• Title/Summary/Keyword: information Protection

Search Result 4,493, Processing Time 0.045 seconds

Software License Management Agent System for Electronic Commerce (전자 상거래를 위한 소프트웨어 사용권 관리 에이전트 시스템)

  • Yoon, Woo-Seong;Yoon, Jung-Mo;Kim, Tai-Yun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.1
    • /
    • pp.77-86
    • /
    • 2001
  • With the growth of the EC(Electronic Commerce), Buying and selling software through the internet are expanded. Among the ESD(Electronic Software Distribution) methods, Buy-first method and TrY-before-bu1 method can not solve the illegal copy problem. Recently developed EL(Electronic License) model solve the illegal copy problem by separating the software and license. But this method also can not support various ways for payment. In this paper we propose the software license management system that is a newly form like ESD model. This system proposes NL(New License) to support various payment methods and SC(Software Charge) to insure that a seller takes the software price. Agent of the proposed system offers scalability to other systems and illegal copy protection function bv managing NL and SC.

  • PDF

Resource Reallocation for the Protection of Essential Services (필수 서비스 보호를 위한 자원 재할당)

  • 민병준;김성기;최중섭;김홍근
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.12
    • /
    • pp.714-723
    • /
    • 2003
  • In order to guarantee system survivability against attacks based on new methodology, we need a solution to recognize important resources for essential services and to adapt the urgent situation properly. In this paper, we present a dynamic resource reallocation scheme which is one of the core technologies for the implementation of intrusion tolerant systems. By means of resource reallocation within a node, this scheme enables the essential services to survive even after the occurrence of a system attack. If the settlement does not work within the node, resource reallocation among nodes takes places, thus the essential services are transferred to another prepared server node. Experimental result obtained on a testbed reveals the validity of the proposed scheme for resource reallocation. This scheme may work together with IDS(Intrusion Detection System) to produce effective responsive mechanism against attacks.

A Study on the Ecosystem Conservation based on Natural Environment Investigation of Jinhae Area Troops (진해지역부대 자연환경조사를 통한 생태계 보전에 관한 연구)

  • Jang, Cheol-Hyeon;Yu, Jong-Ho
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.36 no.11
    • /
    • pp.733-738
    • /
    • 2014
  • Within the scope that does not interfere with the performance of basic duty, the military has been actively supporting the national policy for the conservation of the natural environment in accordance with the "military environmental protection guidelines". Since there is a lack of information regarding inhabitation for wild fauna and flora, field investigations of the natural environment at Jinhae local unit were performed three times in 2003. As a result of the investigation, lycoris sanguinea as flora, marten, otter, and leopard cat as mammalia, and accipiter soloensis, accipiter gentilis schvedow, accipiter gularis, buteo hemilasius, falco tinnunculus and terpsiphone atrocaudata as bird were confirmed to inhabit. For the conservation of the natural ecosystem, the expansion of research for natural ecosystems within the military unit is required. Additionally, environmental pollution can be prevented through the proper maintenance of basic environmental facilities including sewage treatment facilities, soil pollution control facilities, and waste storage facilities. In cooperation with local governments and private organizations, the natural cleansing action and sustainable wildlife conservation should be expanded.

Police Officers' Perception Concerning the Roles of Private Security (민간경비의 역할에 대한 경찰관의 인식연구)

  • Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.101-118
    • /
    • 2009
  • Despite large increases in the growth of the private security industry in the last few decades, very little empirically based information has been collected on the roles of private security within current Korean literature. Attempting to address this gap, this study examined perceptions of the roles of private security by surveying 212 police officers. In order to measure the strength of police officers' perception, not only quantitative but also qualitative methods were adopted. Overall, results of the study indicate that police officers considered private security as an adjunct to the police. However, they also believed that private security industry would grow to get square with the police in the near future. Concerning the specific roles of private security, police officers rated the roles of loss prevention and protection more highly than those of crime prevention and order maintenance. This result reveals that police officers thought private security had focused more on the roles related to the pursuit of profits than on the roles tied to its public functions.

  • PDF

Biodiversity of Epigeic Spider Community in Pear Orchards Managed using Different Farming Methods (배 과원의 재배형태별 토양성 거미군집의 생물다양성)

  • Song, Jang-Hoon;Seo, Ho-Jin;Im, Jae-Seong;Choi, Eu-Ddum;Kim, Seung-Tae
    • Korean Journal of Organic Agriculture
    • /
    • v.27 no.4
    • /
    • pp.463-477
    • /
    • 2019
  • This study was conducted to compare the community structure and biodiversity of epigeic spiders between pear fields cultivated by integrated pest management (IPM) and organic methods. This is the first study of this kind to be conducted in Korea. Eighty-four spider species from 22 families were identified among the collected 2,489 arthropods, with 754 individuals being sampled from IPM fields and 1,735 individuals from organic fields. Generally, Theridiidae, Linyphiidae, Lycosidae, Agelenidae, Gnaphosidae, and Salticidae were the dominant spider families in the pear orchard regardless of the farming methods, and species richness and abundance were higher in organic fields than in IPM fields. The dominant species were the wolf spiders (Lycosidae) and stone spiders (Gnaphosidae), and their cumulative abundance was 70.7% in IPM fields and 72.7% in organic fields. The community structure between organic and IPM fields was heterogeneous, with a 45% similarity level. Biodiversity, species richness, abundance, and species diversity index were higher in organic fields than in IPM fields, and significantly different between the farming methods. Seasonal fluctuations in biodiversity were similar in both IPM and organic fields. The species richness and species diversity index increased and the abundance decreased in the second half of the cultivation period. This study on the community structure and biodiversity of epigeic spiders, which form one of the most important predator groups, will provide principal ecological and faunistic information required to maintain the biodiversity of useful arthropods in agricultural ecosystems and help implement sustainable agriculture based on the active use of natural enemies.

Study for the Method to Secure the Safety of Fire-fighters in the Building Damaged by a Fire by Using Fire-resistant Design Theories - Mainly about Suggesting the Process and the Method for a Real-time Safety Evaluation by a Fire-fighter - (화재손상 건축 구조물에서 내화설계 이론을 활용한 소방관 안전확보 방안에 관한 연구 - 소방관에 의한 실시간 안전성평가 절차 및 방법의 제안을 중심으로 -)

  • Kwon, Yeongbae;Kwon, In-Kyu
    • Fire Science and Engineering
    • /
    • v.30 no.1
    • /
    • pp.86-95
    • /
    • 2016
  • Weight-bearing building materials are substantially weakened under high temperatures, and this is evident through the collapse of structures once engulfed by fire. Currently, there is no scientific or technological process of evaluating the real-time structural stability of a building whcih is engulfed by flame. There are many building design specifications which aim to reduce the risk of fire, but little consideration given to fire officer safety while operating in a dangerous building. This paper aims to provide direction within building policy in order to ensure the safe evacuation of fire-fighters in case of an impending building collapse. This paper suggests evaluation criteria for buildings which are damaged due to fire, autilizing current information on fire-resistant building design and a fire-resistant capacity.

Car Black Box and the Protection of Drivers' Privacy : In Light of the Regulation on EDR(Event Data Recorder) in U.S.A. (차량용 블랙박스와 운전자의 사생활 보호 : 미국에서의 사고기록장치(Event Data Recorder : EDR) 규제를 중심으로)

  • Lee, Kyung Gyu
    • Journal of Information Technology Services
    • /
    • v.12 no.2
    • /
    • pp.171-184
    • /
    • 2013
  • Frequently faced with dangerous situations, for evidentiary purpose in case of civil and criminal liability challenges, car drivers in Korea have been armed with so-called 'black boxes'; however, which are just video recorders in vehicles rather than real 'black boxes' that are equipped in the airplanes. In the United States, they are called EDRs(Event Data Recorders), more technically, which means that they record data of events happened while driving, such as velocity changes, airbags deployment, seatbelt wearing etc. just like in the airplanes. EDR technology is quickly becoming more advanced, more widely available, and less expensive; however, new concerns are emerging : the privacy of drivers. In U. S., vehicle manufacturers and insurance companies and the governmental agencies including the courts and legislatures are the main parties in terms of the EDR concerns. In order to determine the best way to regulate EDR, it is necessary to balance all the merits, such as safety, privacy, truth, justice and efficiency, to support a legal framework regulating the EDR concerns. This article, in light of the regulation of EDR and experience therof in the United States, examines EDR technology itself, particularly with respect to the automobile industry, describing its history, its current state, and trends that may change it in the future; and explains how the National Highway Transportation Safety Agency (NHTSA), legislatures, courts have approached EDR data. At the early stage of regulation on EDRs in Korea, examining U. S. legal framework and usages would help for successful establishment of legislation and regulation.

Implementation of an Obfuscator for Visual C++ Source Code (비주얼 C++소스 코드를 위한 obfuscator 구현)

  • Chang, Hye-Young;Cho, Seong-Je
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.59-69
    • /
    • 2008
  • Automatic obfuscation is known to be the most viable method for preventing reverse engineering intentional1y making code more difficult to understand for security purposes. In this paper, we study and implement an obfuscation method for protecting MS Visual C++ programs against attack on the intellectual property in software like reverse engineering attack. That is, the paper describes the implementation of a code obfuscator, a tool which converts a Visual C++ source program into an equivalent one that is much harder to understand. We have used ANTLR parser generator for handling Visual C++ sources, and implemented some obfuscating transformations such as 'Remove comments', 'Scramble identifiers', 'Split variables', 'Fold array', 'Insert class', 'Extend loop condition', 'Add redundant operands', and 'Insert dead code'. We have also evaluated the performance and effectiveness of the obfuscator in terms of potency, resilience, and cost. When the obfuscated source code has been compared with the original source code, it has enough effectiveness for software protection though it incurs some run-time overheads.

Acute Health Effects among Soldiers Involved in the Cleanup Operation Following the Hebei Spirit Oil Spill in Taean, Korea (허베이스피리트호 원유유출의 방제작업에 참여한 군인의 급성건강영향)

  • Hong, Jee-Young;Lee, Moo-Sik
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05b
    • /
    • pp.910-914
    • /
    • 2010
  • A collision between a barge and an oil tanker of Hebei Spirit caused the release of an estimated 12,547 tons of light crude oil into the Yellow Sea off the west coast of Taean-gun, Korea on December 7, 2007. This study was aimed to evaluate exposure conditions and acute health effects in soldiers participating in the Hebei Spirit oil spill cleanup activities and the association between these and the nature of the work and use of protection devices. The sample comprised 2,624 soldiers stratified by working area and number of working days. We divided working area into the coast of Taean-gun(highly polluted area) and other areas affected by Hebei Spirit oil spill. And we divided number of working days into 1-7 days, 8-14 days, 15-21 days and above 22 days. Data were obtained via a structured, self-administered questionnaire and included information on working area, type of working, number of working days, use of protective materials, and acute health effects. Acute health effects were classified into 5 groups: neurological, respiratory, dermatologic, ophthalmic and other symptoms. Data analysis was performed using unconditional logistic regression used to compute odds ratios and 95% confidence intervals. On logistic regression analysis, working on the coast of Taean-gun was significantly associated with increased risk of acute health problems: headache, dizziness, nausea, general fatigue, insomnia, flushed face, sore throat, dry throat, runny nose, cough, sputum, skin irritation, sore eyes, injection of conjunctiva, tear, and low back pain. Furthermore soldiers working more than 21 days were significantly associated with increased risk of acute health problems: insomnia, flushed face, sore throat, runny nose, cough, sputum, tear, low back pain and fever. Accordingly, the exposure to the oil and the subsequent cleanup efforts were suggested to inflict acute health problems on soldiers participating in the Hebei Spirit oil spill cleanup activities.

  • PDF

A Synthesis Method of Software Fault Tree from NuSCR Formal Specification using Templates (템플릿에 기반한 NuSCR 정형 명세의 소프트웨어 고장 수목 생성 방법)

  • Kim, Tae-Ho;Yoo, Jun-Beom;Cha, Sung-Deok
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.12
    • /
    • pp.1178-1191
    • /
    • 2005
  • In this paper, we propose a synthesis method of software fault tree from software requirements specification written in NuSCR formal specification language. The software fault tree, proposed in this paper, reflects requirements on both structure and behavior and it is an integrated form. The software fault tree can be used for analyzing safety in the view of structure and behavior. We propose templates for each components in NuSCR specification language and a synthesis method of software fault tree using the templates. The research was applied into the main trip logic of the reactor protection system of ARP1400, the Korean next generation nuclear reactor system, developed by KNICS. And we evaluate feasibility of our approach through this case study.