• Title/Summary/Keyword: Process Control Documents

Search Result 71, Processing Time 0.021 seconds

A Study on Policy Design of Secure XML Access Control (안전한 XML 접근 제어의 정책 설계에 관한 연구)

  • Jo, Sun-Moon;Joo, Hyung-Seok;Yoo, Weon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.11
    • /
    • pp.43-51
    • /
    • 2007
  • Access control techniques should be flexible enough to support all protection granularity levels. Since access control policies are very likely to be specified in relation to document types, it is necessary to properly manage a situation in which documents fail to be dealt with by the existing access control policies. The existing access control has not taken information structures and semantics into full account due to the fundamental limitations of HTML. In addition, access control for XML documents allows only read operations, and there exists the problem of slowing down system performance due to the complex authorization evaluation process. In order to resolve this problem, this paper designs a XML Access Control Management System which is capable of making fined-grained access control. And then, in developing an access control system, it describes the subject and object policies of authorization for XML document on which authorization levels should be specified and which access control should be performed.

The Study of technique to find and prove vulnerabilities in ActiveX Control (ActiveX Control 취약점 검사 및 검증 기법 연구)

  • Sohn, Ki-Wook;Kim, Su-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.3-12
    • /
    • 2005
  • To provide visitors with the various services, Many web sites distribute many ActiveX controls to them because ActiveX controls can overcome limits of HTML documents and script languages. However, PC can become dangerous if it has unsecure ActiveX controls, because they can be executed in HTML documents. Nevertheless, many web sites provide visitors with ActiveX controls whose security are not verified. Therefore, the verification is needed by third party to remove vulnerabilities in ActiveX controls. In this paper, we introduce the process and the technique to fad vulnerabilities. The existing proof codes are not valid because ActiveX controls are different from normal application and domestic environments are different from foreign environments. In this paper, we introduce the technique to prove vulnerabilities in ActiveX control.

A Study on the Pilot Qualification and Qualification System Establishment of The Aerospace Composite Materials

  • Yong Man Yang;Sung In Cho;Seok Ho Jeong;Je-Jun Kim;Manseok Oh;Young Hwan Kim
    • International Journal of Aerospace System Engineering
    • /
    • v.10 no.1
    • /
    • pp.14-24
    • /
    • 2023
  • The materials applied to the aircraft fuselage, parts, and components must be verified by relative authorities in accordance with the procedures set by the airworthiness authority to achieve the aircraft type certification. There are no examples of domestic composite materials which were verified in order to be applied to aircraft structure. In this study, the composite material certification system of NCAMP, an American composite material standard certification organization, was reviewed and used as the fundamentals of the first aerospace composite material certification system in ROK(Fig 2,8). Also updated material certification documents were developed and confirmed by material certification engineers and inspectors. This aerospace composite material qualification system is intended to modernize the material certification system for AAM(Advanced Air Mobility) as well as aircraft and to enhance the understanding of related technicians and inspectors.

Understanding and Application of Stoffenmanager Nano Tool into Synthesis and Packing Process of Nanomaterials (Stoffenmanager nano 컨트롤 밴딩 도구 이해와 나노물질 합성 및 포장 공정 적용 연구)

  • Lee, Naroo;Ahn, Jungho
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.25 no.1
    • /
    • pp.95-103
    • /
    • 2015
  • Objectives: This study was conducted in order to better understand the conceptual model and Stoffenmanager nano module and apply it to the synthesis and packing processes of nanomaterials. Methods: Site visits were conducted to five nanomaterial production processes. Product and exposure variables were investigated in these workplaces. Hazard banding and exposure classification of the synthesis and packing processes of nanomaterials were conducted using documents and the website of Stoffenmanager Nano. Results: The five sites featured different products, packing tasks, ventilation and local exhaust, and others. The hazards for nano-nickel and copper were classified as E. The hazards for both fumed silica and indium tin oxide were classified as D. The hazard for spherical silica was classified as C. The exposure classes in the synthesis process of nanomaterials ranged from 2 through 4. The exposure classes in the packing process of nanomaterials ranged from 1 through 4. Conclusions: Application of Stoffenmanager nano to the synthesis and packing processes of nanomaterials helped to better understand the control level of the work environment and to suggest appropriate actions. The comparison of each process showed the effect of the production process and handling of solids and ventilation on exposure class.

Implementation of Subcontract Management System Using Intranet (인트라넷을 이용한 외주 관리 시스템 구현)

  • 하태룡;박주철;민상규
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.59-71
    • /
    • 1999
  • In this paper, we present implemetnations of subcontract management system using intranet. Subcontract management is including the support functions such as process control, official documents exchange, and transmission of subcontract management policy carried out by a big companys subcontract management department. By the use of the developed system, both big company and subcontract company are expected to have benefits from a consistent management of information and a strong access function through the internet. Also, it will reduce time lag ocurred a legacy management between two companies in the past.

  • PDF

A Design of Multimedia Content Management through Cloud Computing Paradigm (클라우드 컴퓨팅 파라다임을 통한 멀티미디어 컨텐츠 관리 설계)

  • Tolentino, Randy;Kim, Yong-Tae;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.343-349
    • /
    • 2012
  • Usage control models are the new breed of access control models that allow description of comprehensive policies for usage of protected content. In this paradigm, decisions regarding access to objects are not limited to request time only. It is coupled with the usage of the protected objects and becomes a continuous process carried out in parallel to the usage. The realization of usage control has been a long standing research problem to overcome the issue of loss of control in secure document dissemination. With the emergence of cloud computing, documents are stored in the cloud, the document viewers and editors themselves reside in the cloud and are accessed from thin clients such as browsers. We note that such scenarios provide an ideal opportunity for the realization of usage control for securing the usage of documents based on the stakeholders' policies. In this paper, we proposed Multimedia Content Management (MCM) for a better realization multimedia content in the cloud based applications. We designed a robust architecture to provide fine-grained control over usage of protected objects through the use of emerging cloud computing paradigm. We present the design principles for this realization and discuss our proposed architecture.

Development of XML based HACCP Diet Automatic Classification System (XML 기반 HACCP 식단 자동 분류 시스템 개발)

  • Cha, Kyung-Ae;Yeo, Sun-Dong;Hong, Won-Kee
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.1
    • /
    • pp.86-95
    • /
    • 2016
  • The main objective of HACCP(Hazard analysis and critical control points) system is to provide a systematic preventive approach how to control the risks in food production process. Practically, the diet classification process performed at the one of the beginning steps of the HACCP system, makes an important role of determining food safety risks and how to control them in every control point according to the different risk level of the diet. In this paper, we propose an automatic diet classification method for HACCP system using XML(eXtensible Markup Language). In order to guarantee the diet classification accuracy, we design the XML schema and attributes represents the relationship of every diet and ingredients analysing the HACCP diet classification rules. Based on the XML schema and document generation method, we develope the proposed system as client and server model that implemented XML based HACCP diet information generation module and integrated HACCP information management modules, respectively. Moreover, we show the efficiency of the proposed system with experiment results describing the school food diet information as XML documents and parsing the diet information.

A Study on Internal Control Systems of BSC(Balanced Scorecard) : Gumi Industrial Complex (BSC(Balanced Scorecard) 관점의 내부통제시스템에 대한 연구 : 구미산업단지)

  • Kim, Tae-Sung;Seo, Mi-Ra
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.2
    • /
    • pp.21-28
    • /
    • 2009
  • This research made an actual study of the Internal Control Systems on medium and small business company located on Gumi industry area. From this study, we learned that work scope, approval procedure and proof documents are well prepared, but some problem of the lack of communication has arose and it should be more complementary. Findings from this study show that the materials and purchasing processes are generally well-operated, but the information-sharing and training related to materials code are still insufficient and require more complementary systems.

Research on the usage status of Job Instructions in domestic enterprises holding ISO certification (국내 ISO 인증기업의 실무지침서 운용실태에 대한 조사연구)

  • Syn, Dong-Sig;Jung, Jang-Woo;Pack, Jong-Yop;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.4
    • /
    • pp.165-171
    • /
    • 2008
  • In the policy management system of the safety&health(same as the environment and the quality), the documentation of the management system is required in various international standards & guides. In case of 3 level classification of the system documents, it generally will be identified such name as the manual, the procedure(or the process) and the job instruction. Each level of the document has the unique role and usage though, the job instructions, especially, would be developed to support the practical job worker. Considering such document level, the job instructions should be reflect the latest know-how of the job-handling methods. And that, it should be used at any times by the related job worker. This paper is prepared for surveying the actual usage status of the job instructions of the domestic enterprises holding ISO certificate and trying to suggest the better way of application of the system documents.

Design and Implementation of Information Security System to Prevent Leakage of Drawing Information (설계정보 유출방지를 위한 정보보안시스템 설계 및 구현)

  • Chang, H.B.;Lee, H.S.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.11 no.5
    • /
    • pp.327-334
    • /
    • 2006
  • Recently, security incidents are growing rapidly in which internal employees let the drawing leak out to competitors or other countries. This type of security incidents has a characteristic that it occurs less frequently than other types of security incidents such as network or server security incident, but the damage is a lot more serious. The existing information security technologies to prevent internal information from being leaked out are only applicable to general documents(office documents, web pages and image files in which data are encrypted one by one). However, architectural drawings made up of collection of files with various formats(extensions) have problems with the process speed of en(de) cryption and accuracy, so the developments of security technologies by new methods are required. In this study, we design and develop a security technology based on work area with which users can protect the leakage of critical information in the kernel level while maintaining their work environment when they have to use sharing information that cannot be managed by the unit of file. As a result, we developed the "Virtual Secure Disk" which allows only authorized users and applications to have an access to drawings, and have verified its security by applying it to the actual company.