• Title/Summary/Keyword: System security

Search Result 9,759, Processing Time 0.039 seconds

A Study on the Performance of Cloud-based VDI Adoption: Comparing between IS administrators and business users (클라우드 기반 VDI 도입 성과에 관한 연구 - 시스템 관리자와 일반 사용자의 비교를 중심으로 -)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.37 no.2
    • /
    • pp.149-167
    • /
    • 2018
  • The purpose of this study is to analyze the performance of Virtual Desktop Infrastructure(VDI) adoption. VDI performance was measured by IS manager (system quality, security, and managerial operation) and business user (usability, access, and user satisfaction). The survey questionnaires were developed for measuring VDI performance. 84 data samples were collected from the companies that had adopted cloud-based VDI. This research model was verified by Smart-PLS and SPSS. The research findings were as follows: First, the companies using VDI experienced actual performance, but they did not attain their expectation. Second, as results of comparing between IS managers and business users, IS administrators had considerably higher performance than business users, which indicates that there were big differences in performance perception among users. Compared with prior research such as technical trend, system construction, and performance improvement, this study has the following implications. First, by comparing the expected performance with the actual performance of the companies that have implemented and operating VDI, it was suggested how a company that wants to adopt VDI can manage the expectation level of VDI and achieve higher actual performance. Second, because the perception of VDI performance differs between business users and system managers, it is meaningful that a fair evaluation of VDI performance requires a balanced consideration of business users and system managers.

Design and Implementation of Medical Information System using QR Code (QR 코드를 이용한 의료정보 시스템 설계 및 구현)

  • Lee, Sung-Gwon;Jeong, Chang-Won;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.109-115
    • /
    • 2015
  • The new medical device technologies for bio-signal information and medical information which developed in various forms have been increasing. Information gathering techniques and the increasing of the bio-signal information device are being used as the main information of the medical service in everyday life. Hence, there is increasing in utilization of the various bio-signals, but it has a problem that does not account for security reasons. Furthermore, the medical image information and bio-signal of the patient in medical field is generated by the individual device, that make the situation cannot be managed and integrated. In order to solve that problem, in this paper we integrated the QR code signal associated with the medial image information including the finding of the doctor and the bio-signal information. bio-signal. System implementation environment for medical imaging devices and bio-signal acquisition was configured through bio-signal measurement, smart device and PC. For the ROI extraction of bio-signal and the receiving of image information that transfer from the medical equipment or bio-signal measurement, .NET Framework was used to operate the QR server module on Window Server 2008 operating system. The main function of the QR server module is to parse the DICOM file generated from the medical imaging device and extract the identified ROI information to store and manage in the database. Additionally, EMR, patient health information such as OCS, extracted ROI information needed for basic information and emergency situation is managed by QR code. QR code and ROI management and the bio-signal information file also store and manage depending on the size of receiving the bio-singnal information case with a PID (patient identification) to be used by the bio-signal device. If the receiving of information is not less than the maximum size to be converted into a QR code, the QR code and the URL information can access the bio-signal information through the server. Likewise, .Net Framework is installed to provide the information in the form of the QR code, so the client can check and find the relevant information through PC and android-based smart device. Finally, the existing medical imaging information, bio-signal information and the health information of the patient are integrated over the result of executing the application service in order to provide a medical information service which is suitable in medical field.

Design of a Bit-Serial Divider in GF(2$^{m}$ ) for Elliptic Curve Cryptosystem (타원곡선 암호시스템을 위한 GF(2$^{m}$ )상의 비트-시리얼 나눗셈기 설계)

  • 김창훈;홍춘표;김남식;권순학
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1288-1298
    • /
    • 2002
  • To implement elliptic curve cryptosystem in GF(2$\^$m/) at high speed, a fast divider is required. Although bit-parallel architecture is well suited for high speed division operations, elliptic curve cryptosystem requires large m(at least 163) to support a sufficient security. In other words, since the bit-parallel architecture has an area complexity of 0(m$\^$m/), it is not suited for this application. In this paper, we propose a new serial-in serial-out systolic array for computing division operations in GF(2$\^$m/) using the standard basis representation. Based on a modified version of tile binary extended greatest common divisor algorithm, we obtain a new data dependence graph and design an efficient bit-serial systolic divider. The proposed divider has 0(m) time complexity and 0(m) area complexity. If input data come in continuously, the proposed divider can produce division results at a rate of one per m clock cycles, after an initial delay of 5m-2 cycles. Analysis shows that the proposed divider provides a significant reduction in both chip area and computational delay time compared to previously proposed systolic dividers with the same I/O format. Since the proposed divider can perform division operations at high speed with the reduced chip area, it is well suited for division circuit of elliptic curve cryptosystem. Furthermore, since the proposed architecture does not restrict the choice of irreducible polynomial, and has a unidirectional data flow and regularity, it provides a high flexibility and scalability with respect to the field size m.

Legal Relations of the Contract of International Carriage of Goods by Air (국제항공화물운송계약(國際航空貨物運送契約)의 법률관계(法律關係) -화주(貨主)의 권리의무(權利義務)를 중심(中心)으로-)

  • Lee, Kang-Bin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.193-222
    • /
    • 1989
  • The purpose of this study is to review the rights and duties of cargo owners, the party to the contract of international carriage of goods by air under the Warsaw Convention System and the IATA conditions. It is generally known that air freight is the most-cost mode of transportation. However, should there be considerations of total distribution cost, the use of air freight leads exporters to be advantageous in physical distribution. The Warsaw Convention System defined and limited the rights and duties of cargo owners and air carriers paticipating in the international carriage of goods, but it does not regulate every aspect of air transportation. Therefore, the unregulated parts are governed by national laws and by individual contracts of carriage. The International Air Transport Association(lATA), a worldwide organization of airlines, has formulated model conditions of contract for the carriage of cargo. These models are not uniformly followed but they serve as a basis for many of the individual standard form of contracts prepared by air carriers. The contract of air carriage of goods is a contract of adhesion, 'the consignor recognizing and accepting the conditions laid down by the carrier'. There are consignors and carriers as the parties to the contract of international carriage of goods. In addition to his basic right, implied in Warsaw Convention Article 18 and 19, to require devery of the goods in good condition and at the date agreed upon, the consignor has the right to dispose the goods in the course of the journey up to the moment when the consignee is entitled to require delivery. If it is impossible to carry out the orders of the consignor, the carrier must so inform him forthwith. The right conferred on the consignor ceases at the moment when that of the consignee begins in accordance with Warsaw Convention Article 13. Nevertheless, if the consignee declines to accept the air waybill or the goods, or if he cannot be communicated with, the consignor resumes his right of disposition. Unless it is otherwise agreed, it is the duty of the carrier to give notice to the consignee as soon as the goods arrive. The consignee is entitled, on arrival of the goods at the place of destination, to require the carrier to hand over to him the air waybill and to deliver the goods to him, on payment of the charges due and on complying with the conditions of carriage set out in the air waybill. The air waybill is supposed to be made out by the consignor. If the carrier makes it out, he is deemed, subject to proof to the contrary, to have done so on behalf of the consignor, whether there is one air waybill or several, each must be made out in three original parts. The first is for the carrier, the second is for the consignee, and the the third is handed to the consignor when the shipment has been accepted. The consignor is responsible for the correctness of the particulars and statement concerning the cargo appearing in the air waybill. Each of the original parts of the air waybill has evidential value and possession of his part is a condition for the exercise by the consignor or consignee of his rights under the contract of carriage. Hague Protocol set forth in Article 9 that nothing in this. Convention prevents the issue of a negotiable air waybill, but Montreal Additional Protocol No. 4 deleted this article. All charges applicable to a shipment are payable in cash at the time of acceptance thereof by the carrier in case of a prepaid shipment or at the time of delivery thereof by the carrier in case of a collect shipment. The carrier shall have lien the cargo for unpaid charges and, in the event of non-payment thereof, shall have the right to dispose of the cargo at public or private sale and pay itself out of the proceeds of such sale any and all such amounts. In conclusion, the Warsaw Convention System has the character of ambiguity in various respects, not only in the part of the forms of documents but also in conditions of contract. Accordingly, the following propositions might be considered: (1) If the carrier does not obey the orders of the consignor for the disposition of the goods without proper reasons, he will be liable strictly for any damage which may be caused thereby to the cargo owner. The special agreement and carrier's conditions of carriage which limit unreasonably the consignor's right of disposition of the goods will be nullified. (2) The instrument of the Warsaw Convention System which is not yet in force(Montreal Additional Protocol No. 4) would considerably simplfy the processing and keeping of computerized records of the carriage. Until this instrument enters into force, the airlines will be faced with practical problems preventing them to substitute computerized data processing techniques for the formal issuance of the documents. Accordingly, Montreal Additional Protocol No. 4 should become effective as soon as posisble. From a practical point of view in the international trade, the issuance of negotiable air waybill should be permitted for the security of the bank.

  • PDF

Improved Original Entry Point Detection Method Based on PinDemonium (PinDemonium 기반 Original Entry Point 탐지 방법 개선)

  • Kim, Gyeong Min;Park, Yong Su
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.6
    • /
    • pp.155-164
    • /
    • 2018
  • Many malicious programs have been compressed or encrypted using various commercial packers to prevent reverse engineering, So malicious code analysts must decompress or decrypt them first. The OEP (Original Entry Point) is the address of the first instruction executed after returning the encrypted or compressed executable file back to the original binary state. Several unpackers, including PinDemonium, execute the packed file and keep tracks of the addresses until the OEP appears and find the OEP among the addresses. However, instead of finding exact one OEP, unpackers provide a relatively large set of OEP candidates and sometimes OEP is missing among candidates. In other words, existing unpackers have difficulty in finding the correct OEP. We have developed new tool which provides fewer OEP candidate sets by adding two methods based on the property of the OEP. In this paper, we propose two methods to provide fewer OEP candidate sets by using the property that the function call sequence and parameters are same between packed program and original program. First way is based on a function call. Programs written in the C/C++ language are compiled to translate languages into binary code. Compiler-specific system functions are added to the compiled program. After examining these functions, we have added a method that we suggest to PinDemonium to detect the unpacking work by matching the patterns of system functions that are called in packed programs and unpacked programs. Second way is based on parameters. The parameters include not only the user-entered inputs, but also the system inputs. We have added a method that we suggest to PinDemonium to find the OEP using the system parameters of a particular function in stack memory. OEP detection experiments were performed on sample programs packed by 16 commercial packers. We can reduce the OEP candidate by more than 40% on average compared to PinDemonium except 2 commercial packers which are can not be executed due to the anti-debugging technique.

An Analysis of IT Trends Using Tweet Data (트윗 데이터를 활용한 IT 트렌드 분석)

  • Yi, Jin Baek;Lee, Choong Kwon;Cha, Kyung Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.143-159
    • /
    • 2015
  • Predicting IT trends has been a long and important subject for information systems research. IT trend prediction makes it possible to acknowledge emerging eras of innovation and allocate budgets to prepare against rapidly changing technological trends. Towards the end of each year, various domestic and global organizations predict and announce IT trends for the following year. For example, Gartner Predicts 10 top IT trend during the next year, and these predictions affect IT and industry leaders and organization's basic assumptions about technology and the future of IT, but the accuracy of these reports are difficult to verify. Social media data can be useful tool to verify the accuracy. As social media services have gained in popularity, it is used in a variety of ways, from posting about personal daily life to keeping up to date with news and trends. In the recent years, rates of social media activity in Korea have reached unprecedented levels. Hundreds of millions of users now participate in online social networks and communicate with colleague and friends their opinions and thoughts. In particular, Twitter is currently the major micro blog service, it has an important function named 'tweets' which is to report their current thoughts and actions, comments on news and engage in discussions. For an analysis on IT trends, we chose Tweet data because not only it produces massive unstructured textual data in real time but also it serves as an influential channel for opinion leading on technology. Previous studies found that the tweet data provides useful information and detects the trend of society effectively, these studies also identifies that Twitter can track the issue faster than the other media, newspapers. Therefore, this study investigates how frequently the predicted IT trends for the following year announced by public organizations are mentioned on social network services like Twitter. IT trend predictions for 2013, announced near the end of 2012 from two domestic organizations, the National IT Industry Promotion Agency (NIPA) and the National Information Society Agency (NIA), were used as a basis for this research. The present study analyzes the Twitter data generated from Seoul (Korea) compared with the predictions of the two organizations to analyze the differences. Thus, Twitter data analysis requires various natural language processing techniques, including the removal of stop words, and noun extraction for processing various unrefined forms of unstructured data. To overcome these challenges, we used SAS IRS (Information Retrieval Studio) developed by SAS to capture the trend in real-time processing big stream datasets of Twitter. The system offers a framework for crawling, normalizing, analyzing, indexing and searching tweet data. As a result, we have crawled the entire Twitter sphere in Seoul area and obtained 21,589 tweets in 2013 to review how frequently the IT trend topics announced by the two organizations were mentioned by the people in Seoul. The results shows that most IT trend predicted by NIPA and NIA were all frequently mentioned in Twitter except some topics such as 'new types of security threat', 'green IT', 'next generation semiconductor' since these topics non generalized compound words so they can be mentioned in Twitter with other words. To answer whether the IT trend tweets from Korea is related to the following year's IT trends in real world, we compared Twitter's trending topics with those in Nara Market, Korea's online e-Procurement system which is a nationwide web-based procurement system, dealing with whole procurement process of all public organizations in Korea. The correlation analysis show that Tweet frequencies on IT trending topics predicted by NIPA and NIA are significantly correlated with frequencies on IT topics mentioned in project announcements by Nara market in 2012 and 2013. The main contribution of our research can be found in the following aspects: i) the IT topic predictions announced by NIPA and NIA can provide an effective guideline to IT professionals and researchers in Korea who are looking for verified IT topic trends in the following topic, ii) researchers can use Twitter to get some useful ideas to detect and predict dynamic trends of technological and social issues.

DEM Generation over Coastal Area using ALOS PALSAR Data - Focus on Coherence and Height Ambiguity - (ALOS PALSAR 자료를 이용한 연안지역의 DEM 생성 - 긴밀도와 고도 민감도 분석을 중심으로 -)

  • Choi, Jung-Hyun;Lee, Chang-Wook;Won, Joong-Sun
    • Korean Journal of Remote Sensing
    • /
    • v.23 no.6
    • /
    • pp.559-566
    • /
    • 2007
  • The generation of precise digital elevation model (DEM) is very important in coastal area where time series are especially required. Although a LIDAR system is useful in coastal regions, it is not yet popular in Korea mainly because of its high surveying cost and national security reasons. Recently, precise DEM has been made using radar interferometry and waterline methods. One of these methods, spaceborne imaging radar interferometry has been widely used to measure the topography and deformation of the Earth. We acquired ALOS PALSAR FBD mode (Fine Beam Dual) data for evaluating the quality of interferograms and their coherency. We attempted to construct DEM using ALOS PALSAR pairs - One pair is 2007/05/22 and 2007/08/22, another pair is 2007/08/22 and 2007/10/22 with respective perpendicular baseline of 820 m, 312m and respective height sensitivity of 75 m and 185m at southern of Ganghwa tidal flat, Siwha- and Hwaong-lake over west coastal of Korea peninsula. Ganghwa tidal flat has low coherence between 0.3 and 0.5 of 2007/05/22 and 2007/08/22 pair. However, Siwha-lake and Hwaong-lake areas have a higher coherence value (From 0.7 and 0.9) than Ganghwa tidal area. The reason of difference coherence value is tidal condition between tidal flat area (Ganghwa) and reclaimed zone (Siwha-lake and Hwaong-lake). Therefore, DEM was constructed by ALOS PALSAR pair over Siwha-lake and Hwaong-lake. If the temporal baseline is enough short to maintain the coherent phases and height sensitivity is enough small, we will be able to successfully construct a precise DEM over coastal area. From now on, more ALOS PALSAR data will be needed to construct precise DEM of West Coast of Korea peninsular.

Development Process and Methods of Audit and Certification Toolkit for Trustworthy Digital Records Management Agency (신뢰성 있는 전자기록관리기관 감사인증도구 개발에 관한 연구)

  • Rieh, Hae-young;Kim, Ik-han;Yim, Jin-Hee;Shim, Sungbo;Jo, YoonSun;Kim, Hyojin;Woo, Hyunmin
    • The Korean Journal of Archival Studies
    • /
    • no.25
    • /
    • pp.3-46
    • /
    • 2010
  • Digital records management is one whole system in which many social and technical elements are interacting. To maintain the trustworthiness, the repository needs periodical audit and certification. Thus, individual electronic records management agency needs toolkit that can be used to self-evaluate their trustworthiness continuously, and self-assess their atmosphere and system to recognize deficiencies. The purpose of this study is development of self-certification toolkit for repositories, which synthesized and analysed such four international standard and best practices as OAIS Reference Model(ISO 14721), TRAC, DRAMBORA, and the assessment report conducted and published by TNA/UKDA, as well as MoRe2 and current national laws and standards. As this paper describes and demonstrate the development process and the framework of this self-certification toolkit, other electronic records management agencies could follow the process and develop their own toolkit reflecting their situation, and utilize the self-assessment results in-house. As a result of this research, 12 areas for assessment were set, which include (organizational) operation management, classification system and master data management, acquisition, registration and description, storage and preservation, disposal, services, providing finding aids, system management, access control and security, monitoring/audit trail/statistics, and risk management. In each 12 area, the process map or functional charts were drawn and business functions were analyzed, and 54 'evaluation criteria', consisted of main business functional unit in each area were drawn. Under each 'evaluation criteria', 208 'specific evaluation criteria', which supposed to be implementable, measurable, and provable for self-evaluation in each area, were drawn. The audit and certification toolkit developed by this research could be used by digital repositories to conduct periodical self-assessment of the organization, which would be used to supplement any found deficiencies and be used to reflect the organizational development strategy.

The Sillok as National Supreme Archives : An archival interpretation (실록(實錄) : 등록(謄錄)의 위계(位階))

  • O, Hang-Nyeong
    • The Korean Journal of Archival Studies
    • /
    • no.3
    • /
    • pp.91-113
    • /
    • 2001
  • History always be re-interpreted as the time flows. 'The Sillok', Which was registered in Memory of World of UNESCO in 1997, is comprehensive documents of the Chosun Dynasty, which had been compiled after kings' death, The Sillok encompasses 473 years of the reign in their 848 volumes(1,893 chapters). It was a history itself and has been main source in studying Korean history. Due to the rise of studies on the Sillok, time has come to explore the nature of the Sillok and to criticize the text, which would be called 'The Sillok-Study'. In this context, this paper examined three concepts that categorize the nature of the Sillok as historical materials ;Is it book or record?; The Sillok in register system in pre-modern society; And the Sillok as the National Archives. Korean historians, including myself, haven't yet examined the question whether the Sillok is the Book or Record in terms of archival science. At first, I regarded it as history book, and with this presupposition, wrote several papers on the characteristics of the Sillok. However, I recognized that the Sillok are close to record rather that history book as I examined the definition of glossary of librarian study, OED (Oxford English Dictionary) and Encyclopedia of Britannica, etc. Definitely, the Sillok was neither compiled and published to be read and sold publicly, nor meant to the works of literature or scholarship. one may say that the court-historians wrote comments on the facts and therefore it was just scholarly work. However, because the court-historians produced their comments on their own businesses, the outcome of 'their scholarly works' were also records conceptually, as were daily court-journalists in Rome. Its publication also had a absolutely different meaning from that of modern society. It was a method to preserve the important national records and distributed each edition of them to plural repositories for its safety and security. How can we explain its book-like shape and the procedure of compilation after a kings' death. The answer is as follows ; In pre-modern society, it was a common record-keeping system in the world to register records materials in order to arrange the materials of different sizes and to store them conveniently. And the lack of scientific preservation or conservation skill also encouraged them to register original records. Actually, the court-historians who participated in the compiling process called themselves "registering officers". On the other hand, similar to social hierarchy, there was a hierarchical system of records, and the Sillok was placed at the top of this hierarchy. In conclusion, the Sillok was a kind of registered records in the middle ages and the supreme records in the records-world. In addition to this we can also conceptualize the Sillok as archives. Through the compiling process, the most important and valuable records were selected to be the parts of Sillok. This process corresponds to the modem records appraisal. In the next step, it was preserved in the Four Archives(史庫) which located at remote site as archives and only accessible by the descendents in the future, who might be the people of the next dynasty. And nobody could access or read the documents at that time except the authorized court-historians who were archivists of the Chosun Dynasty. From this perspective, I conclude that Sillok was the supreme confidential archives in the register system. I work for the Government Archives as a historian and archivist. Whenever I entered the exhibition hall of the Government Archives and Records Service(GARS) and saw the replica of the Archives of Taebeak Mountain built during Chosun period, I always asked to myself a question whether the Sillok can be a symbol of the archival tradition of Korea and the GARS. Now, I can say, 'Yes!' definitely.

Traffic Operation Strategy for the Mixed Traffic Flow on Autonomous Vehicle Pilot Zone: Focusing on Pangyo Zero City (자율주행차 혼재 시 시범운행지구 교통운영전략 수립: 판교제로시티를 중심으로)

  • Donghyun Lim;Woosuk Kim;Jongho Kim;Hyungjoo Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.1
    • /
    • pp.172-191
    • /
    • 2023
  • This study was undertaken to strategize the mixed traffic operation of autonomous vehicles in the pilot zone. This was achieved by analyzing the changes expected when autonomous vehicles are mixed in the autonomous vehicle pilot zone. Although finding a safe and efficient traffic operation strategy is required for the pilot zone to serve as a test bed for autonomous vehicles, there is no available operation strategy based on the mixture of autonomous vehicles. In order to presents a traffic operation strategies for each period of autonomous vehicle introduction, traffic efficiency and safety analysis was performed according to the autonomous vehicle market percentage rate. Based on the analysis results, the introduction stage was divided into introductory stage, transition period, and stable period based on the autonomous vehicle market share of 30% and 70%. This study presents the following traffic operation strategies. Considering the traffic flow operation strategy, we suggest the advancement of the existing road infrastructure at the introductory stage, and operating an autonomous driving lane and the mileage system during the transition period. We also propose expanding the operation of autonomous driving lanes and easing the speed limit during the stable period. In the traffic safety strategy, we present a manual and legal system for responding to autonomous vehicle accidents in the introductory stage, an analysis of the causes of autonomous vehicle accidents and the implementation of preventive policies in the transition period, and the advancement of the autonomous system and the reinforcement of the security system during the stable period. Through the traffic operation strategy presented in this study, we foresee the possibility of preemptively responding to the changes of traffic flow and traffic safety expected due to the mixture of autonomous vehicles in the autonomous vehicle pilot zone in the future.