• Title/Summary/Keyword: Policy Processing

Search Result 980, Processing Time 0.033 seconds

The Verification in Security Protocol for Security Continuity Management (정보보호의 연속성관리를 위한 보안프로토콜 검증)

  • Shin, Seung-Jung;Song, Young-Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.445-448
    • /
    • 2001
  • The objective of this paper was to cope with the verification of the message transfer protocol that integrates the electronic signature and the distribution and authentication of public key in TCP/IP using security continuity management Choquet fuzzy integral compared with fuzzy integral. They were classified into the security technology, the security policy, the electronic document processing, the electronic document transportation and the encryption and decryption keys in its function. The measures of items of the message security protocol were produced for the verification of the implemented document in every function.

  • PDF

A Policy Based Management Model of Quality of Service for Differentiated Services Networks (차별화 서비스망을 위한 정책 기반 서비스 품질 관리 모델)

  • Cha, Si-Ho;Kang, Young-Man;Cho, Kuk-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.171-178
    • /
    • 2003
  • Differentiated Services (DiffServ) is a technique to provide Quality of Service (QoS) in an efficient and scalable way. However, current DiffServ specifications have limitations in providing the complete QoS management framework and its implementation model. This paper proposes a policy-based QoS management model that supports DiffServ policies for managing QoS of DiffServ networks. The management model conforms to Model-View-Controller (MVC) architecture, and is based on Enterprise JavaBeans (EJBs) technologies. In our model, high-level DiffServ QoS policies are represented as valid XML documents with an XML Schema and are translated to low-level EJB policy beans in the EJB-based policy server. The routing topology and role information required to define QoS policies is discovered by using SNMP MIB-II, and the QoS policy distribution and monitoring is accomplished by using SNMP DiffServ MIB.

Development of an OLAP Database System for SME Growth Support -Centering around the Small Business Policy Funds Support Project- (중소기업성장지원 OLAP 데이터베이스 시스템 구축 - 중소기업 정책금융지원 사업을 중심으로-)

  • Hwang, Man-Mo;Choi, In-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.157-167
    • /
    • 2012
  • The purpose of this paper is to develop an OLAP (online analytical processing) database system that supports the SMBA (Small and medium Business Administration) policy funding. A heterogeneous dimension schema will be central in staged support of policy funds. In this paper, therefore, we designed the FREQUENCY dimension table which has a heterogeneous dimension schema structure. In this paper, we made a model of measuring SME (small and medium-sized enterprise) size first. The model is composed of six determinants of firm growth such as sales, employment, own technology, the operating profit to sales ratio, the debt ratio, and the current ratio. We developed the OLAP database system by using three dimensions including the FREQUENCY dimension, and using the model of measuring SME size. Also we assessed past decisions on policy funding in the Small Business Policy Funds Support Project (2004-2007) by using the OLAP database system.

The Policy Distribution Algorithm of Firewall in Integrated Security Management (통합보안관리시스템의 방화벽정책 분배를 위한 알고리즘 : FALCON)

  • Kim, Gwang-Hyeok;Gwon, Yun-Ju;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.467-472
    • /
    • 2002
  • Recently, Networks are required to adopt the security system and security consulting because of security threats and vulnerabilities of systems. Enterprise Security Management (ESM) is a system which establishes the security zone composed of security systems and Firewalls and applies the security policy to each security system. A relevant ESM is based on the effective policy and the proper security system. Particularly, multiple firewalls in ESM are concerned with the security policy about each traffic. In this paper, we describe the problems that can be occurred when we select the firewalls to apply security policy of access control in ESM composed of multiple firewalls and propose the FALCON algorithm, which is able to select the firewalis to apply the policy. We expect that FALCON algorithm offers stability, scalability and compactness for selecting firewall set.

A Development of Central Policy Database for managing Heterogeneous Firewall Systems (이종의 침입 차단시스템 관리를 위한 중앙 정책 데이터베이스 개발)

  • Lee, Dong-Young;Chung, Tai-Myoung
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1063-1070
    • /
    • 2002
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from intrusions and attacks, many vendors have developed various security systems such as firewalls and intrusion detection systems. However, managing these systems individually demands too much work and high cost. Thus, integrated and autonomous security management for various security products has become more important. In this paper, we present the architecture of the WISMSF (Web-based Integrated Security Management System for Firewalls) and the merits of centralized approach for managing heterogeneous firewalls and implement the prototype of the central policy database that is a component of the WISMSF engine. The WISMSF engine supports an integrated view for policies, the integrity of polities and the easy recovery and addition of policies. And also, we define the policy conflicts of WISMSF and present the policy recovery process to support to the policies consistence.

A Visualization System for Permission Check in Java using Static Analysis (정적분석을 이용한 자바 언어의 권한검사 시각화 시스템)

  • Kim, Yun-Kyung;Chang, Byeong-Mo
    • The KIPS Transactions:PartA
    • /
    • v.13A no.5 s.102
    • /
    • pp.399-404
    • /
    • 2006
  • In Jana 2, to enforce a suity policy of a program, programmer writes permission sets required by the code at the policy file, sets Security Manager on system and executes the program. Then Security Manager checks by stack inspection whether an access request to resource should be granted or denied whenever code tries to access critical resource. In this paper, we develop a visualization tool which helps programmers enforce security policy effectively into programs. This system is based on the static permission check analysis which analyzes permission checks which must succeed or fail at each method. Based on this analysis information, programmer can examine visually how permission checks and their stack inspection are performed. By modifying program or policy file if necessary and examining analysis information repeatedly, programmer can enforce security policy correctly.

Integrated Multiple Simulation for Optimizing Performance of Stock Trading Systems based on Neural Networks (통합 다중 시뮬레이션에 의한 신경망 기반 주식 거래 시스템의 성능 최적화)

  • Lee, Jae-Won;O, Jang-Min
    • The KIPS Transactions:PartB
    • /
    • v.14B no.2
    • /
    • pp.127-134
    • /
    • 2007
  • There are many researches about the intelligent stock trading systems with the help of the advance of the artificial intelligence such as machine learning techniques, Though the establishment of the reasonable trading policy plays an important role in the performance of the trading systems most researches focused on the improvement of the predictability. Also some previous works, which treated the trading policy, treated the simplified versions dependent on the predictors in less systematic ways. In this paper, we propose the integrated multiple simulation' as a method of optimizing trading performance of stock trading systems. The propose method is adopted in the NXShell a development environment for neural network based stock trading systems. Under the proposed integrated multiple simulation', we simulate the multiple tradings for all combinations of the neural network's outputs and the trading policy parameters, evaluate the learning performance according to the various metrics and establish the optimal policy for a given prediction module based on the resulting performance. In the experiment, we present the trading policy comparison results using the stock value data from the KOSPI and KOSDAQ.

Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system (유닉스 시스템에서 다양한 접근제어 정책을 이용한 커널 수준의 자동 암호화 기법)

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.387-396
    • /
    • 2003
  • Many studies have been done on secure kernel and encryption filesystem for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policy like ACL, MAC, RBAC and so on, but cannot protect user or system data from stealing backup media or disk itself. In addition to access control policy, there are many studies on encryption filesystem that encrypt file data within system level. However few studies have been done on combining access control policy and encryption filesystem. In this paper we proposed a new encryption filesystem that provides a transparency to the user by integrating encryption service into virtual filesystem layer within secure kernel that has various access control policies. Proposed encryption filesystem can provide a simple encryption key management architecture by using encryption keys based on classes of MAC policy and overcome a limit of physical data security of access control policy for stealing.

A study on the Influence of lighting on DLP videos of HDTV news programs (HDTV 뉴스 조명이 DLP 영상해상도에 미치는 영향에 관한 연구)

  • Kim, Yong-Kyu;Lee, Ki-Tae;Choi, Seong-Jhin
    • Journal of Broadcast Engineering
    • /
    • v.13 no.6
    • /
    • pp.838-848
    • /
    • 2008
  • Recently, new multimedia techniques using lighting and projection are often used for the production of broadcasting programs. Also news programs use DLP(Digital Lighting Processing) videos with good resolution escaping from the existing set changes. This paper examined the correlations between lighting sources and the resolution of DLP videos, and had a simulation, and then it proposed DLP used ideal lighting for news programs. This paper comparatively examined the resolution of DLP videos influenced by the conditions of lighting, using the videos picked up on the HD camera and the measuring monitor.

A New Worker Policy for Self-Balancing Production Line with Stations

  • Hirotani, Daisuke;Morikawa, Katsumi;Takahashi, Katsuhiko
    • Industrial Engineering and Management Systems
    • /
    • v.10 no.3
    • /
    • pp.197-202
    • /
    • 2011
  • In traditional production lines, such as assembly lines, each worker is usually assigned to a particular fixed work, and decreasing the task to master the assigned work is valuated. However, when an imbalance exists between workers' speeds, if a worker delays the overall work in the production line, the production rate of the particular line will also decrease. To avoid this problem, the "Self-Balancing Production Line" was introduced. In this type of production line, each worker is assigned work dynamically, and when specific conditions are satisfied, production remains balanced. Characteristics of these lines that can be preempted at any place have already been analyzed by some researchers. A previous paper examined the situation in which only a single worker can process one machine and cannot preempt processing, and the improved policy of an ordinary selfbalancing production line, which specifies which stations workers can process and how workers can behave. This policy achieveda high production rate with only four stations and two workers (Buzacott, 2002). In that paper, worker processing stations and the behavior of a specific worker were limited, andthe paper focused only on specific stations and workers. Therefore, it is not applicable to any worker sequence. In this paper, we focus on other ways to decrease cycle time. In this kind of line, a worker processes at his or her speed. Therefore, if a worker is assigned stations according to his or her speed, the line can decrease cycle time. To do so, we relax the assumptions of this type of line and set a new condition. Under these conditions, we compare our results to the results of previous papers.