• Title/Summary/Keyword: 인증정책

Search Result 710, Processing Time 0.026 seconds

The Effects of AEO Certification on Firm's Performance : Panel Data Analysis (AEO 인증이 기업성과에 미치는 영향 : 패널데이터 분석)

  • Ha, Eui-Hyun
    • Korea Trade Review
    • /
    • v.41 no.4
    • /
    • pp.91-110
    • /
    • 2016
  • AEO certification has a positive effect on firm's performance. Therefore, this study analyzed the effect of AEO certification on firm's performance using panel data analysis for firm to have international competitiveness. It uses the Hausman-Taylor test for effective solutions of endogenous matter. In terms of the result of analysis, AEO certification has a positive effect on domestic and foreign sales, especially direct benefit and business process improvement of AEO certification have a positive effect on domestic and foreign sales through the improvement of international logistics flow. In conclusion, this study proposes the policy of AEO certification by analyzing the effect of AEO certification on firm's performance by using the panel data analysis.

  • PDF

Transferring Access Policies Between Active Nodes Using Identities (아이덴티티를 이용한 능동 노드들간의 접근 정책 전송 방법)

  • 김영수;한종욱;서동일;손승원
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.182-187
    • /
    • 2003
  • 액티브 네트워크 환경에서 액티브 노드(라우터 또는 스위치)의 기능은 액티브 익스텐션(active extension)에 의해 다이나믹하게 확장될 수 있다 즉, 액티브 노드 기능을 확장하는 소프트웨어 모듈을“익스텐션”이라 할 수 있다. 이러한 융통성(flexible)이 강한 구조는 새로운 네트워크 프로토콜과 서비스들을 활성화시키고 있으나, 다른 한편으로는 매우 심각한 안전성(safety)과 보안(security) 문제를 야기 시키게 된다. 본 논문에서 다루는 액티브 익스텐션 관련 보안 문제는 하나의 액티브 노드상의 익스텐션이 다른 액티브 노드에 접근하려 할 경우 이에 대한 제어 방법이 반드시 제공되어야 한다는 것이다. 특히, 이 문제에서는 액티브 노드들간의 인증(authentication)이 매우 중요하다. 여기에서는 액티브 노드들간의 접근 정책 전송을 위해 각 객체가 갖는 고유 정보인 아이덴티티(identity)를 이용한다. 우리는 본 논문에서 아이덴티티를 통하여 액티브 노드들간의 인증(authentication)을 행하는 새로운 방식의 접근 정책(access policy) 전송 방법을 제안한다.

  • PDF

A Study on the Certificate Based Authorization Policy in a PKI Environment (PKI 환경에서 인증서 기반 권한 정책에 관한 연구)

  • Shin, Myeong-Sook;Song, Gi-Beom;Lee, Joon
    • Annual Conference of KIPS
    • /
    • 2005.05a
    • /
    • pp.1221-1224
    • /
    • 2005
  • 권한 정책은 정책 인증서, 사용-조건 인증서, 속성 인증서로 구성되며, 안전하고 신뢰성 있는 사용자의 권한을 제공한다. 다양한 형태의 사용자 인증, 무결성, 부인 방지의 보안 서비스를 제공하는 공개키 기반 구조는 비대면한 상황에서 사용자의 인증을 위해서 좋은 해결책을 제시하여 주고 있지만 지역적으로 떨어져 있는 컴퓨팅 환경에서 권한에 대한 해결책을 제시하기에는 미흡한 것 또한 사실이다. 따라서 본 논문에서는 분산 환경에서 분산된 사용자들이 사용할 수 있는 AAS 권한 모델을 제안하고, 리눅스 기반 아파치 웹 서버에서 AAS 모듈을 설계하였다.

  • PDF

Trend Analysis and Policy Implications of Wellness Tourism Policy in Korea and Japan (한국과 일본의 웰니스관광정책 동향 분석 및 정책적 함의)

  • Kim, Sang-Yoon
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.6
    • /
    • pp.183-195
    • /
    • 2021
  • This study compared and analyzed the trends of wellness-related tourism polices in Japan, which have policy similarities with Korea, through related literature research and online interview surveys amid growing demand for wellness tourism in Korea's wellness tourism policy implications. According to the survey, wellness tourism-related concepts do not differ particularly between Korea and Japan, and the use of health tourism or wellness tourism concepts is more common in Japan than healing tourism. Wellness tourism policy is analyzed to be more systematic in Japan in the areas of policy principal agent's flexibility, policy efficiency, related certification, and human resource development, and Korea in the driving force and institutional maintenance of policy. It was judged that Korea needs to establish a wellness tourism consultative body, such as the case of Japan, and improve efficiency through systematic certification of wellness tourism and qualitative management of related manpower. In order to industrialize wellness tourism, it is necessary to increase the healing effectiveness and product value of wellness tourism by organically linking wellness resources specialized by region, and to conduct in-depth analysis of the direction and strategies of wellness tourism policies in preparation for the post-Corona(COVID-19) Era and an empirical study of tourism sites.

Analysis of Chinese Consumer Preference of Country of Origin for Apples based on National Organic Certification (사과의 국가별 유기인증 결합에 대한 중국 소비자 선호분석)

  • Kwon, Jae-Hyun;Kim, Jeong-Nyeon;Hong, Na-Kyoung;Kim, Tae-Kyun
    • Current Research on Agriculture and Life Sciences
    • /
    • v.32 no.4
    • /
    • pp.225-230
    • /
    • 2014
  • This study investigates the effect of organic certification of apples on consumer preference in China as a way to support the expanded export of Korean apples to China. A choice experiment was designed to analyze the apple consumption in China. A total of 298 Chinese consumers answered the survey, and multinomial logit models were used to analyze the results. Organic certification was identified as an important determinant of consumer preference for apples in China, affecting both the evaluation and choice of country of origin. The results also indicated that Korean organic certification significantly increased the probability of Chinese consumers choosing Korean apples. Thus, organic certification by the Korean government should be strengthened to promote apple exports to China, plus the results of this study may provide useful information to promote agricultural product exports and improve the organic certification system.

Pseudonym Management in Autonomous Driving Environment (자율주행환경에서 가명성 관리)

  • Hong, Jin Keun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.29-35
    • /
    • 2017
  • In this paper, we describe certificate policy and characteristics in cooperation condition with Cooperative intelligent transport system and autonomous driving vehicle. Among the authentication functions of the vehicle, there is a pseudonym authentication function. This pseudonymity is provided for the purpose of protecting the privacy of information that identifies the vehicle driver, passenger or vehicle. Therefore, the purpose of the pseudonym certificate is to be used for reporting on BSM authentication or misbehavior. However, this pseudonym certificate is used in the OBE of the vehicle and does not have a cryptographic key. In this paper, we consider a method for managing a pseudonym authentication function, which is a key feature of the pseudonym certificate, such as location privacy protection, pseudonym function, disposition of linkage value or CRL, request shuffling processing by registry, butterfly key processing, The authentication policy and its characteristics are examined in detail. In connection with the management of pseudonymes of the vehicle, the attacker must record the BSM transmission and trace the driver or vehicle. In this respect, the results of this study are contributing.

Disconnection of Wireless LAN Attack and Countermeasure (무선 LAN 연결 해제 공격과 보안)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.453-458
    • /
    • 2013
  • In a wireless LAN environment, security is the most important. Security of 802.11 standard has many vulnerabilities of the network attack. IEEE has created mechanisms to security for this vulnerability. But the vulnerabilities is characteristic of broadcast in the air in wireless LAN, it is more disclosure then other network environments. In a wireless LAN environment, it can be accessed to the wireless LAN after authentication. Authentication process is one of most important because of the first security step. However, in the authentication process is not mentioned in the method of reducing the disclosure maximum fundamental. Therefore, in this research, the vulnerability of 802.11 are presented and how to do de-authentication in 802.11.

Analysis of the Government New Technology Certification System (정부의 신기술 인증 정책의 비교 분석)

  • 송학현;최세하;김하식;김윤호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.35-38
    • /
    • 2003
  • The subject of the national new Technology certification system is in which domestic enterprise have competition above international market. Rep. of the korea Government, Ministry of Information and communication(MIC), Ministry of science and technology(MOST), Ministry of Commerce, Industry and energy(MOCIE), ministry of Construction and Transportation(MOCT), Ministry of Marin and fishery(MOAf) excutive the certification Regulations. These Ministry have the new Technology certification rules each of the scope of the their main job. These rules same the subject, proposal qualification and the property, but difference certification reference. So, this article suggestions about new Technology certification system.

  • PDF

A Study of Automatically Resources Authentication over Grid VO (그리드 VO 상에서의 자동화된 자원 인증 시스템 연구)

  • 이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.739-743
    • /
    • 2004
  • The Grid VO(Virtual Organization) is temporary VO where gather indivisual, authority, or system resource, differ from previous VO concept that controled by internal principal and policy set. It have many problems in case of indivisuals, authorities, or system resources that became member of some Grid VO at same time and combination followed changing condition of system resource for building Grid VO. This paper propose lightweighted Grid VO authentication system based on XML security to solve the authentication of the problems occuring in building Grid VO. In this paper, Grid VO authentication system is including Grid VO authentication module that is intermediate management system in PKI to previous authentication service structure and provide effective authentication service to Grid VO.

  • PDF

A Study on Single Authentication Service through Inter-working in Extranet Environments (익스트라넷 환경에서 상호 연동을 통한 단일 인증 서비스에 대한 연구)

  • 손태식;이건희;유정각;이규호;박종운;김동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.721-723
    • /
    • 2001
  • 익스트라넷 환경에서는 인트라넷 환경에서 고려되는 보안 문제는 물론이고, 이와 함께 익스트라넷 환경 내의 여러조직사이에 공유되는 자원의 관리 및 사용자에 대한 접근 제어에 있어 많은 문제를 가지고 있다. 본 논문에서는 익스트라넷 환경에서의 보안 문제를 해결하기 위해 익스트라넷 내부의 여러 도메인을 PKI(Public Key Infrastructure)를 기반으로 상호 연동하는 방안을 제안한다. 또한 상호 연동된 여러 도메인 사이의 상호 인증을 통해 익스트라넷 사용자에 대한 단일 인증 서비스를 제공하는 방안을 제안한다. 각 도메인 내부에는 도메인의 사용자 정보를 가지고 있는 사용자 관리 서버를 두고, 이 사용자 관리 서버에서는 사용자에 대한 인증과 응용 서버에 접근하여 응용 서비스를 제공받을 수 있는 서비스 티켓을 발급한다. 사용자 관리 서버에서 부여된 권한 정보가 담긴 서비스 티켓을 통하여 각 응용 서버는 응용 서버 자신의 보안 정책에 맞는 권한 속성을 접근하는 사용자에게 부여한다. 따라서 사용자의 인증은 PKI 기반으로 상호 연동되어 있는 도메인내의 사용자 관리 서버에서 한번 이루어지며 이때 발급한 서비스 티켓의 권한 정보를 통하여 사용자는 권한에 맞는 권한 속성에 따라 응용 서비스를 각 응용 서버에서 독립적으로 제공받을 수 있다.

  • PDF