• Title/Summary/Keyword: Policy-based Network Management

Search Result 619, Processing Time 0.027 seconds

An Analysis on the Nurse Expansion Policies through Policy Network (정책네트워크 이론을 이용한 간호사 확보를 위한 정책과정 분석)

  • Ko, Yu-Kyung;Park, Bo-hyun
    • Health Policy and Management
    • /
    • v.25 no.2
    • /
    • pp.129-139
    • /
    • 2015
  • Background: Policy network theory was proved to be an appropriate analytic tool for the current social welfare policy making process. This study aimed to analyze policy making process related to the nurse expansion and policy output while focusing on the interactions and activities among various policy actors. Methods: In this study, we used reports related to the need for expansion of nursing personnel journals, dissertations, newspaper articles, for hearings and debate policies for securing nurse data, and interviews. We examined three components of policy network, that is, policy actors, interactions, linkage of interest. Results: For that to expand the nurse before the 2000s in expanding the supply of medical supplies have been conducted without much disagreement among policy actors under the government's initiative. However, there was lacked a close relationship between the expanding supply of nurses and inaccurate analysis of supply and demand. As the policy is applied between the various policy actors' needs and claims, conflict was intensified and many policy options had been developed. Government only took a role as a coordinator among policy actors in the 2000's. Also, it was difficult to find sufficient and clear evidence that policy-making process based on fair judgment. Conclusion: Therefore, it is urgently required to determine the policy through a social consensus to address the appropriate policy means and the process by correct analysis of the policy issues.

A Study on the Implementation of ROK Army Records Management Policy : Limitations of the Street-Level Bureaucracy Model and Proposal of the Policy Network Model (육군 기록관리정책의 집행맥락에 관한 연구 일선관료제 모형의 한계와 정책네트워크 모형의 제안)

  • Lim, Jisu;Kim, Giyeong
    • The Korean Journal of Archival Studies
    • /
    • no.49
    • /
    • pp.175-212
    • /
    • 2016
  • The purpose of this study is to propose a model that can polish and improve the ROK (Republic of Korea) Army's records management policy in a new records management environment by analyzing the context of policy implementation. In this study, two distinct and different policy cases were analyzed using different models for policy analysis such as the case of the records management system of the ROK Army with the street-level bureaucracy model and the case of the archives personnel within the ROK Army with a Policy Network model. The results from the comparative analysis with both cases state that the street-level bureaucracy model has limitations in analyzing even a policy implementation case when multiple actors are involved. At the same time, a network policy model is useful in identifying the problematic points that need improvement in the case. Based on these results, some improvements for effective records management in the ROK Army were proposed. This study follows the approach of the two distinctive case studies from the perspective of policy science-a view that no archive researcher has ever explored before.

The Design of the Security Management System for Secure Internet (안전한 인터넷을 위한 보안관리 시스템 설계)

  • 정연서;박배욱;손승원;오창석
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.74-79
    • /
    • 2002
  • In this paper, we designed the Policy-based ESM(Enterprise Security Management) for network security in Internet. First, we consider the existed network management and present ESM. And then analyze existent systems and drew consideration items at system design. This paper applied to PBNM technology in order to improve security network management.

  • PDF

Policy Core Information Model in Policy-Based Management far Network Security (네트워크 보안을 위한 정책 기반 망 관리에 대한 핵심 정책 정보 모델 적용)

  • 김숙연;김건량;김명은;방효찬;김기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.652-654
    • /
    • 2001
  • 본 논문에서는 네트워크 기반의 침입 탐지 및 대응을 위한 정책 기반 망 관리 (NS-PBNM : Network Security Policy Based Network Management)에 핵심 정책 정보 모델 (PCIM :Policy Core Information Model) 을 적용하는 시스템 구현 방안을 제시한다. 이 시스템은 여러 장치를 유연성 있게 통합적으로 관리판다는 정책 기반 망 관리의 목적뿐만 아니라, 정책을 표현, 관리, 공유 및 재사용 하는데 있어 호환성 및 확장성을 확보한다는 PCIM의 목적을 동시에 달성한다. 먼저 NS-PBNM의 구조를 제시하고 이 구조를 기반으로 PCIM을 적용하는 방안을 제시한다. PCIM은 네트워크 침입 탐지 및 대응이라는 기능을 수행하는데 있어 네트워크 보안 정책 정보 모델로 확장된 후, 정책 서버의 정책 관리 도구와 정책 저장소의 구조를 결정한다.

  • PDF

Proposed Message Transit Buffer Management Model for Nodes in Vehicular Delay-Tolerant Network

  • Gballou Yao, Theophile;Kimou Kouadio, Prosper;Tiecoura, Yves;Toure Kidjegbo, Augustin
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.153-163
    • /
    • 2023
  • This study is situated in the context of intelligent transport systems, where in-vehicle devices assist drivers to avoid accidents and therefore improve road safety. The vehicles present in a given area form an ad' hoc network of vehicles called vehicular ad' hoc network. In this type of network, the nodes are mobile vehicles and the messages exchanged are messages to warn about obstacles that may hinder the correct driving. Node mobilities make it impossible for inter-node communication to be end-to-end. Recognizing this characteristic has led to delay-tolerant vehicular networks. Embedded devices have small buffers (memory) to hold messages that a node needs to transmit when no other node is within its visibility range for transmission. The performance of a vehicular delay-tolerant network is closely tied to the successful management of the nodes' transit buffer. In this paper, we propose a message transit buffer management model for nodes in vehicular delay tolerant networks. This model consists in setting up, on the one hand, a policy of dropping messages from the buffer when the buffer is full and must receive a new message. This drop policy is based on the concept of intermediate node to destination, queues and priority class of service. It is also based on the properties of the message (size, weight, number of hops, number of replications, remaining time-to-live, etc.). On the other hand, the model defines the policy for selecting the message to be transmitted. The proposed model was evaluated with the ONE opportunistic network simulator based on a 4000m x 4000m area of downtown Bouaké in Côte d'Ivoire. The map data were imported using the Open Street Map tool. The results obtained show that our model improves the delivery ratio of security alert messages, reduces their delivery delay and network overload compared to the existing model. This improvement in communication within a network of vehicles can contribute to the improvement of road safety.

An event-based timeout policy to decrease the overhead of session managements in network systems (네트워크 시스템의 세션 관리 부하를 감쇄하기 위한 사건 기반 타임아웃 정책)

  • Yim, Kang-bin;Choi, Chang-seok;Moon, Jong-wook;Jung, Gi-hyun;Choi, Kyung-hee
    • The KIPS Transactions:PartA
    • /
    • v.11A no.2
    • /
    • pp.143-148
    • /
    • 2004
  • The session management overhead on the network systems like firewalls or intrusion detection systems is getting grown as the session table is glowing. In this paper. we propose the event-based timeout management policy to increase packet processing throughput on network systems by decreasing the system's timeout management overhead that is comparable to the existing time-based timeout management policies. Through some empirical studies using a session management system implemented in this paper we probed that the proposed policy provides better packet processing throughput than the existing policies.

A Policy-based Resource Management Framework for QoS Improvement of Mobile Terminals in heterogeneous Network (이종망에서 이동 단말기의 QoS를 향상시키는 정책기반 자원관리 프레임워크)

  • Lee, Kye-Im;Jung, Soon-Gi;Lee, Jong-Chan;Park, Sang-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.125-133
    • /
    • 2010
  • A policy based resource management framework is proposed, that supports the optimal QoS by applying resources management function which is changed according to the status of mobile terminal and heterogeneous connections to hand-over process of mobile terminals based on heterogeneous network. To assess the performance of policy based resource management framework proposed in this thesis, in case of applying weighted policy for selecting optimal cell in hand-over occurring among duplicated heterogeneous connections, the transmission delay was remarkably enhanced as the number of multimedia sessions increased. This means, in case of QoS deterioration of multimedia session occurring in service connection, hand-over was executed with the optimal connection.

An Analysis and Evaluation of Policy-Based Network Management Approaches (정책기반 네트워크 관리 구조의 분석과 평가)

  • Lim Hyung J.;Lee Hyun J.;Lee Jong H.;Chung Tai M.
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.289-300
    • /
    • 2005
  • This paper proposed an analytical framework to compare and model the policy-based network management; centralized and distributed typed model. Policy-based network is introduced in various application fields, and a policy framework can offer different processing performance according to application. Therefore, we evaluated the performance and extensibility of each PBNM model when we apply the policy process to the models. The evaluated measurement metrics are policy provisioning time, traffic occurrence amount, PDP processing rate, and global conflict detection in qualitative simulation. The results show that the suitable structure is required according to the analysis for the careful application characteristics, when PBNM is adopted. The modeling framework presented in this paper is intended to quantify the merits and demerits among the currently suggested PBNM models.

Design of Security Management Function for SNMPv3 using Role-Based Access Control Model (역할기반 접근통제 모델을 이용한 SNMPv3 보안관리기능 설계)

  • 이형효
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.1-10
    • /
    • 2001
  • SNMPv3 provides the security services such as authentication and privacy of messages as well as a new flexible and extensible administration framework. Therefore, with the security services enabled by SNMPv3, network managers can monitor and control the operation of network components more secure way than before. But, due to the user-centric security management and the deficiency of policy-based security management facility, SNMPv3 might be inadequate network management solution for large-scaled networks. In this paper, we review the problems of the SNMPv3 security services, and propose a Role-based Security Management Model(RSM), which greatly reduces the complexity of permission management by specifying and enforcing a security management policy far entire network.

  • PDF

The Design of Integrated Intrusion Detection System in Large Networks (대규모 네트워크를 위한 통합 침입탐지시스템 설계)

  • 정연서
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.953-956
    • /
    • 2002
  • The threat to the network is increasing due to explosive increasing use of the Internet. Current IDS(Intrusion Detection System) detects intrusion and does individual response in small area network. It is important that construction of infra to do response in all system environment through sharing information between different network domains. This paper provides a policy-based IDS management architecture enabling management of intrusion detection systems. The IIDS(Integrated Intrusion Detection System) is composed of IDAs(Intrusion Detection Agents). We describe requirements in design and the elements of function.

  • PDF