• Title/Summary/Keyword: Platform management

Search Result 2,239, Processing Time 0.024 seconds

Secure Boot Security Requirements for Cryptographic Modules against Supply Chain Threats (공급망 위협에 대응하기 위한 암호모듈의 안전한 부팅 보안 요구사항 제안)

  • Jong Wook Park;Sanghan Lee;Bonseok Koo;Seon Yeob Baek;Sang Yun Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.989-1000
    • /
    • 2023
  • In order to respond to supply chain threats, active research and development efforts are underway for software tamper prevention technologies such as Secure Boot and management systems like Software Bill of Materials(SBOM). Particularly, the Trusted Computing Group (TCG) is introducing standards for Trusted Platform Module(TPM) to provide a secure and trustworthy computing boot environment. This paper emphasizes the need for introducing secure booting technology for cryptographic modules to ensure that they remain safe and provide reliable functionality even in the face of supply chain threats. Furthermore, it analyzes vulnerabilities in cryptographic modules verified by the ISO/IEC 19790 standard and proposes security requirements for secure booting of cryptographic modules to address these vulnerabilities.

Reliability Prediction of High Performance Mooring Platform in Development Stage Using Safety Integrity Level and MTTFd (안전무결성 수준 및 MTTFd를 활용한 개발단계의 고성능 지상체 신뢰도 예측 방안)

  • Min-Young Lee;Sang-Boo Kim;In-Hwa Bae;So-Yeon Kang;Woo-Yeong Kwak;Sung-Gun Lee;Keuk-Ki Oh;Dae-Rim Choi
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.27 no.3
    • /
    • pp.609-618
    • /
    • 2024
  • System reliability prediction in the development stage is increasingly crucial to reliability growth management to satisfy its target reliability, since modern system usually takes a form of complex composition and various complicated functions. In most cases of development stage, however, the information available for system reliability prediction is very limited, making it difficult to predict system reliability more precisely as in the production and operating stages. In this study, a system reliability prediction process is considered when the reliability-related information such as SIL (Safety Integrity Level) and MTTFd (Mean Time to Dangerous Failure) is available in the development stage. It is suggested that when the SIL or MTTFd of a system component is known and the field operational data of similar system is given, the reliability prediction could be performed using the scaling factor for the SIL or MTTFd value of the component based on the similar system's field operational data analysis. Predicting a system reliability is then adjusted with the conversion factor reflecting the temperature condition of the environment in which the system actually operates. Finally, the case of applying the proposed system reliability prediction process to a high performance mooring platform is dealt with.

Survey on the Performance Enhancement in Serverless Computing: Current and Future Directions (성능 향상을 위한 서버리스 컴퓨팅 동향과 발전 방향)

  • Eunyoung Lee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.60-75
    • /
    • 2024
  • The demand of users, who want to focus on the core functionality of their applications without having to manage complex virtual environments in the cloud environment, has created a new computing model called serverless computing. Within the serverless paradigm, resource provisioning and server administration tasks are delegated to cloud services, facilitating application development exclusively focused on program logic. Serverless computing has upgraded the utilization of cloud computing by reducing the burden on cloud service users, and it is expected to become the basic model of cloud computing in the future. A serverless platform is responsible for managing the cloud virtual environment on behalf of users, and it is also responsible for executing serverless functions that compose applications in the cloud environment. Considering the characteristics of serverless computing in which users are billed in proportion to the resources used, the efficiency of the serverless platform is a very important factor for both users and service providers. This paper aims to identify various factors that affect the performance of serverless computing and analyze the latest research trends related to it. Drawing upon the analysis, the future directions for serverless computing that address key challenges and opportunities in serverless computing are proposed.

The Impact of Managerial Response to Negative Customer Reviews on the Success of Accommodation Services: Evidence from Online Accommodation Reservation Platforms (부정적 리뷰의 대응 전략이 숙박시설 성공에 미치는 영향: 숙박 중개 플랫폼 사례)

  • Mingi Song;Heejin Seo;Gunwoong Lee
    • Information Systems Review
    • /
    • v.24 no.3
    • /
    • pp.1-21
    • /
    • 2022
  • This research investigates how a service provider's response(s) to negative customer reviews influences the success of accommodation services in the context of online accommodation reservation platforms. Specifically, we attempt to comprehend the important role of attentive and instant responses to users' negative review comments in fostering future success by analyzing panel data on 856 motels registered in the largest accommodation reservation platform in Korea. The results present that response volume (Attentiveness) and faster responses (Timeliness) are positively associated with success. We further find that the two review-response strategies have a positive interaction effect on success. Moreover, we show that the effect of review responses is strengthened when the reputation of motels drops. The key findings of this research offer a set of practical guidelines for accommodation owners to achieve business success by effectively managing customer reviews and claims

Research on digital evidence-based countermeasure depending on the type of small and medium-sized enterprises technology leakage accident (중소기업 기술유출사고 유형에 따른 디지털증거기반 대응방안 연구)

  • Jaeyun Wang;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.67-76
    • /
    • 2024
  • Small and medium-sized enterprises play a fundamental role in the foundation of our country's industry and economy, and most technological innovations occur in small and medium-sized enterprises rather than large corporations. Technology development and innovation are the only way for small and medium-sized enterprises to survive in a fiercely competitive environment, so they focus on it, but interest and investment in technology protection tend to be stingy. As a result, industrial technology leakage accidents occur frequently, and it is difficult to meet improvement measures. When a leak occurs, digital evidence is required to prove criminal activity, but problems such as digital evidence being damaged or deleted due to management loopholes often occur. Therefore, through this study, we aim to design a digital evidence-based countermeasure depending on the type of technology leak accident. We will classify the types of technology leak incidents that actually occurred and study ways to secure digital evidence in the security environment of small and medium-sized businesses that operate internal information leak prevention solutions.

  • PDF

A Study on the Identification of Cloud Security Risks in the Manufacturing Industry (제조산업 클라우드 보안위험 식별 연구)

  • Junghun Oh;Juno Lee;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.2
    • /
    • pp.3-11
    • /
    • 2024
  • In the trend of digital transformation and the increase in non-face-to-face services triggered by the Fourth Industrial Revolution, the demand for cloud computing services is being sharply stimulated. Currently, the cloud is being introduced in various industrial sectors including public, IT, and finance, and the manufacturing industry is also adopting the cloud to secure future sustainability and is promoting innovation through smart manufacturing. However, it has been found that there are constraints in the adoption of cloud by manufacturing companies due to concerns about security. Existing studies that have identified cloud security risks have been limited to presenting general cloud security risks or technical security risks rather than focusing on the manufacturing industry. Therefore, this study aimed to identify cloud security risks in the manufacturing industry based on the actual concerns in the field. For this, expert interviews and literature research were conducted to newly identify cloud security risks in the manufacturing industry, and the adequacy and urgency of the selected security risks were verified through surveys. Based on this study, if a cloud security management system for the manufacturing industry is designed in the future, it is expected that the adoption of cloud in the manufacturing industry will be more activated.

  • PDF

A Study of the Behavioral Intention on Conversational ChatGPT for Tourism Information Search Service: Focusing on the Role of Cognitive and Affective Trust (ChatGPT, 대화형 인공지능 관광 검색 서비스의 행동의도에 대한 연구: 인지적 신뢰와 정서적 신뢰의 역할을 중심으로)

  • Minsung Kim;Chulmo Koo
    • Information Systems Review
    • /
    • v.26 no.1
    • /
    • pp.119-149
    • /
    • 2024
  • This study investigates the antecedents and mechanisms influencing trust and behavioral intentions formation towards new AI chatbots, such as ChatGPT, as travel information searching services. Analyzing the roles of variables such as familiarity, novelty, personal innovativeness, information quality and perceived anthropomorphism, the research elucidates the impact of these factors on users' cognitive and affective trust, ultimately affecting their intention to adopt information and sustain the use of the AI chatbot. Results indicate that perceived familiarity and information quality positively influence both cognitive and affective trust, whereas perceived novelty contributes positively only to cognitive trust. Additionally, the personal innovativeness of new AI chatbot users was found to weaken the effect of familiarity on perceived trust, while the perceived level of anthropomorphism of the chatbot amplified the effects of novelty and familiarity on cognitive trust. These findings underscore the importance of considering factors such as familiarity, personal innovativeness, information quality and anthropomorphism in the design and implementation of AI chatbots, affecting trust and behavioral intention.

An Air-Interface for Ad Hoc Networks Supporting High Mobility

  • Lott, Matthias;Ebner, Andre;Meincke, Michael;Halfmann, Rudiger;Wischhof, Lars;Schulz, Egon;Rohling,
    • Journal of Communications and Networks
    • /
    • v.6 no.4
    • /
    • pp.295-306
    • /
    • 2004
  • In this paper, a novel air-interface is presented for Fleet-Net1, a self-organizing network for inter-vehicle and vehicle-toroadsidecommunication. The air-interface is based upon the lowchip-rate version of UMTS/TDD. To adapt the cellular UMTS standard to an air-interface for ad hoc networks, changes of the physical layer, medium access control sub-layer and radio resource management are required. An overview of the required modifications is given here. Particularly, a decentralized synchronization mechanism is presented and analyzed by means of simulations. Furthermore, changes for the medium access control are explained in detail, which allow for an efficient operation in partly meshed networks and prioritization. Performance results of the overall system considering throughput and delay are derived by means of analytical evaluations and event-driven simulations. Based on realistic mobility models, it is shown that the presented solution provides a robust communication platform even in vehicular environments. The proposed air-interface is a cost-effective solution not only for inter-vehicle communication, but also for ad hoc networking in general, benefiting from the mass-market of UMTS.

Access Control of Visiting Mobile Node on the Foreign Domain Network in Mobile IPv6

  • Park, Sugil;Masayuki Abe;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.495-498
    • /
    • 2002
  • The need for network protection, accounting and resource management in foreign administrative domain requires appropriate security services. In this paper, we propose an access control protocol to support the authentication between mobile node and visiting subnet. Our hybrid way of approach aims to reduce computational overhead and minimize the use of network bandwidth. We also propose non-certificate based public-key cryptography to provide non-repudiation, which does not require CRL retrieval and certificate validation.

  • PDF

Model-Driven Development of RTOS-based Embedded Software (RTOS-기반 임베디드 소프트웨어를 위한 모델기반 개발방법)

  • Maeng Ji-Chan;Kim Jong-Hyuk;Ryu Min-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1325-1328
    • /
    • 2006
  • 본 논문에서는 RTOS 기반 임베디드 소프트웨어 개발에 적합한 모델기반 방법론을 제안하고 이와 함께 개발된 자동코드생성 도구를 기술한다. 현재까지 알려진 대표적인 모델기반 방법론으로는 OMG (Object Management Group)의 MDA (Model-Driven Architecture)가 있으며, MDA 에서는 EJB, 웹서비스,.NET, 그리고 CORBA 와 같은 미들웨어 플랫폼을 대상으로 하는 응용 소프트웨어의 개발을 지원한다. 하지만, 통상적인 임베디드 시스템은 실시간성에 대한 요구조건은 물론 성능과 자원활용에 있어 많은 제약을 가짐에 따라 상당수의 임베디드 시스템은 미들웨어를 사용하지 않고 RTOS 상에서 직접 수행되도록 개발되고 있다. 이에 따라 본 연구에서는 MDA 방법론을 확장하여 플랫폼 의존적인 모델 (PSM, Platform Specific Model) 단계에서 추상화된 RTOS 행위를 표현할 수 있도록 추상 RTOS API (Generic RTOS API)를 정의하고, 아울러 추상화된 RTOS 행위를 자동으로 변환하여 C 코드를 생성해주는 도구인 TransPI 를 함께 제시한다.

  • PDF