• Title/Summary/Keyword: Multi-level security

Search Result 218, Processing Time 0.023 seconds

E-BLP Security Model for Secure Linux System and Its Implementation (안전한 리눅스 시스템을 위한 E-BLP 보안 모델과 구현)

  • Kang, Jung-Min;Shin, Wook;Park, Chun-Gu;Lee, Dong-Ik
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.391-398
    • /
    • 2001
  • To design and develop secure operating systems, the BLP (Bell-La Padula) model that represents the MLP (Multi-Level Policy) has been widely adopted. However, user\`s security level in the most developed systems based on the BLP model is inherited to a process that is actual subject on behalf of the user, regardless whatever the process behavior is. So, there could be information disclosure threat or modification threat by malicious or unreliable processes even though the user is authorized in the system. These problems can be solved by defining the subject as (user, process) ordered pair and by defining the process reliability. Moreover, when the leveled programs which exist as objects in a disk are executed by a process and have different level from the process level, the security level decision problem occurs. This paper presents an extended BLP (E-BLP) model in which process reliability is considered and solves the security level decision problem. And this model is implemented into the Linux kernel 2.4.7.

  • PDF

Polyinstantiation for spatial data for multilevel secure spatial database (다단계 보안 공간 데이터베이스를 위한 공간 다중인스턴스화)

  • 오영환;이재동;임기욱;배해영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.43-54
    • /
    • 2001
  • In this paper we study the use of polyinstantiation for spatial data, for the purpose of solving cover in topology channel in multilevel secure spatial database systems. Spatial database system with topological structure has a number of spatial analysis function using spatial data and neighbored one\`s each other. But. it has problems that information flow is occurred by topological relationship in spatial database systems. Geographic Information System(CIS) must be needed mandatory access control because there ,are many information flow through positioning information And topological relationship between spatial objects. Moreover, most GIS applications also graphe user interface(GUI). In addressing these problems, we design the MLS/SRDM(Multi Level Security/Spatial Relational Data Model) and propose polyinstantiation for spatial data for solving information flow that occurred by toplogical relationship of spatial data.

Compact implementations of Curve Ed448 on low-end IoT platforms

  • Seo, Hwajeong
    • ETRI Journal
    • /
    • v.41 no.6
    • /
    • pp.863-872
    • /
    • 2019
  • Elliptic curve cryptography is a relatively lightweight public-key cryptography method for key generation and digital signature verification. Some lightweight curves (eg, Curve25519 and Curve Ed448) have been adopted by upcoming Transport Layer Security 1.3 (TLS 1.3) to replace the standardized NIST curves. However, the efficient implementation of Curve Ed448 on Internet of Things (IoT) devices remains underexplored. This study is focused on the optimization of the Curve Ed448 implementation on low-end IoT processors (ie, 8-bit AVR and 16-bit MSP processors). In particular, the three-level and two-level subtractive Karatsuba algorithms are adopted for multi-precision multiplication on AVR and MSP processors, respectively, and two-level Karatsuba routines are employed for multi-precision squaring. For modular reduction and finite field inversion, fast reduction and Fermat-based inversion operations are used to mitigate side-channel vulnerabilities. The scalar multiplication operation using the Montgomery ladder algorithm requires only 103 and 73 M clock cycles on AVR and MSP processors.

A Multi-level Optimal Power Flow Algorithm for Constrained Power Economic Dispatch Control (제약조건을 고려한 경제급전 제어를 위한 다단계 최적조류계산 알고리즘)

  • Song, Gyeong-Bin
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.50 no.9
    • /
    • pp.424-430
    • /
    • 2001
  • A multi-level optimal power flow(OPF) algorithm has been evolved from a simple two stage optimal Power flow algorithm for constrained power economic dispatch control. In the proposed algorithm, we consider various constraints such as ower balance, generation capacity, transmission line capacity, transmission losses, security equality, and security inequality constraints. The proposed algorithm consists of four stages. At the first stage, we solve the aggregated problem that is the crude classical economic dispatch problem without considering transmission losses. An initial solution is obtained by the aggregation concept in which the solution satisfies the power balance equations and generation capacity constraints. Then, after load flow analysis, the transmission losses of an initial generation setting are matched by the slack bus generator that produces power with the cheapest cost. At the second stage we consider transmission losses. Formulation of the second stage becomes classical economic dispatch problem involving the transmission losses, which are distributed to all generators. Once a feasible solution is obtained from the second stage, transmission capacity and other violations are checked and corrected locally and quickly at the third stage. The fourth stage fine tunes the solution of the third stage to reach a real minimum. The proposed approach speeds up the two stage optimization method to an average gain of 2.99 for IEEE 30, 57, and 118 bus systems and EPRI Scenario systems A through D testings.

  • PDF

A Study on the VCR Cryptographic System Design Adapted in Wire/Wireless Network Environments (유무선 네트워크 환경에 적합한 VCR 암호시스템 설계에 관한 연구)

  • Lee, Seon-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.65-72
    • /
    • 2009
  • This paper proposed VCR cryptographic algorithm that adapted in TCP/IP protocol architecture and wire/wireless communication network environments. we implemented by hardware chip level because proposed VCR cryptographic algorithm perform scalable & reconfigurable operations into the security system. Proposed VCR cryptographic algorithm strengthens security vulnerability of TCP/IP protocol and is very profitable real-time processing and encipherment of high-capacity data and multi-user communication because there is important purpose to keep security about many user as that have variable round numbers function in network environments.

Effects of Job Security and Psychological Ownership on Turnover Intention and Innovative Behavior of Manufacturing Employees (심리적 주인의식과 고용안정이 이직의도 및 혁신행동에 미치는 영향에 대한 연구 -경북지역 중소제조기업 종업원을 중심으로-)

  • Lee, Wook-Gee;Jeon, Young-Hwan;Kim, Joo-Wan;Jung, Chi-Young
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.1
    • /
    • pp.53-68
    • /
    • 2014
  • The purpose of this study is to verify the relationships among innovative behavior, turnover intention, and job security. An additional purpose was to examine partial mediating effects on psychological ownership. The baseline of analyzing those relationships in this study is that the role of psychological ownership will be a mediator between job security and turnover intention as well as innovative behavior in the organization. To accomplish these purposes, a model was built among job security as predictor variable, the psychological ownership as mediating variable and turnover intention, and innovative behavior as criteria variables based on the studies conducted in the various areas. The 248 questionnaires surveyed from the area of DaeGu and Kyungbuk were used in the statistical analyses. The detail statistical techniques are such as descriptive analysis, reliability analysis, factor analysis, correlation analysis, and multi regression analysis. The results of the study show that job security had positively significant effect on turnover intention and innovative behavior. In addition, only the psychological ownership of organization-level thinking have partial mediating effects between job security and innovative behavior also job security and turnover intention. The results may indicate that the psychological ownership of organization-level thinking be a key factor to alleviate the turnover intention of employees and to encourage the innovative behavior during their works for the small-medium size companies showing the unstable job security.

Multi-Level Emulation for Malware Distribution Networks Analysis (악성코드 유포 네트워크 분석을 위한 멀티레벨 에뮬레이션)

  • Choi, Sang-Yong;Kang, Ik-Seon;Kim, Dae-Hyeok;Noh, Bong-Nam;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1121-1129
    • /
    • 2013
  • Recent malware distribution causes severe and nation-wide problems such as 3 20 cyber attack in Korea. In particular, Drive-by download attack, which is one of attack types to distribute malware through the web, becomes the most prevalent and serious threat. To prevent Drive-by download attacks, it is necessary to analyze MDN(Malware Distribution Networks) of Drive-by download attacks. Effective analysis of MDN requires a detection of obfuscated and/or encapsulated JavaScript in a web page. In this paper, we propose the scheme called Multi-level emulation to analyze the process of malware distribution. The proposed scheme analyzes web links used for malware distribution to support the efficient analysis of MDN.

Multi-Chip Packaging for Mobile Telephony

  • Bauer, Charles E.
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.8 no.2
    • /
    • pp.49-52
    • /
    • 2001
  • This paper presents product level considerations for multichip packaging as a cost effective alternative to single chip packaging in the design and manufacture of mobile telephony products. Important aspects include component functionality and complexity, acquisition and logistics costs, product modularity and integration. Multichip packaging offers unique solutions and significant system level cost savings in many applications including RF modules, digital matrix functions and product options such as security, data storage, voice recognition, etc.

  • PDF

MultiChip Packaging for Mobile Telephony

  • Bauer, Charles E.
    • Proceedings of the International Microelectronics And Packaging Society Conference
    • /
    • 2001.04a
    • /
    • pp.1-7
    • /
    • 2001
  • This paper presents product level considerations for multichip packaging as a cost effective alternative to single chip packaging in the design and manufacture of mobile telephony products. Important aspects include component functionality and complexity, acquisition and logistics costs, product modularity and integration. Multichip packaging offers unique solutions and significant system level cost savings in many applications including RF modules, digital matrix functions and product options such as security, data storage, voice recognition, etc.

  • PDF

Explosive loading of multi storey RC buildings: Dynamic response and progressive collapse

  • Weerheijm, J.;Mediavilla, J.;van Doormaal, J.C.A.M.
    • Structural Engineering and Mechanics
    • /
    • v.32 no.2
    • /
    • pp.193-212
    • /
    • 2009
  • The resilience of a city confronted with a terrorist bomb attack is the background of the paper. The resilience strongly depends on vital infrastructure and the physical protection of people. The protection buildings provide in case of an external explosion is one of the important elements in safety assessment. Besides the aspect of protection, buildings facilitate and enable many functions, e.g., offices, data storage, -handling and -transfer, energy supply, banks, shopping malls etc. When a building is damaged, the loss of functions is directly related to the location, amount of damage and the damage level. At TNO Defence, Security and Safety methods are developed to quantify the resilience of city infrastructure systems (Weerheijm et al. 2007b). In this framework, the dynamic response, damage levels and residual bearing capacity of multi-storey RC buildings is studied. The current paper addresses the aspects of dynamic response and progressive collapse, as well as the proposed method to relate the structural damage to a volume-damage parameter, which can be linked to the loss of functionality. After a general introduction to the research programme and progressive collapse, the study of the dynamic response and damage due to blast loading for a single RC element is described. Shock tube experiments on plates are used as a reference to study the possibilities of engineering methods and an explicit finite element code to quantify the response and residual bearing capacity. Next the dynamic response and progressive collapse of a multi storey RC building is studied numerically, using a number of models. Conclusions are drawn on the ability to predict initial blast damage and progressive collapse. Finally the link between the structural damage of a building and its loss of functionality is described, which is essential input for the envisaged method to quantify the resilience of city infrastructure.