• Title/Summary/Keyword: security architecture

Search Result 1,075, Processing Time 0.032 seconds

A Study on Network Security Modeling using Single Sign-On (Single Sign-On을 적용한 네트워크 보안 모델링)

  • 서희석;김희완
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.49-56
    • /
    • 2004
  • With the growing usage of the networks, the users in the Internet uses some kinds of web server. They confused that each web server uses the different user ID and passwords. To solve these problems, SSO (Single Sign-On) solution is introduced. We presents the modeling methods which are efficiently constructed the network management models. We constructed the intrusion detection systems and firewalls using the SSO. This architecture is efficient to manage the network usage and control. SSO solution designed on the small scale Intranet. CA server in the 550 that depends on PKI (Public Key Infrastructure) is used to issue the certificates. SHTTP based on SSL (Secure Socket Layer) is used to protect the data between certificate server and the intranet users.

  • PDF

The Study on the Elementary Schoolchild's the Fear of Crime in Pedestrian Environment around Elementary School in Detached Housing Area - Focused on the Pedestrian path around 5 Elementary School in Ilsan New Town - (초등학교 주변 보행환경에 대한 초등학생의 범죄 불안감 조사 연구 - 일산 다세대 주택지에 위치하는 5개 초등학교 주변 보행환경을 중심으로 -)

  • Lee, You-Mi
    • KIEAE Journal
    • /
    • v.15 no.2
    • /
    • pp.69-78
    • /
    • 2015
  • Purpose: The aim of this study was to analyze the elementary schoolchildren's the fear of crime in pedestrian environment of elementary school for providing the basic design resource. Method:In order to deal with that, the questionnaire survey on the elementary schoolchildren's the fear of crime were conducted in 5 elementary schools in Ilsan new town. The results of the 293 questionnaires survey were analyzed through SPSS program. Result: The main results were as follows. The level of fear of crime in pedestrian environment differed in these 5 elementary schools because of the width of pedestrian path, the concealed place around pedestrian path, the nearness of park, the height/shape/interval of trees, the number of car and the closure-watching in the school caused by fence and trees and so on. The level of fear of crime in pedestrian environment differed between that of boy groups and that of girls groups because of the number of emergency bell/telephon, the shape of pedestrian path, the number of security office, the number of car and the concealed place around pedestrian path and so on.

Predictive maintenance architecture development for nuclear infrastructure using machine learning

  • Gohel, Hardik A.;Upadhyay, Himanshu;Lagos, Leonel;Cooper, Kevin;Sanzetenea, Andrew
    • Nuclear Engineering and Technology
    • /
    • v.52 no.7
    • /
    • pp.1436-1442
    • /
    • 2020
  • Nuclear infrastructure systems play an important role in national security. The functions and missions of nuclear infrastructure systems are vital to government, businesses, society and citizen's lives. It is crucial to design nuclear infrastructure for scalability, reliability and robustness. To do this, we can use machine learning, which is a state of the art technology used in various fields ranging from voice recognition, Internet of Things (IoT) device management and autonomous vehicles. In this paper, we propose to design and develop a machine learning algorithm to perform predictive maintenance of nuclear infrastructure. Support vector machine and logistic regression algorithms will be used to perform the prediction. These machine learning techniques have been used to explore and compare rare events that could occur in nuclear infrastructure. As per our literature review, support vector machines provide better performance metrics. In this paper, we have performed parameter optimization for both algorithms mentioned. Existing research has been done in conditions with a great volume of data, but this paper presents a novel approach to correlate nuclear infrastructure data samples where the density of probability is very low. This paper also identifies the respective motivations and distinguishes between benefits and drawbacks of the selected machine learning algorithms.

Indoor Passive Location Tracking and Activity Monitoring using WSN for Ubiquitous Healthcare

  • Singh, Vinay Kumar;Lee, Seung-Chul;Lim, Hyo-Taek;Myllyla, Risto;Chung, Wan-Young
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.4
    • /
    • pp.382-388
    • /
    • 2007
  • Indoor location system using wireless sensor network technology was applied for the status evaluation and activity monitoring of elderly person or chronic invalid at home. Location awareness application is transparent to the daily activities, while providing the embedded computing infrastructure with an awareness of what is happening in this space. To locate an object, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. By using only the sensor nodes without any external network infrastructure the cost of the system was reduced while the accuracy in our experiments. was fairly good and fine grained between 7 and 15 cm for location awareness in indoor environments. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object and several applications are enabled for context awareness.

Analysis of Shared Life between the Elderly and the Young at Homeshare in Seoul based on Case Studies

  • Suh, Kuee-Sook
    • Architectural research
    • /
    • v.22 no.3
    • /
    • pp.97-104
    • /
    • 2020
  • The Homeshare Program was promoted to solve the housing problems of the elderly and the young by the Seoul City in 2012. The elderly can provide spare rooms in their homes for the young at low rental fees, and the young can provide daily services to the elderly, cooperating with each other for better housing and life. The aim of this research is to find out how the participants use the shared space and what kinds of activities are shared in homeshare. This research uses case studies, which interviews 10 cases of homeshare in Seoul. The contents of the research are investigated shared spaces of the elderly, and analyzed contents of interaction lives in shared spaces. The elderly experience loneliness while living alone, and having someone to live with gives them comfort and a sense of security, and this is one motive for participating in homeshare. The elderly and the young share many equipment and shared activities and interactions in shared space. The homeshare program makes it possible for the elderly to aging in place and have interactive relationships with different generations. Therefore, homeshare may the formation of a new family, and new dwelling utilizing the elderly's house.

Enforcement of opacity security properties for ship information system

  • Xing, Bowen;Dai, Jin;Liu, Sheng
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.8 no.5
    • /
    • pp.423-433
    • /
    • 2016
  • In this paper, we consider the cybersecurity issue of ship information system (SIS) from a new perspective which is called opacity. For a SIS, its confidential information (named as "secret") may be leaked through the working behaviors of each Distributed Control Unit (DCU) from an outside observer called an "intruder" which is able to determine ship's mission state by detecting the source of each data flow from the corresponding DCUs in SIS. Therefore we proposed a dual layer mechanism to enforce opacity by activating non-essential DCU during secret mission. This mechanism is calculated by two types of insertion functions: Safety-assured insertion function ($f_{IS}$) and Admissibility-assured insertion function ($f_{IA}$). Due to different objectives, $f_{IS}$ is designed to confuse intruder by constructing a non-secret behaviors from a unsafe one, and the division of $f_{IA}$ is to polish the modified output behaviors back to normal. We define the property of "$I_2$-Enforceability" that dual layer insertion functions has the ability to enforce opacity. By a given mission map of SIS and the marked secret missions, we propose an algorithm to select $f_{IS}$ and compute its matchable $f_{IA}$ and then the DCUs which should be activated to release non-essential data flow in each step is calculable.

A Study on Secure Routing using Secure Zone and Nodes Authentication in Wireless Ad Hoc Network (Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.161-169
    • /
    • 2014
  • Wireless Ad Hoc Network is suitable for emergency situations such as and emergency, disaster recovery and war. That is, it has a characteristic that can build a network and use without help of any infrastructure. However, this characteristic is providing a cause of many security threats. In particular, routing attack is not applied the existing routing methods as it is and it is difficult to determine accurately whether nodes that participate in routing is malicious or not. The appropriate measure for this is necessary. In this paper, we propose a secure routing technique through a zone architecture-based node authentication in order to provide efficient routing between nodes. ZH node is elected for trust evaluation of the member nodes within each zone. The elected ZH node issues a certification of the member nodes and stores the information in ZMTT. The routing involvement of malicious nodes is blocked by limiting the transfer of data in the nodes which are not issued the certification. The superior performance of the proposed technique is confirmed through experiments.

A Study on the Floating House for New Resilient Living (새로운 탄력적인 생활을 위한 플로팅 주택에 대한 연구)

  • Moon, Changho
    • Journal of the Korean housing association
    • /
    • v.26 no.5
    • /
    • pp.97-104
    • /
    • 2015
  • This paper aims to discuss the concept of resilience in floating housing, to investigate the resilient features of floating houses & to review the possibility of floating housing as a new form of resilient living, and to suggest some reference ideas for the planning and design of floating housing projects. Resilient features of the floating house can be summarized as the buoyant characteristics for natural disasters, the easy employment & potential use of renewable and nearly self-sufficient energy systems in locations subject to limited energy sources, the movability, mobility, long life, water recycle system, prefabrication and modular construction with the potential for reduced environmental impact. Additional benefits include the potential for a peaceful and comfortable atmosphere due to direct connections with nature, good relationship with neighbors, a solid social spirit of unity, and sense of security. Considering the resilient features of floating house at a time of serious climate change requires a new paradigm, and floating/amphibious/floatable housing has great possibility as a new form of resilient living.

Multimedia Presentation Authoring and Virtual Collaboration in Medicine

  • Hong, Chul-Eui
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.6
    • /
    • pp.690-696
    • /
    • 2010
  • Web-based virtual collaboration is increasingly gaining popularity in almost every area in our society due to the fact that it can bridge the gap imposed by time and geographical constraints. However, in medical field, such collaboration has been less popular than other fields. Some of the reasons were timeliness, security, and preciseness of the information they are dealing with. In this paper, we are proposing a web-based distributed medical collaboration system called Virtual Collaboration System for Medicine (VCSM) for medical doctors that meet the needs. The proposed system consists of two parts - multimedia presentation and recordable virtual collaboration. The former supports synchronized multimedia presentation using Synchronous Multimedia Integration Language (SMIL.) It allows synchronization of the contents of a PowerPoint presentation file and a video file. The presentation may be provided to the participants before the discussion begins. Next, in the virtual collaboration stage, participants can use text along with associated symbols during the discussion over the presented medical images. The symbols such as arrows or polygons can be set or removed dynamically to represent areas of interest in digital images using so called layered architecture that separates image layer from annotation layer. XML files are used to record participants' opinions along with the symbols over some particular images

Privacy Authorization for Internet Identity Management System (인터넷 Identity 관리 시스템을 위한 프라이버시 인가)

  • Roh Jong-Hyuk;Jin Seung-Hun;Lee Kyoon-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.648-659
    • /
    • 2005
  • One's identity on the Internet has been disclosed and abused without his consent. Personal information must be protected by appropriate security safeguard. An Individual should have the right to know whether his personal details have been collected and stored. This paper proposes various conceptual models for designing privacy enabling service architecture in the Internet identity management system. For the restriction of access to personal information, we introduce the owner's policy and the management policy The owner's policy should provide the user with enough information to manage easily and securely his data. To control precisely and effectively all personal information in the Identity provider, we propose the privacy management policy and the privacy authorization model.