• 제목/요약/키워드: Security Evaluation Model

검색결과 389건 처리시간 0.029초

신재생에너지 인력양성의 인적자본 축적 효과 (The Human Capital Accumulation Effect of New and Renewable Energy Human Resource Development Programs)

  • 이유아;김진수;허은녕
    • 신재생에너지
    • /
    • 제5권3호
    • /
    • pp.49-55
    • /
    • 2009
  • Human resource for the new and renewable energy technology is an important factor in the respect of the sustainable growth and energy security. In this paper, we focused on measuring the economic effect of human resource development on new and renewable energy development programs. The human capital accumulation model developed by Mincer (1974) was modified in terms of the rate of the researchers' investment in human capital. As a result of a empirical case study, the value of human capital was estimated by 102 million Korean won per year worth 18% of the project labor cost. In case of the assumption of 100% participation of researchers, the level of human capital accumulation increased to 914 million Korean won per year. These results imply that the new and renewable energy development programs has been successful, on the concept of learning by doing, in terms of providing the researchers with opportunities to accumulate human capital.

  • PDF

An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Applications

  • Ma, Chuan;Shen, Limin;Wang, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권2호
    • /
    • pp.659-679
    • /
    • 2015
  • Distributed applications are composed of multiple nodes, which exchange information with individual nodes through message passing. Compared with traditional applications, distributed applications have more complex behavior patterns because a large number of interactions and concurrent behaviors exist among their distributed nodes. Thus, it is difficult to detect anomalous behaviors and determine the location and scope of abnormal nodes, and some attacks and misuse cannot be detected. To address this problem, we introduce a method for detecting anomalous behaviors based on process algebra. We specify the architecture of the behavior detection model and the detection algorithm. The anomalous behavior detection and analysis demonstrate that our method is a good discriminator between normal and anomalous behavior characteristics of distributed applications. Performance evaluation shows that the proposed method enhances efficiency without security degradation.

PCS/SCADA 센서 네트워크용 키 관리 프로토콜에 대한 보안 분석 (A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks)

  • 박동국
    • 디지털산업정보학회논문지
    • /
    • 제5권2호
    • /
    • pp.123-131
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. Recently, Nilsson et al. proposed a key management scheme for PCS/SCADA, which was claimed to provide forward and backward secrecies. In this paper, we define four different types of adversaries or attackers in wireless sensor network environments in order to facilitate the evaluation of protocol strength. We then analyze Nilsson et al. 's protocol and show that it does not provide forward and backward secrecies against any type of adversary model.

냉난방도일을 이용한 기준부하추정 방법에 관한 연구 (A Study on the Baseline Load Estimation Method using Heating Degree Days and Cooling Degree Days Adjustment)

  • 위영민
    • 전기학회논문지
    • /
    • 제66권5호
    • /
    • pp.745-749
    • /
    • 2017
  • Climate change and energy security are major factors for future national energy policy. To resolve these issues, many countries are focusing on creating new growth industries and energy services such as smartgrid, renewable energy, microgrid, energy management system, and peer to peer energy trading. The financial and economic evaluation of new energy services basically requires energy savings estimation technologies. This paper presents the baseline load estimation method, which is used to calculate energy savings resulted from participating in the new energy program, using moving average model with heating degree days (HDD) and cooling degree days (CDD) adjustment. To demonstrate the improvement of baseline load estimation accuracy, the proposed method is tested. The results of case studies are presented to show the effectiveness of the proposed baseline load estimation method.

몬테카를로 시뮬레이션에 의한 전력탁송 영향평가 (Power Wheeling Effects Evaluation using Monte-Carlo Simulation)

  • 이범
    • 한국정보통신학회논문지
    • /
    • 제7권3호
    • /
    • pp.552-557
    • /
    • 2003
  • 본 연구에서는 몬테카를로 시뮬레이션을 사용하여 상정사고를 고려한 전력탁송에 따른 영향평가를 할 수 있도록 하였으며, 이로써 전력탁송에 따른 탁송회사의 발전비용, 송전손실, 계통안전도에 미치는 영향을 분석할 수 있도록 하였다. 제안한 방법을 시험계통에 적용하여 본 연구의 타당성을 검증하였다.

주가수익률과 기업평가 (Price Earning Ratio And Firm Valuation)

  • 여동길
    • 산업경영시스템학회지
    • /
    • 제9권14호
    • /
    • pp.49-58
    • /
    • 1986
  • Those facts I have studied on the theoretical characteristics of stock price earning ratio related with firm evaluation are as followings. First, I have investigated stock valuation analysis under certainty in view of Miller's, Modigliani's and Linter's theories in Chapter Ⅱ, and it is found that stock valuation under uncertainty to which the basic model of MM theory and the concept of capitalization ratio are applied is the same output, as in the case under certainty. And I have examined the stock valuation of growth corporations in which net investment, total capitals and operating profits are expected. Second, I have reexamined the fact that stock price profits are the erotical indices of firm valuation and the firm valuation on the basis of stock price earning ratio in Chapter III. As a whole, I have surveyed the stock price earning ratio theory of the growth stocks and there have been found some problems as such scholars as Malkiel and others have suggested focusing on the stock price structure of growth stocks. To conclude, there must be incessant efforts for the study of security analysis to make it develop ideally.

  • PDF

Evaluation of ALOS PALSAR Interferometry in the West Coast of Korea;Preliminary Results

  • Choi, Jung-Hyun;Lee, Chang-Wook;Won, Joong-Sun
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2007년도 Proceedings of ISRS 2007
    • /
    • pp.25-28
    • /
    • 2007
  • Precise digital elevation model (DEM) is an important issue in coastal area where DEMs in a time series are especially required. Although LIDAR system is useful in coastal regions, it is not yet popular in Korea mainly because of its high surveying cost and national security reasons. Recently, precise coastal DEM have been made using radar interferometry, waterline method. One of these methods, Spaceborne imaging radar interferometry has been widely used to measure the topography and deformation of the Earth. We acquired ALOS PALSAR FBD mode (Fine Beam Dual) data for evaluating the quality of interferograms and their coherency. The purpose of this study is construction of DEM using the ALOS PALSAR data using radar interferometry and analysis of surface characteristics by coherence and magnitude map over the Ganghwado and Siwha tidal flats and near coastal lands.

  • PDF

정보시스템 보안감리평가의 정량화모델 개발 (Developing A Quantitative Evaluation Model for Information System Security Auditing)

  • 김동수;김현수
    • 한국IT서비스학회:학술대회논문집
    • /
    • 한국IT서비스학회 2003년도 춘계학술대회
    • /
    • pp.363-370
    • /
    • 2003
  • 지금까지 국내 보안감리 평가는 정성적인 평가에 머물러 있어 평가를 담당하는 감리인마다 평가 결과가 서로 상이하여 피 평가자에게 신뢰를 심어주지 못하는 결과가 초래되고 있다. 본 연구에서는 보안감리에 대한 국내의 연구와 해외 사례를 참조하여 SI사업에서의 보안감리평가 효율성을 제고할 수 있는 방안 및 평가체계를 정량화하는 방안을 제시하였다. 이를 위해 SI사업의 소프트웨어 개발 및 개발 환경(네트워크, 서버 등)을 중심으로 한국전산원에서 제시하고 있는 보안감리 지침과 한국정보시스템감리인협회의 보안관련 세부 감리지침을 통합하고 세부 감리지침에 따른 평가를 정량화 하였다. 보안감리 평가의 정량화 방안에 대한 감리전문가의 인터뷰와 사례 프로젝트의 적용을 통하여 연구 모형에 대한 검증을 실시하였다.

  • PDF

고객관계관리의 성과에 영향을 미치는 조직적 특성에 관한 연구 (A Study on the Organizational Characteristics Affecting the Performance of CRM)

  • 고창배;윤종수;이영식;조재완;차대규
    • 디지털융복합연구
    • /
    • 제2권1호
    • /
    • pp.57-73
    • /
    • 2004
  • Due to the rapid development of Information Technology and the Internet, e-business has bloomed and prevailed recently. As the result of this phenomenon, enterprises introduce CRM as a new process accessible to customers. The purpose of this study is to examine the factors affecting the performance of CRM based on precedent theoretical studies. So, the empirical test is conducted to various hypotheses related to the research model. 206 questionnaires for this study are collected. The result of how the organizational characteristics influence on the performance of CRM shows that they have a positively significant effect on it in order of expert security, top management's support and customer information-centric culture, and department collaboration. Evaluation and compensation system don't influence on the performance of CRM directly.

  • PDF

정보보호시스템의 개발 및 평가모델 (A Development and Evaluation Model for Information Technology Security Systems)

  • 전은아;고정호;이강수
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2000년도 제13회 춘계학술대회 및 임시총회 학술발표 논문집
    • /
    • pp.513-518
    • /
    • 2000
  • 정보보호시스템의 개발과 평가는 별개의 업무가 아니며, 평가를 고려하여 개발이 이루어져야만 평가노력을 줄이고 평가의 성공률을 높일 수 있다. 본 연구에서는 정보보호시스템의 특성을 고려하고 다양한 평가기준 및 방법론들을 일반화한 정보보호시스템 개발 및 평가모델을 제시한다. 본 모델은 엔티티와 엔티티간의 관계에 대한 정리들로 구성되어 있으며, 새로운 정보보호시스템을 개발하거나 이를 평가할 때 활용할 수 있다. 또한, 개발 및 평가 환경에 대한 워크플로우 관리 시스템의 골격으로 활용 할 수 있다.

  • PDF