• Title/Summary/Keyword: Hierarchical Security Management Model

Search Result 26, Processing Time 0.034 seconds

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

Prototype Design and Security Association Mechanism for Policy-based on Security Management Model (정책기반 보안관리 모델을 위한 프로토타입과 정책 협상 메커니즘)

  • 황윤철;현정식;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.131-138
    • /
    • 2003
  • With the Internet winning a huge popularity, there rise urgent problems which are related to Network Security Managements such as Protecting Network and Communication from un-authorized user. Accordingly, Using Security equipments have been common lately such as Intrusion Detection Systems, Firewalls and VPNs. Those systems. however, operate in individual system which are independent to me another. Their usage are so limited according to their vendors that they can not provide a corporate Security Solution. In this paper, we present a Hierarchical Security Management Model which can be applicable to a Network Security Policies consistently. We also propose a Policy Negotiation Mechanism and a Prototype which help us to manage Security Policies and Negotiations easier. The results of this research also can be one of the useful guides to developing a Security Policy Server or Security Techniques which can be useful in different environments. This study also shows that it is also possible to improve a Security Characteristics as a whole network and also to support Policy Associations among hosts using our mechanisms.

Decision on Replacing Security Components for Infer]nation Systems (정보시스템 도입에 따른 보안기능 컴포넌트 대체 수준 의사결정)

  • Choi Myeonggil;Kim Hyunwoo;Kim Eunhye;Kim Sehun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.147-157
    • /
    • 2004
  • Enterprises and governments currently utilize COTS based information systems which are a kind of component based systems. Especially, COTS are widely utilized as information security systems and information systems including information security functions. This paper suggests an appropriate adaptation level of security functional components and a cost effective priority among them. To make a cost effective decision on adapting security functional components, this paper develops a hierarchical model of information security technologies and analyzes findings through multiple decision-making criteria.

  • PDF

Design of A Database Architecture for Hierarchical Security Policy Model (계층적 구조 보안 정책 모델을위한 데이터 베이스 구조 설계)

  • Yun, Yeo-Wung;Hwang, Yoon-Cheol;Um, Nam-Kyeong;Kim, Kwun-Woo;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.711-720
    • /
    • 2001
  • An enlarging a scale of logical domain organizing Internet, security policy association among entities become complicated. Establishment and control of security policies for each system is a hard problem to solve because of the environment and composite factors with variable properties. In this paper, to solve this actual problems, we orgainze a hierarchical structure of network and than we design the structure of database to apply security policies for secure communication. This enables efficient management of security data and association of security policy by using designed data structure between different domain in hierarchical structure with make secure communication possible.

  • PDF

New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups

  • Lee, Kwang-Su;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.968-988
    • /
    • 2010
  • Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key, and it additionally provide the anonymity of identity in ciphertexts. Using the anonymous HIBE schemes, it is possible to construct anonymous communication systems and public key encryption with keyword search. This paper presents an anonymous HIBE scheme with constant size ciphertexts under prime order symmetric bilinear groups, and shows that it is secure under the selective security model. Previous anonymous HIBE schemes were constructed to have linear size ciphertexts, to use composite order bilinear groups, or to use asymmetric bilinear groups that is a special type of bilinear groups. Our construction is the first efficient anonymous HIBE scheme that has constant size ciphertexts and that uses prime order symmetric bilinear groups. Compared to the previous scheme of composite order bilinear groups, ours is ten times faster. To achieve our construction, we first devise a novel cancelable random blinding technique. The random blinding property of our technique provides the anonymity of our construction, and the cancellation property of our technique enables decryption.

Developing the Stage Evaluation Model for e-Business Company using Analytic Hierarchy Process (분석적 계층기법을 활용한 e-Business 기업의 초기투자단계 및 성장단계별 평가모형의 개발)

  • Choi, Hye-Jin;Han, In-Goo;Oh, Kyong-Joo
    • Asia pacific journal of information systems
    • /
    • v.15 no.1
    • /
    • pp.45-61
    • /
    • 2005
  • This study develops the evaluation model for e-Business company using analytic hierarchy process. As the first step of this study, we derived the appraisal standards based on the previous literature and the knowledge of experts from venture capitalists, security companies, credit evaluation companies, and consulting firms. In order to validate the evaluating factors in the models, this study was supported by analysts of top ranked venture capitalists in Korea. Through their assistance, this study can determine necessary evaluating factors that refined and deepened the models. Four expert groups, such as venture capitalists, credit analysts, analysts of security company and e-Business consultants, provide their knowledge for the determination of the weights of evaluating factors in the hierarchical model through the questionnaires and interviews. The results show that the weights of the evaluating factors differed by the maturity of e-Business company.

A Study on Applied Orientations of Management Science Technique in Police Audit Planning Process (경찰감사 기획과정시 관리과학기법 응용방안)

  • Kim, Jeong-Heon;Song, Keon-Sup
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.109-130
    • /
    • 2002
  • As proceeding Munmin and Kukmin's government, it is to bring in regionalism of genernal public administration and police administration, specialization, efficiency issue, demand inventing of audit technique to meet this trends. Especially, according to supporting qualitative improvement of the audit, its environment faced that orienting performance audit emphasis on not the legality but the efficiency more systematic and scientific theory or technique. In order to attain police audit's efficiency through performance audit, this study discussed that scientific management techniques should be applied police audit. Accordingly, the primary purpose of this study is to apply public audit to scientific management technique, bring to light limits in public sector(especially, police sector). To be efficiency audit(namely, performance audit), 1) OR techniques are explained linear programming, network modeling, PERT/CPM, queuing matrix model, simulation, 2) Statistical analysis methods are argued delphi technique, data envelopment analysis(DEA), analytic hierarchical process(AHP), time series analysis models etc.

  • PDF

The effect of the exposure to hazard factors on job satisfaction in employees (임금근로자의 작업장 유해위험요인 노출이 근로환경에 대한 만족도에 미치는 영향)

  • Park, Won Yeol
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.3
    • /
    • pp.257-266
    • /
    • 2014
  • This study was planned to investigate the effect of the exposure to hazard factors on work environment satisfaction. Existing researches about job satisfaction have focused on the general working conditions, such as working hours, wage, human relationship, job task and so on. Korean Working Conditions Survey was used for this study because that relevant questions were included. The effect of the exposure to hazard factors on work environment satisfaction may be produced by hierarchical regression analysis because of comparison with existing model for work environment satisfaction. The exposure to hazards factors were statistically significant effect on work environment satisfaction after adjusting other confounding variables, such as gender, age, educational level, job security, work hour, work load, work autonomy, social support, etc. This study has some limitation because that KWCS was cross sectional survey. Some researches about the causal effect and its mechanism may be suggested as future study.

Access Control of XML Object Using Role Hierarchy and Cryptographic Key Assignment Scheme (역할 계층과 암호학적인 키 할당 기법을 이용한 XML 객체의 접근제어)

  • Bae Kyoung-Man;Kim Jong-Hoon;Ban Yong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.93-103
    • /
    • 2005
  • As the usage of XML documents increases the requirement of security for XML documents is growing. Especially it is very important to solve the problem of access control to XML object which shares in the environment where various users connect to each others. In this paper, we propose the access control model and mechanism which is combined with role hierarchy in the RBAC and hierarchical key derivation/assign method for the access to XML object. So we implement the access control mechanism by including hierarchical key derivation method. The technique, we proposed, gives not only the benefit in management which RBAC provides in access control to XML objects, but also it ran help derive a lower layer key from the higher layer user's. This feature decrease the number of keys managed in each role hierarchy in comparison with previous methods.

Integrating physics-based fragility for hierarchical spectral clustering for resilience assessment of power distribution systems under extreme winds

  • Jintao Zhang;Wei Zhang;William Hughes;Amvrossios C. Bagtzoglou
    • Wind and Structures
    • /
    • v.39 no.1
    • /
    • pp.1-14
    • /
    • 2024
  • Widespread damages from extreme winds have attracted lots of attentions of the resilience assessment of power distribution systems. With many related environmental parameters as well as numerous power infrastructure components, such as poles and wires, the increased challenge of power asset management before, during and after extreme events have to be addressed to prevent possible cascading failures in the power distribution system. Many extreme winds from weather events, such as hurricanes, generate widespread damages in multiple areas such as the economy, social security, and infrastructure management. The livelihoods of residents in the impaired areas are devastated largely due to the paucity of vital utilities, such as electricity. To address the challenge of power grid asset management, power system clustering is needed to partition a complex power system into several stable clusters to prevent the cascading failure from happening. Traditionally, system clustering uses the Binary Decision Diagram (BDD) to derive the clustering result, which is time-consuming and inefficient. Meanwhile, the previous studies considering the weather hazards did not include any detailed weather-related meteorologic parameters which is not appropriate as the heterogeneity of the parameters could largely affect the system performance. Therefore, a fragility-based network hierarchical spectral clustering method is proposed. In the present paper, the fragility curve and surfaces for a power distribution subsystem are obtained first. The fragility of the subsystem under typical failure mechanisms is calculated as a function of wind speed and pole characteristic dimension (diameter or span length). Secondly, the proposed fragility-based hierarchical spectral clustering method (F-HSC) integrates the physics-based fragility analysis into Hierarchical Spectral Clustering (HSC) technique from graph theory to achieve the clustering result for the power distribution system under extreme weather events. From the results of vulnerability analysis, it could be seen that the system performance after clustering is better than before clustering. With the F-HSC method, the impact of the extreme weather events could be considered with topology to cluster different power distribution systems to prevent the system from experiencing power blackouts.