• Title/Summary/Keyword: Policy-based Network Management

Search Result 622, Processing Time 0.026 seconds

A Study on the Multilevel Electronic Commerce Security using Scalable Multicast (확장 멀티캐스트를 이용한 다중레벨 전자상거래 보안에 관한 연구)

  • 서장원
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.66-74
    • /
    • 2002
  • Through the increment of requirement for EC(Electronic Commerce) oriented communication services, security multicast communications is becoming more important. However, multicast to EC environment is much different from unicast concept most network security protocols. On the network security, using mandatory access control of multilevel architecture which assigns a specific meaning to each subject, so we accomplish access control. In this way, access control security based on the information security level is proposed. A security protocol based on the architecture proposed in this paper would be utilized in security multicast communications, group key management service and leveled security service through multilevel EC security policy, Also we discuss and propose the security level scaleability and key management method on the network.

  • PDF

Effective Network Management Using Mobile Agents Based on Split Management Policy (분할관리정책에 의한 이동 에이전트를 이용한 효율적인 네트워크 관리)

  • Lee, Jae-Hyoung;Oh, Gil-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.8
    • /
    • pp.66-75
    • /
    • 2007
  • The traditional centralized network management method using the SNMP has problems, such as, increase of communication traffic and severe bottleneck phenomena at the specific manager-node caused by a frequent polling mechanism. Several mobile agent based network management methods have been studied to solve and overcome these problem. However, in these mobile agent based methods, as the number of nodes to be managed is increased, the mobile data are increased accumulatively and the effectiveness of the network management is decreased. In this paper, we propose the split management method by using mobile agents to handle these problems. In our method, the nodes are divided into groups to be handled by separate mobile agents. Each mobile agent visits its own nodes and gets management information from them. We demonstrate the effectiveness of our proposed method using experimental results.

A Resource Management Scheme in Heterogeneous Access Network Architectures (이종 액세스 네트워크 구조에서 자원관리 방안)

  • Park, Sang-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.2
    • /
    • pp.83-92
    • /
    • 2005
  • Access networks connected in B3G networks provide its property network service. Hence, though mobile users may utilize only a network service from an access network, they can also use variety of network services from several access networks for their service satisfaction. To support heterogeneous changeable network service in access networks, the mobile terminal must implement heterogeneous system techniques so that it is able to change the network service by ISHO (Inter-System Handover) In this paper, we present the ISHO condition by the policy-based framework in B3G networks. Also, we propose an ISHO scheme to control network resources for the QoS management of a mobile session between UMTS and WLAN access networks. To support the QoS management, the proposed scheme is that it will be implemented before the resource exhaustion occurs to effect network performances.

  • PDF

Developing a Combined Forecasting Model on Hospital Closure (병원도산의 예측모형 개발연구)

  • 정기택;이훈영
    • Health Policy and Management
    • /
    • v.10 no.2
    • /
    • pp.1-21
    • /
    • 2000
  • This study reviewde various parametic and nonparametic method for forexasting hospital closures in Korea. We compared multivariate discriminant analysis, multivartiate logistic regression, classfication and regression tree, and neural network method based on hit ratio of each model for forecasting hospital closure. Like other studies in the literture, neural metwork analysis showed highest average hit ratio. For policy and business purposes, we combined the four analytical method and constructed a foreasting model that can be easily used to predict the probabolity of hospital closure given financial information of a hospital.

  • PDF

Optimal Planning of Multiple Routes in Flexible Manufacturing System (유연생산 시스템의 최적 복수 경로 계획)

  • Kim Jeongseob
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.29 no.4
    • /
    • pp.175-187
    • /
    • 2004
  • We consider the simultaneous selection of part routes for multiple part types in Flexible Manufacturing Systems (FMSs). Using an optimization framework we investigate two alternative route assignment policies. The one, called routing mix policy in the literature, specifies the optimal proportion of each part type to be produced along its alternative routes, assuming that the proportions can be kept during execution. The other one, which we propose and call pallet allocation policy, partitions the pallets assigned to each part type among the routes. The optimization framework used is a nonlinear programming superimposed on a closed queueing network model of an FMS which produces multiple part types with distinct repeated visits to certain workstations. The objective is to maximize the weighted throughput. Our study shows that the simultaneous use of multiple routes leads to reduced bottleneck utilization, improved workload balance, and a significant increase in the FMS's weighted throughput, without any additional capital investments. Based on numerical work, we also conjecture that pallet allocation policy is more robust than routing mix policy, operationally easier to implement, and may yield higher revenues.

Implementation of Expert System Simulation based on 2th Security of Network (네트워크 2중 보안을 위한 전문가시스템 시뮬레이션의 구현)

  • Lee Chang-Jo
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.309-325
    • /
    • 2000
  • Organizations rely on Secure ID resources today to handle vast amounts of information. Because the data can vary widely in type and in degree of sensitivity, employees need to be able to exercise flexibility in handling and protecting it. It would not be practical or cost-effective to require that all data be handled in the same manner or be subject to the same protection requirements. Without some degree of standardization, however inconsistencies can develop at introduce risks. Policy formulation is an important step toward standardization of security activities for ID resources. ID security policy is generally formulated from the input of many members of an organization, including security officials, line managers, and ID resource specialists. However, policy is ultimately approved and issued by the organization's senior management. In environments where employees feel inundated with policies, directives, guidelines and procedures, an ID security policy should be introduced in a manner that ensures that management's unqualified support is clear. The organization's policy is management's vehicle for emphasizing the commitment to ID security and making clear the expectations for employee involvement and accountability. This paper will discuss ID security Policy in terms of the different types (program-level and issue-specific), components, and Implementation of Expert System Simulation based on 4GL, PowerBuilder.

  • PDF

A Policy Based Management Model of Quality of Service for Differentiated Services Networks (차별화 서비스망을 위한 정책 기반 서비스 품질 관리 모델)

  • Cha, Si-Ho;Kang, Young-Man;Cho, Kuk-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.171-178
    • /
    • 2003
  • Differentiated Services (DiffServ) is a technique to provide Quality of Service (QoS) in an efficient and scalable way. However, current DiffServ specifications have limitations in providing the complete QoS management framework and its implementation model. This paper proposes a policy-based QoS management model that supports DiffServ policies for managing QoS of DiffServ networks. The management model conforms to Model-View-Controller (MVC) architecture, and is based on Enterprise JavaBeans (EJBs) technologies. In our model, high-level DiffServ QoS policies are represented as valid XML documents with an XML Schema and are translated to low-level EJB policy beans in the EJB-based policy server. The routing topology and role information required to define QoS policies is discovered by using SNMP MIB-II, and the QoS policy distribution and monitoring is accomplished by using SNMP DiffServ MIB.

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.

A Study on the Trend of Collaborative Research Using Korean Health Panel Data: Focusing on the Network Structure of Co-authors (한국의료패널 데이터를 활용한 공동연구 동향 분석: 공동 연구자들 연결망 구조를 중심으로)

  • Um, Hyemi;Lee, Hyunju;Choi, Sung Eun
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.4
    • /
    • pp.185-196
    • /
    • 2018
  • This study investigates the social network among authors to improve the quality of Panel researches. Korea Health Panel (KHP), implemented by the collaborative work between KIHASA (Korea Institute for Health and Social Affairs) and NHIC (National Health Insurance Service) since 2008, provides a critical infrastructure for policy making and management for insurance system and healthcare service. Using bibliographic data extracted from academic databases, eighty articles were extracted in domestic and international journals from 2008 to 2014, April. Data were analyzed by NetMiner 4.0, social network analysis software, to identify the extent to which authors are involved in healthcare use research and the patterns of collaboration between them. Analysis reveals that most authors publish a very small number of articles and collaborate within tightly knit circles. Centrality measures confirm these findings by revealing that only a small percentage of the authors are structurally dominant, and influence the flow of communication among others. It leads to the discovery of dependencies between the elements of the co-author network such as affiliates in health panel communities. Based on these findings, we recommend that Korea Health Panel could benefit from cultivating a wider base of influential authors and promoting broader collaborations.

A Study on the Construction of National Cultural Information Network Model through Feasibility Analysis (국가 문화정보망 구축 당위성 분석을 통한 모형 설정에 관한 연구)

  • Jeong, Dong-Youl
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.3 s.57
    • /
    • pp.13-36
    • /
    • 2005
  • As the importance of cultural information becomes greater than before, there are some needs for a new national economic paradigm in the knowledge based society. The purpose of this paper is to suggest guidelines for building up a national cultural information network model that enable to promote government's recognition and cultural policy. This research includes feasibility analysis of cultural policy perspective, current situations, and economic effect of cultural industry.