the user's hand movements can be significantly reduced.

Evaluation Methodology of Remote Dismantling Equipment for Reactor Pressure Vessel in Decommissioning Project

  • Hyun, D.J.;Choi, B.S.;Jeong, K.S.;Lee, J.H.;Kim, G.H.;Moon, J.K.
    • Journal of Nuclear Fuel Cycle and Waste Technology
    • /
    • v.1 no.1
    • /
    • pp.83-92
    • /
    • 2013
  • A novel methodology to evaluate remote dismantling equipment for a reactor pressure vessel (RPV) in a decommissioning project is presented in this paper. The remote dismantling equipment, mainly composed of cutting tools and positioning equipment, is absolutely required to cut and handle highly radioactive and large components in nuclear power plants (NPPs); this equipment has a great effect on the overall success of the decommissioning project. Conventional evaluation methods have only focused on cutting technologies or positioning equipment, although remote dismantling equipment cannot achieve its goal without organic interaction between the cutting tools and the positioning equipment. In this paper, the cutting tools and the positioning equipment are evaluated by performance parameters according to their original characteristics, the relationship between the two systems, and common factors. Finally, the remote dismantling equipment used in recent decommissioning projects has been evaluated based on the proposed methodology. The results of this paper are expected to be useful for future decommissioning projects.