• Title/Summary/Keyword: 보호부담

Search Result 297, Processing Time 0.026 seconds

Ownership Guidelines of Essentially Derived Varieties in Floricultural Breeding Companies (화훼류 변이주의 소유권에 관한 종묘회사별 지침)

  • Park, In Sook;Lim, Ki Byung
    • FLOWER RESEARCH JOURNAL
    • /
    • v.17 no.3
    • /
    • pp.208-213
    • /
    • 2009
  • Since International Union for the Protection of New Varieties of Plants (UPOV) was established in 1968, the number of joined nations is getting increasing and the regime for variety protection was intensified. Korea joined as the 50th member nation in UPOV. A lot of floricultural plants including rose and chrysanthemum from foreign countries have been applied and registered by Korea Seed and Variety Service (KOSID). Since Korea is one of the importing countries in cut flowers and bulbs, paying royalty is a big burden. Now we are to identify the policy on handling of a mutant from essentially derived varieties (EDV) and relation of a finder (or grower) and breeder by different companies in each country. As a result, the rights are provided not to a finder but to a breeder (breeding company) in most industries. Second, grower's rights are recognized, but in case of the mutant is commercialized, a grower and a breeder should come to a mutual agreement. Third, there is a kind of compensation system for the finder of the mutant.

The design and Implementation of Web Security System using the Cookies (쿠키를 이용한 웹 보안시스템 설계 및 구현)

  • 송기평;박기식;한승희;조인준
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.3-14
    • /
    • 2001
  • A Web server makes use of the HTTP(Hyper Text Transfer Protocol) to communicate with a client. The HTTP is a stateless protocol; the server does not maintain any state information for ongoing interactions with the client. Therefore, the HTTP inevitably requires additional overhead as repeating data key-in to user for continuing communications. This overhead in Web environment can be resolved by the cookie technologies. However, the cookie is usually unsecured due to the clear-text to transfer on the network and to store in the file. That is, information in the cookie is easy to exposure, copy, and even change. In this paper, we propose a secure cookie mechanism appropriate to Web environment, and then present a design and implement of secure Web system based on the scheme. The Web system can be used to any web environment. It also provides some security services, such as confidentiality, authentication, integrity.

Efficient and Secure User Authentication and Key Agreement In SIP Networks (효율적이고 안전한 SIP 사용자 인증 및 키 교환)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.73-82
    • /
    • 2009
  • This paper proposes an efficient and secure user authentication and key agreement scheme instead of the HTTP digest and TLS between the SIP UA and server. Although a number of security schemes for authentication and key exchange in SIP network are proposed, they still suffer from heavy computation overhead on the UA's side. The proposed scheme uses the HTIP Digest authentication and employs the Diffie-Hellman algorithm to protect user password against dictionary attacks. For a resource-constrained SIP UA, the proposed scheme delegates cryptographically computational operations like an exponentiation operation to the SIP server so that it is more efficient than the existing schemes in terms of energy consumption on the UA. Furthermore, it allows the proposed scheme to be easily applied to the deployed SIP networks since it does not require major modification to the signaling path associated with current SIP standard.

An Aggregate Detection of Event Correlation using Fuzzy Control (퍼지제어를 이용한 관련성 통합탐지)

  • 김용민
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.135-144
    • /
    • 2003
  • An intrusion detection system shows different result over overall detection area according to its detection characteristics of inner detection algorithms or techniques. To expand detection areas, we requires an integrated detection which can be archived both by deploying a few detection systems which detect different detection areas and by combining their results. In addition to expand detection areas, we need to decrease the workload of security managers by false alarms and improve the correctness by minimizing false alerts which happen during the process of integration. In this paper, a method for aggregation detection use fuzzy inference to integrate a vague detection results which imply the characteristics of detection systems. Their analyzed detection characteristics are expressed as fuzzy membership functions and fuzzy rule bases which are applied through the process of fuzzy control. And, it integrate a vague decision results and minimize the number of false alerts by reflecting the characteristics of detection systems. Also it does minimize inference objects by applying thresholds decided through several experiments.

A Study on the Multiplexing of a Communication Line for the Physical Load Balancing-Based Prevention of Infringement (물리적 부하 균형(Load-balancing) 기반의 침해방지를 위한 통신라인 다중화에 관한 연구)

  • Choi, Hee-Sik;Seo, Woo-Seok;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.81-91
    • /
    • 2012
  • Presently in 2011, there are countless attacking tools oriented to invading security on the internet. And most of the tools are possible to conduct the actual invasion. Also, as the program sources attacking the weaknesses of PS3 were released in 2010 and also various sources for attacking agents and attacking tools such as Stuxnet Source Code were released in 2011, the part for defense has the greatest burden; however, it can be also a chance for the defensive part to suggest and develop methods to defense identical or similar patterned attacking by analyzing attacking sources. As a way to cope with such attacking, this study divides the network areas targeted for attack based on load balancing by the approach gateways and communication lines according to the defensive policies by attacking types and also suggests methods to multiply communication lines. The result of this paper will be provided as practical data to realize defensive policies based on high hardware performances through enhancing the price competitiveness of hardware infrastructure with 2010 as a start.

Secure Contents Access Control System in IPTV Flexible-PPC Model (IPTV Flexible-PPC 환경에서의 안전한 콘텐츠 접근 제어 시스템)

  • Kang, Yong-Goo;Lim, Ji-Hwan;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.93-104
    • /
    • 2011
  • A conditional access system is an essential element in IPTV services enabling service providers to allow authorized access to their services only to paid subscribers. Currently, there are two types of IPTV service models, namely PPC (pay-per-channel) and PPV (pay-per-view). However, a more desirable model would be the flexible PPC model, in which subscribers are free to choose any combination of preferred channels and add/remove channels independently. In this paper, we first point out that a previously proposed key management scheme for F-PPC is not secure. We then propose a new conditional access system using 4-level key hierarchy to realize secure F-PPC services. Compared to existing schemes, the proposed system is very efficient, just requiring O(1) communication for key update.

A Secure Communication Scheme without Trusted RSU Setting for VANET (신뢰 RSU 세팅이 필요 없는 VANET 보안통신 기법)

  • Fei, He;Kun, Li;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.75-87
    • /
    • 2010
  • Secure communication has been one of the main challenges in vehicular ad hoc networks(VANET) since broadcast messages from nearby vehicles contain life-critical information for drivers and passengers. So far various secure communication schemes have been proposed to secure the communication in VANET, and they satisfy most security requirements. However most of them need to put trust on roadside units(RSUs), which are usually deployed in unattended area and vulnerable to compromise. In this paper, we propose a secure communication scheme, which does not need to put trust on RSUs. And we adopt a grouping technique to averagely divide the huge burden in the server without jeopardizing the anonymity of users. Moreover we design a complete set of protocols to satisfy common security requirements with a relatively lower hardware requirement. At last, we evaluate the scheme with respect to security requirements, communication overhead, storage overhead and network performance.

Analysis of Zero-Knowledge Protocols for Verifiable Computation and Its Applications (연산을 검증하기 위한 영지식 증명 프로토콜의 기법 및 응용 사례 분석)

  • Ju, Chanyang;Lee, Hyeonbum;Chung, Heewon;Seo, Jae Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.675-686
    • /
    • 2021
  • According to the recent revision of Privacy Policy and the emerging importance of personal information, cooperations must verify customer identity (Know Your Costomer, KYC) while processing and managing this information so that it does not violate the Privacy Policy. One of the solution of this problem is zero-knowledge proof (ZKP). The use of the ZKP enables to verify the identity without exposing the identity information directly, thereby reducing the burden on the management of personal information while fulfilling the obligation of the cooperations to verify the identity. The ZKP could be employed to many other applications. In this paper, we analyze the ZKP technique and its applications currently being actively studied.

A Study on the Minimization of Problems of the Direct Payment for Subcontractor's Work in Public Construction Project (공공건설사업(公共建設事業) 하도급대가(下都給代價) 직접지급(直接支給)의 효과분석(效果分析)을 통한 문제점(問題點) 저감방향(低減方向)에 대한 연구(硏究))

  • Cho, Young-Jun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.5
    • /
    • pp.101-108
    • /
    • 2007
  • To execute a construction project, many construction participants are engaged in the project. Especially many subcontactors role is very important, but their contract statute seems weaker rather than prime contractor. So to protect the subcontractor and to activate fair subcontract, Fair Transactions in Subcontracting Act was enacted. Direct payment to subcontractor clause of the act can protect subcontractor from the fear of insolvency of prime contractor, on the other hand can cause dispute about the interpretation of defect liability. Therefore the positive act and regulation were examined, and the effects of direct payment to subcontractor were analyzed. And the treatment direction of direct payment were suggested in this paper. Summary is as follows; (1) Statute of subcontractor for the ordering subject must be considered (2) Contract relationship must be reflected in the performance bond, subcontract bond, and subcontract construction conditions (3) To clarify the defect liability for the direct payment, retainage to guarantee the repair during contract period may be reflect on the subcontract construction conditions.

Problems and Ways of Improvement towards the Maldevelopment of Reserved Areas of Natural Environments, Ulleung Island (울릉도 자연환경자원보호구역에서의 난개발 문제점과 개선방안)

  • Oh, Nam-Hyun
    • Journal of the Korean association of regional geographers
    • /
    • v.7 no.3
    • /
    • pp.14-28
    • /
    • 2001
  • This study is to discuss the problems due to the maldevelopment occurred at the reserved areas of natural environments of the Ulleung Island, Gyeongsangbuk-do province, and it also suggests the ways of solving them The types of the maldevelopment practiced on the Ulleung Island consist of the change of land use, the opening of a round road, the destruction of mountains for the construction of harbor, the development of tourist areas, and the construction of military facilities. The decreased habitat of animals and the pollution of drinking water are occurred by the change of land use. The destruction of ecological system is due to the opening of a round road. The damage of natural landscape and the change of ocean eco-system is closely related to the construction of harbor and the destruction of mountains. Finally, the damage of rare plants and the pollution of drinking water are due to the development of tourist areas and the construction of military facilities. In the followings, the ways of solving the problems occurred by the various types of maldevelopment are suggested. First, the planning of pro-environmental development has to be established and practiced to preserve rare plants which are damaged due to the change of land use. Second, the destruction of natural landscape and resources has to be minimized by the implementation of environmental impact assesment when road and harbor are constructed. Third, the stones needed for the development of islands ought to be imported from mainland. Fourth, the established tourist areas are needed to rationally manage and the potential tourist areas has to be transferred to the reserved areas of natural environments. Fifth, military facilities should be constructed though the cooperation of autonomous local government. Finally, government officers' and residents' conscience of protecting and reserving natural environments is needed, and government has to give residents financial supports.

  • PDF