• Title/Summary/Keyword: Protect

Search Result 7,488, Processing Time 0.029 seconds

A Study on the Intrusion Tolerance System Applied to the Object Oriented Middleware Environment

  • Shin Seung Jung;Kim Young Soo;Kim Jung Tae;Ryu Dae Hyun;Na Jong Whoa
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.693-698
    • /
    • 2004
  • The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.

  • PDF

A Queue Policy for Multimedia Communications

  • Jeong, Seong-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.129-132
    • /
    • 2002
  • To support UDP-based real-time multimedia applications over the Internet, it is necessary to provide a certain amount of bandwidth within the network so that the performance of the applications will not be seriously affected during periods of congestion. Since the flow rates of some of these applications do not back of during periods of congestion, it is also necessary to protect flow-controlled TCP flows from unresponsive or aggressive UDP flows. To achieve these goals, we propose a simple queue policy to support multimedia applications, called threshold-based queue management (TBQM). TBQM isolates UDP flows efficiently from TCP flows to protect TCP flows while supporting bandwidth requirements of UDP applications that require QoS. In addition, TBQM supports drop fairness between TCP flows without maintaining per-flow state. We also present some experimental results to show that the proposed queue policy can work well.

  • PDF

The U.S. Contract Law Defenses in Consumer Arbitration Agreement (소비자중재합의의 미국계약법상 항변)

  • Ha, Choong-Lyong
    • Journal of Arbitration Studies
    • /
    • v.20 no.2
    • /
    • pp.151-171
    • /
    • 2010
  • This paper investigates the consumer arbitration practices In the U.S. The key issue in consumer arbitration is how to protect the individual consumers from the loss of their legal rights stemming from the arbitration agreement with the business. In the U.S., the major legal doctrines to protect individual consumer include the voluntary-knowing-intelligent doctrine, unconscionability doctrine, and void contract. Even though the US courts are favorable to the enforceability of arbitration agreement, they strictly apply the contract law theories in deciding the existence of arbitration agreement, providing a strong common law protection for the consumers in arbitration. However, the practices for protection of consumers in arbitration in Korea are not mature yet. If consumer arbitration is widely adopted into B to C contracts, a protective measure for individual consumer can be found in the Act of Clause Regulation providing that the business has duty to explain the relevant clause in the adhesive contracts.

  • PDF

Treasury Stock Sales and Management Rights Protection: Conflicts of Interest between an Owner-manager and Small Shareholders

  • CHO, SUNG ICK
    • KDI Journal of Economic Policy
    • /
    • v.39 no.3
    • /
    • pp.63-98
    • /
    • 2017
  • This paper investigates the sales process of treasury stocks, while most previous research studies treasury stock repurchases. The sales of treasury stocks are an important measure to protect management rights only in Korea, as Korea's laws and systems allow treasury stock sales according to the board's resolution and not by the decisions made at the general shareholders' meetings. The board's resolution, which considers the owner-manager's interest on management rights, can cause damages to small shareholders. Considering (i) the economic characteristics of treasury stocks, (ii) other countries' institutions and experiences, (iii) a theoretical assessment of the possibility of small shareholder losses, and (iv) lessons from Korea's actual instances, Korea's present system should be corrected at least in the mid and long term. Even in the short-term, rules pertaining to sales enacted by the board's resolution inducing small shareholder losses should be overhauled. The autonomous discipline by various stakeholders could be an ideal measure by which to monitor ownermanager's decisions. In addition, temporary intervention measures, such as government examinations, could be implemented to protect small shareholders.

Measuring Economic Value for Endangered Korean Goral

  • Han, Sang-Yoel
    • Journal of Korean Society of Forest Science
    • /
    • v.97 no.5
    • /
    • pp.525-529
    • /
    • 2008
  • The purpose of this paper is to examine willingness to pay (WTP) for endangered species, the Korean goral, of Woraksan National Park in South Korea. The median of the WTP is adopted to estimate the value because it will not be affected by the extreme values. The estimated household median WTP using a logit model for Korean goral conservation in Woraksan National Park was 15,221 won. The estimated value of the WTP in relation to the Korean goral has some policy implications. especially in terms of implementing policy to protect the Korean goral. The result shows that the public conservation program does have a positive WTP for the conservation of the Korean goral. This implies that the Korean goral is an important species that needs to be maintained, the government has been expended a large sum of money in an attempt to protect it.

Carnosine and Related Compounds Protect against the Hydrogen Peroxide-Mediated Cytochrome c Modification

  • Kang, Jung-Hoon
    • Bulletin of the Korean Chemical Society
    • /
    • v.27 no.5
    • /
    • pp.663-666
    • /
    • 2006
  • Carnosine, homocarnosine and anserine might act as anti-oxidants and free radical scavengers in vivo. In the present study, the protective effects of carnosine and related compounds on the $H_2O_2$-mediated cytochrome c modification were studied. Carnosine, homocarnosine and anserine significantly inhibited the oligomerization of cytchrome c induced by $H_2O_2$. All three compounds also inhibited the formation of carbonyl compound and dityrosine during the incubation of cytochrome c with $H_2O_2$. These compounds effectively inhibited the peroxidase activity in the cytchrome c treated with $H_2O_2$. The results suggested that carnosine, homocarnosine, and anserine might protect cytochrome c against $H_2O_2$-mediated oxidative damage through a free radical scavenging.

An Algorithm to Detect Bogus Nodes for a Cooperative Intrusion Detection Architecture in MANETs

  • Hieu Cao Trong;Dai Tran Thanh;Hong Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1117-1120
    • /
    • 2006
  • Wide applications because of their flexibilities and conveniences of Wireless Mobile Ad-hoc Networks (MANETs) also make them more interesting to adversaries. Currently, there is no applied architecture efficient enough to protect them against many types of attacks. Some preventive mechanisms are deployed to protect MANETs but they are not enough. Thus, MANETs need an Intrusion Detection System (IDS) as the second layer to detect intrusion of adversaries to response and diminish the damage. In this paper, we propose an algorithm for detecting bogus nodes when they attempt to intrude into network by attack routing protocol. In addition, we propose a procedure to find the most optimize path between two nodes when they want to communicate with each other. We also show that our algorithm is very easy to implement in current proposed architectures.

  • PDF

Mechanism of Photodynamic Therapy using 9-hydroxypheophorbide-alpha on HeLa Cell Lines

  • Ahn, Jin-Chul
    • Biomedical Science Letters
    • /
    • v.15 no.2
    • /
    • pp.153-160
    • /
    • 2009
  • Photodynamic therapy(PDT) is a treatment utilizing the generation of singlet oxygen and other reactive oxygen species(ROS), which selectively accumulate in target cells. The aim of present work is to investigate the photodynamic therapy mechanism of 9-HpbD-a-mediated PDT in HeLa cell lines. We studied the general reactive oxygen species(G-ROS) activation after 9-HpbD-a PDT using fluorescence stain with $H_2DCF-DA$. G-ROS activation observed after 9-HpbD-a PDT and higher activation condition was 1 hour after PDT at 0.5 ${\mu}g/ml$ 9-HpbD-a concentration. Sodium azide and reduced glutathione(the singlet oxygen quencher) could protect HeLa cells from cell death induced by 9-HpbD-a PDT. But D-mannitol(the hydroxyl radical scavenger) could not protect cell death. Singlet oxygen played a decisive role in 9-HpbD-a PDT induced HeLa cell death. Type II reaction was the main type of ROS formation at 9-HpbD-a PDT.

  • PDF

Tracking Control of Maximum Power Point using Step-up Chopper (체승 Chopper를 이용한 최대 출력점 추적 제어)

  • Chung, Y.T.;Han, K.H.;Jang, K.H.;Kwon, H.;Kang, S.W.;Lee, S.H.;Kim, Y.J.
    • Proceedings of the KIEE Conference
    • /
    • 1990.11a
    • /
    • pp.323-325
    • /
    • 1990
  • In this paper, a new method to track the maximum power point is presented. The proposed scheme achieves the maximum power the step-up chopper, which tracks the maximum power point by sensing only the actual current from the photovoltaic array. Also it adopts the protect ion circuit to protect the battery system against the overvoltage and overvoltage by utilizing hysterisis characteristic.

  • PDF

On the Capacities of Spectrum-Sharing Systems with Transmit Diversity

  • Asaduzzaman, Asaduzzaman;Kong, Hyung-Yun
    • Journal of electromagnetic engineering and science
    • /
    • v.10 no.3
    • /
    • pp.99-103
    • /
    • 2010
  • Motivated by recent works on spectrum-sharing systems, this paper investigates the effects of transmit diversity on the peak interference power limited cognitive radio(CR) networks. In particular, we derive the ergodic and outage capacities of a spectrum-sharing system with multiple transmit-antennas. To derive the capacities, peak interference power constraint is imposed to protect the primary receiver. In a CR transmitter and receiver pair with multiple antennas at the transmitter side, the allowable transmit power is distributed over the transmit-antennas to achieve transmit diversity at the receiver. We investigate the effect of this power distribution when a peak interference power constraint is imposed to protect the primary receiver. We show that the transmit diversity does not improve the ergodic capacity compared to the single-antenna system. On the other hand, the transmit diversity significantly improves the outage capacity. For example, two transmit-antennas improve the outage capacity 10 times compared to the single-antenna with a 0 dB interference constraint.