• Title/Summary/Keyword: Infrastructure Dependability

Search Result 6, Processing Time 0.02 seconds

The Application and Certification of Dependability Management System (IEC 60300) (시간종속성 경영시스템(IEC 60300) 적용 및 인증)

  • Kim Jong-Gurl;Kim Dong-Chul
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2004.04a
    • /
    • pp.255-260
    • /
    • 2004
  • IEC 60300 series, the international standards on dependability management system are newly developed and introduced rapidly worldwide. In order to meet this situation, it is necessary to apply them to the Korean industries effectively. This requires for us to prepare in advance for the introduction of the certification system of IEC 60300. It includes the establishment of the infrastructure such as documentation of Korean Standards, introduction of test equipments and test manuals, recognition of the certification body and training of specialists etc. This paper addresses the first step for the Introduction of IEC 60300. It includes the necessity of introduction of the system, general requirements and procedures for the certification of the industries, sampling methods design and establishment of the dependability assurance system of the materials.

  • PDF

Certification and Assessment Plan of Dependability Management System IEC 60300 (신뢰성 경영시스템 IEC 60300의 인증 및 평가 방안)

  • 김종걸;김동철
    • Journal of the Korea Safety Management & Science
    • /
    • v.6 no.2
    • /
    • pp.103-114
    • /
    • 2004
  • IEC 60300 series, the international standards on reliability management system are newly developed and introduced rapidly worldwide. In order to meet this fast-changing situation, it is necessary to apply them to the Korean industries effectively. It includes the establishment of the infrastructure such as documentation of Korean Standards, introduction of test equipments and test manuals, accreditation of the certification bodies and training of the specialists etc. IEC 60300 is upgraded management system of the ISO 9000 and ISO 14000. In this regard, the Korean companies which were certified with the ISO 9000 or 14000 should endeavor to find new strategies and methods to be certified with IEC 60300. This paper introduces a Quantitative method of estimating the level of the reliability management system by applying the MIR(Maturity Index on Reliability) technique. This enables the estimation of the operation level of the system and can upgrade the maturity level of it.

An Integrated Architecture for Location-Based Mobile Commerce Service in Ubiquitous Environment (유비쿼터스 환경의 위치 기반 모바일 전자상거래 서비스 통합 구조에 관한 연구)

  • Lee, Min-Suk;Lee, Hun-Ll;Lee, Mi-Young
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.3
    • /
    • pp.97-109
    • /
    • 2005
  • The internet and wireless communication technologies are creating ubiquitous environments in which various services are expected anytime and anywhere. Many hardware facilities have been developed and system structures are suggested for mobile services to realize a ubiquitous computing environment with appropriate quality. But these applications are not designed in the consideration of the general capabilities to perform user's wireless and mobile communication/transaction. Consequently, different needs from users are not sufficiently satisfied yet. In this study, we suggest structure of the emerging network system for mobile commerce that provides users with seamless and ubiquitous environments using location information which exploit context-aware technology.

  • PDF

Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks

  • Hafiz Abdullah, Muhammad Daniel;Hanapi, Zurina Mohd;Zukarnain, Zuriati Ahmad;Mohamed, Mohamad Afendee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1493-1515
    • /
    • 2015
  • A smart meter is one of the core components in Advanced Metering Infrastructure (AMI) that is responsible for providing effective control and monitor of electrical energy consumptions. The multifunction tasks that a smart meter carries out such as facilitating two-way communication between utility providers and consumers, managing metering data, delivering anomalies reports, analyzing fault and power quality, simply show that there are huge amount of data exchange in smart metering networks (SMNs). These data are prone to security threats due to high dependability of SMNs on Internet-based communication, which is highly insecure. Therefore, there is a need to identify all possible security threats over this network and propose suitable countermeasures for securing the communication between smart meters and utility provider office. This paper studies the architecture of the smart grid communication networks, focuses on smart metering networks and discusses how such networks can be vulnerable to security attacks. This paper also presents current mechanisms that have been used to secure the smart metering networks from specific type of attacks in SMNs. Moreover, we highlight several open issues related to the security and privacy of SMNs which we anticipate could serve as baseline for future research directions.

Analysis of Basic Emergency Obstetric and Neonatal Care (PONED) Services in Baso Public Health Center, Indonesia: Recommendations from Qualitative Interviews

  • Hasnita, Evi
    • Asian Journal for Public Opinion Research
    • /
    • v.3 no.3
    • /
    • pp.131-144
    • /
    • 2016
  • One of the main indicators of the health status of a country is the Maternal Mortality Rate (MMR). In order to improve the MMR in Indonesia, the government has made a number of primary health centers (PHC) capable of providing basic obstetric and neonatal emergency care (PONED) services. The aim of this research is to learn how well PONED services have been implemented at the Baso PHC in Agam Regency as of 2015. We used a qualitative approach, with in-depth interviews and observations from June-August 2015. Ten respondents participated in the in-depth interviews, and observations were made about the infrastructure. The validity of the data is based on the standard of credibility, transferability, dependability, and confirmability of the content of the interviews. The analysis shows that there are still some obstacles in PONED PHC implementation, including the lack of human resources at the PHC and insufficient facilities, funding, and oversight, which causes many cases that should be handled by a PONED team to be referred to the hospital. Suggestions are provided to help improve policies and ultimately patient care.

Design and Implementation of The Capability Token based Access Control System in the Internet of Things (IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현)

  • Lee, Bum-Ki;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.439-448
    • /
    • 2015
  • IoT (Internet of Things) propels current networked communities into a advanced hyper-connected society/world where uniquely identifiable embedded computing devices are associated with the existing internet infrastructure. Therefore, the IoT services go beyond mere M2M (Machine-to-Machine communications) and should be able to empower users with more flexible communication capabilities over protocols, domains, and applications. In addition, The access control in IoT need a differentiated methods from the traditional access control to increase a security and dependability. In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments. In the proposed system, Authorities are symbolized into concepts of the capability tokens, and the access control systems manage the tokens, creation, (re)delegation and revocation. The proposed system is expected to decrease the process time of access control by using capability tokens.