• Title/Summary/Keyword: restricted access to information

Search Result 80, Processing Time 0.029 seconds

Industry Secret Information Leakage Prevention : Focus on the Utilization of IoT (기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.101-110
    • /
    • 2017
  • The purpose of this study is to examine possibilities of industry secret information leakage through IoT devices and to prevent information leakage from the perspective of administrative and technique security. From the administrative security perspective, first, it is important to face the possibility of industry information data leakage through anyone who can access companies and should establish guidelines to limit the use of IoT devices when entering companies. Second, security management guideline should be prepared by companies or upon user's request and use of any electronic devices sharing wireless internet connection should be eliminated or restricted. From technique security perspective, channels that sharing IoT devices in computers should be controlled since industry secret information are stored in computers and servers. Furthermore, IoT devices that accessing wireless internet network or devices that already registered should be regularly checked in order to minimize any information leakage. Lastly, data and information stored in computers and servers should be encrypted.

Thermal Stability of SiO2 Doped Ge2Sb2Te5 for Application in Phase Change Random Access Memory

  • Ryu, Seung-Wook;Ahn, Young-Bae;Lee, Jong-Ho;Kim, Hyeong-Joon
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.11 no.3
    • /
    • pp.146-152
    • /
    • 2011
  • Thermal stability of $Ge_2Sb_2Te_5$ (GST) and $SiO_2$ doped GST (SGST) films for phase change random access memory applications was investigated by observing the change of surface roughness, layer density and composition of both films after isothermal annealing. After both GST and SGST films were annealed at $325^{\circ}C$ for 20 min, root mean square (RMS) surface roughness of GST was increased from 1.9 to 35.9 nm but that of SGST was almost unchanged. Layer density of GST also steeply decreased from 72.48 to 68.98 $g/cm^2$ and composition was largely varied from Ge : Sb : Te = 22.3 : 22.1 : 55.6 to 24.2 : 22.7 : 53.1, while those of SGST were almost unchanged. It was confirmed that the addition of a small amount of $SiO_2$ into GST film restricted the deterioration of physical and chemical properties of GST film, resulting in the better thermal stability after isothermal annealing.

Development of RESTful Web Service for Loading Data focusing on Daily Meteorological Data (데이터 로딩 자동화를 위한 RESTful 웹서비스 개발 - 일별 기상자료 처리를 중심으로 -)

  • Kim, Taegon;Lee, JeongJae;Nam, Won-Ho;Suh, Kyo
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.56 no.6
    • /
    • pp.93-102
    • /
    • 2014
  • Generally data loading is a laborous job to develop models. Meteorological data is basic input data for hydrological models, it is provided through websites of Korea Meteorological Administration (KMA). The website of KMA provides daily meteorological observation data with tabular format classified by years, items, stations. It is cumbersome to manipulate tabular format for model inputs such as time series and multi-item or multi-station data. The provider oriented services which broadcast restricted formed information have caused inconvenient processes. Tim O'Reilly introduces "Web 2.0" which focuses on providing a service based on data. The top ranked IT companies such as google, yahoo, daum, and naver provide customer oriented services with Open API (Application Programming Interface). A RESTful web service, typical implementation for Open API, consists URI request and HTTP response which are simple and light weight protocol than SOAP (Simple Object Access Protocol). The aim of this study is to develop a web-based service that helps loading data for human use instead of machine use. In this study, the developed RESTful web service provides Open API for manipulating meteorological data. The proposed Open API can easily access from spreadsheet programs, web browsers, and various programming environments.

Implementation and Performance Analysis of Pointer Swizzling Method for Effective Access to Complex Objects (복합 객체의 효율적인 접근을 위한 포인터 스위즐링 방법의 구현 및 성능 분석)

  • Min, Jun-Gi;Gang, Heum-Geun;Lee, Seong-Jin;Jeong, Jin-Wan
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.395-404
    • /
    • 1999
  • 포인터 스위즐링 기법은 포인터 스위즐링과 언스위즐링으로 이루어지며, 포인터 스위즐링은 객체 접근 시 객체 식별자를 해당 객체의 메모리 주소로 교체하는 것을 말하며, 언스위즐링은 객체 교체 또는 객체 저장 시에 스위즐링된 포인터를 원래의 객체 식별자로 환원하는 것을 말한다. 본 연구에서는 시스템 버퍼 구조에 따라 여러 포인터 스위즐링 기법을 분류하여 장단점을 분석하였으며, 이중 버퍼 구조 상에서 적극/소극, 직접/간접 스위즐링, 언스위즐링 모듈을 설계, 구현하였다. 또한 제한된 크기의 객체 버퍼 상에서 각 포인터 스위즐링 모듈의 성능을 평가하였다. 이 성능 평가의 결과로는 사용하지 않는 포인터는 스위즐링하지 않으며 언스위즐링 부담이 적은 소극 간접 스위즐링 기법이 일반적으로 뛰어난 성능을 나타냄을 알 수 있게 되었다.Abstract The pointer swizzling methods consist of pointer swizzling and unswizzling. Pointer swizzling replaces the OID of a object to the memory address of the object at object access time and unswizzling replaces the swizzling pointer of the OID at object replacement time or object save time. In this research, the different techniques for pointer swizzling are classified according to the system buffer structure and analyzed the pros and cons. In addition, eager/lazy, direct/indirect swizzling, unswizzling modules are designed and implemented on a dual buffering structure. Also, we evaluate the performance of pointer swizzling modules on the restricted object buffer size. The results of performance evaluation show that the performance of lazy indirect pointer swizzling technique is generally good because unused pointers are not swizzled, and unswizzling overhead is minimized.

An Implementation Method of HB-Family Light-weight Authentication for Device Authentication between ECU (ECU간 기기인증을 위한 HB-Family 경량인증기법의 적용 방법)

  • Kim, Tae Su;Kim, Hyoseung;Woo, Samuel;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.593-607
    • /
    • 2013
  • The In-Vehicle-Networking(IVN) of modern cars is constituted by an small electronic control device called ECU. In the past, there was no way to be able to access the IVN of a driving car. so IVN has been recognized as a closed environment so there is no need to exist authentication protocol between devices which are to configure the internal network and to communicate with other devices. However, constant improvements made it possible to access the IVN in many different ways as the communication technology evolves. This possibility created a need for device authentication in IVN. HB-Family are representative authentication schemes in RFID environment which has similar restrictions to IVN. In this paper, we propose an implementation method of HB-Family for device authentication between ECU considering ECU has low computing power and the message field of CAN protocol has restricted size of 8 bytes. In order to evaluate the efficiency and availability of the authentication schemes adopted our method, we have evaluated the performance based on DSP-28335 device. Further, it was possible to improve the efficiency rate of at lest 10%, up to 36%, and we then analyze this result in various aspects of the IVN.

Tolerance Computation for Process Parameter Considering Loss Cost : In Case of the Larger is better Characteristics (손실 비용을 고려한 공정 파라미터 허용차 산출 : 망대 특성치의 경우)

  • Kim, Yong-Jun;Kim, Geun-Sik;Park, Hyung-Geun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.2
    • /
    • pp.129-136
    • /
    • 2017
  • Among the information technology and automation that have rapidly developed in the manufacturing industries recently, tens of thousands of quality variables are estimated and categorized in database every day. The former existing statistical methods, or variable selection and interpretation by experts, place limits on proper judgment. Accordingly, various data mining methods, including decision tree analysis, have been developed in recent years. Cart and C5.0 are representative algorithms for decision tree analysis, but these algorithms have limits in defining the tolerance of continuous explanatory variables. Also, target variables are restricted by the information that indicates only the quality of the products like the rate of defective products. Therefore it is essential to develop an algorithm that improves upon Cart and C5.0 and allows access to new quality information such as loss cost. In this study, a new algorithm was developed not only to find the major variables which minimize the target variable, loss cost, but also to overcome the limits of Cart and C5.0. The new algorithm is one that defines tolerance of variables systematically by adopting 3 categories of the continuous explanatory variables. The characteristics of larger-the-better was presumed in the environment of programming R to compare the performance among the new algorithm and existing ones, and 10 simulations were performed with 1,000 data sets for each variable. The performance of the new algorithm was verified through a mean test of loss cost. As a result of the verification show, the new algorithm found that the tolerance of continuous explanatory variables lowered loss cost more than existing ones in the larger is better characteristics. In a conclusion, the new algorithm could be used to find the tolerance of continuous explanatory variables to minimize the loss in the process taking into account the loss cost of the products.

An Analysis on Teacher Librarians' Self-reported Appraisals about School Library-based Instruction (도서관 활용수업에 대한 사서교사의 자기평가 분석)

  • Song, Gi-Ho
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.3
    • /
    • pp.5-23
    • /
    • 2016
  • The aim of this study is to analyze the effect and limitation of teacher librarians' self-reported appraisals and suggest it's activation plans about school library based instruction (SLBI). According to results of analyses, the SLBI begin with subject teachers' demand for learning materials and teacher librarians play their educational role in Information search & access and representation & synthesis of information during the instruction. Compared with previous studies, the limitations of SLBI we can see in this study are restricted role of teacher librarians, exclusive attitude and antipathy to classroom opening of subject teachers under the SLBI. The bars of promoting the SLBI are also the difficulty of collaborative working with several same subject teachers and subject classroom system. The ways of activating the SLBI suggested in their self-reported appraisals are building intimacy with subject teachers and participating actively curriculum council, peer-supervision and demonstration classes.

A Method for Enhancing Timely-Delivery and Security Using IGPT in Content-Centric Networking (콘텐츠 중심 네트워킹에서 IGPT를 이용한 적시성 및 보안성 향상 방안)

  • Jung, Seunghoon;Park, Heungsoon;Kwon, Taewook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.11
    • /
    • pp.743-754
    • /
    • 2014
  • Recently, Information-Centric Networking(ICN), different from traditional IP-based networking, has been highlighted. Content-Centric Networking(CCN), proposed by Van Jacobson, is a representative scheme of the ICN architectures. It can deliver messages slightly faster than the IP-based networking by focusing on the access and delivery to the content itself. However, CCN is restricted to distribute the information without transmitting the request packet in advance because it is pull-based architecture by content requester. In addition, it has a problem that the Pending Interest Table(PIT) could be overloaded easily when DDoS attack happens. In this paper, we suggest an algorithm using a push-based scheme without request packets and overcoming PIT overload situation by Interest Group Push Table(IGPT). The proposed scheme enables to transmit a large amount of content than an existing scheme during the same amount of time in terms of timely-delivery and security.

A Survey Research on the Circulation System for Students of College and University Libraries in Korea (한국 대학도서관 학생 관외대출제도에 관한 조사연구)

  • 손정표
    • Journal of Korean Library and Information Science Society
    • /
    • v.9
    • /
    • pp.145-178
    • /
    • 1982
  • This is a survey of the circulation system for students in college & university libraries in Korea. The survey used a questionnaire with 14 questions on 6 items concerning the various aspects of the circulation system in 82 libraries responded among 85 college & university libraries as of 1981. The survey results discovered many problems needing improvement. The following list describes the measures needed to better the problems found in the survey results of 82 libraries. 1. 67.1% of the libraries shows the restricted volumes loaning less than 2 volumes, and 81.7% of the libraries shows the loan periods less than a week, but it is desirable to extend them, when comparing with the size of holdings and the higher educational system at present. 2. It is desirable that the number of a staff in charge of circulation works places one person per average 75-85 books borrowed a day, when calculating an adequate number of the staff on the basis of the correlation between books borrowed a day and number of the staff. 3. 59.8% of the libraries does not have reserved book system, but it is desirable to take it for increasing reliability about the circulation services. 4. More than half of the libraries takes a method of a public announcement on a notice-board for claims of overdue books, but it is desirable to send a claim notice to the individual in viewpoint of keeping their privacies. 5. More than half of the libraries to take the open access system uses a call slip, but it is desirable not to use it in viewpoint of simplicity and economical efficiency of the charging system, because of demanding the unnecessary records. 6. Most of libraries shows many problems of the charging system, especially in factors of the records and filing system, but it is desirable to improve it on the basis of 4 basic factors of the charging system, that is, simplicity, economical efficiency, promptitude and accuracy.

  • PDF

A Study on the CMOS Camera robust to radiation environments (방사선 환경에 강인한 CMOS카메라에 관한 연구)

  • Baek, Dong-Hyun;Kim, Bae-Hoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.27-34
    • /
    • 2020
  • Human access is restricted to environment where radiation sources are used, however observation equipment should be radiation-resistant as it is exposed. Therefore, if tungsten with the highest specific gravity and melting point and the lowest lead were selected to reduce the dose to the Cobalt 60 radiation source to 1/8, Tu had a volume of 432.6cm3, a thickness of 2.4cm, and Pb had a volume of 961cm3,, a thickness of 3.6cm. By applying this method, produced a radiation resistant CMOS camera with a camera module using a CMOS Image sensor and a radiation shielding structured housing. As a result of applying the head detachable 2M AHD camera (No. ①) that survived the experiment to select the optimal shielding thickness, when shielding the associated equipment such as cameras, adapters, etc. is achieved, it was confirmed that the design of the structure is appropriate by operating well at doses higher than 1.88×106rad. Therefore, it is expected to secure the camera technology and business feasibility that can be applied to high radiation environments.