• Title/Summary/Keyword: Operating system

Search Result 11,865, Processing Time 0.039 seconds

An Access Control Security Architecture for Secure Operating System supporting Flexible Access Control (유연한 접근통제를 제공하는 보안 운영체제를 위한 접근통제 보안구조)

  • Kim Jung-Sun;Kim Min-Soo;No Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.55-70
    • /
    • 2006
  • In this paper, we propose a new access control security architecture for supporting flexibility in Secure Operating Systems. By adding virtual access control system layer to the proposed security architecture, various access control models such as MAC, DAC, and RBAC can be applied to Secure Operating Systems easily. The proposed security architecture is designed to overcome the problem of Linux system's base access control system. A policy manager can compose various security models flexibly and apply them to Operating Systems dynamically. Also, the proposed architecture is composed of 3 modules such as access control enforcement, access control decision, and security control. And access control models are abstracted to hierarchy structure by virtual access control system. And, we present the notation of policy conflict and its resolution method by applying various access control model.

A Study on Wearing and Manufacturing of Surgical Gowns (수술가운의 생산 및 착용현황에 관한 연구)

  • 박상희
    • Journal of the Korean Society of Costume
    • /
    • v.54 no.3
    • /
    • pp.65-71
    • /
    • 2004
  • Surgical operating gowns are worn by doctors and nurses in operating theater to address dual function of preventing transfer microorganisms like bacteria and body fluids from the operating staffs to patients. and also from patients to staff. They must allow necessary mobility without rubbing and must resist tearing. These gown must be designed to fit a diversity of body shapes and sizes with a limited range of sizes as hospitals will stock limited quantities. Also they must proper in various operating situations. In order to suggest improving design features of surgical gowns, it has been done to analyze current situation of medical uniform manufacturing and wearing. Surgical gown were made with plain fabric of cotton 100% and had a little size system without sexual division. Many doctors were unsatisfied with surgical gown size and wearing comfort. Surgical operating gowns need continuos research for new material and design as surgical situation, and new sizing system.

A Study on Recognition of Operating Condition for Hydraulic Driving Members (유압구동 부재의 작동조건 식별에 관한 연구)

  • 조연상;류미라;김동호;박흥식
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.4
    • /
    • pp.136-142
    • /
    • 2003
  • The morphological analysis of wear debris can provide early a failure diagnosis in lubricated moving system. It can be effective to analyze operating conditions of oil-lubricated tribological system with shape characteristics of wear debris in a lubricant. But, in order to predict and recognize an operating condition of lubricated machine, it is needed to analyze and to identify shape characteristics of wear debris. Therefore, If the morphological characteristics of wear debris are recognized by computer image analysis using the neural network algorithm, it is possible to recognize operating condition of hydraulic driving members. In this study, wear debris in the lubricating oil are extracted by membrane filter (0.45 ${\mu}{\textrm}{m}$), and the quantitative values of shape parameters of wear debris are calculated by the digital image processing. This shape parameters are studied and identified by the artificial neural network algorithm. The result of study could be applied to prediction and to recognition of the operating condition of hydraulic driving members in lubricated machine systems.

Investigation of influence of linear diffuser in the ventilation of operating rooms

  • Keshtkar, Mohammad Mehdi;Nafteh, Maryam
    • Advances in Energy Research
    • /
    • v.4 no.3
    • /
    • pp.239-253
    • /
    • 2016
  • Air quality in hospitals has always concerned hospitals' health officials due to its dangerous particles and gases. Because of the importance of air conditioning in the operating room, a system must be embedded in operating rooms to direct the contaminated air outside, and inject fresh filtered air from outside back into the room. In this study, laminar flow air conditioning system is implemented in the operating room by slot linear diffusers and with the help of air curtain. For this, stimulation Computational Fluid Dynamic (CFD) was used due to its efficiency. The aim of the present study was to find a proper solution to overcome the unfavorable factors, namely, contamination, humidity, and also temperature, velocity and pressure inside the room. These factors were implemented with different values and then stimulated through FLUENT software program. Results showed that the aforementioned factors can be overcome using air curtain and slot linear diffusers.

A Study on Data Management and Communication Infrastructure Based Upon Standards for Smart Grid Operation (스마트그리드 운영을 위한 표준 기반 데이터 관리 및 통신 인프라에 관한 연구)

  • Choi, Seung-Hwan;Shin, Jin-Ho;Kim, Jun-Sung
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.9
    • /
    • pp.1209-1216
    • /
    • 2013
  • Recently, there is a rising interest in smart grid operating system which manages various types of distributed generation, smart meters, and electric vehicles with power grid. Considering the features of smart grid environment, the interoperability should be one of the important factors to build smart grid environment successfully. To secure interoperability, smart grid operating system should conform to some standards in terms of the data representation and communication. CIM and OPC-UA are the international standards widely used in smart grid domain for enabling interoperability. They provide common information model and the unified architecture for communicating between each systems or applications. In this paper, we illustrate a smart grid operating system that we have developed to secure interoperability between not only applications but also numerous legacy systems(applications) by implementing CIM based information model and OPC-UA based communication interface services.

A Job Loading Procedure as a Kernel Part of FMS Integrated Operating System and Its Evaluation

  • Katayama, Hiroshi
    • Management Science and Financial Engineering
    • /
    • v.2 no.1
    • /
    • pp.1-18
    • /
    • 1996
  • FMS operating system consists of several subsystems in general. i.e. tool grouping subsystem. tool/job assignment subsystem. job dispatching subsystem, and papers dealing with each subsystem were published by many researchers [1], [4], [6], [8], [9], [10], [11], [12], [13], [14], [15], [16]. This paper mainly discusses about tool/job assignment subsystem as a job loading procedure. that occupies the kernel position of overall FMS operating system. Its performance is evaluated through simulation experiments of an integrated operating system under a typical FMS hardware configuration implemented in many machining factories, which is composed of the proposed procedure as well as a job dispatching procedure including several heuristic dispatching rules in terms of rule-base.

  • PDF

A Study for Protecting the Virtual Memory of Applications (어플리케이션의 가상 메모리 보호를 위한 연구)

  • Kim, Dong-Ryul;Moon, Jong-sub
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.6
    • /
    • pp.335-341
    • /
    • 2016
  • As information technology advances rapidly, various smart devices are becoming an essential element in our lives. Smart devices are providing services to users through applications up on the operating system. Operating systems have a variety of rules, such as scheduling applications and controlling hardwares. Among those rules, it is significant to protect private information in the information-oriented society. Therefore, isolation task, that makes certain memory space separated for each application, should highly be guaranteed. However, modern operating system offers the function to access the memory space from other applications for the sake of debugging. If this ability is misused, private information can be leaked or modified. Even though the access authority to memory is strictly managed, there exist cases found exploited. In this paper, we analyze the problems of the function provided in the Android environment that is the most popular and opened operating system. Also, we discuss how to avoid such kind of problems and verify with experiments.

A Secure Operating System Architecture Based on Linux against Communication Offense with Root Exploit for Unmanned Aerial Vehicles

  • Koo, KwangMin;Lee, Woo-yeob;Cho, Sung-Ryung;Joe, Inwhee
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.42-48
    • /
    • 2020
  • This paper proposes an operating system architecture for unmanned aerial vehicle (UAV), which is secure against root exploit, resilient to connection loss resulting in the control loss, and able to utilize common applications used in Linux. The Linux-based UAVs are exposed to root exploit. On the other hand, the microkernel-based UAVs are not able to use the common applications utilized in Linux, even though which is secure against root exploit. For this reason, the proposed architecture uses a virtualized microkernel on the Linux operating system to isolate communication roles and prevent root exploit. As a result, the suggested Operating system is secure against root exploit and is able to utilize the common applications at the same time.

The Blocking of buffer overflow based attack for Linux kernel (리눅스 시스템의 버퍼 오버플로우 공격 대응 기법)

  • Kim, Jeong-Nyeo;Jeong, Gyo-Il;Lee, Cheol-Hun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.385-390
    • /
    • 2001
  • In this paper, we describe a blocking method of buffer overflow attack for secure operating system. Our team developed secure operating system using MAC and ACL access control added on Linux kernel. We describe secure operating system (SecuROS) and standardized Secure utility and library. A working prototype able to detect and block buffer overflow attack is available.

  • PDF

Optimized design for operating system model of automated container terminal in Korea (우리나라에 적합한 자동화 터미널의 운영시스템 모델 설계)

  • 홍동희
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.1
    • /
    • pp.62-67
    • /
    • 2002
  • Construction of automated terminal is urgently demanded to gain the foundation of hub-port in north east Asia. Therefore I suggest an adequate operating system model of automated terminal in Korea. In this paper the aim of automated terminal operating system is satisfied, four basic models are divided according to moving course of export and import cargo of each automated equipments, several input data are changed and analyzed dynamically by Trial and Error method, and then an optimized operating system model is designed. It is a Premise that all the yard equipments described in this paper must be automatic except quay crane.

  • PDF