• Title/Summary/Keyword: Managed Security

Search Result 278, Processing Time 0.028 seconds

Blockchain applied Military Electronic Secret Document Management Scheme (focused on C4i) (블록체인을 적용한 군(軍) 전자적 비밀관리 개선방안 (전장관리정보체계 중심으로))

  • Hong Yoon;Yeong Gyun Cha;Jong Beom Park
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.181-187
    • /
    • 2023
  • Recently, military operations have been aimed at winning using various information, analysis, weapons, and operation systems. These systems should consist of integrated composition and the function of analyzing and sharing data. Accordingly, military C4I collects and analyzes a lot of data and produces and shares secrets to perform effective operations. However, C4I cannot operate in electronic form from secret production to disposal. And as it is managed based on the output, problems such as difficulty in management and loss/leakage arise. Therefore, in this paper, we propose an ESDMB(Electronic Secret Document Management whit Bloockchain) plan based on blockchain technology to manage all secrets in electronic document format and provide integrity and denial prevention. In particular, the blockchain-based proposal method will be suitable as a protection measure against manipulation and leakage, from secret production to destruction.

Token-Based User Dynamic Access Control for Secure Device Commands in Smart Home (스마트 홈에서 안전한 디바이스 제어 명령을 위한 토큰 기반 사용자 동적 접근제어 기법)

  • Hyeseon Yu;Minhye Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.553-568
    • /
    • 2024
  • Due to the rapid development of IoT technology and the increase in home activities after the COVID-19 pandemic, users' demand for smart homes has increased significantly. As the size of the smart home market increases every year and the number of users increases, the importance of personal information protection and various security issues is also growing. It often grants temporary users smart home owner rights and gives them access to the system. However, this can easily allow access to third parties because the authorities granted are not properly managed. In addition, it is necessary to prevent the possibility of secondary damage using personal information collected through smart home devices and sensors. Therefore, in this paper, to prevent indiscriminate access to smart home systems without reducing user convenience, access rights are subdivided and designed according to the functions and types of smart home devices, and a token-based user access control technique using personal devices is proposed.

Isolated Cleft in the Anterior Mitral Leaflet One Case Report (전소엽의 열구에 의한 승모판막부전치험 1례)

  • Kim, Gi-Bong;Jo, Dae-Yun;Seo, Gyeong-Pil
    • Journal of Chest Surgery
    • /
    • v.18 no.1
    • /
    • pp.92-96
    • /
    • 1985
  • A cleft in the anterior mitral valve leaflet is commonly associated with atrioventricular septal defects, but may occur as an isolated phenomenon. The cleft mitral valve can cause regurgitation, and surgical treatment of the cleft leaflet should conserve the existing valve if possible. But if satisfactory hemodynamic security cannot be obtained with a reconstructive procedure, the valve should be replaced. We present one case of an isolated cleft in the anterior mitral valve leaflet. The patient showed marked mitral regurgitation in the preoperative left ventriculogram. We managed him successfully by interrupted suture repair of the cleft, and he was discharged uneventfully.

  • PDF

Efficient Authentication and Management System for PLC-based AMR (전력선통신기반 원격검침시스템을 위한 효율적인 기기인증 및 관리체계)

  • Ju, Seong-Ho;Choi, Moon-Seok;Lim, Yong-Hoon;Choi, Jong-Hyup
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.353-354
    • /
    • 2008
  • Security weakness in PLC network can be made up for by authentication and management scheme of PLC modules introduced in this paper. Each PLC module must pass the authentication procedure to work normally in PLC network as soon as being installed in the spot. Based on this scheme, all PLC devices are registered, certified, and managed automatically in central control center - AMR server, authentication server, NMS server, and DB server.

  • PDF

Sediment in Agricultural Reservoir and Variation of Storage (농업용 저수지의 토사퇴적과 내용적 변화)

  • Park, Jae-Heung;Jeon, Doh-Cheol;Kim, Jae-Jin
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 2005.10a
    • /
    • pp.74-79
    • /
    • 2005
  • Many reservoirs have been constructed for sustainable utilization of water resources in Korea. Effective management of water resources in Korea becomes very important in resent years. Especially, the dredging in reservoirs is important for effective water resources management and one in easy water resources security methods. According to "The reservoir dredging mid-long term planning investigation report", it was investigated that 1221 reservoirs need to dredge among 3,288 reservoirs managed by KARICO. And, KARICO made a survey of reservoirs for the sediment and storage change in $2002{\sim}2004$. In results, it was investigated total storage $1,406{\pm}10^6m^3$, effective storage $1,344{\pm}10^6m^3$ in mid-small 2,748 reservoirs and the storage ratio decreased total storage ratio 15.7%, effective storage ratio 4.4%.

  • PDF

A Novel Authenticated Group Key Distribution Scheme

  • Shi, Run-hua;Zhong, Hong;Zhang, Shun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.935-949
    • /
    • 2016
  • In this paper, we present a novel authenticated group key distribution scheme for large and dynamic multicast groups without employing traditional symmetric and asymmetric cryptographic operations. The security of our scheme is mainly based on the basic theories for solving linear equations. In our scheme, a large group is divided into many subgroups, where each subgroup is managed by a subgroup key manager (SGKM) and a group key generation center (GKGC) further manages all SGKMs. The group key is generated by the GKGC and then propagated to all group members through the SGKMs, such that only authorized group members can recover the group key but unauthorized users cannot. In addition, all authorized group members can verify the authenticity of group keys by a public one-way function. The analysis results show that our scheme is secure and efficient, and especially it is very appropriate for secure multicast communications in large and dynamic client-server networks.

Meta Data Modeling for Weapon System Design/Configuration Data Management System (무기체계 설계/형상정보 관리 시스템을 위한 메타 데이터 모델링)

  • Kim Ghiback
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.7 no.2 s.17
    • /
    • pp.65-73
    • /
    • 2004
  • In general, weapon system design/configuration data consist of system structure information which is linked to Part information, documents and drawings. For configuration management, version and revision control are necessary and access control of users to information should be managed for information security. Configuration data of weapon systems have various kinds of different meta data which are contained in the structure as well as attributes of parts and documents information. If neutral types of meta data models be used for building configuration management system, they can be applied to many different kinds of weapon systems with a little customization. In this paper, five meta data models are supposed and implementation results of them by using CBD(component based design) methodology are presented.

Agricultural cooperation among the North-East Asian countries

  • Lee, Byung-Oh
    • Korean Journal of Agricultural Science
    • /
    • v.40 no.1
    • /
    • pp.61-78
    • /
    • 2013
  • The following four aspects should be examined in detail to revitalize North-East Asian agricultural cooperation specialized with Korea, Japan, and China. First, quality and safety standards of agricultural food should be unified. Secondly, it is necessary to build a food security cooperative system in North-East Asia. If three countries build the system, they can overcome a problem such as unstable supply and demand due to natural disaster, and also they can cope with food crisis. Thirdly, to establish North-East Asian Agro-valley is needed. After forming food production belt that connects Korea, Hokkaido in Japan, and the three north-eastern provinces in China, it is possible to realize high value-added agriculture with producing and processing of complementary food for partner country. Lastly, trilateral FTA negotiations should be managed carefully with operating the agricultural special zone and exclusion or prolong period of removal of tariff on sensitive items.

A Software Development Process Supporting Non-Functional Requirements (비기능적 요구사항을 지원하는 소프트웨어 개발 프로세스)

  • Jung, Hyo-Taeg;Joo, Sang-Hyun
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.1
    • /
    • pp.13-18
    • /
    • 2010
  • As the importance of non-functional requirements has increased, many researchers have become interested in the software development process for non-functional requirements including the notation, modeling, and assessment of non-functional requirements. However, the characteristics of non-functional requirements are so sophisticated and there are many topics which have not been solved until now. In order to address one of the unsolved problems, we propose a systematic software development process to support the management of non-functional requirements. The process consists of six steps, each of which is composed of detailed activities. Using the proposed process, the non-functional requirements can be managed and modeled more effectively and systematically than previous ones.

  • PDF

A rule based file management tool for facility log files integration in disaster environments

  • Lee, Young-Geol;Lee, Younlae;Kim, Hyunah;Jang, Yeonyi;Park, Minjae
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.73-82
    • /
    • 2018
  • We often experience complex presence of files within the compute environment. It could be an end-user's desktop environment or a professional part of file management. We would like to suggest one way to manage these different cases of duplicate files. It is a rule-based file management tool, and we want to use it as a tool to consolidate facility management log files. In this paper, we will describe the rule-based file management tools and show examples of how files are managed using them. We are interested in the management of the disaster environment and would like to apply this method to the management of log data related to facilities to be considered in the event of a disaster.