• 제목/요약/키워드: Security Technology Policy

검색결과 686건 처리시간 0.025초

수소에너지의 승용차부문 도입에 따른 CO2 배출 감축 및 비용효과 분석 연구 (An Analysis on CO2 Emission and Cost Effects of Hydrogen Energy in Sedan Sector)

  • 홍종철;강승진;최상진;박상용;김종욱
    • 한국수소및신에너지학회논문집
    • /
    • 제20권1호
    • /
    • pp.9-21
    • /
    • 2009
  • As one of the alternative solution for energy and environmental issues such as climate change, energy security, oil price, etc., hydrogen energy has been getting so much attentions these days. This paper analyzed the $CO_2$ emission, costs, and energy consumptions when the hydrogen energy was introduced to transportation, specifically in Sedan sector using the energy system model, MARKAL. As results, 21.5% of $CO_2$ emission in 2040 could be reduced and additional 76 billion dollars will be needed in the high energy price scenario. The amount of energy saving mainly due to the replacement of existing car to hydrogen vehicle was 16% of the final energy consumption in 2040.

Design and Analysis of Lightweight Trust Mechanism for Accessing Data in MANETs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.1119-1143
    • /
    • 2014
  • Lightweight trust mechanism with lightweight cryptographic primitives has emerged as an important mechanism in resource constraint wireless sensor based mobile devices. In this work, outlier detection in lightweight Mobile Ad-hoc NETworks (MANETs) is extended to create the space of reliable trust cycle with anomaly detection mechanism and minimum energy losses [1]. Further, system is tested against outliers through detection ratios and anomaly scores before incorporating virtual programmable nodes to increase the efficiency. Security in proposed system is verified through ProVerif automated toolkit and mathematical analysis shows that it is strong against bad mouthing and on-off attacks. Performance of proposed technique is analyzed over different MANET routing protocols with variations in number of nodes and it is observed that system provide good amount of throughput with maximum of 20% increase in delay on increase of maximum of 100 nodes. System is reflecting good amount of scalability, optimization of resources and security. Lightweight modeling and policy analysis with lightweight cryptographic primitives shows that the intruders can be detection in few milliseconds without any conflicts in access rights.

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

Spatial Decision Support System for Residential Solar Energy Adoption

  • Ahmed O. Alzahrani;Hind Bitar;Abdulrahman Alzahrani;Khalaf O. Alsalem
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.49-58
    • /
    • 2023
  • Renewable energy is not a new terminology. One of the fastest growing renewable energies is solar energy. The implementation of solar energy provides several advantages including the reduction of some of the environmental risks of fossil fuel consumption. This research elaborated the importance of the adaption of solar energy by developing a spatial decision support system (SDSS), while the Residential Solar Energy Adoption (RSEA) is an instantiation artifact in the form of an SDSS. As a GIS web-based application, RSEA allows stakeholders (e.g., utility companies, policymakers, service providers homeowners, and researchers) to navigate through locations on a map interactively. The maps highlight locations with high and low solar energy adoption potential that enables decision-makers (e.g., policymakers, solar firms, utility companies, and nonprofit organizations) to make decisions. A combined qualitative and quantitative methodological approach was used to evaluate the application's usability and user experience, and results affirmed the ability of the factors of utility, usefulness, and a positive user experience of the residential solar energy adoption of spatial decision support system (RSEA-SDSS). RSEA-SDSS in improving the decision-making process for potential various stakeholders, in utility, solar installations, policy making, and non-profit renewable energy domains.

중요도-수행도 분석을 이용한 개인정보 보호기술 표준화 추진전략 (Decision Making on Standardization Strategy for Personal Information Security Using Importance-Performance Analysis)

  • 구경철;우훈식;조인준
    • 산업경영시스템학회지
    • /
    • 제33권4호
    • /
    • pp.145-152
    • /
    • 2010
  • Under limited resources such as budgets and experts, it is necessary to make decisions for promotion strategy of standardization work items in Information and Communication Technologies (ICTs). This paper focuses on a method of setting standardization promotion strategies for each item of personal information security standardization. As a decision making tool, the Importance Performance Anaysis (IPA) is applied and analyzed to the decision processes. The results are showed and illustrated for useful inputs to practical policy making in the field of standardization activities.

군사훈련용 기능성 게임에 관한 연구 (A Study on the Serious Game for the Military Training)

  • 하수철
    • 안보군사학연구
    • /
    • 통권7호
    • /
    • pp.233-270
    • /
    • 2009
  • Serious game played with a computer in accordance with specific rules, that uses entertainment to further government or corporate training, education, health, public policy, and strategic communication objectives. The main goal of a serious game is usually to train or educate users while giving them an enjoyable experience. Serous games are video games with serious purposes such as teaching or training and whose principal aim is education. The major characteristics of serious games involve pedagogy which are all of the activities that educate, train, or instruct the player. Other characteristics of serious games are that they use entertainment principles, creativity and technology to build games that carry out serious purposes. This study is to introduce a serious game for the military training and to describe the elements of game design for developing it.

  • PDF

이종의 보안시스템 관리를 위한 보안정책 관리에 관한 연구 (A Study on the Security Policy Management for managing Heterogeneous Security Systems)

  • 이동영;박현주
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2012년도 추계학술발표대회
    • /
    • pp.1119-1121
    • /
    • 2012
  • 이종의 분산환경에서 다양한 보안시스템에 대한 효율적인 보안 관리를 위해서 관리자는 보안 시스템들이 설치된 네트워크 환경에 대한 사전에 전문적인 보안 지식을 갖고 있어야하며, 개방형 네트워크 환경의 경우 새로운 보안시스템이 추가되면 새로운 보안 정책과 기술을 적용해야 한다. 이는 전산망 운영 기관의 보안 관리 비용을 가중시키며 체계적이고 일괄적인 보안 정책 및 기술 구현을 불가능하게 하여 오히려 보안 문제를 야기시키는 역기능을 초래할 수 있다. 이에 본 논문에서는 관리대상 보안 시스템들에 대한 효율성, 편의성 및 보안성 향상을 목적으로 하며, 보안 시스템들 간의 상호연동이 가능하도록 보안정책의 일반화 프로세스를 제시하고자 한다.

Towards the Acceptance of Functional Requirements in M-Learning Application for KSA University Students

  • Badwelan, Alaa;Bahaddad, Adel A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.145-166
    • /
    • 2021
  • M-learning is one of the most important modern learning environments in developed countries, especially in the context of the COVID-19 pandemic. According to the Ministry of Education policies in Saudi Arabia, gender segregation in education reflects the country's religious values, which are a part of the national policy. Thus, it will help many in the target audience to accept online learning more easily in Saudi society. The literature review indicates the importance to use the UTAUT conceptual framework to study the level of acceptance through adding a new construct to the model which is Mobile Application Quality. The study focuses on the end user's requirements to use M-learning applications. It is conducted with a qualitative method to find out the students' and companies' opinions who working in the M-learning field to determine the requirements for the development of M-learning applications that are compatible with the aspirations of conservative societies.

주요국 사이버보안 정책 동향 및 시사점 (Trends and Implications of Cybersecurity Policies in Major Countries)

  • 이재성;최선미;안춘모;유영상
    • 전자통신동향분석
    • /
    • 제38권4호
    • /
    • pp.58-69
    • /
    • 2023
  • Cyberspace is emerging as a critical domain requiring national-level governance and international cooperation owing to its potential financial and societal impacts. This research aims to investigate the cybersecurity policies from major countries for understanding with comprehensive perspectives. Global trends emphasize a comprehensive command-centered approach, with top leadership directing cybersecurity policies. Key policy areas include security across technology ecosystems, protection of critical infrastructure, and software supply chain security. Investment is being focused on zero-trust architectures, software bills, and new technologies like artificial intelligence. For countries like Korea, immediate response and adaptation to these trends are crucial to develop and enforce national cybersecurity policies.

민군관계와 국방리더십의 발전방향 (Civil-Military Relations and Military Leadership)

  • 손수태
    • 안보군사학연구
    • /
    • 통권4호
    • /
    • pp.119-156
    • /
    • 2006
  • Now it is not useful the theory about civil-military relationship that have been analysed for power games between military and civilians Korean society is going on governance society managed by cooperating network of government, civilian society and business market These social change require for new context about civil-Military relationship. Military leadership must contribute desirable civil-military relationship This study will suggest the direction about military leadership for desirable civil-military relationship. Now political issues about military intervention to the government are almost settled, but the worry about complications between military and civilians exist in the part of low issues like policy-making. Another important issues is military leadership about the style of social-being. In recent years, social change is very complex and speedy like global networking and diversity, leadership environment also, changed like leadership paradigm shift. Military leadership must be examined from the principle to the context of social integration At the present age, individual soldier is citizen in uniformed. Also military leadership must to seek the principle in the citizen mind like citizenship. Another charactristics of present day military is influence of high technogy. For the high-tech war military need the transition about science and technology from the whole society. In the context of above the development of military leadership are suggested as follows. First, the development of military control leadership must besought to the context of cooperation between government and military. Government must provide the system to strengthen military professionals in the process of policy-making about national security Second, military leadership must embody the important social values through the advanced military making, Third, military leadership must provide the adaptability to the society through the military education of their soldiers Forth, military leadership must be contributed to the social integration and to the growing up individual soldiers like their socialization and their achievement. Five, an important subject of military leadership is the creation of desirable military culture through the harmony of social culture and military culture.

  • PDF