• Title/Summary/Keyword: Integrity Information

Search Result 1,465, Processing Time 0.024 seconds

Master Integrity Principle for Effective Management of Role Hierarchy (효과적인 역할계층 관리를 위한 기본 무결성 규칙)

  • Oh Se-Jong
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.981-988
    • /
    • 2005
  • Administrative Role-Based Access Control(ARBAC) is a typical model for decentralized authority management by plural security administrators. They have their work range on the role hierarchy. A problem is that legal modification of role hierarch may induce unexpected side effect. Role-Role Assignment 97(RRA97) model introduced some complex integrity principles to prevent the unexpected side effect based on geometric approach. We introduce simple and new one integrity principle based on simple set theory. It is simple and intuitive. It can substitute for all integrity principles of RRA97 model.

Provable Security of 3GPP Integrity Algorithm f9 (3GPP 무결성 알고리즘 f9의 증명가능 안전성)

  • Hong, Do-won;Shin, Sang-Uk;Ryu, Heui-su;Chung, Kyo-Il
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.573-580
    • /
    • 2002
  • Within the security architecture of the 3GPP system there is a standardised integrity algorithm f9. The integrity algorithm f9 computes a MAC to authenticate the data integrity and data origin of signalling data over a radio access link of W-CDMA IMT-2000. f9 is a variant of the standard CBC MAC based on the block cipher KASUMI. In this paper we provide the provable security of f9 We prove that f9 is secure by giving concrete bound on an adversary's inability to forge in terms of her inability to distinguish the underlying block cipher from a pseudorandom permutation.

Backward Propagation of User-Defined Integrity Constraints On Active Object-Oriented Database (능동적 객체지향 데이타베이스에서 사용자 정의 제약조건의 역방향 전달에 관한 연구)

  • 도남철;최인준
    • The Journal of Information Technology and Database
    • /
    • v.1 no.1
    • /
    • pp.63-81
    • /
    • 1994
  • The trigger mechanism in active object-oriented database systems is known to be a good tool for describing user-defined integrity constraints. It cannot adequately support, however, certain integrity constrains specified on the objects in class composition hierarchy. Those are the cases where the constraints must be maintained in the forward direction along the composition hierarchy as well as in the backward direction We call theses kinds of problems "backward propagation problem" and investigate several ways to resolve them using the currently available techniques. Based on them, a new constructor, called CONSTRAIN $T^{cch}$, is proposed. The constructor can be realized with enhanced facilities for active OODBMS which we recommend in this paper.d facilities for active OODBMS which we recommend in this paper.r.

  • PDF

Study on the Effect of Metal-Wall Loading on the DC Power-Bus

  • Kahng Sungtek
    • Journal of electromagnetic engineering and science
    • /
    • v.5 no.4
    • /
    • pp.193-196
    • /
    • 2005
  • The DC power-bus for the PCB is loaded with metal walls on its selected sides and is characterized electromagnetically. This is a novel concept of approach to mitigate the spurious resonance and finally signal integrity problems. In particular, the peak at DC, which is always in the way to secure parallel-plates' EMC, can be completely removed by the proposed method. Through the findings of this study, the effect of metal-loading of the power-bus will be presented along with the impression that the suggested technique can tackle the headaches of signal integrity, ground bounce, EMIs.

Efficient Integrity Checking using Hashed B-Tree Index (Hashed B-트리 인덱스를 이용한 효율적인 무결성 검사)

  • Park, Sun-Seob;Jeong, Jae-Mok;Kim, Hyoung-Joo
    • Journal of KIISE:Databases
    • /
    • v.27 no.2
    • /
    • pp.216-226
    • /
    • 2000
  • This paper suggests a new access path, hashed B-tree which is an efficient access method for integrity checking. Hashed B-tree is based on the observation that most query patterns in enforcing integrity constraints are point queries. Hashed B-tree compresses the key by hashing procedure, which reduces the height of tree and results in fast node search. This method has the advantages such as it can be implemented easily and use the B-tree concurrency control and recovery algorithm with minor modifications.

  • PDF

Improvement of Memory Module Test Signal Integrity Using High Frequency Socket (High Frequency Socket 개발을 통한 Memory Module Test Signal Integrity 향상)

  • Kim, Min-Su;Kim, Su-Ki
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.491-492
    • /
    • 2008
  • According to high-speed large scale integration trend of Memory module product, many type of noises, such a reflection, cross-talk simultaneous switching noise, occur on the Package PCB and they make the deterioration of memory module's performance and reliability. As module products have more high efficiency, Hardware of test board and socket has to be considered In test of the high-speed Memory Module. we mainly focused on improvement of Signal integrity Using the High Frequency Test socket that we invented

  • PDF

Fabrication of the Micro-structured DVD-RAM Substrates (미세 형상을 갖는 DVD-RAM 기판의 성형에 관한 연구)

  • 문수동
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2000.04a
    • /
    • pp.167-170
    • /
    • 2000
  • Recently the sub-micron structured substrates of 0.74 ${mu}ell$ track pitch and 800 $\AA$groove depth are required for DVD-RAM and the track pitch is expected to be narrower as the need for the information storage density is getting higher. For the accurate replication of the land-groove structure in the stamper to the plastic substrates it is important to control the injection -compression molding process such that the integrity of the replication for the land-groove structure is maximized. in the present study polycarbonate substrates were fabricated by injection comression molding and the land-groove structure regarded as one of mold temperature and the compression pressure on the integrity of the replication were examined experimentally. An efficient design methodology using the response surface method (RSM) the central composite design(CCD) technique and the analysis-of-variance (ANOVA) was developed to obtain the optimum processing conditions which maximize the integrity of the replication with a limited number of experiments.

  • PDF

Experimental Characterization and Signal Integrity Verification of Interconnect Lines with Inter-layer Vias

  • Kim, Hye-Won;Kim, Dong-Chul;Eo, Yung-Seon
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.11 no.1
    • /
    • pp.15-22
    • /
    • 2011
  • Interconnect lines with inter-layer vias are experimentally characterized by using high-frequency S-parameter measurements. Test patterns are designed and fabricated using a package process. Then they are measured using Vector Network Analyzer (VNA) up to 25 GHz. Modeling a via as a circuit, its model parameters are determined. It is shown that the circuit model has excellent agreement with the measured S-parameters. The signal integrity of the lines with inter-layer vias is evaluated by using the developed circuit model. Thereby, it is shown that via may have a substantially deteriorative effect on the signal integrity of high-speed integrated circuits.

A Study on Mobile Forensic Data Acquisition Method Based on Manufacturer's Backup Mobile App (모바일 포렌식 증거 수집방안 연구: 제조사 백업 앱 기반 데이터 획득 기법)

  • Choi, Jaewon;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.95-110
    • /
    • 2018
  • With the widespread use of smartphones, various personal information of users is being recorded on a smartphone in real time. For the purpose of preventing the loss of important personal information of users, manufacturer provides a smartphone backup applications. Recently, not only backup programs for PC but also backup mobile apps for smart phones have been provided. From the point of view acquiring forensic data, it is important not to compromise the acquisition possibilities and the integrity of the original data. Especially, in the case of Android smartphones, various studies are being carried out to acquire the data without damaging the integrity of the original data. However, there are limitations to apply the existing research methods. In this paper, we describe the process of acquiring data using the backup mobile app provided by the manufacturer without compromising the integrity of the latest smartphone.

Implementation of Object-oriented Active Rule System in Distributed Environment (분산환경에서 객체지향 능동 규칙 시스템 구현)

  • Go, Goeng-Uk;Yu, Sang-Bong;Kim, Gi-Chang;Cha, Sang-Gyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.2875-2888
    • /
    • 1999
  • In this paper we present compiler-based active rule system to efficiently maintain spatial integrity constraints in a heterogeneous, distributed environment. Specially, the prototype active rule system presented has been developed as a component of a whole middleware system called SDBC(Spatile DataBase Connectivity). Due to this reason, our active rule system is provided for heterogeneous ODBMSs in a distributed environment and used to define spatial integrity constraints using the active rules in E-C-A(Event-Condition-Action) type. Using this active rule system, an application programmer can free himself from a heavier burden on the integrity maintenance of application objects. In the compiler-based approach, active rules applicable to events raised by a database program are directly inserted into the program in a function type by the preprocessor, and then they are compiled with the application program source codes. One advantage of this approach is that there is no run-time overhead accompanied by monitoring all the database transitions when preprocessed program is executed. This active rule system also provides facilities to manage changed rules and dynamically interpret those rules at run-tuime.

  • PDF