• Title/Summary/Keyword: User Defined Rules

Search Result 53, Processing Time 0.025 seconds

The Access Control System of Network Management Information Base (망관리 정보베이스 접근 제어 시스템)

  • Kim, Jong-Duk;Lee, Hyung-Hyo;Noh, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1246-1256
    • /
    • 1998
  • MIB(Management Information Base), one of the key components of network management system, is a conceptual repository for the information of the various managed objects. MIB stores and manages all the structural and operational data of each managed resources. Therefore, MIB should be protected properly from inadvertant user access or malicious attacks. International standard ISO/IEC 10164-9 describes several managed object classes for the enforcement of MIB security. Those managed object classes described access control rules for security policy. But the exact authorization procedures using those newly added managed object classes are not presented. In this paper, we divide managed object classes into two groups, explicit and implicit ones, and describe the access authorization procedure in Z specification language. Using Z as a description method for both authorization procedure and GDMO's action part, the behaviour of each managed object class and access authorization procedure is more precisely and formally defined than those of natural language form.

  • PDF

Specification and Simulation Environment for Prototying the Object Model (객체 모델의 프로토파이핑을 위한 명세 및 시물레이션 환경)

  • Jung, Lan;Kim, Jung-A;Moon, Chung-Ryeal;Kim, Jung-Doo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.5
    • /
    • pp.1243-1256
    • /
    • 1997
  • Object modeling has been cinsidered as an efficient technique for eleciting user requirements and communicat-ing between developers and customers. But model itself is not easy to understand what recult will be after coding and whether it will be meet with the requirements of customers. In this paper, we developed the envuroment for visualization of object model for validating with rewuirnent at the early stage. Therefore, we defined correct and complete rules which can transform the object model.the delierables of Shler/Mellor's method, into a for-mal specification language of VDM(Vienna Development Methods) with a mathematical basis. This basis provides the means of proving that a specification is realizable and proving properties of a system.Therefore.the completeness, preciceness of object model can be verified by proving the transformed VDM specification and prototyping by constructing a visualization supporting enviroment.

  • PDF

Rule-base Expert System for Privacy Violation Certainty Estimation (개인정보유출 확신도 도출을 위한 전문가시스템개발)

  • Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.125-135
    • /
    • 2009
  • Logs from various security system can reveal the attack trials for accessing private data without authorization. The logs can be a kind of confidence deriving factors that a certain IP address is involved in the trial. This paper presents a rule-based expert system for derivation of privacy violation confidence using various security systems. Generally, security manager analyzes and synthesizes the log information from various security systems about a certain IP address to find the relevance with privacy violation cases. The security managers' knowledge handling various log information can be transformed into rules for automation of the log analysis and synthesis. Especially, the coverage of log analysis for personal information leakage is not too broad when we compare with the analysis of various intrusion trials. Thus, the number of rules that we should author is relatively small. In this paper, we have derived correlation among logs from IDS, Firewall and Webserver in the view point of privacy protection and implemented a rule-based expert system based on the derived correlation. Consequently, we defined a method for calculating the score which represents the relevance between IP address and privacy violation. The UI(User Interface) expert system has a capability of managing the rule set such as insertion, deletion and update.

Generating Training Dataset of Machine Learning Model for Context-Awareness in a Health Status Notification Service (사용자 건강 상태알림 서비스의 상황인지를 위한 기계학습 모델의 학습 데이터 생성 방법)

  • Mun, Jong Hyeok;Choi, Jong Sun;Choi, Jae Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.1
    • /
    • pp.25-32
    • /
    • 2020
  • In the context-aware system, rule-based AI technology has been used in the abstraction process for getting context information. However, the rules are complicated by the diversification of user requirements for the service and also data usage is increased. Therefore, there are some technical limitations to maintain rule-based models and to process unstructured data. To overcome these limitations, many studies have applied machine learning techniques to Context-aware systems. In order to utilize this machine learning-based model in the context-aware system, a management process of periodically injecting training data is required. In the previous study on the machine learning based context awareness system, a series of management processes such as the generation and provision of learning data for operating several machine learning models were considered, but the method was limited to the applied system. In this paper, we propose a training data generating method of a machine learning model to extend the machine learning based context-aware system. The proposed method define the training data generating model that can reflect the requirements of the machine learning models and generate the training data for each machine learning model. In the experiment, the training data generating model is defined based on the training data generating schema of the cardiac status analysis model for older in health status notification service, and the training data is generated by applying the model defined in the real environment of the software. In addition, it shows the process of comparing the accuracy by learning the training data generated in the machine learning model, and applied to verify the validity of the generated learning data.

A study on macro detection using information of touch events in Android mobile game environment (안드로이드 모바일 게임 환경에서의 터치 이벤트 정보를 이용한 매크로 탐지 기법 연구)

  • Kim, Jeong-hyeon;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1123-1129
    • /
    • 2015
  • Macro(automatic hunting) of mobile game is a program that touch the screen by defined rules like a game bot in PC online games, and it is used by make various ways like android application or windows application program. This gives honest users deprivation and make to lose their interest. Finally they would leave the game and gradually game life would be shorten. Although many studies to prevent these problems in PC online game are conducted, applying mobile game to PC's way is difficult because mobile games are limited to use the network and device performance is different with PC. In this paper, we propose a framework for macro detection by using the touch event information. A touch event on the mobile game is a necessary control command to the game. Because macro touches the screen with the same pattern, there is a difference between normal user's behavior and macro's operation. In mobile games that casual games are mostly, Touch event is the best difference that identify normal user against macro for a short period of time. As a result of detecting macros used in real mobile game by using the proposed framework it showed 100% accuracy and 0% false positive rate.

Object Modeling for Mapping from XML Document and Query to UML Class Diagram based on XML-GDM (XML-GDM을 기반으로 한 UML 클래스 다이어그램으로 사상을 위한 XML문서와 질의의 객체 모델링)

  • Park, Dae-Hyun;Kim, Yong-Sung
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.129-146
    • /
    • 2010
  • Nowadays, XML has been favored by many companies internally and externally as a means of sharing and distributing data. there are many researches and systems for modeling and storing XML documents by an object-oriented method as for the method of saving and managing web-based multimedia document more easily. The representative tool for the object-oriented modeling of XML documents is UML (Unified Modeling Language). UML at the beginning was used as the integrated methodology for software development, but now it is used more frequently as the modeling language of various objects. Currently, UML supports various diagrams for object-oriented analysis and design like class diagram and is widely used as a tool of creating various database schema and object-oriented codes from them. This paper proposes an Efficinet Query Modelling of XML-GL using the UML class diagram and OCL for searching XML document which its application scope is widely extended due to the increased use of WWW and its flexible and open nature. In order to accomplish this, we propose the modeling rules and algorithm that map XML-GL. which has the modeling function for XML document and DTD and the graphical query function about that. In order to describe precisely about the constraint of model component, it is defined by OCL (Object Constraint Language). By using proposed technique creates a query for the XML document of holding various properties of object-oriented model by modeling the XML-GL query from XML document, XML DTD, and XML query while using the class diagram of UML. By converting, saving and managing XML document visually into the object-oriented graphic data model, user can prepare the base that can express the search and query on XML document intuitively and visually. As compared to existing XML-based query languages, it has various object-oriented characteristics and uses the UML notation that is widely used as object modeling tool. Hence, user can construct graphical and intuitive queries on XML-based web document without learning a new query language. By using the same modeling tool, UML class diagram on XML document content, query syntax and semantics, it allows consistently performing all the processes such as searching and saving XML document from/to object-oriented database.

COBie-based Building Information Exchange System Framework for Building Facility Management (건축물 유지관리를 위한 COBie기반 건축정보교환체계 프레임웍 연구)

  • Kang, Tae-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.370-378
    • /
    • 2020
  • The Construction Operations Building Information Exchange (COBie) collects and documents a large amount of information from different paths in one place during design and construction projects. This documented information is readily available as a means of continuously transferring data to the facility management systems used by building engineers. In this process, the COBie Worksheet, an open standard form, is used to input the information by simplifying the list required by the user. As a result, COBie was developed to improve dramatically how relevant information is obtained and updated to support operations, maintenance, and asset management at the design and construction stages. On the other hand, to use COBie, a great deal of manual work is required for information linkage and quality inspection with heterogeneous data models. These issues become obstacles to COBie-based facility management system development. This study analyzed the COBie information system and defined the framework for simpler operating maintenance information from BIM (Building Information Modeling). Moreover, the rules for facility management information submission, quality inspection, role definition of framework components, and information linkage were derived. COBie DB schema and support data linkages could be generated effectively based on the proposed framework in prototype development.

Design and Implementation of a WML Converter and WML Editor for Automatic Generation of Wireless Internet Content (무선 인터넷 컨텐츠의 자동 생성을 위한 WML 변환기와 WML 편집기의 설계 및 구현)

  • Jeon Yun-Ju;Choi Eun-Hye;Jung Hyun-Suk;Cho Hyeyoung;Lee Minsoo;Yong Hwan-Seung
    • The KIPS Transactions:PartD
    • /
    • v.12D no.2 s.98
    • /
    • pp.309-318
    • /
    • 2005
  • In order to present wireless Internet users with previously created HTML contents and applications, it is essential to research and develop the technology to efficiently convert HTML documents into documents and further provide a way to edit the WML documents. This paper describes the design and development of a WML converter and WML editor The WML converter can convert HTML pages in real time into WML documents that are suitable for the WAP environment. The WML editor enables creation and modification of WML documents in a WYSIWYG fashion. These tools enable the previous services based on HTML documents to be easily adapted to the wireless environment. The developed WML converter can be installed on a proxy server to support real time conversion of Web contents. It is superior to other converters in terms of the various image formats it supports and the improvements on the conversion of the link and frame tags. Users can continuously browse via links and also view frames. Automatic dividing of large WML documents into WML cards md user defined conversion rules are also supported. The WML editor is also integrated with the converter and provides an integrated WYSIWYG environment for creating, converting and publishing WML documents.

A Study on Archive Description Using RiC-CM (RiC-CM을 적용한 영구기록물 기술방안 연구)

  • Kim, Soohyun;Lee, Sungsook
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.20 no.1
    • /
    • pp.115-137
    • /
    • 2020
  • This study aims to examine the limitations of status that describe archives based on the Archival rules, and to propose a new method using the Records in Context - Conceptual model (RiC-CM) as a solution. Given this, the study conducted literature reviews and case studies. The solutions based on RiC-CM and its effects on the limitations of the existing environment are as follows. First, RiC-CM can describe multiple provenances about archives. This can be solved by defining individual records and provenances as "entity" and expressing their associations as relationships. The interrelation of entities alone can more accurately represent the information of provenances associated with a particular archive, making it easier to identify the overall context that makes records. Second, RiC-CM can link related files. Those that belong to a specific records group (fonds) can be resolved by assigning them to individual entities and making interrelation according to the context that makes records. This method makes it possible to serve information about the context that makes records. From the user's point of view, more options are available for searching records. Third, RiC-CM can link all relevant producer-made records related to a specific production organization. If organizations are related to each other, they can be defined as "entity," and their relationship can be expressed as "associated with." It helps to comprehensively examine the context of provenances. The findings of this study are expected to be used as a basis for future research on RiC-CM, in response to the paradigm shift for electronic records management systems.

A Rule-driven Automatic Learner Grouping System Supporting Various Class Types (다양한 수업 유형을 지원하는 규칙 기반 학습자 자동 그룹핑 시스템)

  • Kim, Eun-Hee;Park, Jong-Hyun;Kang, Ji-Hoon
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.3
    • /
    • pp.291-300
    • /
    • 2010
  • Group-based learning is known to be an effective means to improve scholastic achievement in online learning. Therefore, there are some previous researches for the group-based learning. A lot of previous researches define factors for grouping from the characteristics of classes, teacher's decision and students' preferences and then generate a group based on the defined factors. However, many algorithms proposed by previous researches depend on a specific class and is not a general approach since there exist several differences in terms of the need of courses, learners, and teachers. Moreover it is hard to find a automatic system for group generation. This paper proposes a grouping system which automatically generate a learner group according to characteristics of various classes. the proposed system automatically generates a learner group by using basic information for a class or additional factors inputted from a user. The proposed system defines a set of rules for learner grouping which enables automatic selection of a learner grouping algorithm tailored to the characteristics of a given class. This rule based approach allows the proposed system to accommodate various learner grouping algorithms for a later use. Also we show the usability of our system by serviceability evaluation.

  • PDF