• 제목/요약/키워드: data security control

검색결과 954건 처리시간 0.032초

Real-time Network Middleware Supporting Fault-Tolerant Operations for Personal Robot System

  • Choo, Seong-Ho;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.756-760
    • /
    • 2005
  • By development of a robot technology, personal robot is being developed very actively. Various infra-technologies are accumulated in hardware and software how by internal a lot of research and development efforts, and it is circumstance that actual commodity is announced. But, personal robot is applied to be acting near human, and takes charge of safety and connected directly a lot of works of home security, gas-leakage, fire-warning facilities, or/and etc. So personal robot must do safe and stable action even if any unexpected accidents are happened, important functions are always operated. In this paper, we are wished to show design structures for supporting fault-tolerant operation from our real-time robot middleware viewpoint. Personal robot, in being developed, was designed by module structure to do to interconnect and to interoperate among each module that is mutually implemented by each research facilities or company. Also, each modules can use appreciate network system that is fit for handling and communicating its data. To guarantee this, we have being developed a real-time network middleware, for especially personal robot. Recent our working is to add and to adjust some functions like connection management, distributed routing mechanism, remote object management, and making platform independent robot application execution environment with self-moving of robot application, for fault-tolerant personal robot.

  • PDF

도심지 대규모 굴착공사에서 수행된 자동계측과 수동계측의 비교 사례 (Comparison of Field Monitoring System in case of Automatic and Manual Type Executed in Urban Deep Excavation Site)

  • 김태섭;정원홍;김현모;김웅규;정창원
    • 한국지반공학회:학술대회논문집
    • /
    • 한국지반공학회 2008년도 춘계 학술발표회 초청강연 및 논문집
    • /
    • pp.1216-1223
    • /
    • 2008
  • Displacement control of earth retaining wall is recognized as the most important item for insuring the stability of ground in urban deep excavation site near by major structure such as subway etc. The field monitoring system is classified by two types as manual system and automatic system. The application case of latter type of field monitoring is increased because real time measurement is possible in automatic system and that is correspondent with the recent constructional trend. Though the automatic monitoring system is more useful and advanced than manual monitoring system, accuracy of the system is not verified sufficiently. It was examined that the reliance of automatic monitoring system in this paper through the comparison of monitoring result obtained three urban excavation site in which the each type of monitoring system was executed concurrently. Result of the examination is that the two types of monitoring system is generally alike in view of monitoring result, so the engineering reliance of automatic system was confirmed in case site. This task was researched in restricted case site, it is expected more precise analysis from security of more data monitored and progressive study.

  • PDF

이진트리 기반의 속성기반 암호전송 알고리즘 (Two Attribute-based Broadcast Encryption Algorithms based on the Binary Tree)

  • 이문식;김홍태;홍정대
    • 한국군사과학기술학회지
    • /
    • 제17권3호
    • /
    • pp.358-363
    • /
    • 2014
  • In this paper, we present two constructions of the attribute-based broadcast encryption(ABBE) algorithm. Attribute-based encryption(ABE) algorithm enables an access control mechanism over encrypted data by specifying access policies among private keys and ciphertexts. ABBE algorithm can be used to construct ABE algorithm with revocation mechanism. Revocation has a useful property that revocation can be done without affecting any non-revoked uers. The main difference between our algorithm and the classical ones derived from the complete subtree paradigm which is apt for military hierarchy. Our algorithm improve the efficiency from the previously best ABBE algorithm, in particular, our algorithm allows one to select or revoke users by sending ciphertext of constant size with respect to the number of attributes and by storing logarithm secret key size of the number of users. Therefore, our algorithm can be an option to applications where computation cost is a top priority and can be applied to military technologies in the near future.

아파트단지의 물리적 폐쇄성과 사회경제적 효과에 관한 실증분석 (Empirical Analyses of Physical Exclusiveness of Multi-family Housing Estates in Seoul and Its Socioeconomic Effects)

  • 김지은;최막중
    • 한국주거학회논문집
    • /
    • 제23권5호
    • /
    • pp.103-111
    • /
    • 2012
  • This study empirically investigates the degree of physical exclusiveness of multi-family housing estates and its socioeconomic effects. By combining various physical elements devised to blockade and control the entrance to the estate as well as housing units, it constructs the index to quantify the degree of physical exclusiveness for the multi-family housing estates of more than 300 households in Seoul. The statistics reveal that the degree of physical exclusiveness has increased over time and therefore, as a representative example, two-thirds of the estates are now equipped with barricade at the entrance, which often symbolizes 'gated community'. The estimation result of hedonic price model show that physical exclusiveness has a significant positive effect on housing price. The household survey data for the case study estates also demonstrate that the residents in the estate of higher degree of physical exclusiveness put a higher housing value on socioeconomic 'prestige' as well as 'community', beyond physical 'security', and have closer neighborhood relationship with the residents inside the estate. However, there is no significant difference in neighborhood relationship with the outside residents depending upon the degree of physical exclusiveness.

IEEE 802.15.4 LR-WPAN의 실시간 음성 데이터 응용에 대한 적용 가능성 연구 (Feasibility Study of IEEE 802.15.4 LR-WPAN to the Real-time Voice Application)

  • 허윤강;김유진;허재두
    • 대한임베디드공학회논문지
    • /
    • 제2권2호
    • /
    • pp.82-94
    • /
    • 2007
  • Wireless sensor networking technology is one of the basic infrastructures for ubiquitous environment. It enables us to gather various sensory data such as temperature, humidity, gas leakage, and speed from the remote sensor devices. To support these networking functions, IEEE WPAN working group makes standards for PHY and MAC, while ZigBee Alliance defines the standards for the network, security, and applications. The low-rate WPAN was emerged to have the characteristics of network resilience, low cost, and low power consumption. It has a broad range of applications including, but not limit to industrial control and monitoring, home automation, disaster forecast and monitoring, health care. In order to provide more intelligent and robust services, users want voice-based solutions to accommodate to low-rate WPAN. In this paper, we have evaluated voice quality of an IEEE 802.15.4 standard compliant voice node. Specifically, it includes the design of a voice node and experiments based on the prediction of voice quality using the E-model suggested by ITU-T G.107, and the network communication mechanisms considering beacon-enabled and nonbeacon-enabled networks for real-time voice communications.

  • PDF

복합만성질환을 가진 고령근로자 직업건강간호의 과제 (A Challenge in Occupational Health Nursing among Elderly Workers with Multimorbidity)

  • 서수경;최성주;연승욱
    • 한국직업건강간호학회지
    • /
    • 제29권4호
    • /
    • pp.247-253
    • /
    • 2020
  • Purpose: Multimorbidity is defined as the coexistence of multiple chronic diseases within a person. This study explores the burden of multimorbidity in the working population, focusing on the recent increase in elderly workers in Korea. Methods: We summarized past empirical or theoretical literature. Results: Previous literature shows that about 80% of the elderly are multimorbid, and more than half of people with chronic disease have two or more chronic conditions. Multimorbidity is a common phenomenon in the elderly working population. However, little is known about its prevalence, the factors related to its unequal distribution among workers, and its effects on health outcome measures such as mortality, medical use, and employment decisions. Conclusion: This study asks researchers to focus on a subgroup analysis employing data on the working population. Health professionals need to develop clinical guidelines for multimorbid patients. As multimorbidity is a major health concern in the working elderly, prevention and control should be promoted in the workplace.

인터넷 Identity 관리 시스템을 위한 프라이버시 인가 (Privacy Authorization for Internet Identity Management System)

  • 노종혁;진승헌;이균하
    • 한국통신학회논문지
    • /
    • 제30권10B호
    • /
    • pp.648-659
    • /
    • 2005
  • 인터넷에 산재되어 있는 사용자 개인정보의 오남용은 더 이상 간과할 수 없는 문제이다. 개인정보의 유통은 반드시 소유자의 허가 하에서만 이루어져야 하고, 개인정보를 관리하는 사이트는 인터넷에 익숙하지 않은 사용자들에게 개인정보 유출에 관한 두려움을 없애줄 수 있는 환경을 제공하여야 한다. 본 논문은 인터넷 Identity 관리시스템에서 개인정보를 안전하게 관리하고 유통할 수 있는 기술을 소개한다. 개인정보의 소유자가 자신의 정보를 관리하는 방법, 정보 관리 시스템 차원에서 사용자 정보를 관리하기 위한 정책, 개인정보 접근을 제어하는 Privacy Controller 등 여러 관점에서의 프라이버시 인가 기술을 제안한다. 그리고, 정책 기반의 프라이버시 인가 기술을 인터넷 Identity 관리 시스템에 적용하기 위한 다양한 모델을 제시한다.

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.

Energy Efficiency Enhancement of TICK -based Fuzzy Logic for Selecting Forwarding Nodes in WSNs

  • Ashraf, Muhammad;Cho, Tae Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4271-4294
    • /
    • 2018
  • Communication cost is the most important factor in Wireless Sensor Networks (WSNs), as exchanging control keying messages consumes a large amount of energy from the constituent sensor nodes. Time-based Dynamic Keying and En-Route Filtering (TICK) can reduce the communication costs by utilizing local time values of the en-route nodes to generate one-time dynamic keys that are used to encrypt reports in a manner that further avoids the regular keying or re-keying of messages. Although TICK is more energy efficient, it employs no re-encryption operation strategy that cannot determine whether a healthy report might be considered as malicious if the clock drift between the source node and the forwarding node is too large. Secure SOurce-BAsed Loose Synchronization (SOBAS) employs a selective encryption en-route in which fixed nodes are selected to re-encrypt the data. Therefore, the selection of encryption nodes is non-adaptive, and the dynamic network conditions (i.e., The residual energy of en-route nodes, hop count, and false positive rate) are also not focused in SOBAS. We propose an energy efficient selection of re-encryption nodes based on fuzzy logic. Simulation results indicate that the proposed method achieves better energy conservation at the en-route nodes along the path when compared to TICK and SOBAS.

Does Earnings Quality Affect Companies' Performance? New Evidence from the Jordanian Market

  • SALEH, Isam;ABU AFIFA, Malik;ALSUFY, Fares
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권11호
    • /
    • pp.33-43
    • /
    • 2020
  • This study aims to investigate the importance of earnings quality as a determinant of companies' performance. It provides some empirical evidences from an emerging market, specifically from the Jordanian market. This study developed an econometric model for the effect of earnings quality on the companies' performance using empirical evidence. The study employs a panel data analysis method by using a sample of all Jordanian industrial public shareholding companies listed on Amman Stock Exchange (ASE) during 2010-2018. The results reveal that Return on Assets (ROA), Return on Equity (ROE), and Earnings Per Share (EPS) as proxies of company's performance are affected by the earnings quality. This provides the importance of positive earnings quality that eventually influences the companies' performance. The results of this study suggest that the higher control level on the managers' behavior and its outcome will have an effect on earnings quality, and thus the company's performance increases. As well as, high relevance of accounting information will improve earnings quality, and thus earnings quality with the interaction factors of the company's environment work on improving performance. As a conclusion, this study can work as a reference to assist standard setters, security analysts, regulators and other accounting-information users in appraising relation between the earnings quality and companies' performance.