• 제목/요약/키워드: Systems and policies

검색결과 1,575건 처리시간 0.027초

보안 실시간 데이터베이스 시스템에서 시간성 향상을 위한 동적 암호화 관리자에 관한 연구 (A Study on the Dynamic Encryption Manager for Improved Timeliness in Secure Real-Time Database Systems)

  • 이순조
    • 한국정보통신학회논문지
    • /
    • 제9권1호
    • /
    • pp.210-216
    • /
    • 2005
  • 대부분의 실시간 응용에서 보안은 또 하나의 중요한 요구 사항이 되고 있다. 따라서 보안 실시간 데이터베이스 시스템은 다양한 보안 등급을 갖는 여러 사용자가 공유하거나 악의를 갖은 해커에 의해 공격될 수 있는 민감한 정보를 관리해야 한다. 보안 실시간 데이터베이스 시스템이 보안을 위해서는 기존의 보안 방법뿐만 아니라 암호화 정책을 적용하는 것이 필요하다. 그렇지만 민감한 정보가 실시간 시스템에서도 보호되어야만 함에도 불구하고 보안 실시간 데이터베이스 시스템에서 암호화정책을 지원하기 위한 연구가 많지 않았다. 본 논문에서는 보안 실시간 데이터베이스 시스템의 이러한 암호화 정책 문제를 해결하기 위한 암호화 관리자를 제안한다. 보안 실시간 데이터베이스 시스템의 암호화 정책에서 중요한 것은 보안성과 시간성이다. 제안된 암호화 관리자의 중요한 특징은 트랜잭션 데드라인과 보안 수준을 고려하여 데이터를 동적으로 암호화하는 것이다.

A study on the status and support policies of the small wholesale vendor in Korea

  • Lee, Sang-Youn
    • 동아시아경상학회지
    • /
    • 제4권4호
    • /
    • pp.24-32
    • /
    • 2016
  • There hardly have been support policies for small wholesale vendors or any materials such as proper statistical standards and figures compared to diversity of support policies and size of budget for small and medium manufacturing business. The biggest concern coming from it is that there have never been any policies for small and medium wholesale vendors. This study proposes some ways to improve support policies through investigating the current status of those vendors as their true values haven't been properly recognized, while diverse support systems have been devised for manufacturing business thanks to the traditional industrial development process. According to the study on support policies for domestic and international small and medium wholesale vendors, I realized that those vendors need a policy to ensure them to be promptly adjusted to the rapidly changing distribution environment and to be competitive to access to the global distribution market to finally become hidden champions through systematical operations of small and medium wholesale vendors and implementing educational business through sales management. Therefore, I propose five ways to improve support policies for small and medium wholesale vendors by considering social and economic value, systematizing small wholesalers and scaling small and medium wholesale vendors, reinforcing support for wholesalers, support policies for new online market opening and offline market opening.

다단계 생산시스템에서 재작업정책의 비교분석 (Comparative Analysis of Rework Policies in Multistage Production System)

  • 신재선;한주윤;정봉주
    • 대한산업공학회지
    • /
    • 제32권1호
    • /
    • pp.29-41
    • /
    • 2006
  • As the quality and environmental problems become one of the most concerned issues of company, the rework policy needs to be efficiently designed and implemented to sustain the company's competitiveness. This paper examines three basic rework policies in multi-stage production systems and analyzes them in terms of costs of setup, production, inspection, and inventory. For analyzing the performance of the rework policies, we propose mathematical models which can compute total production cost and determine the optimal production batch size to minimize the total production cost. The rework policies are classified by the number and location of inspection stages. Using the mathematical models, we could analyze the performances of rework policies and suggest the optimal rework policy according to each manufacturing environment. The analyses show that the proposed model can be used to analytically evaluate and choose the rework policies.

정보통신정책의 인과지도 분석 (A Study on the Causal Map Analysis of the Information and Communication Policy)

  • 박제석
    • 한국시스템다이내믹스학회:학술대회논문집
    • /
    • 한국시스템다이내믹스학회 2004년도 하계 학술대회 발표논문집
    • /
    • pp.109-128
    • /
    • 2004
  • The complexity of information and communication policy has been increasing due to its rapid changes and its expansions toward various fields. I used the2001, 2002 and 2003 White Papers on MIC(Ministry of Information and Communication Republic of Korea) as a reference and the Vensim PLE program to create a causal map. According to my analysis, no major feedback loop was found among the information and communication policies. Thus, it was impossible to conduct a causal map analysis on these policies. The causal map analysis is usually employed to understand a complex mechanism of entire policies by finding feedback loops among them. A lack of feedback loops makes it impossible to conduct the causal map analysis and means that the mechanism of such policies is even more complex to understand. The most important conclusion is that to consider feedback thought among the policies based on the systems thinking before making the policies.

  • PDF

두 가지 크기의 단위를 가진 자동창고의 효율적인 운영방안 (Effective Operation Policies of AS/RS with Two Different Sized Units)

  • 최효돈;문기주
    • 산업경영시스템학회지
    • /
    • 제21권46호
    • /
    • pp.137-146
    • /
    • 1998
  • Most studies related to AS/RS are about operation policies or system designs. However, the studies on operation policy could not deal with various products using the single unit load system. In this paper, two different sized units are introduced and six different AS/RS operation policies are developed to process the different sized items. Computer simulation is used to evaluate AS/RS performances on various operation policies and to find the most effective operation policy for each case. The simulation model is developed using GPSS/PC and operation policies include COL-FIFO-SP, SIL-FIFO-SP, COL-RN-SP, COL-FIFO-LP, SIL-FIFO-LP and COL-RN-LP. The policies are evaluated based on the criteria of crane utilization, rack utilization, crane moving time, throughput and waiting time.

  • PDF

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF

정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로 (The Effects of Information Security Policies, Security Controls and User's Characteristics on Anti-Virus Security Effectiveness)

  • 김종기;전진환;임호섭
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제15권1호
    • /
    • pp.145-168
    • /
    • 2006
  • Current computer viruses are one of the most serious problems in information age due to their potential demage and impact on use of information systems. To make the problem worse, virus development technology has been advanced rapidly, and use of network systems has expanded widely. Therefore computer viruses are much more complex and use of anti-virus software(AV S/W) is not enough to prrevent virus incidents. It implies that computer viruses as well as other information security matters are not solely a technical problem but also a managerial one. This study emphasized on computer virus controls from managerial perspective of information security and investigated factors influencing the effectiveness of computer virus controls. Organization's comprehensive security policies provide guidelines on how organization or individual can protect themselves from computer viruses. Especially, user's education has positive impact on user's security related characteristics. Based on the analysis of research model using structural equation modeling technique, security policies were influencing security controls and improving user's computer viruses related awareness. Also security controls had positive impact on security effectiveness. However, no significant relationship was found between user's security related characteristics and security effectiveness.

  • PDF

우리나라 물류비 절감을 위한 물류정책의 효율성 제고방안에 관한 연구 (A Study on the Improvement of Korean Logistics Policies)

  • 박광서;유광현
    • 무역상무연구
    • /
    • 제45권
    • /
    • pp.139-163
    • /
    • 2010
  • Companies make a great effort for saving costs because a rise in logistics costs weaken trade companies competitive position in the international market. Therefore it is important for companies and government to enhance logistics competitive. This article focus on the logistics laws and policies to improvement companies competitiveness and save logistics costs. It has researched from the point of view rather government basis than company basis. Korean Logistics policies have some fundamental problems that the law and policies are spreaded to several administrations such as, Ministry of Knowledge Economy, Ministry of Land, Transport and Maritime Affairs etc. We propose the solutions as follows; First of all, we review the laws and policies on logistics and point out the problems. Second, setting up the principle of Korean Logistics Policies according to the changes in international logistics paradigm and circumstances. Third, adjustment of systems and tasks of administrations related to logistics. Fourth, innovation plan for logistics policies. The plan can carry out two ways demonstration business and diffusion business in order.

  • PDF

분산 데이터베이스 시스템에서의 최적 파일 이동 정책 (Optimal File Migration Policies in Distributed Database Systems)

  • 이기태;김재련
    • 산업경영시스템학회지
    • /
    • 제18권33호
    • /
    • pp.1-10
    • /
    • 1995
  • The allocation of files is essential to the efficiency and effectiveness of a distributed system that must meet geographically dispersed data processing demands. In this paper, we address an optimization model that generates optimal file migration policies in distributed database systems. The proposed model is a more generalized model that includes system's capacity constraints - computing sites' storage capacity and communication networks' capacity - which have not taken into consideration in previous researches. Using this model, we can establish initial file allocation, file reallocation and file migration polices that minimize a system operating cost under system's capacity constraints at an initial system design or reorganization point The proposed model not only can be adopted by small-sized systems but also provides a foundation for effective and simple heuristics for adaptive file migration in large systems.

  • PDF

토지정책 추진체계 변화 연구 (Analyzing the Implement System Shift of Land Policies)

  • 김미숙;윤정란;박상학
    • 토지주택연구
    • /
    • 제2권4호
    • /
    • pp.439-452
    • /
    • 2011
  • 본 연구는 토지이용을 둘러싼 정책 환경변화에 따라 우리나라의 토지정책 추진체계의 변화가 필요한 시점에서 지금까지 우리나라 토지정책추진체계를 분석하고 향후 방향을 제시하고자 하였다. 이를 위해 1960년대 이후부터 최근까지 시대별 유형별로 우리나라 토지정책의 변화에 따라 토지정책의 추진체계가 어떻게 변화하였는지 추이를 살펴보았다. 분석결과 우리나라 토지정책 추진체계의 특징은 첫째, 1960년대 이래 최근까지 대규모 및 신속한 개발을 뒷받침하는 방향으로 정립되어 왔다. 둘째, 경제개발이후 우리나라의 토지정책 추진체계는 영역별로 전문화를 이루어왔지만, 개발과 보전이 조화를 이룰 수 있도록 통합적 관리를 위한 조직체계는 부족했다. 셋째, 토지이용관련 중앙정부의 권한을 지방에 이양 및 토지개발에서 민간 및 주민참여를 확대해왔다. 넷째, 토지와 관련된 정보 관리 목적이 조세징수에서 점차 토지시장 관리, 계획적 토지이용이라는 측면으로 강조점이 변화되어가고 있는데, 계획적 이용과 관리에는 부합하지 못하고 있다. 본 연구의 시사점 및 향후 추진체계의 개편 방향은 첫째, 토지이용을 둘러싼 여건변화 및 외국의 사례를 볼 때 토지수요가 안정화될 가능성이 높으므로, 대규모 개발 중심의 추진체계에서 탈피할 필요가 있다. 둘째, 향후 인구감소 및 기후변화 등으로 토지자원의 효율적 이용 및 보전적 토지이용이 중요해질 것이므로 이에 대응할 수 있는 추진체계가 필요하다. 셋째, 다양한 주체의 참여 확대와 실질적인 역할을 할 수 있는 방안이 필요하다. 넷째, 토지정보관리를 통합적 체계적으로 구축할 수 있는 추진체계 정비가 필요가 있다.