• 제목/요약/키워드: mandatory access control

검색결과 49건 처리시간 0.028초

Context-Based Mandatory Access Control Model (컨텍스트 기반 강제적 접근통제 모델)

  • Oh, Yi-Myun;Choi, Eun-Bok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2004년도 춘계학술발표대회
    • /
    • pp.1161-1164
    • /
    • 2004
  • 정보통신기술의 급속한 발전과 웹을 통한 기업모델의 다양화로 인해 개인정보를 통한 새로운 경영기법의 발전은 향상되었던 반면 개인정보의 오용과 남용은 인터넷 발전의 가장 큰 저해 요소 중 하나로 대두되게 되었다. 그러므로 방대한 정보를 부당한 사용자로부터 보호하면서 개인의 프라이버시를 보장하기 위해서는 적절한 접근통제 정책이 요구되어진다. 본 논문에서는 Biba 모델의 엄격한 무결성 정책에 대한 접근모드, 시스템 상태정보 그리고 주체의 생성과 실행에 따른 제약조건을 기술하였다. 또한, 객체의 용도(purpose)와 접근권한의 제약조건으로 구성되는 컨텍스트를 엄격한 무결성 정책에 적용하므로서 주체에 의한 객체정보의 임의적 연산을 방지하므로서 객체 정보를 보호할 수 있다.

  • PDF

An Efficient Test Access Mechanism for System On a Chip Testing (시스템 온 칩 테스트를 위한 효과적인 테스트 접근 구조)

  • Song, Dong-Seop;Bae, Sang-Min;Gang, Seong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • 제39권5호
    • /
    • pp.54-64
    • /
    • 2002
  • Recently System On a Chip(SoC) design based on IP cores has become the trend of If design To prevent the testing problem from becoming the bottleneck of the core-based design, defining of an efficient test architecture and a successful test methodology are mandatory. This paper describes a test architecture and a test control access mechanism for SoC based on IEEE 1149.1 boundary,scan. The proposed SoC test architecture is fully compatible with IEEE P1500 Standard for Embedded Core Test(SECT), and applicable for both TAPed cores and Wrapped cores within a SOC with the same test access mechanism. Controlled by TCK, TMS, TDI, and TDO, the proposed test architecture provides a hierarchical test feature.

Real-Time Transaction Scheduling Method without Timing Covert Channel (시간 비밀 채널을 제거하는 실시간 트랜잭션 스케줄링 기법)

  • 조숙경;김종훈;정현민;정미영;배영호;배해영
    • Journal of the Korea Computer Industry Society
    • /
    • 제4권12호
    • /
    • pp.1053-1068
    • /
    • 2003
  • In this paper, we propose a new scheduling method without timing covert channel of real-time transaction for secure database systems that implement mandatory access control. Our scheduling method use the wait queue based on security level to remove timing covert channel. And it use priority queue that consider transaction type, deadline, and weight. Therefore, the proposed scheduling method prevents timing covert channel because it is kept noninterference between transactions with different security level, and maximizes the sum of the weight of transactions that satisfy its deadline. The simulation results, is a comparison of traditional methods, show that our scheduling method is improved to 30%.

  • PDF

Implementation and Evaluation of Multi-level Secure Linux (다중등급 보안 리눅스 구현 및 시험평가)

  • 손형길;박태규;이금석
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제9권3호
    • /
    • pp.311-321
    • /
    • 2003
  • A current firewall or IDS (intrusion detection system) of the network level suffers from many vulnerabilities in internal computing servers. For a secure Linux implementation using system call hooking, this paper defines two requirements such as the multi-level security function of TCSEC B1 and a prevention of hacking attacks. This paper evaluates the secure Linux implemented in terms of the mandatory access control, anti-hacking and performance overhead, and thus shows the security, stability and availability of the multi-level secure Linux. At the kernel level this system protects various hacking attacks such as using Setuid programs, inserting back-door and via-attacks. The performance degradation is an average 1.18% less than other secure OS product.

Urgent problems and solution strategies in 2nd cycle of long-term care hospital accreditation (요양병원 인증 2주기 당면과제 및 해결방안)

  • Kim, Kyung Sook
    • Korea Journal of Hospital Management
    • /
    • 제21권3호
    • /
    • pp.65-70
    • /
    • 2016
  • The Long-Term Care Hospital (LTCH) accreditation system was initiated in 2013 in the form of mandatory accreditation system in order to improve patient safety and the quality of medical service at LTCHs. By June 2016, the accredited LTCHs were 76.2%. This research was conducted to review the implementation process in the first cycle and to promote development of the second cycle of LTCH accreditation system. There are some changes which reinforced the accreditation standards, accreditation survey, and public access to accreditation results in order to strengthen patient safety in the first cycle LTCH accreditation system. LTCHs which participated in the accreditation system achieved certain outcomes in respect to patient safety and employee satisfaction. However, there are several urgent problems in placement criteria of night duty health care providers, reinforcement plans in the accreditation system, and incentives for accredited hospitals. In order to solve these problems, the most important thing is to clearly recognize the fact that the healthcare accreditation system is not the means for control and regulate hospitals but a system to induce hospitals to continue to strive for improvements in patient safety and medical service quality. In addition, it is required that LTCHs, accrediting agency and the Ministry of Health and Welfare compromise and cooperate to seek solutions every time issues related to the accreditation system arise.

Importance-Performance Analysis (IPA) of Cyber Security Management: Focused on ECDIS User Experience

  • Park, Sangwon;Chang, Yeeun;Park, Youngsoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • 제27권3호
    • /
    • pp.429-438
    • /
    • 2021
  • The mandatory installation of the ECDIS (Electronic Chart Display and Information System) became an important navigational equipment for navigation officer. In addition, ECDIS is a key component of the ship's digitalization in conjunction with various navigational equipment. Meanwhile, cyber-attacks emerge as a new threat along with digitalization. Damage caused by cyber-attacks is also reported in the shipping sector, and IMO recommends that cybersecurity guidelines be developed and included in International Security Management (ISM). This study analyzed the cybersecurity hazards of ECDIS, where various navigational equipment are connected. To this end, Importance-Performance Analysis (IPA) was conducted on navigation officer using ECDIS. As a result, the development of technologies for cyber-attack detection and prevention should be priority. In addition, policies related to 'Hardware and Software upgrade', 'network access control', and 'data backup and recovery' were analyzed as contents to be maintained. This paper is significant in deriving risk factors from the perspective of ECDIS users and analyzing their priorities, and it is necessary to analyze various cyber-attacks that may occur on ships in the future.

Design and Verification of IEEE 802.11a Baseband Processor (IEEE 802.11a 기저대역 프로세서의 설계 및 검증)

  • Kim, Sang-In;Kim, Su-Young;Seo, Jung-Hyun;Yun, Tae-Il;Lee, Je-Hoon;Cho, Kyoung-Rok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • 제44권6호
    • /
    • pp.9-17
    • /
    • 2007
  • This paper shows an implementation of the baseband processor compliant with the IEEE 802.11a standard. Some innovative techniques are proposed to fulfill the mandatory requirements of the standard. For verification and analysis of this design, we use a Platform-based SoC (system on chip) environment. The entire system consists of test-board for the baseband processor chip and the SoC platform for implementing MAC (medium access control).

Polyinstantiation for spatial data for multilevel secure spatial database (다단계 보안 공간 데이터베이스를 위한 공간 다중인스턴스화)

  • 오영환;이재동;임기욱;배해영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제11권1호
    • /
    • pp.43-54
    • /
    • 2001
  • In this paper we study the use of polyinstantiation for spatial data, for the purpose of solving cover in topology channel in multilevel secure spatial database systems. Spatial database system with topological structure has a number of spatial analysis function using spatial data and neighbored one\`s each other. But. it has problems that information flow is occurred by topological relationship in spatial database systems. Geographic Information System(CIS) must be needed mandatory access control because there ,are many information flow through positioning information And topological relationship between spatial objects. Moreover, most GIS applications also graphe user interface(GUI). In addressing these problems, we design the MLS/SRDM(Multi Level Security/Spatial Relational Data Model) and propose polyinstantiation for spatial data for solving information flow that occurred by toplogical relationship of spatial data.

The Effect of Safety Education Satisfaction of Apartment Residents and Application of Fire Protection Plan on Fire Safety Awareness (아파트 거주자의 안전교육 만족도와 소방계획서의 활용성이 화재안전의식에 미치는 영향)

  • Kim, Sang-Sig;Kong, Ha-Sung
    • Fire Science and Engineering
    • /
    • 제34권1호
    • /
    • pp.103-114
    • /
    • 2020
  • The purpose of this study is to investigate the effect of apartment residents' safety education satisfaction and the application of fire protection plans on fire safety awareness. The analysis results are as follows. First, the low levels of satisfaction with safety education content had a negative effect on anxiety about fire safety. This means that apartment residents' low levels of interest or participation in education affected their safety awareness, which prevented them from securing safety from fire. It is necessary for control staff to have a positive impact on their educational satisfaction via the learning support information system, among others, in order to create a satisfying education and safety culture. Second, competence in the execution of firefighting plans had a positive effect on fire safety awareness. These results indicate that apartment residents do not have the opportunity to access the education and training necessary for safety, nor the legal responsibility to complete mandatory safety education, which leads to their lack of safety awareness. Therefore, the control staff need to raise awareness of fire safety and the importance of participating in safety education among apartment residents by strengthening and activating the execution of firefighting plans in order to ensure safe living. Third, the competency of the firefighting plans moderated the effects of apartment residents' educational satisfaction on their awareness of fire safety.