• 제목/요약/키워드: Database Protection

검색결과 247건 처리시간 0.025초

한약제제의 권리보호에 대한 초보적인 고찰 (A Elementary Study on Protect Intellectual Property of Herbal Medicines)

  • 김윤경;안상우;김홍준;최환수
    • 한국한의학연구원논문집
    • /
    • 제10권1호
    • /
    • pp.81-95
    • /
    • 2004
  • The discussion of intellectual property protection with TK, GR in WIPO begin Herbal medicines get a important basis in a development of modern new medicine. For the protection of intellectual property, we set up this study. For the protection of intellectual property with herbal medicines, We analyze as follows. First, we analyze the specific theory and character of traditional herbal medicines. Second, we analyze the existing system on protecting them in Korea. The intellectual property protection with herbal medicines must maintain the specific character of that. We must select the basic traditional herbal medicines. The next, we must protect from intellectual property on add and subtract, combine, create of the traditional herbal medicines. In order that we must construct database on the Herbal medicines.

  • PDF

Phantom Protection Method for Multi-dimensional Index Structures

  • Lee, Seok-Jae;Song, Seok-Il;Yoo, Jae-Soo
    • International Journal of Contents
    • /
    • 제3권2호
    • /
    • pp.6-17
    • /
    • 2007
  • Emerging modem database applications require multi-dimensional index structures to provide high performance for data retrieval. In order for a multi-dimensional index structure to be integrated into a commercial database system, efficient techniques that provide transactional access to data through this index structure are necessary. The techniques must support all degrees of isolation offered by the database system. Especially degree 3 isolation, called "no phantom read," protects search ranges from concurrent insertions and the rollbacks of deletions. In this paper, we propose a new phantom protection method for multi-dimensional index structures that uses a multi-level grid technique. The proposed mechanism is independent of the type of the multi-dimensional index structure, i.e., it can be applied to all types of index structures such as tree-based, file-based, and hash-based index structures. In addition, it has a low development cost and achieves high concurrency with a low lock overhead. It is shown through various experiments that the proposed method outperforms existing phantom protection methods for multi-dimensional index structures.

생태수질기준설정을 위한 대상물질의 생태위해성 평가 (Ecological Risk Assessment of Chemicals of Concern for Initiation of Ecorisk-based Water Quality Standards in Korea)

  • 안윤주;남선화;김용화
    • 한국물환경학회지
    • /
    • 제24권5호
    • /
    • pp.592-597
    • /
    • 2008
  • Current water quality standard (WQS) in Korea is based on the protection of human health, not considering the protection of aquatic organisms. Most of chemicals can be toxic to ecological biota as well as human. Health of aquatic biota is closely related to the human health via food chain, therefore ecological risk based-WQS needs to be developed to protect the aquatic ecosystem. In this study, we selected the 31 chemicals in the Project entitled 'Development of integrated methodology for evaluation of water environment'. The methodology for calculating water quality criteria was derived from the Australian and New Zealand processes for deriving guideline trigger value for aquatic ecosystem. The available ecotoxicity data were collected from US EPA's ECOTOXicology Database (ECOTOX), TOX-2000 Database, European Chemicals Bureau (ECB)'s International Uniform Chemical Information Database (IUCLID) and Environmental Protection Agency (US EPA)'s report 'Ambient Water Quality Criteria (AWQC)'. The aquatic toxicity data for the Korean species were selected for risk assessment to reflect the Korean water environment. The monitoring values were calculated from the water quality monitoring data four main Korean rivers. We suggested the order of priorities of chemicals based on ecological risk assessment. We expect that these results can be useful information for establishing the WQS for the protection of aquatic ecosystem.

계통 보호 종합 전산화를 위한 데이터베이스 관리 시스템 개발 (A Development of Power System Protection Database Management System for Computerized Integrated Environment)

  • 정병관;이승재;최면송;강상희;김호표;이운희;최홍석
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1999년도 하계학술대회 논문집 C
    • /
    • pp.1475-1477
    • /
    • 1999
  • The setting of protective relays, which is critical to the system security, requires a huge volume of data and a lot of repetitive calculations. Therefore computerization of this process, named PROSET2000 is in progress in KEPCO. PROSET2000 is based on a power system protection database. The database must accomodate a variety of protective device data efficiently, which need be viewed and updated with ease. This paper suggests several database management functions for PROSET2000.

  • PDF

계통보호 정정 프로그램의 데이터베이스 개선에 관한 연구(II) (A Study On Database improvement Of The Power System Protection Program(II))

  • 김성훈;이승재;최면송;민병운
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 하계학술대회 논문집 A
    • /
    • pp.302-304
    • /
    • 2003
  • This paper presents the methods to solve the problem about Power System Protection Program(PROSET). PROSET is a overall program system to protect power system and correct it. In the context of the PROSET, it is so difficult to edit database data when topology is changed. When the renewal of data is performed, all changed values are disappeared. Therefore, it will not be expected to know the present situation by using the information of the databases data. So it is necessary to solve this problem. Solution is copy of the user. Database of GRL,GRZ,KYP2D1,KYD2X1,L90 Relay module were developed. We made a database management system for PROSET, therefore I will show this management system briefly.

  • PDF

데이터베이스 보호를 위한 법적 대응 방안에 관한 연구 (A Study on the Legal Countermeasure for the Protection of Databases)

  • 안계성;조소연
    • 정보관리학회지
    • /
    • 제16권2호
    • /
    • pp.27-48
    • /
    • 1999
  • 저작권법에 의한 데이터베이스 보호에 문제가 제기되자 세계 각국에서는 추가적인 데이터베이스 보호법 제정 여부를 놓고 열띤 논의를 벌이고 있다. 본 연구에서는 저작권법에 의한 데이터베이스 보호의 문제점 및 최근 선진 각국의 데이터베이스 보호 입법 동향을 살펴보고 이를 토대로 국내 데이터베이스 산업 활성화를 위한 법적인 보호 대응책을 제안하였다.

  • PDF

암호화 데이터베이스에서 영역 질의를 위한 기술 (Technique of Range Query in Encrypted Database)

  • 김천식;김형중;홍유식
    • 전자공학회논문지CI
    • /
    • 제45권3호
    • /
    • pp.22-30
    • /
    • 2008
  • 최근 들어 개인 정보 보호의 중요성에 대한 인식이 매우 높아지고 있다. 많은 국가에서 개인정보 보호에 관련한 법규를 새로이 제정하고 있으며 이제 개인 신상에 관련된 데이터를 보호하는 것은 단순한 기업 이미지 관리 차원이 아닌 법적인 의무가 되었다. 대부분의 기업의 세일즈 데이터베이스에는 예외 없이 고객의 이름, 주소, 신용카드번호와 같은 정보가 저장되어 있다. 개인 정보는 개인 신상에 관한 민감한 정보이고, 또한 기업의 전략적인 자산이며, 따라서 기업은 개인 정보를 사전 예방차원에서 안정적으로, 그리고 포괄적으로 보호하기 위한 모든 노력을 다해야 한다. 그러나 만일 데이터베이스 관리자의 패스워드 보안이 뚫린다면 속수무책일 수밖에 없다. 이를 위해서 데이터베이스 암호화는 반드시 필요하다. 그러나 암호화의 결과 데이터베이스의 성능에 문제가 될 수 있고 또한, 암호화로 인하여 기존의 SQL 언어에서의 영역(range) 질의에 제한이 있다. 따라서 이와 같은 문제를 해결하여 암호화된 데이터를 효과적으로 질의하기 위한 방법을 본 논문에서 제안하였다.

Flush Optimizations to Guarantee Less Transient Traffic in Ethernet Ring Protection

  • Lee, Kwang-Koog;Ryoo, Jeong-Dong
    • ETRI Journal
    • /
    • 제32권2호
    • /
    • pp.184-194
    • /
    • 2010
  • Ethernet ring protection (ERP) technology, which is defined in ITU-T Recommendation G.8032, has been developed to provide carrier grade recovery for Ethernet ring networks. However, the filtering database (FDB) flush method adopted in the current ERP standard has the drawback of introducing a large amount of transient traffic overshoot caused by flooded Ethernet frames right after protection switching. This traffic overshooting is especially critical when a ring provides services to a large number of clients. According to our experimental results, the traditional FDB flush requires a link capacity about sixteen times greater than the steady state traffic bandwidth. This paper introduces four flush optimization schemes to resolve this issue and investigates how the proposed schemes deal with the transient traffic overshoot on a multi-ring network under failure conditions. With a network simulator, we evaluate the performance of the proposed schemes and compare them to the conventional FDB flush scheme. Among the proposed methods, the extended FDB advertisement method shows the fastest and most stable protection switching performance.

GIS기반 의사결정지원시스템을 이용한 부산 대기질 측정망의 최적화 (Optimization of Air Quality Monitoring Networks in Busan Using a GIS-based Decision Support System)

  • 유은철;박옥현
    • 한국대기환경학회지
    • /
    • 제23권5호
    • /
    • pp.526-538
    • /
    • 2007
  • Since air quality monitoring data sets are important base for developing of air quality management strategies including policy making and policy performance assessment, the environmental protection authorities need to organize and operate monitoring network properly. Air quality monitoring network of Busan, consisting of 18 stations, was allocated under unscientific and irrational principles. Thus the current state of air quality monitoring networks was reassessed the effect and appropriateness of monitoring objectives such as population protection and sources surveillance. In the process of the reassessment, a GIS-based decision support system was constructed and used to simulate air quality over complex terrain and to conduct optimization analysis for air quality monitoring network with multi-objective. The maximization of protection capability for population appears to be the most effective and principal objective among various objectives. The relocation of current monitoring stations through optimization analysis of multi-objective appears to be better than the network building for maximization of population protection capability. The decision support system developed in this study on the basis of GIS-based database appear to be useful for the environmental protection authorities to plan and manage air quality monitoring network over complex terrain.

OHDSI OMOP-CDM 데이터베이스 보안 취약점 및 대응방안 (OHDSI OMOP-CDM Database Security Weakness and Countermeasures)

  • 이경환;장성용
    • 한국IT서비스학회지
    • /
    • 제21권4호
    • /
    • pp.63-74
    • /
    • 2022
  • Globally researchers at medical institutions are actively sharing COHORT data of patients to develop vaccines and treatments to overcome the COVID-19 crisis. OMOP-CDM, a common data model that efficiently shares medical data research independently operated by individual medical institutions has patient personal information (e.g. PII, PHI). Although PII and PHI are managed and shared indistinguishably through de-identification or anonymization in medical institutions they could not be guaranteed at 100% by complete de-identification and anonymization. For this reason the security of the OMOP-CDM database is important but there is no detailed and specific OMOP-CDM security inspection tool so risk mitigation measures are being taken with a general security inspection tool. This study intends to study and present a model for implementing a tool to check the security vulnerability of OMOP-CDM by analyzing the security guidelines for the US database and security controls of the personal information protection of the NIST. Additionally it intends to verify the implementation feasibility by real field demonstration in an actual 3 hospitals environment. As a result of checking the security status of the test server and the CDM database of the three hospitals in operation, most of the database audit and encryption functions were found to be insufficient. Based on these inspection results it was applied to the optimization study of the complex and time-consuming CDM CSF developed in the "Development of Security Framework Required for CDM-based Distributed Research" task of the Korea Health Industry Promotion Agency. According to several recent newspaper articles, Ramsomware attacks on financially large hospitals are intensifying. Organizations that are currently operating or will operate CDM databases need to install database audits(proofing) and encryption (data protection) that are not provided by the OMOP-CDM database template to prevent attackers from compromising.