• Title/Summary/Keyword: information protection requirements

Search Result 203, Processing Time 0.026 seconds

An Enhanced Dynamic Multilayer Routing for Networks with Protection Requirements

  • Urra, Anna;Calle, Eusebi;Marzo, Jose L.;Vila, Pere
    • Journal of Communications and Networks
    • /
    • v.9 no.4
    • /
    • pp.377-382
    • /
    • 2007
  • This paper presents a new enhanced dynamic and multilayer protection(DMP) routing scheme that considers cooperation between packet and wavelength switching domain in order to minimize the resource consumption. The paper describes the architecture of the multilayer network scenario and compares the proposed algorithm with other routing mechanisms applying protection at the IP/multi-protocol label switching(MPLS) layer or at the optical layer. Simulation results show that DMP reduces the number of optical-electrical-optical(o-e-o) operations and makes an efficient use of the network resources compared to non-multilayer proposals.

Development of Walk-down Performance Procedures for Fire Modeling of Nuclear Power Plants based on Deterministic Fire Protection Requirements (결정론적 화재방호요건을 기반으로 한 원자력발전소 화재모델링 현장실사 수행절차 개발)

  • Moon, Jongseol;Lee, Jaiho
    • Fire Science and Engineering
    • /
    • v.33 no.6
    • /
    • pp.43-52
    • /
    • 2019
  • A walk-down procedure for fire modeling of nuclear power plants, based on deterministic fire protection requirements, was developed. The walk-down procedure includes checking the locations of safety shutdown equipment and cables that are not correctly indicated on drawings and identifying the existence and location of combustibles and ignition sources. In order to verify the performance of the walk-down procedure developed in this study, a sample of important equipment and cables were selected for hypothetical multiple spurious operation (MSO) scenarios. In addition, the hypothetical fire modeling scenarios were derived from the selected safe shutdown equipment and cables and an actual walk-down was conducted. The plant information collected through the walk-down was compared to the information obtained from the drawings, so that the collected information may be used as input values for the fire modeling.

Evaluation of International BIM Standard Contracts to establish BIM Copyrights and Operational Protocols in Korea (국제 BIM 표준계약서 분석을 통한 국내 BIM 저작권 보호 및 운용 체계 수립에 관한 연구)

  • Koo, Bonsang;Shin, Byungjin
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.6
    • /
    • pp.24-30
    • /
    • 2016
  • Building Information Modeling, and its associated work practices, requires project participants to share not only 3D geometric data, but also information in the model that may be considered proprietary and even trade secrets. Thus protection of intellectual property, or BIM copyrights, must be in place for participants to share proprietary information among project stakeholders. Currently Korea does not have adequate copyright laws or mechanisms to provide such protection. This research examined three BIM copyright legal documents, namely U.S.' ConsensusDOCS 301, AIA Document E203/G202, and U.K.'s CIC BIM Protocol to determine how copyright protection is realized, and to formulate appropriate stipulations within the Korean construction context. The resultant requirements include stipulating ownership at to the BIM originator, adopting a license-sublicense scheme, employing a federated model, and use of a formal model delivey table to allocate responsibilities. Given Korea's adoption stage, liability should be minimal, and license revocation should be allowed if payments are not met. The three BIM legal documents focus on practical measures that allow participants to customize requirements for individual projects, and such conventions should be emulated in Korea.

PreBAC: a novel Access Control scheme based Proxy Re-Encryption for cloud computing

  • Su, Mang;Wang, Liangchen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2754-2767
    • /
    • 2019
  • Cloud computing is widely used in information spreading and processing, which has provided a easy and quick way for users to access data and retrieve service. Generally, in order to prevent the leakage of the information, the data in cloud is transferred in the encrypted form. As one of the traditional security technologies, access control is an important part for cloud security. However, the current access control schemes are not suitable for cloud, thus, it is a vital problem to design an access control scheme which should take account of complex factors to satisfy the various requirements for cipher text protection. We present a novel access control scheme based on proxy re-encryption(PRE) technology (PreBAC) for cipher text. It will suitable for the protection of data confidently and information privacy. At first, We will give the motivations and related works, and then specify system model for our scheme. Secondly, the algorithms are given and security of our scheme is proved. Finally, the comparisons between other schemes are made to show the advantages of PreBAC.

Vulnerability and Security Requirement Analysis on Security Token and Protection Profile Development based on Common Criteria Version 3.1 (보안토큰의 취약성/보안요구사항 분석 및 CC v3.1 기반 보호프로파일 개발)

  • Kwak, Jin;Hong, Soon-Won;Yi, Wan-Suck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.139-150
    • /
    • 2008
  • Recently, financial institutes and industrial companies are adopted to security token such as OTP, smart card, and USB authentication token and so on for secure system management and user authentication. However, some research institutes have been introduced security weaknesses and problems in security tokens. Therefore, in this paper, we analyses of security functions and security requirements in security token performed by analyses of standardization documents, trends, security problems, attack methods for security tokens. Finally, we propose a CC v.3.1 based security token protection profile.

A Study on the Applicability of Anonymous Authentication Schemes for Fine-Grained Privacy Protection (개인정보보호를 위한 익명 인증 기법 도입 방안 연구)

  • Ki, Ju-Hee;Hwang, Jung-Yeon;Shim, Mi-Na;Jeong, Dae-Kyeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.195-208
    • /
    • 2010
  • As information communication technologies have highly advanced, a large amount of user sensitive information can be easily collected and unexpectedly distributed. For user-friendly services, a service provider requires and processes more user information. However known privacy protection models take on a passive attitude toward user information protection and often involve serious weaknesses. In reality, information exposure by unauthorised access and mistakenly disclosure occurs frequently. In this paper, we study on the applicability of anonymous authentication services for fine-grained user privacy protection. We analyze authentication schemes and classify them according to the level of privacy newly defined in this paper. In addition, we identify security requirements that a privacy protection scheme based on anonymous authentication can achieve within legal boundary.

A Fast and Scalable Inter-Domain MPLS Protection Mechanism

  • Huang, Chang-Cheng;Messier, Donald
    • Journal of Communications and Networks
    • /
    • v.6 no.1
    • /
    • pp.60-67
    • /
    • 2004
  • With the fast growth of Internet and a new widespread interest in optical networks, the unparalleled potential of Multi-Protocol Label Switching (MPLS) is leading to further research and development efforts. One of those areas of research is Path Protection Mechanism. It is widely accepted that layer three protection and recovery mechanisms are too slow for today’s reliability requirements. Failure recovery latencies ranging from several seconds to minutes, for layer three routing protocols, have been widely reported. For this reason, a recovery mechanism at the MPLS layer capable of recovering from failed paths in 10’s of milliseconds has been sought. In light of this, several MPLS based protection mechanisms have been proposed, such as end-to-end path protection and local repair mechanism. Those mechanisms are designed for intra-domain recoveries and little or no attention has been given to the case of non-homogenous independent inter-domains. This paper presents a novel solution for the setup and maintenance of independent protection mechanisms within individual domains and merged at the domain boundaries. This innovative solution offers significant advantages including fast recovery across multiple nonhomogeneous domains and high scalability. Detailed setup and operation procedures are described. Finally, simulation results using OPNET are presented showing recovery times of a few milliseconds.

Formalizing the Design, Evaluation, and Analysis of Quality of Protection in Wireless Networks

  • Lim, Sun-Hee;Yun, Seung-Hwan;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.634-644
    • /
    • 2009
  • A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical crosslayer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks.

Blockchain based Online Pharmacy with Customer Privacy Protection

  • Im, Cheon Woon;Kim, Dong Han;Jang, Jung Eun;Shin, Eun Jung;Lee, Hyun Chul;Kim, Tae Hyun;Kim, Seong Whan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.33-36
    • /
    • 2021
  • Corona 19 minimizes face-to-face contact, and online untact platforms are emerging in the medical sector. However, there are potential risks of medicine expiration, medicine misuse, and responsible materials management for secure delivery. In this paper, we investigate three key functional requirements for online pharmacy, and design the blockchain based online pharmacy to meet the requirements. To protect the patient's privacy and to ensure tamper-free traceability, we incorporate the multi-level access authentication scheme for each participant (governments, medical circles, and patients). We show that our system guarantees patient's privacy without further system modification.

License Distribution Mechanism for the Rights Sharing Between Consumers

  • Liu, Zong-Hua;Lee, Byung-Wook;Han, Myung-Mook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.981-984
    • /
    • 2007
  • Most existing DRM systems give too much power to rights holders and have not concerned the requirements of the consumers. In this paper, we propose a mechanism for license distribution that considers the distribution of rights between consumers. we describe the protection of digital content in two digital licenses, formal license and peer license. Also we propose an extending mechanism to control the distribution of rights between consumers. For this mechanism, we define it by extending the ODRL model in the end.