A novel network architecture to be deployed in Korea is so called HTN (highly trusted network). The aim of HTN is the seamless communication of information in a secure manner, anytime and anywhere, in the national administration network infrastructure. In this paper, we present the results of information security modeling for the HTN. Through the use of security modeling procedure, we derive the requirements and corresponding technology for security control of the system by analyzing threat elements and attack possibility. First we analyze threat of each component for the HTN by STRIDE modeling and later construct an attack tree by analyzing attack examples for every threat. Finally we propose the security requirements and technology to respond against them, based on the analyzed threats and attack examples.
In the queueing literature, achievable performances for average delay and probability of loss have been tmditionally referred to aa conservation laws. Such laws provide the theoretical background for scheduling problem and for the design of tmfic control schemes in broadband communication networka. The conservation laws presented so far, deal with single performance meaaures such aa delay only or loss only, under a single arrival or service control. Our emphaaw in this paper w on laws for combined arrival and service controls. We ab0 present a dynamic queueing discipline that achieves the specified performance objectives for both delay and loss requirements.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.