• 제목/요약/키워드: Violation

검색결과 858건 처리시간 0.023초

HTML 문서의 무결성 유지 시스템의 설계 및 구현 (The Design and Implementation of HTML Document Integrity Management System)

  • 조이기;이영운;황인문;양수영;김원중
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2002년도 춘계종합학술대회
    • /
    • pp.380-383
    • /
    • 2002
  • KLDP(리눅스 한글 문서 프로젝트, http://kldp.org)와 같이 많은 분량의 HTML 문서들로 이루어진 매뉴얼 사이트를 관리하는데 가장 어려운 점은 현수 참조(dangling reference), 오문 참조 (inaccurate content reference)와 같은 깨진 링크(broken link)를 관리하는 것이다. 본 논문에서는 웹사이트의 HTML 문서들 사이에 존재하는 관계성(Relationship)과 제약 조건(Constraints)을 정의하여, HTML 문서의 삽입, 삭제, 변경이 발생할 경우 사용자에게 통지하거나, 트리거를 수행하여 HTML 문서들의 무결성(Integrity)을 유지할 수 있도록 하는 HIMS(HTML Document Integrity Management System)시스템을 설계 및 구현하였다.

  • PDF

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

  • Kang, Jin-Suk;Choi, Yong-Sik;Sung, Mee-Young;Shin, Seung-Ho;Jeong, Tai-Keong T.
    • Journal of information and communication convergence engineering
    • /
    • 제5권3호
    • /
    • pp.254-258
    • /
    • 2007
  • Recently, ubiquitous computing in being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. In this paper, in order to improve the survivability of its nodes, it should build available simulation surrounding sensor nodes. Also, In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on LFSR(Linear Feedback Shift Register) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests.

3D프린팅과 3D모델링의 디자인에 대한 지적재산권 침해확인 방안 (Ensure intellectual property rights for 3D pringting 3D modeling design)

  • 이용규;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 춘계학술대회
    • /
    • pp.305-308
    • /
    • 2016
  • 21C의 새로운 제조혁명이라고 불리는 3D프린팅의 기술이 최근 각광을 받고 있으며, 일반 제조업계 뿐만 아니라 시제품, 교육, 의료, 건축 등 다양한 산업 분야로 영향력이 확산되고 있다. 3D프린터의 도입으로 개인맞춤형 제품을 생산 유통 하게 될 것으로 보인다. 이때 발생하는 타인의 지적재산권에 대한 침해가 발생할 수 있는 가능성이 있어서 이를 미연에 예방할 수 있는 시스템을 제안하고자 한다.

  • PDF

Metered Signatures: How to Restrict the Signing Capability

  • Kim, Woo-Hwan;Yoon, Hyo-Jin;Cheon, Jung-Hee
    • Journal of Communications and Networks
    • /
    • 제12권3호
    • /
    • pp.201-208
    • /
    • 2010
  • We propose a new notion of metered signatures. Metered signature is an extension of k-times signatures in which a signer can generate only k signatures. However, the restriction of metered signatures can be more elaborate: It can be used k-times every day or to preserve the order of signed messages in some applications. Any violation of this regulation reveals a secret key or the signature on a predetermined message. The applications includes proxy signatures, limited free downloads, and the rating web site. We give two instances of metered signatures: One is based on the computational Diffie-Hellman problem (CDHP) using a bilinear map and the other is based on the RSA problem. In both schemes, the signature and certificate size and the verification cost are constant with respect to k. Further, we show that the proposed metered signatures admit batch verification of many signatures almost at one verification cost with small security loss.

전력계통에 있어서 직접법을 활용한 상정사고 위험순위 결정 (Contingency Severity Ranking Using Direct Method in Power Systems)

  • 이상근
    • 전기학회논문지P
    • /
    • 제54권2호
    • /
    • pp.67-72
    • /
    • 2005
  • This paper presents a method to select contingency ranking considering voltage security problems in power systems. Direct method which needs not the detailed knowledge of the post contingency voltage at each bus is used. Based on system operator's experience and knowledge, the membership functions for the MVAR mismatch and allowable voltage violation are justified describing linguistic representation with heuristic rules. Rule base is used for the computation of severity index for each contingency by fuzzy inference. Contingency ranking harmful to the system is formed by the index for security evaluation. Compared with 1P-1Q iteration, this algorithm using direct method and fuzzy inference shows higher computation speed and almost the same accuracy. The proposed method is applied to model system and KEPCO pratical system which consists of 311 buses and 609 lines to show its effectiveness.

신뢰도지수와 목표성능치에 기반한 확률론적 구조설계 최적화기법에 대한 비교연구 (A Comparative Study on Reliability Index and Target Performance Measure Based Probabilistic Structural Design Optimizations)

  • 양영순;이재옥
    • 한국전산구조공학회:학술대회논문집
    • /
    • 한국전산구조공학회 2000년도 가을 학술발표회논문집
    • /
    • pp.32-39
    • /
    • 2000
  • Probabilistic structural design optimization, which is characterized by the so-called probabilistic. constraints which introduce permissible probability of violation, is preferred to deterministic design optimization since unpredictable inherent uncertainties and randomness in structural and environmental properties are to be taken quantitatively into account by probabilistic design optimization. In this paper, the well-known reliability index based MPFP(Most Probable Failure Point) search approach and the newly introduced target performance measure based MPTP(Minimum Performance Target Point) search approach are summarized and compared. The present comparison focuses on the number of iterations required for the estimation of probabilistic constraints and a technique for improvement which removes exhaustive iterations is presented as well. A 10 bar truss problem is examined for this.

  • PDF

비선형 헤르쯔 접촉스프링과 변위제한조건식의 적용에 의한 차량-궤도-교량 동적상호작용 수치해석기법 (Simulation of Vehicle-Track-Bridge Dynamic Interaction by Nonlinear Hertzian Contact Spring and Displacement Constraint Equations)

  • 정근영;이성욱;민경주
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2005년도 추계학술대회 논문집
    • /
    • pp.191-196
    • /
    • 2005
  • In this study, to describe vehicle-track-bridge dynamic interaction phenomena with 1/4 vehicle model, nonlinear Hertzian contact spring and nonlinear contact damper are introduced. In this approach external loads acting on 1/4 vehicle model are self weight of vehicle and geometry information of running surface. The constraint equation on contact surface is implemented by Penalty method. Also, to improve the numerical stability and to maintain accuracy of solution, the artificial damper and the reaction from constraint violation are introduced. A nonlinear time integration method, in this study, Newmark method is adopted for both equations of vehicles and structure. And to reduce the error caused by inadequate time step size, adaptive time-stepping technique is partially introduced. As the nonlinear Hertzian contact spring has no resistance to tensile force, the bouncing phenomena of wheelset can be described. Thus, it is expected that more versatile dynamic interaction phenomena can be described by this approach and it can be applied to various railway dynamic problems.

  • PDF

Dynamic Collaborative Cloud Service Platform: Opportunities and Challenges

  • Yoon, Chang-Woo;Hassan, Mohammad Mehedi;Lee, Hyun-Woo;Ryu, Won;Huh, Eui-Nam
    • ETRI Journal
    • /
    • 제32권4호
    • /
    • pp.634-637
    • /
    • 2010
  • This letter presents a model for a dynamic collaboration (DC) platform among cloud providers (CPs) that prevents adverse business impacts, cloud vendor lock-in and violation of service level agreements with consumers, and also offers collaborative cloud services to consumers. We consider two major challenges. The first challenge is to find an appropriate market model in order to enable the DC platform. The second is to select suitable collaborative partners to provide services. We propose a novel combinatorial auction-based cloud market model that enables a DC platform among CPs. We also propose a new promising multi-objective optimization model to quantitatively evaluate the partners. Simulation experiments were conducted to verify both of the proposed models.

On China's Intellectual Property Rights Protection Online

  • Wang, Guo-An;Lim, Yong-Taek
    • 통상정보연구
    • /
    • 제6권1호
    • /
    • pp.237-247
    • /
    • 2004
  • Online people conduct all kinds of business activities, such as promoting the sales of products and services, reading newspapers, watching TV and movies, and sending business messages by e-mail, by e-voice and by e-fax. Computers with access to the Internet are defined by the United Nations as the fourth media characterized by instantaneousness, openness, limitlessness, boundlessness and globalization. With the development and popularization of the Internet and the advance of the information technology in China, Intellectual Property Rights (IPRs) violations online have frequently occurred in e-business activities. IPRs protection online has posed a great challenge not only for business managers and officials, but also for judges and lawyers because the rapid development of the Internet has created a legal vacuum governed by no laws in IPRs violation and protection online in China.. The paper at first classifies IPRs into several categories, then reveals China's serious problems and challenges of IPRs violations online and stresses the necessity of China's IPRs protection online. Finally it puts forward some suggestions concerning IPRs protection online.

  • PDF

A Case Study of an Activity Based Mathematical Education: A Kernel Density Estimation to Solve a Dilemma for a Missile Simulation

  • Kim, G. Daniel
    • 한국수학교육학회지시리즈E:수학교육논문집
    • /
    • 제16권
    • /
    • pp.139-147
    • /
    • 2003
  • While the statistical concept 'order statistics' has a great number of applications in our society ranging from industry to military analysis, it is not necessarily an easy concept to understand for many people. Adding some interesting simulation activities of this concept to the probability or statistics curriculum, however, can enhance the learning curve greatly. A hands-on and a graphic calculator based activities of a missile simulation were introduced by Kim(2003) in the context of order statistics. This article revisits the two activities in his paper and point out a dilemma that occurs from the violation of an assumption on two deviation parameters associated with the missile simulation. A third activity is introduced to resolve the dilemma in the terms of a kernel density estimation which is a nonparametric approach.

  • PDF