• Title/Summary/Keyword: PBNM

Search Result 37, Processing Time 0.021 seconds

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

Design and Simulation of Policy Based Integrated Server System Capable to Provide Real-time Internet Security Service (실시간 인터넷 보안 서비스 제공을 위한 정책기반 통합 서버 설계 및 시뮬레이션)

  • Kim, Gi-Yeong;An, Gae-Il;Jang, Jong-Su;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.565-572
    • /
    • 2001
  • Recently, due to the open architecture of the internet and wide spread of internet users, the cyber terror threatens to the network\`s weak point are tending grow. Until now, information security solutions are passive on security host and particular security system. This passive information security solution is weak from the attacks through the networks connected worldwide internet systems, and has limitation on the defense against cyber terror attacks. Therefore, network level integrated security function must be provided. In this paper, we consider technology limitations on the information security problems and its environment. Then we present the architecture and functions of policy-based information security services for network level active information security function. This paper also includes design of target system, which provide information security services. Finally, we discuss network level system deployment direction and discuss with Network Security Simulation.

  • PDF

A QoS Adaption Model on the Policy-Based Network Management in the IMS (IMS에서 정책 기반 네트워크 관리 QoS 적용 모델)

  • Han, Seok-Jun;Lee, Jae-Oh;Kang, Seung-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.7
    • /
    • pp.3175-3181
    • /
    • 2012
  • The need of multimedia based application service is increasing as the number of smart mobile devices such as smart phone, tablet PC, and netbook is increasing rapidly and the development of application service like IPTV. There are various proposed policies to control the limited network resources. The IMS is used to control wired and wireless aggregation network to support multimedia services that are suitable to the user's need and the policy based models using the PDF of the IMS have emerged. In this paper, we propose the QoS adaption model using various protocols with the PDF of the IMS and the user scenario.

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.

Temperature Coefficient of Dielectric Constant in CaTiO3-A(B′, B″)O3 Microwave Dielectric Ceramics (A=Ca, La, Li, B′=Al, Fe, Mg, B″=Nb, Ta)

  • Kim, Jeong-Seog;Cheon, Chae-Il;Park, Chan-Sik;Byun, Jae-Dong
    • Journal of the Korean Ceramic Society
    • /
    • v.40 no.10
    • /
    • pp.925-930
    • /
    • 2003
  • The dielectric polarizability-related factors contributing to the $\tau$$_{\varepsilon}$ have been analysed in terms of dielectric permittivity $\varepsilon$, Tolerance Factor (TF), and octahedron tilt angles in (1-x)CaTi $O_3$-x[A(B', B″) $O_3$] (A=Ca, La, Li, B'=Al, Fe, Mg, B″=Nb, Ta) and (S $r_{0.2}$C $a_{0.8}$)( $Ti_{1-x}$ Z $r_{x}$) $O_3$. All the compounds have the orthorhombic Pbnm structure except the end members A(B', B″) $O_3$ and the solid solutions of x$\geq$0.8. The additional dipole field effect is suggested as a dominant factor contributing to $\tau$$_{\varepsilon}$ in CaTi $O_3$-based ceramics having relatively large $\varepsilon$, which has not been generally considered in the previous reports dealing with the $\tau$$_{\varepsilon}$. This study has been focussed on delineating the dipole field effect on the $\tau$$_{\varepsilon}$ in comparison to the octahedron tilt effect in CaTi $O_3$-based ceramics.cs..cs.

Performance Analysis of Policy-based QoS Algorithm in the IMS (IMS에서 정책기반 QoS 알고리즘의 성능 분석)

  • Han, Seok-Jun;Shon, Hyung-Doh;Kang, Seung-Chan
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.133-141
    • /
    • 2015
  • The IMS is an architectural control framework for delivering IP multimedia services such as voice, video, audio and data, the IMS supports not only the mobile communication system but also the existing wired and wireless network based on IP. The network that is integrated by the IMS needs policy-based network management protocol for managing the limited network resources to provide efficient multimedia service. The IMS use additional device called PDF for efficient resource management, but the PDF only uses diameter which is one of the network management protocol such as SNMP and COPS. Many devices use various protocol to manage the limited network resources. There is an algorithm using a variety of protocols such as Diameter, COPS and SNMP to handle the resources management efficiently. We also analyze the performance using the proposed algorithm in the implemented IMS environment.

Physical Properties of the Nonstoichiometric Perovskite $Dy_{1-x}Sr_xCoO_{3-y}$ System

  • 정수경;김민규;김규홍;여철현
    • Bulletin of the Korean Chemical Society
    • /
    • v.17 no.9
    • /
    • pp.794-798
    • /
    • 1996
  • Solid solutions of the nonstoichiometric Dy1-xSrxCoO3-y system with the compositions of x=0.00, 0.25, 0.50, 0.75, and 1.00 have been synthesized by the solid state reaction at 1000 ℃ under atmospheric air pressure. The crystallographic structures of the solid solutions are analyzed by the powder X-ray diffraction patterns at room temperature. The analyses assign the compositions of x=0.00 and 0.25 to the orthorhombic system with space group of Pbnm/D2h16, the compositions of x=0.50 and 0.75 to the tetragonal system like a typical SrCoO2.86, and the composition of x=l.00 or SrCoO2.50 to the brownmillerite type system with space group of I**a. The reduced lattice volumes increase with x value due to the larger radius of Sr2+ ion than that of Dy3+ ion. The mole ratio of Co4+ ion to total Co ion with mixed valence state between Co3+ and Co4+ ions at B sites or τ value has been determined by an iodometric titration. All the samples except for the DyCoO3 compound show the mixed valnce state and thus the composition of x=0.50 has the maximum τ value in the system. The oxygen vacancies increasing with x value are randomly distributed over the crystal lattice except for the composition of x=l.00 which have the ordering of the oxygen vacancies. The nonstoichiometric chemical formulas of the Dy1-xSrxCo3+1-τCo4+τO3-(x-τ)/2 system are formulated from the x, τ, and y values. The electrical conductivity in the temperature range of 100 to 900 K increases with τ value linearly because of positive holes of the Co4+ ions in π* band as a conducting carrier. The activation energy of the x=0.50 as Ea=0.17 eV is minimum among other compouds. Broad and high order transition due to the overlap between σ* and π* bands broadened by the thermal activation is observed near 1000 K and shows a low temperature-semiconducting behavior. Magnetic properties following the Currie-Weiss law show the low to high spin transition in the cobaltate perovskite. Especially, the composition of x=0.75 presents weak ferromagnetic behavior due to the Co3+-O2--Co4+ indirect superexchange interaction.