• Title/Summary/Keyword: Security Cooperation

Search Result 883, Processing Time 0.023 seconds

Security control system modelling utilizing RFID infra (RFID 인프라를 활용한 보안통제 시스템 모델링)

  • Kim, Kyoung-Woo;Kim, Young-Ho;Kim, Tae-Ho;Hwang, Shin-Woo;Cho, Sung-Mok
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.676-679
    • /
    • 2009
  • Ubiquitous 시대의 도래와 함께 RFID는 Ubiquitous 기술의 핵심적인 역할을 담당하고 있으며, RFID를 읽고 판독하는 단말기의 개발 역시 매우 중요한 기술개발 분야이다. 본 논문에서는 RFID중 현재 교통카드 등에서 많이 사용되고 있는 RFID 13.56Mhz와 보안회사에서 사용하고 있는 125Khz의 인프라를 그대로 사용할 수 있고, TCP/IP 통신을 통해 위치파악, 출입통제, 보안통제 등의 응용이 가능한 시스템을 모델링하고자 한다. 기존의 로컬 RFID 방식은 기업체 내에 별도의 서버를 두어 운영하기 때문에 관리문제, 기술문제 등의 애로사항이 빈번하게 발생하는 문제점이 있다. 따라서 본 논문에서는 이러한 문제점을 해소할 수 있도록 TCP/IP로 연결된 중앙관리 서버를 사용하여 보안통제가 가능하도록 시스템을 모델링함으로써 RFID 인프라의 설치, 이전 및 관리 등이 용이하도록 보안통제 시스템을 구성하였다.

  • PDF

Legislation on Space Security: South Korean and Poland Challenges

  • Polkowska, Malgorzata
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.34 no.1
    • /
    • pp.79-123
    • /
    • 2019
  • This article refers to the Space security legislation in South Korea and Poland. Both states have already prepared some legislation on Security in Space- the question is the following- if there is still a need of progress and if those presented legislation are sufficient for the practical purposes of the peaceful uses of Outer Space. South Korea is a much more experienced state in using space than Poland; the same seems with the legislation. Poland as less experienced state in this matter has lots of ambitions to create the efficient legislation on Space security, so it must follow the good examples of states and institution in this matter. One of them is Korea. On the other state, Poland as a Member of EU must implement the European law in space security (in particular SSA), which seems to be priceless and efficient for the international cooperation in Space.

The Relationship between Labor Market Flexibility and Outcome Variables and Its Moderating Effect on Union Power (노동시장의 유연성과 결과변수와의 관계 및 노조 힘의 조절효과)

  • Bae, Seung-Hyun;Park, Se-Yul
    • Management & Information Systems Review
    • /
    • v.30 no.4
    • /
    • pp.475-509
    • /
    • 2011
  • Taking 195 Korean businesses and sorting them out according to the unit types, this study looks into how flexibility strategy in labor market, which consists of numerical flexibility and functional flexibility, takes effect on the organization's outcome variable, which in turn consists of productivity, labor-management cooperation, and job security. In addition, the present study analyzes the role of labor union's moderating effect on the relationship among labor market flexibility, labor-management cooperation, and job security. It is found out as a result that numerical flexibility has no meaningful relation with productivity, labor-management cooperation, and job security, while functional flexibility has a considerably positive relation with them. This result confirms the importance of functional flexibility of business strategy in labor market. The West has continuously insisted the importance of functional flexibility, pointing out problems of numerical flexibility. On the other hand, considering that this study has confirmed functional flexibility's meaningful relation, while it has not found out numerical flexibility's negative relation, it is necessary to study further on the relationship between these two kinds of flexibility. The result of analysis on the role of union power's moderating effect confirms only the union power's interaction effect in the relation between numerical flexibility and labor-management cooperation. The possibility of union's opportunistic behavior can be detected in this result.

  • PDF

Design of Vehicle Security Authentication System Using Bluetooth 4.0 Technology (블루투스 4.0 기술을 이용한 차량용 보안인증 시스템 설계)

  • Yu, Hwan-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.325-330
    • /
    • 2017
  • Bluetooth 4.0 is a technology suitable for the Internet of things that is used for communication between various devices. This technology is suitable for developing a service by combining with automobiles. In this study, a security authentication system was designed by linking Bluetooth 4.0 technology and a vehicle system as an implementation example of an object internet service. A procedure was designed for security authentication and an authentication method is proposed using a data server. When the security authentication function is provided, various additional services can be developed using the information collection function of the risk notification and user action history. In addition, BLE (Bluetooth Low Energy) technology, which is a wireless communication technology that enables low-power communication and low-power communication in the process of the standardization and development of Bluetooth technology and technology, improves the battery life through the use of RFID or NFC This study expanded the range possible. The security service can be extended by expanding the scope of authentication by the contactless type. Using the proposed system, a customized service can be provided while overcoming the problems of an existing radio frequency (RF)-based system, portability, and battery usage problem.

Lighting Improvement for Propriety Management of Security Installations (보안설비의 적정관리를 위한 조명개선)

  • Lee, Gae-Myoung;Oh, Seong-Bo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1370-1374
    • /
    • 2015
  • Lighting improvements are needed for adequate operation of security installations according to the turn of scientific policing instead of human policing. The basic principles of security lighting is to provide sufficient lighting over a specific area so that anyone moving in or around can be seen easily. Also, in security lighting, illuminance and uniformity are to be considered for clearing of CCTV screen through the lighting improvement. To achieve such goals, each pole is to be considered of the height and the space of luminaries as well as the wattage and the type of lamps. In this paper, the lighting designs show the adequate operations of fence security systems through the actual measurement of illuminance by mock-up and the illuminance analyses for obtaining proper illuminance and uniformity value to keep brightness of CCTV screen able to confirm objects considering characteristics of CCTV monitor by simulations.

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

File Sharing Algorithm based Mutual Cooperation using Smart Device (스마트 기기를 이용한 상호 협력 기반 파일 공유 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.53-60
    • /
    • 2018
  • With the development of information and communication technology, we have been able to access and manage documents containing corporate information anytime and anywhere using smart devices. As the work environment changes to smart work, the scope of information distribution is expanded, and more efforts are needed to manage security. This paper proposes a file sharing system that enables users who have smart devices to manage and share files through mutual cooperation. Proposed file sharing system, the user can add a partner to share files with each other when uploading files kept by spliting the part of the file and the other uses an algorithm to store on the server. After converting the file to be uploaded to base64, it splits it into encrypted files among users, and then transmits it to the server when it wants to share. It is easy to manage and control files using dedicated application to view files and has high security. Using the system developed with proposed algorithm, it is possible to build a system with high efficiency even for SMEs(small and medium-sized enterprises) that can not pay much money for security.

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.

A Study on security characteristics and vulnerabilities of BAS(Building Automation System) (BAS의 보안 특성 및 취약점에 관한 연구)

  • Choi, Yeon-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.669-676
    • /
    • 2017
  • Recently, due to the importance of information security, security vulnerability analysis and various information protection technologies and security systems are being introduced as a countermeasure against cyber-attacks in new as well as existing buildings, and information security studies on high-rise buildings are also being conducted. However, security system introduction and research are generally performed from the viewpoint of general IT systems and security policies, so there is little consideration of the infrastructure of the building. In particular, the BAS or building infrastructure, is a closed system, unlike typical IT systems, but has unique structural features that accommodate open functions. Insufficient understanding of these system structures and functions when establishing a building security policy makes the information security policies for the BAS vulnerable and increases the likelihood that all of the components of the building will be exposed to malicious cyber-attacks via the BAS. In this paper, we propose an architecture reference model that integrates three different levels of BAS structure (from?) different vendors. The architectures derived from this study and the security characteristics and vulnerabilities at each level will contribute to the establishment of security policies that reflect the characteristics of the BAS and the improvement of the safety management of buildings.

The Comparison and Analysis on Students' Awareness of National Security -Focus on the students of military science established college and those of military science non-established college- (대학생들의 안보의식에 대한 비교·분석 -군사학과 설치 대학과 미설치 대학 대학생들을 중심으로-)

  • Lee, Sung Choon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4246-4257
    • /
    • 2014
  • The aim of this study was to search for a security strategy and security education program by analyzing the security awareness of universities with and without Department of Military Science. The results of university student's security awareness revealed a normal level of recognition and differences according to region and gender. The recognition of stability of current Korean national security is normally low on average, which suggests that students feel anxiety towards national security. In addition, the North Korea provocation influence on national security has been recognized highly (score of 4.33 on average). The national security awareness of university students in the case of whether establishing a Dept. of Military Science or not showed a normal level, which revealed a score of 3.44, and differed according to region, gender and recruitment, and had a relationship with the recognition of Dept. of Military Science management. Therefore, the political consideration of security authorities is in strong demand to improve the security awareness of general university students, and have an influx of great human resources by advertising the educational contents, advantages and future career of Dept. of Military Science students.