RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Development of Molecular Markers for Xanthomonas axonopodis Resistance in Soybean

        Ki-Seung Kim,Kyujung Van,Moon Young Kim,Suk-Ha Lee 韓國作物學會 2004 Korean journal of crop science Vol.49 No.5

        A single recessive gene, rxp, controls the bacterial leaf pustule (BLP) resistance in soybean and in our previous article, it has been mapped on linkage group (LG) D2 of molecular genetic map of soybean. A total of 130 recombinant inbred lines (RILs) from a cross between BLP-resistant SS2-2 and BLP-susceptible Jangyeobkong were used to identify molecular markers linked to rxp. Fifteen simple sequence repeat (SSR) markers on LG D2 were screened to construct a genetic map of rxp locus. Only four SSR markers, Satt135, Satt372, Satt448, and Satt486, showed parental polymorphisms. Using these markers, genetic scaffold map was constructed covering 26.2cM. Based on the single analysis of variance, Satt372 among these four SSR markers was the most significantly associated with the resistance to BLP. To develop new amplified fragment length polymorphism (AFLP) marker linked to the resistance gene, bulked segregant analysis (BSA) was employed. Resistance and susceptible bulks were made by pooling equal amount of genomic DNAs from ten of each in the segregating population. A total of 192 primer combinations were used to identify specific bands to the resistance, selecting three putative AFLP markers. These AFLP markers produced the fragment present in SS2-2 and the resistant bulk, and not in Jangyeobkong and the susceptible bulk. Linkage analysis revealed that McctEact97 (P=0.0004,~;R2=14.67~%) was more significant than Satt372, previously reported as the most closely linked marker.

      • KCI등재

        Development of Molecular Markers for Xanthomonas axonopodis Resistance in Soybean

        Kim Ki-Seung,Van Kyujung,Kim Moon Young,Lee Suk-Ha The Korean Society of Crop Science 2004 Korean journal of crop science Vol.49 No.5

        A single recessive gene, rxp, controls the bacterial leaf pustule (BLP) resistance in soybean and in our previous article, it has been mapped on linkage group (LG) D2 of molecular genetic map of soybean. A total of 130 recombinant inbred lines (RILs) from a cross between BLP-resistant SS2-2 and BLP-susceptible Jangyeobkong were used to identify molecular markers linked to rxp. Fifteen simple sequence repeat (SSR) markers on LG D2 were screened to construct a genetic map of rxp locus. Only four SSR markers, Satt135, Satt372, Satt448, and Satt486, showed parental polymorphisms. Using these markers, genetic scaffold map was constructed covering 26.2cM. Based on the single analysis of variance, Satt372 among these four SSR markers was the most significantly associated with the resistance to BLP. To develop new amplified fragment length polymorphism (AFLP) marker linked to the resistance gene, bulked segregant analysis (BSA) was employed. Resistance and susceptible bulks were made by pooling equal amount of genomic DNAs from ten of each in the segregating population. A total of 192 primer combinations were used to identify specific bands to the resistance, selecting three putative AFLP markers. These AFLP markers produced the fragment present in SS2-2 and the resistant bulk, and not in Jangyeobkong and the susceptible bulk. Linkage analysis revealed that McctEact97 $(P=0.0004,\;R^2=14.67\%)$ was more significant than Satt372, previously reported as the most closely linked marker.

      • KCI등재후보

        강제적 보안 정책에 기반한 BLP/BIBA 융합 접근 통제 모델

        최은복,박주기 한국지식정보기술학회 2010 한국지식정보기술학회 논문지 Vol.5 No.6

        This paper presents union access control model to solve access control model's inconsistency based on the mandatory access control property. We found security definition, rule and axiom by confidentiality and integrity in mandatory access control policy as well as analyzed all union circumstances of access control model. Also, we suggest BLP/BIBA union access control model that can provide mandatory access control model's confidentiality, integrity and availability.

      • KCI등재

        안전한 리눅스 시스템을 위한 E-BLP 보안 모델과 구현

        강정민,신욱,박춘구,이동익,Kang, Jung-Min,Shin, Wook,Park, Chun-Gu,Lee, Dong-Ik 한국정보처리학회 2001 정보처리학회논문지 A Vol.8 No.4

        대부분의 안전한 운영체제는 주체와 객체에 보안 등급을 부여하여 운영하는 다중등급 정책(MLP:Multi-Level Policy)을 수용하고 있으며, BLP(Bell and LaPadula) 모델은 이 정책을 표현하는 검증된 대표적인 모델이다. 하지만 BLP 모델을 적용한 안전한 운영체제들은 사용자의 보안 등급을 프로세스에 그대로 상속하고 있음을 알 수 있다. 이러한 접근방법의 문제점은 프로세스를 전적으로 신뢰할 수 없다는 것에서 기인한다. 즉, 사용자의 보안 등급과 권한허용 범위를 오류가 내재되어 있거나 의도적으로 수정된 악의적인(malicious) 프로세스에게 그대로 상속할 경우, 시스템 안전성이 파괴될 가능성이 있다. 이는 BLP 모델이 접근 주체를 정의함에 있어서 시스템 사용자와 실제 그 접근을 대행하는 프로세스를 동일시 하도록 단순하게 정의하고 있기 때문이며, 따라서 사용자와 프로세스간 신뢰관계를 모델에 도입함으로써 해결 가능하다. 또한 다중등급 보안 운영체제들은 접근 주체인 프로세스가 접근 객체로서 존재하는 등급화 된 프로그램 실행 시, 새로운 프로세스를 위한 보안 등급을 부여해야 하는데, 접근 주체와 접근 객체의 보안 등급이 다를 경우, 보안 등급 결정 문제가 발생하며 정보보호의 목적에 위배되는 결과가 발생한다. 이에 본 논문에서는 프로세스의 신뢰성을 고려하고, 보안 등급 결정 문제를 해결할 수 있는 확장된 BLP(E-BLP) 보안 모델을 제안하고 리눅스 커널(2.4.7)에 구현한다. To design and develop secure operating systems, the BLP (Bell-La Padula) model that represents the MLP (Multi-Level Policy) has been widely adopted. However, user\`s security level in the most developed systems based on the BLP model is inherited to a process that is actual subject on behalf of the user, regardless whatever the process behavior is. So, there could be information disclosure threat or modification threat by malicious or unreliable processes even though the user is authorized in the system. These problems can be solved by defining the subject as (user, process) ordered pair and by defining the process reliability. Moreover, when the leveled programs which exist as objects in a disk are executed by a process and have different level from the process level, the security level decision problem occurs. This paper presents an extended BLP (E-BLP) model in which process reliability is considered and solves the security level decision problem. And this model is implemented into the Linux kernel 2.4.7.

      • KCI등재

        PVS를 이용한 수정된 BLP 모델의 안전성 검증

        구하성,박태규,송호근,Koo Ha-Sung,Park Tae-Kue,Song Ho-Keun 한국정보통신학회 2006 한국정보통신학회논문지 Vol.10 No.8

        안전성에 대한 이상적인 평가방법은 운영체제내의 모든 가능한 연산을 대상으로 실행 결과의 안정성 여부를 검사하는 것이다. 하지만 이는 현실적으로 불가능하다. 그러나 정형기법을 사용할 경우 운영체제 동작논리상의 안전성 보장 여부를 이론적으로 증명할 수 있다. 따라서 본 논문에서는 보안커널의 안정성 검증방법에 대하여 논하고, 정형검증의 대표적인 도구들에 대하여 비교분석을 수행하였다. 그리고 보안커널에 기반한 다중레벨 접근통제모델인 수정된 BLP(Bell & LaPadula) 모델을 검증하기에 적합한 PVS(Prototype Verification System) 검증도구를 선정하였다. 마지막으로 PVS 검증도구를 활용하여 정형명세를 작성하고, 작성된 정형명세의 검증을 통하여 수정된 BLP 모델이 안전한 보안모델이라는 것을 검증하였다. The ideal method of safety evaluation is to verify results of execution against all possible operations within operating system, but it is impossible. However, the formal method can theoretically prove the safety on actual logic of operating system. Therefore we explain the contents of the art of the safety verification of security kernel, and make a comparative study of various standardized formal verification tools. And then we assigned PVS(Prototype Verification system) of SRI(Stanford Research Institute) to verify the safety of a modified BLP(Bell & LaPadula) model, the core access control model of multi-lavel based security kernel. Finally, we describe formal specification of the revised BLP model using the PVS, and evaluate the safety of the model by inspecting the specification of the PVS.

      • Overexpression of the 3’ half of the PHYB phytochrome partially suppresses dwarfism in the brassinosteroid-insensitive bri1-5 mutant

        Yu Jeong Jeong,Soon Il Kwon,Slki Park,Su Jeoung Suh,Richard Cha,Yoong Eun Kim,Sunghwa Choe 한국육종학회 2015 한국육종학회 심포지엄 Vol.2015 No.07

        Brassinosteroids (BRs) control virtually every aspect of plant growth and development. BRs act alone or with other exogenous and endogenous signals including auxin and light. To screen for the novel player involved in BR signaling in Arabidopsis, we employed cDNA overexpression strategy. We created a cDNA library to be expressed under the 35S overexpression promoter, and introduced into a weak brassinosteroid insensitive 1 (bri1) mutant. The mutant dubbed bri1-5 with long petiole (blp) was identified to display bigger stature especially in hypocotyl and petiole length relative to bri1-5. Sequence analysis of the rescued transgene revealed that blp consisted of a chimeric DNA consisting of a 3’ half of PHYB, 2 bp insertion, and a part of a chloroplast ribosomal RNA. Re-introduction of chimeric DNA into bri1-5 recapitulated blp phenotype. The blp phenotypes being similar to phyB mutants led us to examine both the PHYB transcript and protein levels in the blp 35Spro:PHYB doubly homozygous line. Lower levels of both transcripts and proteins of PHYB suggested that introduction of the chimeric gene interfered with the stability of PHYB transcripts. Our results highlight that overexpression mutagenesis facilitates functional genomics to decipher a function of Arabidopsis genome.

      • Research on the Strategy of Role Management Based on Grid Environment

        Yi He LIU,Yu Ping QIN,Shuang ZHANG 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.2

        The grid security affects directly the development of the grid and the practical application of grid system software. The access control is one of important contents of grid security research. The traditional access control models have ignored the subject security, and can not be solved with the dynamic grid, and the characteristics of the coexistence of multiple security strategy etc problems. Regarding expanded the concepts under the common network environment subject, the object, safe service, granularity control, the concept of subject/ object decomposition and the organization classifications are defined. Using the RBAC model and BLP the model basic principle, some of the new access control security strategy based on the grid environment has been defined in the paper. After discussion shows that the new rules emphasis on the subject security, and adapt to the dynamic nature of grid environment and characteristics of the coexistence of multiple security strategy. The new rules are compatibility with existing network access control model, they are secure and are also an expansion under the common network environment access control strategy, and this has certain positive significance to the grid security research.

      • KCI등재

        Routing in Cognitive Radio Networks with Full-duplex Capability under Dynamically Varying Spectrum Availability

        Haythem Bany Salameha,Haneen Khasawneh 한국통신학회 2021 ICT Express Vol.7 No.1

        This paper proposes a routing scheme for full-duplex-(FD)-based multi-hop CRNs that attempts to maximize the packet-delivery-ratio between any source–destination pair by being aware of the time-varying nature of spectrum-availability of the operating environment. The proposed routing scheme consists of path selection and channel assignment. Two design variants are presented: one for inband- and the other for outband-FD CRNs. Our scheme is performed into three phases: path-discovery (to identify a set of feasible routes), channel-selection (to assign channels along each path) and path-selection (to select the highest effective availability-time path). Compared to a reference scheme, the simulation results indicate that being spectrum-availability-aware can achieve significant performance enhancement.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼