• Title/Summary/Keyword: 제3의 신뢰기관

Search Result 40, Processing Time 0.029 seconds

Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network (모바일 Ad-hoc 네트워크에서 Hamming Distance를 이용한 인증프로토콜)

  • Lee, Seok-Lae;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.

The Effects of Energy and Environment R&D Researchers Self-Leadership and Self-Efficacy on Job Satisfaction and Job performance (에너지·환경분야 연구자의 셀프리더십이 자기효능감, 직무만족과 직무성과에 미치는 영향)

  • Yu, Hyeon-Heui;Hyun, Byung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.10
    • /
    • pp.341-350
    • /
    • 2019
  • The aim of this study was to establish research hypotheses and conduct empirical analysis to clarify the relationship between self-leadership, self-efficacy, job satisfaction, and job performance of researchers in the energy and environment fields. Data were extracted from questionnaires returned by 165 researchers in the field of energy environment among 200 questionnaires collected for approximately three weeks. The reliability, frequency, descriptive statistics, correlation analysis, multiple regression analysis, and sobel-test were examined using the SPSS 22.0 statistical program. The self-leadership of the researcher has a positive (+) effect on self-efficacy, job satisfaction, and job performance, and the researcher's self-efficacy has a positive (+) influence on both job satisfaction and job performance. In addition, the self-efficacy and job satisfaction mediated the relationship between self-leadership, and job performance. Therefore, to improve the job performance of the researchers, it is important to establish a system for the human resource management of the affiliated institutions and revitalize the education for the self-leadership and self-efficacy improvement. In addition, it is necessary to provide an appropriate compensation system to satisfy the researchers' enjoyment, satisfaction and trust in their jobs. In particular, because self-efficacy is a very important factor for job performance, it is important to prepare an institutional strategy for strengthening the self-efficacy of researchers.

Study on Procedure for Escrow Account to Resolve Controversy of Intellectual Property Right of Software for Rolling Stock (철도차량 Software 지적 재산권 분쟁 해결을 위한 Escrow Account 적용 절차에 대한 연구)

  • Park, Jun-Hyung;Cho, Chi-Hwan;Kang, Chan-Yong
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1479-1485
    • /
    • 2008
  • This paper shows the result of study on the detailed applicable procedure of software Escrow account applied for rolling stock. The customer as end-user requires software source code, related critical technical documents etc. about software based system of train for maintenance purpose through software modification and enhancement after completion of warranty period. Otherwise, it is not easy to keep up with the customer's requirement of demanding supplier's exclusive information because it is considered as intellectual property rights of supplier as software developer. Therefore, the main contractor(normally called as Car-builder) need to introduce software Escrow service in order to coordinate the different a standpoint between software developer and end-user. Software Escrow is a legal arrangement in which an software Escrow packages (software source code, software development tool, build process, proprietary information, copyright and etc.) is deposited into and Escrow account under the trust of a reliable third party (Escrow agent) depending on mutual agreement on Escrow contract condition as signing off Escrow agreement document. This paper deals with the study on the detailed procedure about the following general category of Escrow procedure and purpose to apply this specific procedure of Escrow into the future project onward.

  • PDF

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Design and Implementation of a Secure E-Document Transmission System based Certificate for CEDA (Certified E-Document Authority) (공인전자문서보관소를 위한 인증서 기반의 안전한 전자문서 전송시스템 설계 및 구현)

  • Kim, Dae-Jung;Kim, Jung-Jae;Lee, Seung-Min;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.2
    • /
    • pp.370-378
    • /
    • 2008
  • The CEDA(Certified E-Document Authority) is a reliable third party that deposit electronic document having legal effects securely, and verify contents of document or transmission. This paper focuses on a function of secure transmission among several important functions, and implements public key encryption system for secure transmission when server and user communicate for image transmission. This paper follows a standard fundamental rule of X.509 in ITU-T, and it uses symmetric encryption algorithm to raise speed of a large data operation. A key of symmetric encryption algorithm is encrypted by private key in public key system, it protects to be modified using digital signature for data integrity. Also it uses certificates for mutual authentication.

Use of Oil Red O Staining Method in Non-Comedogenic Test for Cosmetics (화장품의 면포 비유발 평가에서 오일 레드 오 염색법의 응용)

  • Lee, Sun Hwa;Lee, Jung Im;Kim, Yoo-Ri;Lee, Bum Chun;Kang, Min Ji;Choi, Kwang Seong;Moon, Tae Kee
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.39 no.3
    • /
    • pp.215-224
    • /
    • 2013
  • It has been reported that certain ingredients added to cosmetics clog the skin pores and this can cause outbreaks of comedones which are the primary sign of acne leading to inflammatory acne. This research aims to establish objective evaluation criteria for non-comedogenic cosmetics suitable for acne prone skin. The research has been carried out to examine non-comedogenic test performed in foreign clinical institutions and to establish the evaluation method for detecting comedones outbreaks through repetitive closed back-patch test, Also, usability evaluation on face skin is performed additionally to the same subjects. The analysis of the comedones collected through repetitive closed back-patch test confirmed that the test products, moisturizer and sunscreen product, did not cause comedones. These results had no correlation with the analysis result of the comedones collected from face skin or visual evaluation of acne by Global Acne Grading System (GAGS) in face usability test. Additionally, Oil red O staining was performed on the collected comedones specimen for easy distinction of comedones from hair follicle in image analysis. The analysis result of stained specimen showed higher precision than that of non-stained specimen. This study established a new version of non-comedogenic test for cosmetics, whose objectivity and reliability were improved by inclusion of comedones staining step.

A Study on the Comparison of the Backfill Loads Obtained by the Marston-Spangler에s Theory and by the Finite Element Analysis for the Metal-Polyethylene Composite Pipes (금속-폴리에틸렌 복합관에 대해서 Marston-Spagler이론과 유한요소해석에 의해 구해진 뒤채움하중의 비교에 관한 연구)

  • 정진호
    • Geotechnical Engineering
    • /
    • v.14 no.5
    • /
    • pp.89-110
    • /
    • 1998
  • Variations of backfill load on the metal-polyethylene composite( MPC ) pipes buried in various trenches backfill afterward were investigated in this paper. The backfill loads obtained by the finite element method( FBM ) were compared with those calculated by the well-known MarstonBpangler(M-5) theory. The reliability of the finite element analysis used in this study was examined by an inaitu best for the buried pipe. The backfill lords and deflections on the real-size pipe buried on-site were measured while increasing the backfill height. In addition, further investigations were made for the variations of the backfill loads as a function of several important parameters such as the backfill soil type, bach. height$(\leq4.0m)$, diameter of the pipe$(B.$1.0m)$, and trench width($\leq 3.0 B_c$). It is confirmed that the M-S theory predicts reasonably well the backfill loafs of the MPC of the M-S backfill coils be 0.13 and 0.15 for the SC and SM coils in the D unman soil model, respectively. The load ratio, Wu-s/WwgM for a narrow trench varies negligibly with the back(111 height but fiends to increase for a wide trench. The ratio increases with increasing diameter of the pipe for a narrow trench while decreasing for a wide trench. It is also found that the ratio generally decreases as the degree of compaction increases and BM soil exhibits larger load ratio than that of SC soil.

  • PDF

Prevalence and Treatment Pattern of Korean Patients with Temporomandibular Disorders (한국인 턱관절장애 환자의 유병률과 진료 양태)

  • Yang, Hee-Young;Kim, Mee-Eun
    • Journal of Oral Medicine and Pain
    • /
    • v.34 no.1
    • /
    • pp.63-79
    • /
    • 2009
  • While previous epidemiological studies on temporomandibular disorders (TMD) have been based on a given health center or population sample, no study has been performed on general population of Korea, especially concerning about treatment pattern such as clinician’s specialty involved in TMD treatment, types and amount of prescription medication and cost. This study aimed to investigate magnitude of health visits and treatment patterns for Korean patients with TMD through the computerized database of Health Insurance Review and Assessment Service (HIRAS). Inclusion criteria were all patients registered on the HIRAS database over 3 years' period from 2003 to 2005 and the medical records of patients with TMD as a main diagnosis were extracted. Information collected was as follows; distribution related to gender, age and region and type of hospital the patients visited, treatment duration, clinicians' specialty involved in treatment, cost, types of prescription medication and surgical treatment. The results of this study indicated that 0.15% of the population yearly sought TMD treatment, presenting with increase of incidence over the three years. Most of TMD patients were women (99.8%) and the biggest age group was second and third decades and decreased with age. Seoul and Kyeonggi province presented with higher incidence of TMD compared to the other regions of Korea, which seems to be related with magnitude of population. 56% of TMD patients visited primary care sector and the numbers of treatment visits was the highest in dental clinic (38.4%), followed by orthopedics (28%) and ENT (13.6%) clinics in order. Duration of prescription medication was the longest for anti-inflammatory analgesics, followed by antipsychotic drugs and muscle relaxants. Inpatient care related to TMD was primarily performed in dental hospital compared to medical hospital. Medical database of HIRAS provided comprehensive and vast information on epidemiologic characteristics and treatment patterns for patients seeking TMD treatment, which can be more reliable data to expect medical demand for TMD in condition that accurate diagnosis and standardized treatment is delivered in clinical settings.

Development of Health Promotion Program through IUHPE - Possibilities of collaboration in East Asia - (IUHPE를 통한 건강 증진 프로그램의 발달-동아시아권의 공동연구의 가능성-)

  • Moriyama, Masaki
    • Proceedings of The Korean Society of Health Promotion Conference
    • /
    • 2004.10a
    • /
    • pp.1-16
    • /
    • 2004
  • This paper considers the possibilities of health promotion from the following perspectives; (1) IUHPE, (2) socio-cultural similarities, (3) action research, and (4) learning from our past. 1. The IUHPE values decentralized activities through regions, and countries such as Japan, Korea, Hong Kong, Taiwan and China belong to NPWP region. Since IUHPE World Conference was held in Japan in 1995, Japan used to occupy more than 60% of NPWP membership. After 2001, membership is increasing rapidly in Chinese speaking sub-region. The transnational collaboration is still in its beginning phase. 2. Confucianism is one of key points. Confucian tradition should not be seen only as obstacles but as advantages to seek a form of health promotion more acceptable in East Asia. 3. Within the new public health framework, people are expected to create and live their health. However, especially in Japan, the tendency of 'lacking of face-to-face explicit interactions' is still common at health-promotion settings as well as academic settings. Therefore, the author tried participatory approaches such as asking WlFY (interactive questions designed for subjects to review their daily life and environment) and as introducing round table interactions. So far, majority of participants welcome new trials. 4. The following social phenomena are comparatively discussed after Japanese invasion and occupation of Korea ended in 1945; ·status of oriental medicine, ·separation of dispensary services, and ·health promotion specialist as a national license. In contrast to Japanese' tendency of maintaining the status quo and postponing of substantial social change, trend toward rapid and dynamic social changes are more commonly observed in Korea. Although all of above possibilities are still in their beginning stages, they are going to offer interesting directions waiting for further challenges and accompanying researches.

  • PDF

Laying the Siting of High-Level Radioactive Waste in Public Opinion (고준위 방폐장 입지 선정의 공론화 기초 연구)

  • Lee, Soo-Jang
    • Journal of Environmental Policy
    • /
    • v.7 no.4
    • /
    • pp.105-134
    • /
    • 2008
  • Local opposition and protest constitute single greatest hurdle to the siting of locally unwanted land uses(LULUs), especially siting of high-level radioactive disposal not only throughout Korea but also throughout the industrialized world. It can be attributed mainly to the NIMBYism, equity problem, and lack of participation. These problems are arisen from rational planning process which emphasizes instrumental rationality. But planning is a value-laden political activity, in which substantive rationality is central. To achieve this goals, we need a sound planning process for siting LULUs, which should improve the ability of citizens to influence the decisions that affects them. By a sound planning process, we mean one that is open to citizen input and contains accurate and complete information. In other word, the public is also part of the goal setting process and, as the information and analyses developed by the planners are evaluated by the public, strategies for solutions can be developed through consensus-building. This method is called as a co-operative siting process, and must be structured in order to arrive at publicly acceptable decisions. The followings are decided by consensus-building method. 1. Negotiation will be held? 2. What is the benefits and risks of negotiation? 3. What are solutions when collisions between national interests and local ones come into? 4. What are the agendas? 5. What is the community' role in site selection? 6. Are there incentives to negotiation. 7. Who are the parties to the negotiation? 8. Who will represent the community? 9. What groundwork of negotiation is set up? 10. How do we assure that the community access to information and expert? 11. What happens if negotiation is failed? 12. Is it necessary to trust each other in negotiations? 13. Is a mediator needed in negotiations?

  • PDF