• 제목/요약/키워드: Database Protection

검색결과 245건 처리시간 0.027초

한국전력 송전계통 보호 데어터베이스 구축 (A Development of Power Transmission System Protection Database for Korea Electric Power Company)

  • 안영태;이승재;최면성;강상희;김호표;이운희;최홍석
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제48권7호
    • /
    • pp.847-854
    • /
    • 1999
  • The setting of protective relays, which is critical to the power system security and reliability, requires a huge volume of data processing and repetitive calculation. Since it has been performed by relay engineers manually, it is vulnerable to human errors, its computerization has been pursued, in which the efficient management of the data is the key to the success. The database for power system protection must accommodate not only the power system network data but also a variety of protective devices. Also its information should be able to be viewed and updated with easy by operators and by computer programs. This paper describes several existing database designs for power system protection, their advantages and disadvantages. Also this paper has identified the required function and designed the database for the KEPCO power system data structure for the benefit of the relay setting process, etc..

  • PDF

접근제어형 데이터베이스 보안 시스템의 보호프로파일 (A Protection Profile for Access Control Based Database Security System)

  • 전웅렬;조혜숙;김승주;원동호
    • 정보보호학회논문지
    • /
    • 제17권1호
    • /
    • pp.109-113
    • /
    • 2007
  • 실생활에서 네트워크가 차지하는 비중이 점점 커지면서 데이터가 집약되어있는 데이터베이스 보안의 중요성도 점점 증가하고 있다. 현재 데이터베이스 보안은 크게 사용자 접근제어 방식과 데이터의 암호화 저장방식으로 구분된다. 그러나 데이터베이스 보안시스템에 대한 범용의 보호프로파일이 아직 존재하지 않기 때문에 정확한 평가가 어렵다. 이에 본 논문은 사용자 접근제어 형 데이터베이스 보안시스템의 보안기능요구사항을 개발한다. 본 논문은 접근제어 형 데이터베이스 보안시스템이 갖춰야 할 기본적인 필수기능을 제안한다. 이는 데이터베이스 보안시스템 평가 시 참고자료로 충분히 활용될 수 있을 것이다.

사업장 모성보호 실태 및 교육자료 요구도 (Need Assessment to Develop the Maternity Protection Education Database for Occupational Health Nurses)

  • 전경자;최은숙;김소연;윤순녕;정혜선;이복임
    • 한국직업건강간호학회지
    • /
    • 제12권1호
    • /
    • pp.71-79
    • /
    • 2003
  • Purpose: The purpose of this study was to describe the status of maternity protection in the industries for the development of educational database used by occupational health nurses (OHNs). Method: 100 OHNs were purposively sampled and they were charged in the occupational health manager of their own industries. Data were collected by the postal mail, the response rate was 53.0%, and analysis rate was 43.0%. Result: The results were as follows; 1. Most of subjects responded there was the institutionalization of a special holiday for woman workers (97.7%) and 90 days maternity leave (95.4%). Otherwise, the numbers of industry were smaller in the case of providing the breast-feeding time, temporary rest from office for child raring, restriction of hazard job, night job, and over time. The application rates were lower than the rate of institutionalization of all maternity protection items. 2. There were significant differences in institutionalization of maternity protection by the activity of the trade union. And the numbers of the industry applying the maternity protection were significantly different by the area and the types of industry. 3. Most OHNs responded 17 subjects were needed to the maternity protection education for women workers. Conclusion: It would be needed to develop the maternity protection education database in base of the status of maternity protection in the industries and the need of maternity protection education. The role of OHNs for maternity protection was expected to activate.

  • PDF

효율적인 계통보호 데이터베이스 디자인 방법에 관한 연구 (A Study of an Effective Database Design Method for Power System Protection)

  • 안영태;최면송;이승재;강상희;김호표;최흥석
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1998년도 하계학술대회 논문집 C
    • /
    • pp.905-907
    • /
    • 1998
  • The setting of protective relays, which is critical to the system security, requires a huge volume of data and a lot of repetitive calculations. Since an effective design of a database is essential. The relay setting database must accommodate a variety of protective devices. Also its information can be viewed and updated with easy by humans and by computer programs. This paper describes several existing database designs for power system protection, their advantages and disadvantages. Also this paper develops an effective database for power system protection with their advantages.

  • PDF

A Tabu Search Method for K-anonymity in database privacy protection

  • Run, Cui;Kim, Hyoung-Joong
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.990-992
    • /
    • 2011
  • In this paper, we introduce a new Tabu method to get K-anonymity character in database information privacy protection. We use the conception of lattice to form the solution space for K-anonymity Character and search the solution area in this solution space to achieve the best or best approach modification solution for the information in the database. We then compared the Tabu method with other traditional heuristic method and our method show a better solution in most of the cases.

계통보호 정정 프로그램의 데이터베이스 개선에 관한 연구 (A Study On Database Improvement Of The Power System Protection Program)

  • 김성훈;이승재;최면송;민병운
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 추계학술대회 논문집 전력기술부문
    • /
    • pp.193-195
    • /
    • 2002
  • This paper presents the methods to solve the problem about Power System Protection Program(PROSET) and describe the database relation and schema with UML. PROSET is a overall program system to protect power system and correct it. In the context of the PROSET it is so difficult to edit database data when topology is changed. When the renewal of data is performed. all changed values are disappeared. Therefore, it will not be expected to know the present situation by using the information of the databases data. So it is necessary to solve this problem. Solution is copy of the user. Only E.R diagram is used to express database schema and relation. So, in this paper, UML(Unified Modeling Language) will be used to express PROSET and database of MCD-H and MDT-H.

  • PDF

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF

지적재산권 보호를 위한 전통의학 DB 구축에 관한 고찰 (Grope for a Summary Program about a Traditional Medical Database for Intellectual Property Protection in WIPO)

  • 최환수;이제현;김용진
    • 대한한의학회지
    • /
    • 제25권3호
    • /
    • pp.12-19
    • /
    • 2004
  • Objectives : In the WIPO conference about the protection of intellectual property for traditional knowledge (TK) and genetic resources (GR), there was a demand concerning the necessity of recognizing the invention of TK and GR and the foundation of a related database. Methods : In the standard of the foundation of a database, the content and resource identification standards, the technological standards and the security and transmission standards were discussed. In a decision on intellectual property, it means the protection and recognition as a technology precedent of the materials of the database. Results : Massive material on traditional medical care technology in Korea has existed in many areas. However, it is hard to make a database because it is difficult to organize and find the data. In addition, a database demanded by WIPO is not only the material of images or texts of simple technology information, but also the use of patent decisions about traditional knowledge technology and the public sharing of information in related areas. A traditional medical care database would consist of the core of a subject and the related areas. The core part is the medical herb resource and Oriental clinical technology. Conclusions : These are necessary to detail the kind of medicines and prescriptions, their use, and their processing. In the related areas, it needs to detail PIAS and clinical data in regarding the industrialization. These DB have to protect the TK and the GR of Korea.

  • PDF

자가 건강관리를 위한 데이터베이스 시스템 구축에 관한 연구 - 수지침요법을 중심으로 - (The Development of a Database for Self Health Management - Focusing on the Soojichim (Koryo Hand Therapy) -)

  • 정혜명
    • 한국보건간호학회지
    • /
    • 제20권2호
    • /
    • pp.195-206
    • /
    • 2006
  • Purpose: As Koryo Hand Therapy is generally referenced by a manual, we made a database system to ease. Method: Using the basic theory of Koryo Hand Therapy with the System Development Life Cycle (SDLC), we tested, analyzed, designed and implemented the system and constructed a database system with MS Access according to the symptoms. Results: We constructed the database system of Handing and the symptoms of Koryo Hand Therapy in 3 parts (Basic Data Management, Disorder Therapy Management, Report) for easy management. This database system will be useful for general users to protect, promote and measure their health. The structured database system was valued on the basis of the students basic knowledge of Koryo Hand Therapy. As a result, 80% of the respondents answered that the "system is well structured", 78% that "it's convenient to search", and 87% that "it's helpful for self health management". Conclusion: These study results provides people with information on the basic treatment of symptoms for the self health protection and promotion with Koryo Hand Therapy by constructing a database.

  • PDF

Ethernet Ring Protection Using Filtering Database Flip Scheme For Minimum Capacity Requirement

  • Rhee, June-Koo Kevin;Im, Jin-Sung;Ryoo, Jeong-Dong
    • ETRI Journal
    • /
    • 제30권6호
    • /
    • pp.874-876
    • /
    • 2008
  • Ethernet ring protection is a new technology introduced in ITU-T Recommendation G.8032, which utilizes the generic Ethernet MAC functions. We introduce an alternative enhanced protection switching scheme to suppress penalty in the switching transient, in which the Ethernet MAC filtering database (FDB) is actively and directly modified by information disseminated from the nodes adjacent to failure. The modified FDB at all nodes are guaranteed to be consistent to form a complete new ring network topology immediately. This scheme can reduce the capacity requirement of the G.8032 by several times. This proposed scheme can be also applied in IP protection rings.

  • PDF