• Title/Summary/Keyword: Control System Security

Search Result 1,729, Processing Time 0.024 seconds

Vulnerability Analysis and Research on Digital Contents Storage System (디지털콘텐츠 저장장치시스템의 취약성 연구)

  • Kim, Jeom-Goo;Kim, Tae-Eun;Choi, Jae-Wan;Kim, Won-Gil;Lee, Joong-Seok
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.35-41
    • /
    • 2007
  • In accordance with increasing of digital contents and rising of property value, the importance of storing equipment system which can store and control essential contents has been maximized, and securer storing equipment system overcoming various vulnerabilities is now required. Therefore, in this paper, we analyzed misuse, abuse, modification, leak, and various vulnerabilities of storing equipment system that might be damaged, and we researched into an intrusion detection & recovery system which can solve potential vulnerabilities.

  • PDF

Introducing Contemporary Blockchain Platforms

  • Alrumaih, Malak Suliman
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.9-18
    • /
    • 2021
  • Blockchain and its infrastructure technology have expanded rapidly in the last decade and are in high demand, but there is a lack of comprehensive studies on those platforms. Blockchain is a new technology based on the distributed digital ledger system. Decentralized trust is one of the key factors behind the blockchain-based system. Transparency of such a system is better than a conventional centralized ledger system. By using a blockchain-based transaction system, any business organization can harness key benefits like data integrity, confidentiality, and anonymity without involving any third party in control of the transactions. Since the blockchain is used in numerous applications and the horizon is expanding at an unprecedented pace. So, there is a need for an introducing and reviewing of blockchain platforms. In this paper, we have reported a review on existing contemporary blockchain platforms. In particular, From the existing studies, we have identified eighty blockchain platforms and the majority of them have a lack of technical details. To provide the researchers a comprehensive introducing on blockchain platforms to perform a broad guideline for future research and investment in the blockchain domain.

Design of Network Controller for Proportional Flow Control Solenoid Valve (비례유량제어밸브 네트워크 제어기 설계)

  • Jung, G.H.
    • Transactions of The Korea Fluid Power Systems Society
    • /
    • v.8 no.4
    • /
    • pp.17-23
    • /
    • 2011
  • Proportional control solenoid is a type of modulating valve that can continuously control the valve position with magnetic force of solenoid. Recent microcontroller based digital servocontroller for proportional valve is being developed toward the smart valve with additional features such as enhanced control algorithm for finer process and intelligent on-board diagnosis for maintenance. In this paper, development of servocontroller network control with CAN bus which is free from problems of security and network traffic jam is presented. Design of network control system includes modes of communication between master and slave, assignment of 29bit message identifier and message objects, transaction of communication sequence, etc. Monitoring function and control experiments for remote valve through CAN network prove the extended function of smart valve control system.

A Study On D-Shortage Control Hyper System Using MRP and JIT (MRP와 JIT를 융합한 D-결품관리 시스템에 관한 연구)

  • 조동수;이근희
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.15 no.25
    • /
    • pp.63-74
    • /
    • 1992
  • This study proposes D- shortage control system which is a convenient tool for cooperative companies to reduce shortages which frequently break out between the manufacturing companies and the cooperative companies. On the ground of theoretical analysis of MRP and JIT system, D- shortage control system sets up a schedule that secures the delivery date by precedent scheduling( D-) comparing with MRP It also syncronizes business, production and release, and builds the pull system comparing with JIT. The factors causing shotages are the scheduling absurdity and the controlling absurdity. The scheduling absurdity can be settled by the calculating required quantity method of MRP and the controlling absurdity can be settled by daily control of business, production and pruchasing fuctions by the pull system of JIT. And the inventory and the WIP can be reduced by the operating of PULL system and by the settlement of D- shortage control practices. The Application of D- shortage control system, therefore, enables the rationalization of logistics and reduces the inventory And it leads to the reinforced competitiveness and the security of subsistence of manufacturer by the cost ruduction, the reduction of financial difficulty, and the insurance of the delivery date.

  • PDF

The Development of Map Supply System Based on Web (웹 기반 지도공급 시스템 개발)

  • Park, Ki-Surk;Park, Kyeong-Sik
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.2
    • /
    • pp.123-131
    • /
    • 2009
  • The telecommunication technology in the 21st century has come up to the standard which could transmit various spatial information by means of on-line and the printing technology using computers has been on a par with presswork in quality. In addition, map users also would like to get various spatial information through on-line directly or indirectly. None the less, the supply system of national base map in our country has maintained the off-line sales method. It is owing to this reason that the nation's supply system has shown a high degree of inefficiency from the viewpoint of the inventory control, rapidity, and economical efficiency as compared with the on-line sales system in the developed countries. This study tried to analyze some problems of the present supply system in order to build up the foundation of the efficient map supply system and also developed the system such as On-demand maps, on-line paying and sales, inventory control, meta dat establishment, and security module, etc. This study tried to analyze some problems of the present supply system in order to build up the foundation of the efficient map supply system and also developed the system such as On-demand maps, on-line paying and sales, inventory control, meta dat establishment, and security module, etc.

  • PDF

Disturbance Torque Suppression Control of Servo Motors for Missile Fin Actuators (미사일 Fin 액츄에이터용 서보모터의 외란 토크 억제 제어)

  • Kim, Chang-Hwan
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.311-343
    • /
    • 2003
  • In this paper, we propose a generalized disturbance torque suppression control scheme of servo motors for missile fin actuators. Our controller consists of both a model based feed-forward controller and a stabilizing feedback controller. The feed-forward controller is designed such that the output of nominal plant tracks perfectly the reference position command with a desired dynamic characteristics. The feedback controller stabilizes the overall closed loop system. Furthermore, the feedback controller contains a free function that can be chosen arbitrary. The free function can be designed so as to achieve both the suppression of disturbances and the robustness to model uncertainties. In order to illuminate the superior performance of our control scheme to the conventional ones, we present some simulation results.

  • PDF

Fast and Seamless Handoff Control in Wireless ATM Networks (무선 ATM 네트워크에서 빠르고 매끄러운 핸드오프 제어)

  • Koh, Jae-Young
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.99-106
    • /
    • 2007
  • We propose a distributed anchor Crossover Switches (CX) searching algorithm to play an important role in ensuring fast and seamless handoff control in wireless ATM networks. Within networks that are grouped together, connection management is done for each group by anchor switches, and Permanent Virtual Circuit (PVC) with a narrow bandwidth is assigned between anchors for exchange of information. The proposed algorithm enables quick searching of a targeted CX, makes management of the overall network easier, and reduces system overhead or propagation delay time, thus providing fast and seamless handoff.

  • PDF

Leveraged BMIS Model for Cloud Risk Control

  • Song, YouJin;Pang, Yasheng
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.240-255
    • /
    • 2014
  • Cloud computing has increasingly been drawing attention these days. Each big company in IT hurries to get a chunk of meat that promises to be a whopping market in the future. At the same time, information is always associated with security and risk problems. Nowadays, the handling of these risks is no longer just a technology problem, with a good deal of literature focusing on risk or security management and framework in the information system. In this paper, we find the specific business meaning of the BMIS model and try to apply and leverage this model to cloud risk. Through a previous study, we select and determine the causal risk factors in cloud service, which are also known as CSFs (Critical Success Factors) in information management. Subsequently, we distribute all selected CSFs into the BMIS model by mapping with ten principles in cloud risk. Finally, by using the leverage points, we try to leverage the model factors and aim to make a resource-optimized, dynamic, general risk control business model for cloud service providers.

Investigation of Users' Satisfaction of Control & Operation Technology Development for Secure Container Transportation (컨테이너 화물 안전수송을 위한 관제 및 운용기술 개발에 관한 사용자 만족도)

  • Ha, Chang-Seung;Hwang, Seok-Jun;Sohn, Bo-Ra
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.24 no.4
    • /
    • pp.482-493
    • /
    • 2012
  • Logistics security has been enhanced to control cargo containers effectively and safely in global logistics. In response to the change, This study describes the system now being developed that tracks container position, watches cargo security status and gets informations of surrounding until the cargos arrived at its destination. We examine completion and satisfaction of the product for prospective users. For this, considering earlier studies about customer trust, satisfaction, service quality and purchase decision, we analyse an effect among the variables empirically. As a result, when the program is released, we examine customers' satisfaction and purchase decision for the informations to be offered from the program.

In order to prevent malicious attacks, physical security control to the virtual security control to link integrated control system design (악의적인 공격을 차단하기 위하여 가상보안관제와 물리보안관제를 연동한 통합관제시스템 설계)

  • Song, Jun-Ho;You, Jae-Hwe;Park, Tae-Sung;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.756-758
    • /
    • 2012
  • 클라우드 서비스가 발전됨에 따라 자원공유를 위한 가상머신의 활용도 점차 증진되고 있다. 그러나 이러한 가상머신의 활용으로 인하여 가상 영역에 따른 보안위협이 이슈가 되고 있다. 따라서 본 논문은 가상 영역에 따른 보안위협으로부터 보다 안전하고 유동적인 대처를 하기 위한 시스템을 제안하였다. 해당 시스템은 물리관제센터와 가상관제센터의 연동을 통하여 상호간의 현황을 알 수 있음으로써 가상머신 모니터링, 플랫폼 간 공격연관성 분석 등이 용이하며 자원고갈공격이나 DDoS 공격과 같은 위협으로부터 안전하다. 제안하는 시스템은 향후 클라우드 서비스 운용시 물리영역과 가상영역을 총괄적으로 관리하는 통합관제센터 활용에 적합할 것으로 보인다.