• Title/Summary/Keyword: authority module

Search Result 29, Processing Time 0.032 seconds

A Study of the Effects on Applying Test Design to Information Communication Authority Module

  • Jang, Jinwook
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.8 no.2
    • /
    • pp.111-118
    • /
    • 2018
  • Information communication authority module software contains various functions and services. A software test is the only acceptance test step. Recently, however, all development steps have become important. In particular, the software acceptance step is very high, and a study of the effective use of limited time and resources on acceptance step is needed. This study examined the efficiency of the Test Design Technique for Software Test. The proposed Test Design process was applied to the domain systems of info-communication and the degree of improvement was measured. This paper establishes Software Test design process Infrastructure based on the developed software.

A Study on the Development Plan for Nationwide Authority Control System based on National Authority Sharing System (국가전거공동활용시스템 기반의 국가 전거제어 체계 발전방안에 관한 연구)

  • Mihwa Lee;Sung Sook Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.1
    • /
    • pp.25-44
    • /
    • 2023
  • This study was to prepare a development plan for nationwide authority control system based on national authority sharing system of NLK through the survey targeting on libraries which do not participate in the system. Six plans were suggested to establish a nationwide authority control system based on this survey. First, an authority data construction module and a module linked to the national authority sharing system should be developed. Second, describing external identifiers such as ISNI to the national authority sharing system is to provides reliability of data and to utilizes to build linked data. Third, it is necessary to prepare strategies for promoting the national authority sharing system and diversifying services. Fourth, both authority establishment and non-establishment show difficulties and diversity in the selection and description of authorized access point, so it is necessary to prepare rules related to authorized access points. Fifth, since the data described in authority records is not enough, it is necessary to improve and upgrade authority records by using bibliographic records. Sixth, it is necessary to educate librarians about the necessity and function of authority control. As such, this study is meaningful in that it investigated the current status and requirements of libraries that do not participate in the nationwide authority system and sought ways to establish a nationwide cooperative authority control system.

Implementation of Voice Awareness Security Sytems (음성인식 보안 시스템의 구현)

  • Lee, Moon-Goo
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.799-800
    • /
    • 2006
  • This thesis implemented security systems of voice awareness which is higher accessible than existing security system using biological authentication system and is inexpensive in module of security device, and has an advantage in usability. Proposed the security systems of voice awareness implemented algorithm for characteristic extraction of inputted speaker's voice signal verification, and also implemented database of access control that is founded on extractible output. And a security system of voice awareness has a function of an authority of access control to system.

  • PDF

The Design for Security System of Linux Operating System (리눅스 운영체제를 위한 보안 시스템 설계)

  • Park, JinSeok;Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.35-42
    • /
    • 2010
  • This paper reviews the current studies about the current secure OS, security module and SELinux, and suggests Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. First, during the user authentication process, it distinguishes the access permission IP and separates the superuser(root)'s authority from that of the security manager by making the users input the security level and the protection category. Second, when the subjects have access to the objects through security authority inheritance of subjects and objects, the suggested system carries out the access control by comparing the security information of the subjects with that of the objects. Third, this system implements a Reference Monitor audit on every current events happening in the kernel. As it decides the access permission after checking the current MAC security attributes, it can block any malicious intrusion in advance. Fourth, through the real-time audit trailing system, it detects all activities in the operating system, records them in the database and offers the security manager with the related security audit data in real-time.

  • PDF

A Study on Dynamic Role-based Service Allocation for Service Oriented Architecture System (서비스 지향 아키텍처 시스템을 위한 동적 역할 기반 서비스 할당에 관한 연구)

  • Park, Yong B.;Kwon, Ye Jin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.1
    • /
    • pp.12-20
    • /
    • 2018
  • Recently, web-based service software has been used as to combine various information or to share information according to the needs of users and the convergence of specialized fields and individual dependent systems. According to the necessity of the user, the proper service environment and the selective service environment according to the purpose and the needs of the user have been studied in a variety of specialized and combined professional research fields and industries. Software based on cloud systems and web services is being used as a tool for appropriate group and user groups and roles. A service system combined dynamically needs a module to manage a user through internal logic and grant a service access authentication. Therefore, it has been considered various approaches that a user who accesses the system is given a service access authority for a certain period of time. Also, when the deadline is over, the authority that you are given to access system will go through the process of expire the right. In this paper, we define the roles of users who access web services, manage user rights according to each role, and provide appropriate service resources to users according to their rights and session information. We analyzed the procedure of constructing the algorithm for the service according to the procedure of each user accessing the web service, granting the service resource and constructing a new role.

A Study on the Design of Solar Hybrid Generating System for a Ship (선박용 태양광 하이브리드 발전시스템 개념 설계)

  • Choi, Han-Kyu;Kim, Hee-Je;Lee, Kyung-Jun
    • Journal of Korea Ship Safrty Technology Authority
    • /
    • s.29
    • /
    • pp.2-15
    • /
    • 2010
  • 국제적으로 해운분야 등 온실가스 배출량 규제를 강화하고 있으며, 정부에서도 '저탄소 녹색성장'을 위한 신재생 에너지 비율을 확대 추진함에 따라 육상 녹색성장을 위한 시도는 활발히 이루어지고 있으나, 친환경 에너지를 선박에 이용한 노력은 부족한 실정이다. 또한 현재까지 연구된 태양광 시스템의 경우 기존 선박의 동력을 대체하여 추진용으로 사용하기에는 실용성이 없으므로, 기존 선박 발전시스템을 연계한 태양광 하이브리드 발전시스템의 연구개발이 필요하며, 따라서 태양광을 선박용 에너지로 활용하기 위한 선박용 하이브리드 발전 시스템 개념 설계 및 설치 기준에 대하여 고찰하고자 한다.

  • PDF

A Study of Hazard Analysis and Monitoring Concepts of Autonomous Vehicles Based on V2V Communication System at Non-signalized Intersections (비신호 교차로 상황에서 V2V 기반 자율주행차의 위험성 분석 및 모니터링 컨셉 연구)

  • Baek, Yun-soek;Shin, Seong-geun;Ahn, Dae-ryong;Lee, Hyuck-kee;Moon, Byoung-joon;Kim, Sung-sub;Cho, Seong-woo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.6
    • /
    • pp.222-234
    • /
    • 2020
  • Autonomous vehicles are equipped with a wide rage of sensors such as GPS, RADAR, LIDAR, camera, IMU, etc. and are driven by recognizing and judging various transportation systems at intersections in the city. The accident ratio of the intersection of the autonomous vehicles is 88% of all accidents due to the limitation of prediction and judgment of an area outside the sensing distance. Not only research on non-signalized intersection collision avoidance strategies through V2V and V2I is underway, but also research on safe intersection driving in failure situations is underway, but verification and fragments through simple intersection scenarios Only typical V2V failures are presented. In this paper, we analyzed the architecture of the V2V module, analyzed the causal factors for each V2V module, and defined the failure mode. We presented intersection scenarios for various road conditions and traffic volumes. we used the ISO-26262 Part3 Process and performed HARA (Hazard Analysis and Risk Assessment) to analyze the risk of autonomous vehicle based on the simulation. We presented ASIL, which is the result of risk analysis, proposed a monitoring concept for each component of the V2V module, and presented monitoring coverage.

Research on SecureOS Module Based on File System for Data Protection (데이터 보호를 위한 파일시스템 기반의 SecureOS Module에 관한 연구)

  • Yonggu JANG;Inchul KIM;Jisong RYU
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.26 no.4
    • /
    • pp.67-79
    • /
    • 2023
  • Service environments through laptops, smart devices, and various IoT devices are developing very rapidly. Recent security measures in these Internet environments mainly consist of network application level solutions such as firewall(Intrusion Prevention Systems) and IDS (intrusion detection system). In addition, various security data have recently been used on-site, and issues regarding the management and destruction of such security data have been raised. Products such as DRM(Digital Rights Management) and DLP(Data Loss Prevention) are being used to manage these security data. However despite these security measures, data security measures taken out to be used in the field are operated to the extent that the data is encrypted, delivered, and stored in many environments, and measures for encryption key management or data destruction are insufficient. Based on these issues we aim to propose a SecureOS Module, an OS-based security module. With this module users can manage and operate security data through a consistent interface, addressing the problems mentioned above.

Study on Improvement of Connected Vehicles Interface Board and Transition Algorithm of Digital Traffic Signal Controller for Autonomous Vehicles and C-ITS (자율주행차 및 C-ITS 지원을 위한 디지털 교통신호 제어기의 신호정보연계장치 및 전이 알고리즘 개선 연구)

  • Ko, Sejin;Choi, Eunjin;Gho, Gwang-Yong;Han, Eum;Yun, Ilsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.2
    • /
    • pp.15-29
    • /
    • 2021
  • The signal intersection is the most challenging space for autonomous vehicles. To promote the safe driving of autonomous vehicles on urban roads with traffic signals, autonomous vehicles need to receive traffic signal information from infrastructure through V2I communication. Thus, a protocol for providing traffic signal information was added to the standard traffic signal controller specification of the National Police Agency. On the other hand, there are technical limitations when applying this to digital traffic signal controllers because the protocols are defined mainly for analog traffic signal controllers. Therefore, this study proposes developing a signal information linkage module to provide traffic signal information from a digital traffic signal controller to an autonomous vehicle and an algorithm improvement method that can provide accurate traffic signal information at the time of traffic signal transition.

A Study on the Optimized Balance Module of Security Policy to Enhance Stability in the Service-Based Information System (서비스 기반 정보시스템의 안정성 증대를 위한 보안정책 최적화 균형모듈에 관한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1155-1160
    • /
    • 2018
  • Presently in 2018, the security market is requiring progressive development and innovation in the area of security on account of new changes and technologies. This means the rapid and prompt development of the service platforms and service-based information systems. Here, this study is going to examine the process of operating a number of services and obtaining security, not the criteria for selecting particular service in online environment where the various services exist. Within a series of flows to protect the manager's authority about the platforms operated by information systems, and to provide and destroy services, this author limits the entire service platforms of the optimized balance module into four categories maximum for the security of the area apt for illegal invasion and access, and the proper area. Also, about the area with limited security, this researcher again applies subordinate security policy and technology respectively. This author here will suggest a method to provide and to extend safety and security for the information system and also propose the process of applying it as well.