• Title/Summary/Keyword: secure operating system

Search Result 239, Processing Time 0.03 seconds

A study on the send and receive of the message in the bolero and TEDI system (Bolero와 TEDI 시스템상의 메시지 송수신에 관한 고찰)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.7 no.2
    • /
    • pp.105-121
    • /
    • 2004
  • The purpose of this paper is to study the send and receive of the message in the both Bolero and TEDI System. Bolero System is the business processes and methods, together with the digital information system, which are provided by Bolero International for communicating Messages and Documents and facilitating business transactions, as well as the Bolero Rulebook and Operating Rules governing their use. On the other hand, The TEDI System replaces a series of trade documents with electronic date, and it realizes secure and reliable transactions of data among parties by means of open networks, such as the Internet. The TEDI system is composed of Web browsers, TC Servers, a RSP Server, and Certification Servers.

  • PDF

The policy study on the power grid operation strategy of new and renewable energy combined generation system (도서지역의 신재생에너지복합발전 전력계통 운영방안에 관한 정책연구)

  • Kim, Eui Hwan
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.109.1-109.1
    • /
    • 2011
  • KEPCO was operating power plants with diesel generators in 49 islands including Baekryeong-Do, and the generation capacity was about 66 MW in 2008. The cost of fuel is increasing by the international oil price inflation and continuous rise of oil price is predicted. For the stabilizing of electric power supply to the separate islands, renewable energy and fuel cell systems were considered. Hydrogen is made using renewable energy such as wind power and solar energy, and then a fuel cell system generates electricity with the stored hydrogen. Though the system efficiency is low, it is treated as the only way to secure the stable electric supply using renewable energy at this present. The analytic hierarchy process was used to select suitable candidate island for the system installation and 5 islands including Ulleung-Do were selected. Economic evaluation for the system composed of a kerosene generator, a wind power, an electrolysis, and a fuel cell system was conducted with levelized generation cost based on present value methode. As the result, the necessity of renewable energy combined generation system and micro grid composition in the candidated islands was confirmed. Henceforth, the development of an integration technology which connects micro grid to the total power grid will be needed.

  • PDF

The Design of Remote Digital Evidence Acquisition System for Incident Response of Smart Grid Devices (스마트그리드 기기 보안 침해사고 대응을 위한 원격 증거 수집 시스템 설계)

  • Kang, SeongKu;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.49-60
    • /
    • 2015
  • Smart Grid devices are the major components of the Smart Grid. They collect and process a variety informations relating power services and support intelligent power services by exchanging informations with other SG devices or systems. However, If a SG device is attacked, the device can provide attack route to attacker and attacker can attack other SG devices or systems using the route. It may cause problem in power services. So, when cyber incident is happened, we need to acquire and examine digital evidence of SG device quickly to secure availability of SG. In this paper, we designed remote evidence acquisition system to acquire digital evidences from SG devices to response quickly to incidents of SG devices. To achieve this, we analyzed operating environment of SG devices and thought remote digital evidence acquisition system of SG devices will be more effective than remote digital evidence acquisition system targeted general IT devices. So, we introduce design method for SG devices remote evidence acquisition system considered operating environment of SG devices.

A Study on DRT System Introduction for Aging Society : A Case Study on Kimhae City (고령화사회의 DRT(Demand Responsive Transit)시스템 도입방안에 관한 연구 - 김해시를 중심으로 -)

  • Oh, Yun-Pyo;Kim, Jae-Youl
    • Journal of Korean Society of Rural Planning
    • /
    • v.14 no.3
    • /
    • pp.27-36
    • /
    • 2008
  • Rapid increase of aging population and progressed migration from rural areas to urban areas have caused deficit of bus routes in local cities. This increasing burden of operation deficit affects the movement strategy of the transportation vulnerable who are using buses. Along with dramatically increased aging in Korea, there is an urgent need to implement a new method which can guarantee mobility rights of public transportation especially for the elderly. This study focuses on the case of Demand Responsive Transit(DRT) system that has been operating in America, Europe, Japan, etc. Kimhae(Sangdong-myeon and Saengnim-myeon) is selected as a study area. This study investigated the possibility of adopting DRT system on the perspectives of the consumer and provider by the analysis of traffic condition such as the number of transportation vehicles, present bus service and regulation and conduct of questionnaire survey which includes present bus service and DRT system and so on. In conclusion, DRT system in Kimhae city will reduce transport cost, increase affordability through the betterment of service level and secure mobility rights for the transportation vulnerable.

Design and Implementation of File Access Control Module Based on Multi-Operating System (멀티 운영체제 기반의 파일 접근 제어 모듈 설계 및 구현)

  • Soh, Woo-Young
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.123-131
    • /
    • 2007
  • Recently, various threat and security incident are occurred for unspecified individuals, and this problem increases as the rapid of information sharing through Internet. The using of Information Security System such as IDS, Firewall, VPN etc. makes this problem minimal. However, professional knowledge or skill is needed in that case, normal user can't operate the Information Security System. This paper designs and implements File Access Control Module(FACM) to use easily for normal user against malicious threats and attacks. The FACM can exclude from malicious threats and attacks based on operation system rather than detection of threats and attacks. The FACM is working not only Windows System but also Linux System, and the FACM has effect on access control, integrity and non-repudiation for a file with an access control over files on the each OS that are used by multi-user.

  • PDF

A study on the difference in management performance according to the quality management system introduction level of small and medium-sized manufacturing companies (중소제조기업의 품질경영시스템 도입 수준에 따른 경영성과 차이 연구)

  • Lee, JuYong;Joo, HyungKun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.2
    • /
    • pp.61-75
    • /
    • 2022
  • The purpose of this study is to analyze the impact of quality management system requirements, a management innovation technique, on business performance to secure the competitiveness of SMEs in an environment of increasing uncertainty in the global economy and intensifying competition. To this end, a survey was conducted on small and medium-sized enterprises (SMEs) operating a quality management system, and statistical analysis was performed through validity and reliability analysis, regression analysis, and group analysis using IBM SPSS 26.0. As a result of the study, it was found that planning, operation, support, and improvement, which are the core requirements of a quality management system, have a positive effect on business performance. In addition, through group analysis, it was found that the effect of quality management system requirements on business performance varies according to the level of the company. This means that the importance of quality management requirements required for strategy establishment varies according to the quality management introduction level of small and medium-sized manufacturers, and it can be used for small and medium-sized manufacturers to set strategic directions.

Study on Data-link Antenna System for UAV (무인기용 탑재 데이터링크 안테나 시스템에 관한 연구)

  • Yeo, Su-Cheol;Kang, Byoung-Wook;Bae, Ki-Hyeong;Yoon, Chang-Bae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.1
    • /
    • pp.9-14
    • /
    • 2020
  • In this paper, we studied on-board antenna(primary link/secondary link/satellite link) used in UAV Data-link system. As a result, it is ideal to configure the Data-link as a triple link to secure the flight stability of the UAV, but the communication link should be configured according to the operating platform. As a result of overseas R&D trend analysis, the on-board Data-link antenna is installed and operated in a location where it is easy to secure LOS. The primary link consists of a directional antenna for basic operation and an omni-directional antenna for emergency operation. The secondary link uses a monopole/dipole antenna in the UHF/C band. Satellite link has been developed to apply phased array antenna to improve UAV operability.

Design of the secure data management system using homomorphic encryption (준동형 암호를 이용한 안전한 데이터 관리 시스템 설계)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Choi, Kang-Im;Ryou, Hwang-Bin;Shin, Hyo-Young
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.91-97
    • /
    • 2015
  • General companies consider saving the information after enciphering as law. However, if the actual information is saved as enciphered, the decoding process must be conducted when the information is searched or edited in the ser ver. Therefore, process delay time occurs and is less efficient. This kind of work gives burden to the server, so the companies or managers handling the server do not save the information after enciphering. In this paper, the Networ k constructs and realizes an efficient security data management system that ensures safety and haste in operating u sing the homomorphic encryption technology, which collects information and decides quickly, and enables editing the encryption without a decoding process. To ensure the security of the embodied system, the existing encryption algo rithm can be used. Search method to use the keyword search. Additionally, by using a trapdoor, the keyword is not expose and it is changed whenever it is searched, and the formation of the keyword does not get exposed.

Design & Test of Stereo Camera Ground Model for Lunar Exploration

  • Heo, Haeng-Pal;Park, Jong-Euk;Shin, Sang-Youn;Yong, Sang-Soon
    • Korean Journal of Remote Sensing
    • /
    • v.28 no.6
    • /
    • pp.693-704
    • /
    • 2012
  • Space-born remote sensing camera systems tend to be developed to have very high performances. They are developed to provide extremely small ground sample distance, wide swath width, and good MTF (Modulation Transfer Function) at the expense of big volume, massive weight, and big power consumption. Therefore, the camera system occupies relatively big portion of the satellite bus from the point of mass and volume. However, the camera systems for lunar exploration don't need to have such high performances. Instead, it should be versatile for various usages under various operating environments. It should be light and small and should consume small power. In order to be used for national program of lunar exploration, electro-optical versatile camera system, called MAEPLE (Multi-Application Electro-Optical Payload for Lunar Exploration), has been designed after the derivation of camera system requirements. A ground model of the camera system has been manufactured to identify and secure relevant key technologies. The ground model was mounted on an aircraft and checked if the basic design concept would be valid and versatile functions implemented on the camera system would worked properly. In this paper, results of design and functional test performed with the field campaigns and air-born imaging are introduced.

RADIATION MONITORING SYSTEM FOR ADVANCED SPENT FUEL CONDITIONING PROCESS FACITLITY

  • Kook Dong-Hak;Choung Won-Myung;Lee Eun-Pyo;You Gil-Sung;Cho Il-Je;Kwon Kie-Chan;Lee Won-Kyoung;Ku Jeoung-Hoe
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2005.11b
    • /
    • pp.149-155
    • /
    • 2005
  • The $ACP^1$ is under development for effective management of spent fuel by converting $UO_2$ into U-metal. For demonstration of this process, $\alpha-\gamma$ type new hotcell was built in the $IMEF^2$ basement. To secure against radiation hazard, this facility needs radiation monitoring system which will observe the entire operating area before the hotcell and service area at back of it. This system consists of 7 parts; Area Monitor for $\gamma$-ray, Room Air Monitor for particulate and iodine in both area, Hotcell Monitor for hotcell inside high radiation and rear door interlock, Duct Monitor for particulate of outlet ventilation, Iodine Monitor for iodine of outlet duct, CCTV for watching workers and material movement, Server for management of whole monitoring system. After installation and test of this, radiation monitoring system will be expected to assist the successful ACP demonstration.

  • PDF