• Title/Summary/Keyword: 보장성강화

Search Result 352, Processing Time 0.027 seconds

A Critical Study on Welfare Decentralization of Roh Government (참여정부 복지분권화에 대한 비판적 고찰)

  • Ku, In-Hoe;Yang, Nan-Joo;Lee, Won-Jin
    • Korean Journal of Social Welfare
    • /
    • v.61 no.2
    • /
    • pp.61-84
    • /
    • 2009
  • There has been a continuous debate on decentralization of welfare. The proponents of decentralization argue that it will enhance the autonomy of local governments and the efficiency in the provision of service. However, the opponents argue that it will lead to the welfare reduction and the increased inequality among localities. This study attempts to deal with the question, focusing on the evaluation of decentralization reform of Roh Government. The main results are as follows: After the decentralization, local governments has undergone hardships in financing the welfare service, while there is no clear evidence that the local autonomy has enhanced. In respect of fiscal role-sharing, local duties has significantly increased because of the insufficient grants-in-aid for decentralization and inappropriate formula in assessing the grants. In respect of functional role-sharing, the decreased role of central government made it difficult for local governments to provide enough residential institution for the elderly and the disabled. To improve the decentralization reform, deliberate reclassification is needed to decide which item should be transferred to localities. Regarding the characteristic of the projects, social services could be transferred in the long run, while central government should take more responsibilities for the income guarantee and protection for the disadvantaged.

  • PDF

Efficient RFID Search Protocols Providing Enhanced User Privacy (강화된 사용자 프라이버시를 보장하는 효율적인 RFID 검색 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Nyang, Dae-Hun;Lee, Mun-Kyu;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.347-356
    • /
    • 2009
  • In an RFID search protocol, a reader uses designated query to determine whether a specific tag is in the vicinity of the reader. This fundamental difference makes search protocol more vulnerable to replay attacks than authentication protocols. Due to this, techniques used in existing RFID authentication protocols may not be suitable for RFID search protocols. In this paper, we propose two RFID search protocols, one based on static ID and the other based on dynamic ID, which use counter to prevent replay attacks. Moreover, we propose a security model for RFID search protocols that includes forward/backward traceability, de-synchronization and forgery attack. Based on this model, we analyze security of our protocols and related works.

IoT Multi-Phase Authentication System Using Token Based Blockchain (블록체인 기반의 토큰을 이용한 IoT 다단계 인증 시스템)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.6
    • /
    • pp.139-150
    • /
    • 2019
  • IoT(Internet of Things) security is becoming increasingly important because IoT potentially has a variety of security threats, including limited hardware specifications and physical attacks. This paper is a study on the certification technology suitable for the lightened IoT environment, and we propose a system in which many gateways share authentication information and issue authentication tokens for mutual authentication using blockchain. The IoT node can be issued an authentication token from one gateway to continuously perform authentication with a gateway in the block-chain network using an existing issued token without performing re-authentication from another gateway participating in the block-chain network. Since we do not perform re-authentication for other devices in a blockchain network with only one authentication, we proposed multi phase authentication consisting of device authentication and message authentication in order to enhance the authentication function. By sharing the authentication information on the blockchain network, it is possible to guarantee the integrity and reliability of the authentication token.

BCON : Blockchain-based Content Management Service Using DID

  • Kim, Hye-Won;Lee, Young-Eun;Kwon, Min-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.97-105
    • /
    • 2021
  • In this paper, we propose BCON, a service that allows individuals to store personal contents safely, and reliably guarantee their ownership of contents, certifying their identities with DIDs(Decentralized identifiers). DID technology, which supports decentralized identification service based on a blockchain that cannot forgery or alter data, allows users to selectively provide their information, controlling personal information and reinforcing their sovereignty over their identity. BCON stores information about the content specified by a user on the blockchain and Authenticates the user's identity based on DID technology. It also provides functions for the user to safely upload and download the user's content to a distributed database. BCON consists of the content service verifier, the content storage service, the content management contract, and the user application, administrating rhe DID registry for Authority management.

A Design of Blockchain-based LoRa Multi-hop Network for Smart Grid (스마트 그리드를 위한 블록체인 기반 LoRa 멀티홉 네트워크 설계)

  • Jeon, Seongho;Kim, Seungku
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.440-448
    • /
    • 2021
  • This paper presents problems of network technology in smart grid and implements a blockchain-based LoRa multi-hop network to solve them. Since some smart grid applications are operated in harsh environments, it is difficult to establish communication infrastructure. We propose a LoRa network with multi-hop using the Flooding routing protocol. Smart grid environment composes an independent network using various power grid protocols depending on the application. Since this has a problem that an independent infrastructure must be established for each network, a single gateway device supports multiple power grid protocols to implement a method for network integration. Lastly, the author applied Hyperledger-based blockchain to the LoRa network to ensure the integrity of data in a smart grid environment, and strengthened security by physically distributing it. After constructing the three suggestions on the actual test bed, we confirmed that the network operates normally through experiments.

Design of DID-based Verification Protocol for Strengthening Copyright Holders' Sovereignty (저작권자의 주권 강화를 위한 DID 기반 검증 프로토콜 설계)

  • Kim, Ho-Yoon;Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.9
    • /
    • pp.47-58
    • /
    • 2022
  • Digital content is difficult to distinguish between the original and the replica due to its nature. For this reason, NFT technology using blockchain technology is attracting attention because it can guarantee the proof and scarcity of the original digital content. However, the NFT buyer does not own the copyright to the digital content, but the ownership. In particular, since the minting process of issuing NFTs is possible for anyone, there is a copyright threat to the copyright holder. In this study, we propose a verification protocol based on DID for the process of issuing and transacting NFTs for copyright protection of copyright holders' digital contents. As a research method, the problems of research cases related to digital contents were analyzed and the safety was comparatively analyzed. NFT issuance can only be issued by copyright holders whose identity has been verified through DID, and only users who have completed authentication can participate in the transaction to prevent indiscriminate theft and use of digital content and form a safe and transparent transaction market.

Disparities in High-cost Outpatient Imaging Test Utilization between Private Health Insurance Subscribers and Non-subscribers: Changes Following the National Health Insurance Benefit Expansion Policy (민간의료보험 가입자와 미가입자 간 외래 고가영상검사 이용의 격차: 건강보험 보장성 강화 정책에 따른 변화)

  • Yukyung Shin;Young Kyung Do
    • Health Policy and Management
    • /
    • v.33 no.3
    • /
    • pp.325-337
    • /
    • 2023
  • Background: While there are many studies estimating the effects of private health insurance on various types of health care utilization, few have examined how such effects change in conjunction with important policy reforms in national health insurance (NHI). This study examined how the effect of private health insurance (supplemental and fixed cash benefit) on high-cost outpatient imaging test utilization changed following the expansion of magnetic resonance imaging (MRI) coverage in 2018, which is a key example of the NHI benefit expansion policy in recent years. Methods: Data from the 2017 and 2019 Korea Health Panel Survey, which contained information about healthcare utilization before and after the expansion of MRI coverage in 2018, were used. The incremental effect of private health insurance on high-cost outpatient imaging test utilization for each period were quantified and compared, with special attention given to the type of private health insurance. Results: While people with supplemental private health insurance were more likely to use high-cost outpatient imaging tests than those without, both before and after the expansion of MRI coverage, the incremental effect increased from 1.6% points in 2017 to 2.5% points in 2019. Conclusion: Benefit expansion in NHI does not necessarily reduce disparities in the use of health care between private health insurance subscribers and non-subscribers. The results of our study also suggest that the path through which private health insurance affects healthcare utilization may not be limited to the price mechanism alone but can be more complex.

Design of a Neuro-Fuzzy System Using Union-Based Rule Antecedent (합 기반의 전건부를 가지는 뉴로-퍼지 시스템 설계)

  • Chang-Wook Han;Don-Kyu Lee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.13-17
    • /
    • 2024
  • In this paper, union-based rule antecedent neuro-fuzzy controller, which can guarantee a parsimonious knowledge base with reduced number of rules, is proposed. The proposed neuro-fuzzy controller allows union operation of input fuzzy sets in the antecedents to cover bigger input domain compared with the complete structure rule which consists of AND combination of all input variables in its premise. To construct the proposed neuro-fuzzy controller, we consider the multiple-term unified logic processor (MULP) which consists of OR and AND fuzzy neurons. The fuzzy neurons exhibit learning abilities as they come with a collection of adjustable connection weights. In the development stage, the genetic algorithm (GA) constructs a Boolean skeleton of the proposed neuro-fuzzy controller, while the stochastic reinforcement learning refines the binary connections of the GA-optimized controller for further improvement of the performance index. An inverted pendulum system is considered to verify the effectiveness of the proposed method by simulation and experiment.

A New Healthcare Policy in Korea Part 3: Ultrasound and MRI in Urogenital Disorders (새로운 건강보험 보장성 강화 대책 3부: 비뇨생식기 초음파 및 MRI 급여 확대)

  • Young Sup Shim;Kye Jin Park
    • Journal of the Korean Society of Radiology
    • /
    • v.81 no.5
    • /
    • pp.1083-1095
    • /
    • 2020
  • Since 2019, ultrasound and magnetic resonance imaging for evaluation of urogenital disorders have been covered by the National Health Insurance (NHI) in Korea. Patients with urogenital malignancies were already insured by NHI for ultrasound and MRI. With the expansion of NHI coverage, patients with suspected prostate or gynecologic cancer, uterine fibroids before myomectomy and some other benign disease such as congenital anomaly can receive benefits of NHI. In consideration of these changes, radiologists and other clinicians should be aware of the indications and standard images of each examination and the required reporting forms. Clinical application based upon thorough understanding of the NHI guidelines will aid in improving the standard care of patients.

History of the National Health Insurance Cost for Radiological Examinations and Value of the Radiological Report Fee (영상의학과 보험수가 역사와 판독료의 가치)

  • Choong Wook Lee
    • Journal of the Korean Society of Radiology
    • /
    • v.81 no.5
    • /
    • pp.1038-1052
    • /
    • 2020
  • Advancements of medical care with the use of new medical technologies have been promoting public health, but they can also place a financial burden on individuals and the country. Since the introduction of the health insurance system in 1977, the South Korean government has been attempting to control medical expenses. Radiological examinations have been a major target for cost reduction. Meanwhile, the radiological report fee has been combined with the technical fee for a long time; hence, its value has not been independently evaluated, and was also decreased proportionally with examination cost reduction. However, in the revised medical fee estimation system for MRI, the report fee has begun to be calculated separately from the technical fee, significantly contributing to the evaluation of the radiologists' work value. In conclusion, radiologists need to know and actively participate in the process of determining the insurance cost of radiological examinations and reports to get a proper value of their professionalism.