• Title/Summary/Keyword: Hierarchical Policy Model

Search Result 132, Processing Time 0.02 seconds

Using Multilevel Model for Evaluation on Community Support Program (다층모형을 활용한 상수원 관리지역 주민지원사업 평가에 관한 연구)

  • Kim, Dong Hyun;Jung, Juchul
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.3D
    • /
    • pp.469-476
    • /
    • 2011
  • The purposes of research is to understand the need of and the effectiveness of multilevel model to evaluate community support program in watershed areas. If the properties of policy target have hierarchical characteristics, the multilevel analysis is an adequate method to evaluate and test the effectiveness of policy. Also, the technique of multilevel modeling is extended to testing the relevance between performance appraisal and policy effectiveness. The case study of watershed region's community support program was estimated using satisfaction and economic aid level of policy target. This research has three results. First, the multilevel analysis should be used in nested data structure to estimate the effect of policy intervention. Second, the indexes of multilevel modeling should be used complementally to that of the traditional index approach. Third, the spatial hierarchical structure should be considered as the hierarchical structure in policy evaluation.

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

Design of A Spammail Control Model Based on Hierarchical Policy (정책기반의 계층적 스팸메일 제어모델 설계)

  • Lee Yong-Zhen;Baek Seung-Ho;Park Nam-Kyu;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.143-151
    • /
    • 2005
  • As the internet and I-commerce have been developing. a novel method for marketing is needed. A new advertisement using E-mail is becoming popular, because it has characteristics with low costs and relative efficiency. However. as the spam mails are increasing rapidly, mail service companies and users are deeply damaged in their mind and economically. In this paper, we design a hierarchical spam mail blocking policy through cooperation of all the participants-user, administrator, ISP to cut off the spam mail efficiently and Propose an efficient model to block and manage the spam mails based on the Policy. Also we prove the efficiencies and effectiveness of the proposed model through evaluation process .

  • PDF

A Hierarchical Analysis on the Commuting Behaviors and Urban Spatial Characteristics (통행행태와 도시공간특성에 관한 위계적 분석)

  • Seo, Jonggook
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.506-514
    • /
    • 2015
  • In this study, a new analytical techniques is proposed for seeking policy alternatives aimed at objectives of TDM, increasing the transit rideshare. Determinants of travel mode such as personal characteristics, lifestyle, and urban spatial characteristics are interdependent and have combined effect on decision. In addition, individuals, groups, and regional characteristics have interdependencies at different levels. Unlike traditional regression analysis, hierarchical analysis model has the advantage of identifying interdependencies and complex relationship between the combined impact factors. This analysis technique is expected to be a significant contribution to seek a more efficient TOD policy.

A Hierarchical Analysis on the Commuting Behaviors and Urban Spatial Characteristics II (통행행태와 도시공간특성에 관한 위계적 분석 II)

  • Seo, Jong Gook
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.2
    • /
    • pp.182-193
    • /
    • 2018
  • Purpose: The purpose of the study is to analyze the relationship between travel behavior and urban spatial characteristics in a hierarchical manner. Method: This study analyzed the relationship between traffic patterns and urban spatial characteristics for 83 cities in Korea by using a hierarchical linear model. Results: It was found that the urban spatial characteristics influenced the choice of transportation mode and travel time with personal attributes. However, the degree of influence on the choice of the means and the time required is relatively low through the policy of changing the city attribute, so the policy effect of mobilizing the land use policy for the traffic is theoretically, but the scale is not bigger than expected. Conclusion: In high density or the bigger scale of the city, the mass transportation system is widely supplied and used, but it does not overcome the drawback that it takes more time than the autos.

An Empirical Analysis of Building Energy Consumption Considering Building and Local Factors in Seoul (건물과 지역요인을 고려한 서울시 건물에너지 소비 실증분석)

  • Lee, Sujin;Kim, Kijung;Lee, Seungil
    • Journal of Korea Planning Association
    • /
    • v.54 no.5
    • /
    • pp.129-138
    • /
    • 2019
  • This study aims to empirically examine the relationship between building energy consumption and building and local factors in Seoul. Building energy issue is an important topic for low carbon and eco-friendly city development. Building physical, socio-economic and environmental factors effect to increasing or decreasing energy consumption. However, there are different characteristic in each area, and this kind of variable has a hierarchical structure. The multi-level model was used to consider the hierarchical structure of the variables. In this study, a multi-level model was applied to confirm the difference between areas. Spatial area is Seoul, Korea and the temporal scope is August, summer season. As the result, in Model 1 (Null Model), ICC is 0.817. This shows that the energy consumption differs by 8.174% due to factors at the Dong level. Model 2 (Random Intercept Model) suggests that building's physical factors and Average age, Household size and Land price in Dong level have significant effects on Building energy consumption. In Model 3 (Random Coefficient Model), random effect variables have intercepts and slopes to vary across groups. This study provides a perspective for policy makers that the building energy reduction policies to be applied for buildings should be differently applied on area. Furthermore, not only physical factors but also socio-economic and environmental factors are important when making energy reduction policy.

Development of an Annual Expenditure Assessment Model for Amenity-oriented Policy-making in Rural Areas (어메니티 지향적 지방행정을 위한 정책평가모델의 개발)

  • Jung, Nam-Su;Lee, Ji-Min;Lee, Jeong-Jae
    • Journal of Korean Society of Rural Planning
    • /
    • v.10 no.2 s.23
    • /
    • pp.43-49
    • /
    • 2004
  • According to the growing concerns of the public with efficiency and effects of regional policies, their assessment works have become an important issue. Up to now, several studies have been carried out on economic effects of policies using conventional cost/benefit analysis, while there have been few studies on assessment of amenity oriented policies. From the above consideration, this study tried to develop An Annual Expenditure Assessment Model (AEAM) for amenity-oriented policy-making in rural area. As a pre-work for model development, the hierarchical indices system for rural development and the classification system of expenditure were designed. Being based on high significant relationship between rural amenities and local government expenditure, a linear optimization model for maximization of regional amenity was constructed. Through a case study of Sunchang-gun, Chonbuk-province, the model applicability was ascertained.

New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing

  • Zhang, Leyou;Hu, Yupu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1343-1356
    • /
    • 2013
  • Cloud computing has emerged as perhaps the hottest development in information technology at present. This new computing technology requires that the users ensure that their infrastructure is safety and that their data and applications are protected. In addition, the customer must ensure that the provider has taken the proper security measures to protect their information. In order to achieve fine-grained and flexible access control for cloud computing, a new construction of hierarchical attribute-based encryption(HABE) with Ciphertext-Policy is proposed in this paper. The proposed scheme inherits flexibility and delegation of hierarchical identity-based cryptography, and achieves scalability due to the hierarchical structure. The new scheme has constant size ciphertexts since it consists of two group elements. In addition, the security of the new construction is achieved in the standard model which avoids the potential defects in the existing works. Under the decision bilinear Diffie-Hellman exponent assumption, the proposed scheme is provable security against Chosen-plaintext Attack(CPA). Furthermore, we also show the proposed scheme can be transferred to a CCA(Chosen-ciphertext Attack) secure scheme.

Design of A Database Architecture for Hierarchical Security Policy Model (계층적 구조 보안 정책 모델을위한 데이터 베이스 구조 설계)

  • Yun, Yeo-Wung;Hwang, Yoon-Cheol;Um, Nam-Kyeong;Kim, Kwun-Woo;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.711-720
    • /
    • 2001
  • An enlarging a scale of logical domain organizing Internet, security policy association among entities become complicated. Establishment and control of security policies for each system is a hard problem to solve because of the environment and composite factors with variable properties. In this paper, to solve this actual problems, we orgainze a hierarchical structure of network and than we design the structure of database to apply security policies for secure communication. This enables efficient management of security data and association of security policy by using designed data structure between different domain in hierarchical structure with make secure communication possible.

  • PDF

Prototype Design and Security Association Mechanism for Policy-based on Security Management Model (정책기반 보안관리 모델을 위한 프로토타입과 정책 협상 메커니즘)

  • 황윤철;현정식;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.131-138
    • /
    • 2003
  • With the Internet winning a huge popularity, there rise urgent problems which are related to Network Security Managements such as Protecting Network and Communication from un-authorized user. Accordingly, Using Security equipments have been common lately such as Intrusion Detection Systems, Firewalls and VPNs. Those systems. however, operate in individual system which are independent to me another. Their usage are so limited according to their vendors that they can not provide a corporate Security Solution. In this paper, we present a Hierarchical Security Management Model which can be applicable to a Network Security Policies consistently. We also propose a Policy Negotiation Mechanism and a Prototype which help us to manage Security Policies and Negotiations easier. The results of this research also can be one of the useful guides to developing a Security Policy Server or Security Techniques which can be useful in different environments. This study also shows that it is also possible to improve a Security Characteristics as a whole network and also to support Policy Associations among hosts using our mechanisms.